• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 24
  • 5
  • 5
  • 5
  • 3
  • Tagged with
  • 58
  • 12
  • 10
  • 10
  • 8
  • 8
  • 7
  • 7
  • 7
  • 7
  • 6
  • 6
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Text Classification of Legitimate and Rogue online Privacy Policies : Manual Analysis and a Machine Learning Experimental Approach

Rekanar, Kaavya January 2016 (has links)
No description available.
32

A reestruturação conceitual e taxonômica dos weak e rogue states: securitização do subdesenvolvimento e instrumentalização política / The conceptual and taxonomic restructuring of the weak and rogue states: securitization of underdevelopment and political instrumentalization

Silva, Murilo Mesquita Melo e 01 April 2013 (has links)
Submitted by Elesbão Santiago Neto (neto10uepb@cche.uepb.edu.br) on 2018-05-07T20:39:23Z No. of bitstreams: 1 PDF - Murilo Mesquita Melo e Silva.pdf: 46412607 bytes, checksum: ee09611d76ad0dbbfe935355448b9f56 (MD5) / Made available in DSpace on 2018-05-07T20:39:23Z (GMT). No. of bitstreams: 1 PDF - Murilo Mesquita Melo e Silva.pdf: 46412607 bytes, checksum: ee09611d76ad0dbbfe935355448b9f56 (MD5) Previous issue date: 2013-04-01 / CAPES / This Dissertation aims to analysis the formation and utilization of state taxonomies weak states and rogue states, according to their political instrumentalization. The hypothesis is that happened a conceptual and taxonomic restructuring from weak to rogue states since the securitization of underdevelopment of the weak states and of political instrumentalization of rogue states taxonomy. The analysis of hypothesis is based on postcolonial approaches as theoric-methodologic substratum. In analysis of weak states the aim is to contextualize the beginning of construction of this taxonomy, since of underdevelopment securitization process. In analysis of rogue states the aim is verified the process of construction of rogue taxonomy and how maintains this process itself. As final considerations, there is not a conceptual and taxonomic restructuring so unanimous. If the assumptions of Rational Modern State were accepted, some States may be considered weak, but not rogue, while another may be called rogue, but not weak. It was found, however, the political exploitation of state's taxonomies, according to the diagnoses made by outside actors of state to be cataloged, especially by the United States. / Essa dissertação tem por objetivo analisar a formação e utilização das taxonomias estatais weak states e rogue states à luz da instrumentalização política das mesmas. A hipótese é que houve uma reestruturação conceitual e taxonômica dos weak para rogue states a partir da securitização do subdesenvolvimento dos weak states e da instrumentalização política da taxonomia rogue states. Na análise da hipótese foram utilizadas as abordagens pós-coloniais como substrato teórico-metodológico. Na análise dos weak states o objetivo é contextualizar o início do processo de construção da taxonomia weak, desde o processo de securitização do subdesenvolvimento. Na análise dos rogue states o objetivo é verificar o processo de construção dessa taxonomia e como ela se sustenta. Por fim, considera-se que não há uma reestruturação conceitual e taxonômica de forma unânime. Se, se aceitar as premissas do Estado Racional Moderno, alguns Estados podem ser considerados weak, mas não rogue, enquanto outros podem ser rogue, mas não weak. O que se verifica, no entanto, é a instrumentalização política das taxonomias, segundo os diagnósticos elaborados por atores externos ao Estado a ser catalogado, principalmente pelos Estados Unidos.
33

Využití analýzy scénářů při řízení operačního rizika / Managing operational risk using scenario analysis

Vostatek, Jan January 2011 (has links)
The master thesis is dealing with the contemporary issues of operational risk management in financial institutions. Author sets a theoretical basis and legal background of the topic and describes the contemporary practices of managing the operational risk. Author focuses on the scenario analysis as a specific method which is described and evaluated. Scenario analysis is applied on the rogue trading risk. In the thesis there is created a model institution on which author applies the operational risk theory using best practices and expert opinions. The model situation provides the analysis of the processes of the financial institution and choose the suitable measures in order to defend against the risk. The author also analyses the past cases of rogue trading which helps to understand the prevention and the historical significance of the operational risk.
34

Using random projections for dimensionality reduction in identifying rogue applications

