Learn More
We describe an investigation into e-mail content mining for author identification, or authorship attribution, for the purpose of forensic investigation. We focus our discussion on the ability to discriminate between authors for the case of both aggregated e-mail topics as well as across different e-mail topics. An extended set of e-mail document features(More)
This paper describes an investigation of authorship gender attribution mining from e-mail text documents. We used an extended set of predominantly topic content-free e-mail document features such as style markers, structural characteristics and gender-preferential language features together with a Support Vector Machine learning algorithm. Experiments using(More)
The bacteriophage population is large, dynamic, ancient, and genetically diverse. Limited genomic information shows that phage genomes are mosaic, and the genetic architecture of phage populations remains ill-defined. To understand the population structure of phages infecting a single host strain, we isolated, sequenced, and compared 627 phages of(More)
We describe an investigation of authorship gender and language background cohort attribution mining from e-mail text documents. We used an extended set of predominantly topic content-free e-mail document features such as style markers, structural characteristics and gender-preferential language features together with a Support Vector Machine learning(More)
Information security officers of large organisations have the responsibility, inter alia, to advise senior management on the current level of organisational risk and to overview the operation of effective security systems within the organisation. Current developments in risk analysis methodologies and system security certification, e.g. ITSEC, can provide(More)
(3 alpha,5 alpha)-3-Hydroxypregnan-20-ones and (3 alpha,5 alpha)-3-hydroxypregnane-11,20-diones bearing a 2 beta-morpholinyl substituent were synthesized, and the utility of these steroids as anesthetic agents was evaluated through determination of their potency and duration of hypnotic activity in mice after intravenous administration. Alkylation of the(More)
Intrusion detection techniques have appeared to inspect all of the inbound and outbound network activities, and to identify suspicious patterns that indicate an attack that might compromise an information system. However, related information can be collected so as to supply evidence in criminal and civil legal proceedings. Several works have been carried(More)
Various cyclic ether and other 3 alpha-hydroxyandrostane derivatives bearing a conformationally constrained hydrogen-bonding moiety were prepared. Their anesthetic potency and their binding affinity for GABA(A) receptors, measured by intravenous administration to mice and inhibition of [(35)S]TBPS binding to rat whole brain membranes, were compared with(More)
A series of monoclonal antibodies was prepared against tegumental and internal antigens of Fasciola hepatica by immunizing mice with whole adult-fluke homogenates prior to