Atkison, Travis Levestis 08 August 2009 (has links)
In general, the consumer must depend on others to provide their software solutions. However, this outsourcing of software development has caused it to become more and more abstract as to where the software is actually being developed and by whom, and it poses a potentially large security problem for the consumer as it opens up the possibility for rogue functionality to be injected into an application without the consumer’s knowledge or consent. This begs the question of ‘How do we know that the software we use can be trusted?’ or ‘How can we have assurance that the software we use is doing only the tasks that we ask it to do?’ Traditional methods for thwarting such activities, such as virus detection engines, are far too antiquated for today’s adversary. More sophisticated research needs to be conducted in this area to combat these more technically advanced enemies. To combat the ever increasing problem of rogue applications, this dissertation has successfully applied and extended the information retrieval techniques of n-gram analysis and document similarity and the data mining techniques of dimensionality reduction and attribute extraction. This combination of techniques has generated a more effective Trojan horse, rogue application detection capability tool suite that can detect not only standalone rogue applications but also those that are embedded within other applications. This research provides several major contributions to the field including a unique combination of techniques that have provided a new tool for the administrator’s multi-pronged defense to combat the infestation of rogue applications. Another contribution involves a unique method of slicing the potential rogue applications that has proven to provide a more robust rogue application classifier. Through experimental research this effort has shown that a viable and worthy rogue application detection tool suite can be developed. Experimental results have shown that in some cases as much as a 28% increase in overall accuracy can be achieved when comparing the accepted feature selection practice of mutual information with the feature extraction method presented in this effort called randomized projection.
35

Rogue Access Point Detection through Statistical Analysis

Kanaujia, Swati 26 May 2010 (has links)
The IEEE 802.11 based Wireless LAN (WLAN) has become increasingly ubiquitous in recent years. However, due to the broadcast nature of wireless communication, attackers can exploit the existing vulnerabilities in IEEE 802.11 to launch various types of attacks in wireless and wired networks. This thesis presents a statistical based hybrid Intrusion Detection System (IDS) for Rogue Access Point (RAP) detection, which employs distributed monitoring devices to monitor on 802.11 link layer activities and a centralized detection module at a gateway router to achieve higher accuracy in detection of rogue devices. This detection approach is scalable, non-intrusive and does not require any specialized hardware. It is designed to utilize the existing wireless LAN infrastructure and is independent of 802.11a/b/g/n. It works on passive monitoring of wired and wireless traffic, and hence is easy to manage and maintain. In addition, this approach requires monitoring a smaller number of packets for detection as compared to other detection approaches in a heterogeneous network comprised of wireless and wired subnets. Centralized detection is done at a gateway router by differentiating wired and wireless TCP traffic using Weighted Sequential Hypothesis Testing on inter-arrival time of TCP ACK-pairs. A decentralized module takes care of detection of MAC spoofing and totally relies on 802.11 beacon frames. Detection is done through analysis of the clock skew and the Received Signal Strength (RSS) as fingerprints using a naïve Bayes classifier to detect presence of rogue APs. Analysis of the system and extensive experiments in various scenarios on a real system have proven the efficiency and accuracy of the approach with few false positives/negatives and low computational and storage overhead. / Master of Science
36

Structural and Evolutionary Analyses of Signalling Proteins with Special Reference to Protein Kinases

Rakshambikai, R January 2014 (has links) (PDF)
Cellular response to environmental changes involves a wide repertoire of complex signalling systems often resulting in up and down regulation of various genes. These mechanisms are generally conserved in a variety of organisms. These pathways are also constantly rewired in various organisms, which aid them in maintaining homeostasis and result in species-specific adaptation mechanisms. Protein kinases are central to these mechanisms and orchestrate a multitude of these pathways. This thesis aims to understand the selective forces behind evolution of signalling pathways. More specifically, this thesis focuses on structural and domain architecture differences of protein kinases. Protein kinases are one of the most populated families of proteins in many organisms and it constitutes about 2-3% of proteomes of most of the eukaryotic organisms. These kinases have evolved over ~400 million years and regulate nearly all major signalling pathways. Classification of kinases enables convenient association of kinases to the function and signalling pathway in which they participate. The current scheme of classification is based on the amino acid sequence of the catalytic region, which consists of about 200-300 residues. This scheme proposes division into 7 groups which show gross level similarities in function such as the TK group, which constitutes all tyrosine kinases, or AGC group which constitutes kinases regulated by second messengers. These groups are further divided into ~280 subfamilies providing us insights into function and regulation at a much finer level. This enables ascertaining information about signalling pathways, protein-protein interactions or substrates the kinase phosphorylates. Chapter 1 provides an elaborate introduction to the various types of protein kinases and their roles in signalling processes. This chapter discusses how protein kinases work in a concerted manner with several other players of a signalling pathway to generate a regulated response to external stimuli. Furthermore, it highlights both the evolutionary aspects and dynamical nature of such pathways. The subsequent part of this chapter deals with protein kinases, their evolution, regulation and structural features crucial to catalysis. Protein kinases are regulated in many ways ¬regulation is achieved from within the catalytic domain and also by means of additional domains tethered to the catalytic domain. The regulatory switch is triggered by various cellular and molecular events such as phosphorylation of specific residues, changes in spatial-temporal localization and altered redox states to name a few. The effects of regulatory domains on the overall function have also been discussed. The chapter concludes by highlighting structural analysis carried out to understand the regulatory aspect of kinases and uses this information in rational drug discovery. Chapters 2 and 3 report identification and analysis of a repertoire of protein kinases encoded in the genomes of two of the organisms which are frequently used in comparative genomics. Chapter 2 focuses on the distribution of kinases in Takifugu rubripes, a teleost fish which is a widely used model system for studying human genes. Use of remote homology detection methods identified 519 kinases in fugu. Although the group-wise distribution of kinases shows high similarity to that of human kinases, subfamily distribution shows considerable differences in 22 subfamilies. They are either under or over-represented in fugu. Most noticeable difference is seen for the DYRK subfamily, which is eight times higher in fugu than human. Detailed analysis of the DYRKs revealed interesting insights into and explained partially their high representation in fugu. Only about ten of these kinases classified into these subfamilies showed high sequence similarity and conserved localization signals to the human kinases and kinases commonly found in other eukaryotes such as C.elegans, S.cereviseae and D.melanogaster. Disparity at the level of genome may be attributed to the observation of unique domain architectures characteristic of this genome. A comparison of domain architectures of kinases documented in Pfam with that of the kinases in Takifugu also revealed two kinases with unique domain architectures in fugu; they are associated with Galectin domain and YkyA domains. Despite inconsistencies in the distribution, human and Takifugu kinases subfamilies remarkable similarity is observed in the MAP kinase pathway, which is ubiquitously found across eukaryotic organisms. Nearly 83% of the proteins in this pathway show more than 30% sequence identity between the two organisms thus, validating the use of Takifugu as a model system to study human signalling pathways. While addressing the possibilities of similar expansions of kinases in other teleosts, it was noticed that the Danio rerio genome (zebrafish) had a massively expanded kinome with ~1200 kinases. Chapter 3 explores the possible reasons for the expansion of kinome with kinases specific to Zebrafish. For e.g., the number of kinases from one subfamily (CAMK) is roughly similar to the total number of protein kinases encoded in the human genome. Further, the PIM kinase subfamily is the sole subfamily, which is massively over-represented (~30 times) in this genome. A detailed analysis of PIM kinases of zebrafish revealed that the sequences are divergent from the canonical PIM kinases. Despite this difference, the specific residues, which dictate the functional properties specific to PIM kinases, are highly conserved. These PIM kinases are usually constitutively active, features of which are conserved in PIM kinases of zebrafish as well. Unlike canonical PIM kinases in other eukaryotes, the post-transcriptional regulation of these PIM kinases might be different due to the absence of regulatory regions in the 3'UTR regions of the PIM gene. However, conservation of a S261 phosphorylation site highlights regulation by phosphorylation, which compensates for the constitutively active nature. A massive expansion of the substrate pool of PIM kinases in this genome seems to correlate well with the expansion. Since PIM kinases regulate large number of growth related pathways, we believe that, this might be associated with high regenerative capacity of organs observed in this fish, which makes it an ideal model to study most cancers. While the earlier two chapters primarily focused on the kinase catalytic domain and organism specific changes; the next two chapters address the contribution of domains tethered to the catalytic domain in the overall function of the kinase. Deviations from canonical kinase domain architectures indicate expansion in the functional repertoire of kinases. Chapter 4 is a study on human kinases from the latest revised version of the human genome sequence data. The initial part of the chapter focuses on the differences in the kinase repertoire upon revision of the human genomic data. Seven sequences gleaned from the earlier genomic data are absent and 16 new sequences are added to the kinome dataset according to the latest human genome sequence data. In addition, differences in transcripts for 23 kinases have led to differences in overall length and sub-family classification of these kinases. The identification of the kinome data from this latest version was a mandatory step prior to the study of outlier kinases due to variations in gene transcripts. The domain architectures of the human kinases have been compared with known subfamily-specific domain architectures, in order to identify outliers. Based on the type of domain architecture these outliers have been classified as “rogue” or “hybrid” kinases. Hybrid architecture represent kinases showing high sequence similarity within the kinase domain to a known sub¬family of kinases with the acquisition of non-kinase domains typically found in one of the other subfamilies of kinases. On the other hand rogue architectures belong to kinases with domain architectures not observed in any of the kinase sub-families. A total of 23 outliers have been identified in the human genome-13 hybrids and 10 rogues. The presence of such "hybrid" and "rogue" kinases makes classification of kinases into subfamilies a daunting task and hence necessitates a new method for classification using the full-length sequences. The use of one such alignment-free method, ClaP (Appendix), using full length sequences has been validated for classification of kinases. A similarity metric obtained from full protein sequence comparison further improved the existing methods of classification for 29 kinases, which utilize only the catalytic domain of kinases. Classification based on catalytic domain is incomplete without the knowledge of associated domains, which also have an important role in function. This necessitates a new approach in classification of kinases for function annotation-an integrated one that uses information from the full-length sequence of each kinase. Chapter 5 extends the learning from chapter 4 and aids in identification of 74 "Hybrid" and 18 "Rogue" kinases in other model eukaryotes, Mus musculus, C.elegans, S. Cerevisiae, D. melanogaster and Takifugu rubripes which show significant variations in the overall functions. These sequences due to their hybrid nature might facilitate cross-talk between signalling pathways. Thus annotating the function of each of these 92 outliers has highlighted the use of domain recombination in wiring new pathways and re-wiring existing pathways. Also, these sequences because of their hybrid nature cannot be classified under any of the existing sub-families. Therefore, it has been proposed in this chapter that they be classified as separate sub-family containing sequences with hybrid properties. To validate this, the ClaP method has been extended where the pair-wise distances between two sequences (using full length sequence) has been used to generate phylogenetic trees which have then been subjected to hierarchical clustering to generate sub-family based clusters. Further, a Shannon entropy based score has been used to identify clusters that contain sequences from diverse sub-families grouped together. Upon analysis of these clusters, it was observed that the hybrid and rogue kinases specifically cluster within four clusters with high entropy (constitute large number of sub-families) validating their status as emergent sub-families. In addition, more hybrids and rogues have been identified in these clusters, which have long regions without any domain assignments. Such sequences may contain domain families deviant from those that are currently known and information on their function can be obtained from further genomic studies in future. Lastly, the prevalence of such hybrid and rogue kinases in the genome of a protozoan parasite, P. falciparum has been studied in detail. The role of hybrids and rogues in host-pathogen interaction has been explored. Chapter 6 presents an in-depth analysis of the possible role of charge-neutralization around phosphosites in protein kinases and its substrates. This analysis was a follow up of a study and in collaboration with Dr.Warwicker's group in Manchester, which identified positively charged residues around phosphosites in kinase substrates. The current study not only aims to address the importance of charge neutralization around phosphosites, but also uses this feature for prediction of phosphosites in known structures of kinase substrates. A dataset of phosphosites mapped on a 3-D structure has been used to calculate peak electrostatic potentials around phosphosites based on the solution of a non-linear Poisson-Boltzmann equation. A comparison of peak potentials around phosphosites with that of non-phosphosites reveals a higher positive peak potential at ~10.0 Å radius around the phosphosite. This variation is significantly higher around tyrosine residues in comparison to Ser/Thr residues phosphosites. Further, this distinction in peak potential around the phosphosite is attributed to only certain families like protein kinases and pyruvate kinases. The concept of charge neutralization will therefore show greater success in prediction of phosphosites in such families in comparison to other families with phosphosites. The functional importance of such charge neutralizations has been studied in great detail in the protein kinase domain family due to prior knowledge that certain phosphorylation events contribute to conformational change, which may be correlated to the changes in peak potentials upon phosphorylation. Phosphorylation at certain sites within the kinase catalytic domain often mediates onset of certain signalling events including regulating activity levels of kinases, mediating protein-protein interactions and altering their localization. Therefore, by means of studying conservation patterns of such phosphosites or neutralizing residues, the variations in signalling pathways in homologues with differences in conservation patterns, have been highlighted. Among domain families which do not show clear differences in peak potentials between phosphosites and non-phosphosites, it was noted, in a few cases, that negatively charged ligands bind to the protein in the vicinity of phosphosites, in the un-phosphorylated forms of the protein. Structural studies on a few cases in ligand bound forms indicate a competitive mechanism between phosphorylation and ligand binding which helps in switching between different functional forms. Therefore, the role of phosphorylation as a regulatory mechanism for modulating ligand binding in such domain families has been highlighted. Chapter 7 of the thesis reports a study on disease causing mutations in kinases. So far 180 kinases have been reported to contain disease causing mutations. This chapter particularly focuses on understanding the deleterious effects of non-synonymous missense mutations in kinases. Mutations at certain sites are enriched as seen by the concentration of disease phenotypes upon mutations at these sites in comparison to others. Interactions involving Arginines in sub-domains VIB, VIII, IX and XI are perturbed which affect catalysis. Structural explanation of 10 such mutations, which occur in important sub-domains and not directly implicated in catalysis has been provided. Apart from analyzing the various evolutionary and structural aspects of protein kinases in this thesis an attempt has been made to provide a deeper structural understanding of Msh (MutS Homologues) proteins involved in eukaryotic chromosomal segregation. Chapter 8 deals with Msh4-Msh5 complex, which are eukaryotic homologues of the MutS family of proteins in bacteria. MutS proteins form homodimeric complexes in bacteria that aid in mismatch repair process. There are six MutS homologues in eukaryotes, which form hetero-dimers. Two of the homologues are Msh4 and Msh5, which form hetero-dimeric complexes which is a pre-requisite for its function. They are involved in chromosomal segregation during meiosis-I and aid in resolving Holliday junction DNA. Till date no structure of this complex is available and the exact mode of binding is unclear. In addition, Msh4 and Msh5 display asymmetry in DNA and ATP binding sites. These insights are derived from the severity in phenotypes upon mutation of various residues in these proteins. This work is in collaboration with Dr. Nishant from IISER, Trivandrum. The questions addressed in chapter 8 of the thesis are: What are the structural features that contribute to the asymmetry in function between Msh4 and Msh5 in DNA and ATP binding? Can a structural explanation be provided for each of the 27 mutations causing severe phenotypes (cross-over defects/viability) to predict their role in function of the Msh4-Msh5 complex? Can a prediction be provided for the mode of binding of the Holliday junction DNA? Can residues occurring at interface regions of Msh4 and Msh5 be identified on the basis of the structure which affects the complexation of Msh4 and Msh5? These questions are addressed by homology modelling of the Msh4-Msh5 complex using the Msh2-Msh6 complex as template. Structural explanations have been provided for 23 out of 27 mutations with severe phenotypes. Certain residues in Msh5 are shown to form tighter network of interactions than their counterparts in Msh4 and therefore likely to have a more prominent role in DNA and ATP binding which corroborate with the observed asymmetry in mutant functions. A volume based calculation has been used to suggest a possible mode of binding of the Holliday junction within the cavity of the complex. Finally, the model has been used to predict interface residues that play a crucial role in complexation and function. Experiments are being carried out in Dr. Nishant's laboratory to mutate these residues to validate the model. Chapter 9 summarizes the entire thesis work and also clearly states the chief conclusions from various chapters. Apart from studies embodied in the thesis, the author has been involved in one other study, which is provided as appendix.
37

Exploiting Rogue Signals to Attack Trust-based Cooperative Spectrum Sensing in Cognitive Radio Networks

Jackson, David 29 April 2013 (has links)
Cognitive radios are currently presented as the solution to the ever-increasing spectrum shortage problem. However, their increased capabilities over traditional radios introduce a new dimension of security threats. Cooperative Spectrum Sensing (CSS) has been proposed as a means to protect cognitive radio networks from the well known security threats: Primary User Emulation (PUE) and Spectrum Sensing Data Falsification (SSDF). I demonstrate a new threat to trust-based CSS protocols, called the Rogue Signal Framing (RSF) intrusion. Rogue signals can be exploited to create the illusion of malicious sensors which leads to the framing of innocent sensors and consequently, their removal from the shared spectrum sensing. Ultimately, with fewer sensors working together, the spectrum sensing is less robust for making correct spectrum access decisions. The simulation experiments illustrate the impact of RSF intrusions which, in severe cases, shows roughly 40\% of sensors removed. To mitigate the RSF intrusion's damage to the network's trust, I introduce a new defense based on community detection from analyzing the network's Received Signal Strength (RSS) diversity. Tests show a 95\% damage reduction in terms of removed sensors from the shared spectrum sensing, thus retaining the benefits of CSS protocols.
38

Métrologie ultrarapide : application aux dynamiques laser et à l'imagerie / Ultrafast metrology : application to the study of laser dynamics and for imaging

Hanzard, Pierre-Henry 11 October 2018 (has links)
Ce travail de thèse s’inscrit dans le cadre de la caractérisation optique à haute cadence en temps réel. Des outils de métrologie ultrarapides ont ainsi été utilisés pour l’étude d’une source laser impulsionnelle ainsi que pour l’imagerie de phénomènes physiques. La mise en place et la caractérisation temporelle d’une source laser impulsionnelle a permis l’observation d’événements anormalement intenses pour certains régimes de fonctionnement, et ces dynamiques ont pu être confirmées numériquement. La compréhension de ces phénomènes présente un intérêt fondamentalmais également pratique, notamment en vue de limiter les dommages optiques dans les sources laser. L’utilisation d’une technique d’imagerie appelée « imagerie par étirage temporel » a permis l’observation de jets liquides à une cadence de 80MHz. Reposant sur le principe de Transformée de Fourier Dispersive, cette technique permet de rendre compte de phénomènes non-répétitifs à des cadences élevées, et ainsi d’outrepasser les limitations imposées par les systèmes d’enregistrement conventionnels. La technique a également permis l’étude d’ondes de choc générées par ablation laser, et la détermination du profil de vitesse de l’onde de choc à travers la zone de mesure. Le phénomène de réflexion d’une onde de choc sur une paroi a également pu être observé. / This PhD work is dedicated to optical characterization in real time. Ultrafast metrology tools have thus been used to study a pulsed laser source and also for physical phenomena imaging. The implementation of a temporally well characterized pulsed laser source allowed the observation of events involving abnormally high intensity, the dynamics of which have also been numerically studied and confirmed. Understanding of these phenomena addresses a fundamental and interesting need to prevent optical damage in laser sources. The use of the imaging technique called “time-stretch imaging” allowed the imaging of liquid sprays at an 80MHz repetition rate. Based on Dispersive Fourier Transform, this technique enables the study of non-repetitive events at high sampling frequency, and thus goes beyond the performance of traditional imaging devices. This technique also allowed the tracking of shockwaves, and thus profiling the shockwave’s velocity variation through its propagation along a certain measuring distance. Shockwave reflection has also been observed.
39

Anomaly Detection using a Deep Learning Multi-layer Perceptron to Mitigate the Risk of Rogue Trading

Hedström, Erik, Wang, Philip January 2021 (has links)
The term Rogue Trading is defined as the activity of someone at a financial organisation losing a large amount of money in bad or illegal transactions and trying to hide this. The activity of Rogue traders exposes financial organisations to huge risks and may lead to the organisation collapsing, which will affect other stakeholders like, for example, the customers. In order to detect potential Rogue Trading cases, Control Systems that monitor the employees and the positions they take on financial markets must exist. In this study, a two-step control system is suggested to monitor the margins on Foreign exchange (FX) Forwards traded by employees at the Swedish bank Skandinaviska Enskilda Banken (SEB). The first step in the control system uses a Deep Learning neural network trained on transactional data to predict the margin. The errors of the predictions versus the actual values are then in the second step of the control system used to find outliers which should be flagged for further investigation due to a too high deviation. The results show that the model hopefully can decrease the number of false positives yielded by the current Control Systems at SEB and thus reduce manual inspection of flagged transactions. / Termen Rouge Trading definieras som en aktivitet där någon på en finansiell institution förlorar stora mängder pengar i dåliga eller illegala transaktioner och försöker dölja detta. Detta är något som skapar enorma risker för finansiella institutioner och som kan förorsaka organisationens kollaps, som kan påverka intressenter som till exempel kunder. För att upptäcka potentiella företeelser av Rouge Trading så måste kontrollsystem som övervakar anställda och deras positioner existera. I denna studie föreslås och presenteras ett tvåstegs-system för att övervaka marginaler vid terminsaffärer i utländsk valuta vid Skandinaviska Enskilda Banken (SEB). Det första steget i kontrollsystemet använder ett neuralt närverk tränat på data från transaktioner för att prediktera en marginal. Differenserna mellan prediktionen och det faktiska värdet används för att finna outliers vilka borde flaggas för vidare undersökning. Resultaten visar att modellen förhoppningsvis kan minska antalet falska positiva som det nuvarande kontrollsystemet ger på SEB, något som således kan minska den manuella inspektionen av flaggade transaktioner.
40

L'instabilité modulationnelle en présence de vent et d'un courant cisaillé uniforme

Thomas, Roland 21 March 2012 (has links)
Cette thèse étudie l'influence du vent sur l'instabilité modulationnelle. Une première partie unifie les travaux de Segur et al. qui intègrent la dissipation et ceux de Leblanc qui prennent en compte le vent. Une équation non linéaire de Schrödinger est établie avec un terme additionnel linéaire résultant de la compétition entre le vent et la dissipation. La dissipation est traduite par le modèle de Lundgren et l'effet du vent se manifeste par l'intermédiaire de la pression atmosphérique selon le modèle de Miles. La profondeur est finie. Une étude de stabilité de l'onde de Stokes est détaillée, et des simulations numériques sont menées pour illustrer les résultats. Des expérimentations sont menées pour apporter une validation qualitative à ces travaux. Cette première partie a été validée par une publication au Journal of Fluid Mechanics (2010). La deuxième partie étudie l'influence du vent sur l'instabilité modulationnelle par l'intermédiaire de la vorticité qu'il crée en surface. Le modèle est simplifié par l'hypothèse d'un écoulement unidirectionnel et d'une vorticité constante. La profondeur est encore supposée finie. Une équation non linéaire de Schrödinger est établie, qui prend en compte cette vorticité constante. La stabilité de l'onde de Stokes est alors étudiée en détail(diagramme d'instabilité en fonction de la vorticité et de la profondeur, bande d'instabilité, taux d'instabilité, etc.). Il est démontré qu'une vorticité négative, au delà d'un certain seuil, supprime l'instabilité modulationnelle indépendamment de la profondeur. Cette deuxième partie a été soumise pour publication au journal Physics of Fluids. / This thesis manuscript treats about the influence of wind on modulational instability. A first part merges the works of Segur at al. which take into account viscous dissipation and Leblanc's work which deals with wind. A nonlinear Schrödinger equation is derived, with a forcing linear term which represents the result of the balance between wind forcing and dissipation. Visous dissipation is represented by Lundgren's model and the effect of wind is integrated into atmospheric pressure following Miles' model. Depth is finite. The stability of Stokes's waves is investigated, and numerical simulations are presented to illustrate the results. Some experimentations are done to confirm qualitatively these works. This first part was validated by a publication in the Journal of Fluid Mechanics~(2010). The second part studies the influence of the wind on the modulational instability by the intermediary of the vorticity whom it creates on the water at the surface. The model is simplified by the hypothesis of an unidirectional flow and a constant vorticity. The depth is still supposed finite. A non linear Schrödinger equation is derived, which takes into account this constant vorticity. The stability of the Stokes' wave is studied then in detail (instability diagram function of vorticity and depth, instability bandwidth, instability rate, etc.). It is demonstrated that a negative vorticity, beyond a certain threshold, eliminates the modulational instability independently of the depth. This second part has been submitted for publication in the journal Physics of Fluids.

Page generated in 0.0287 seconds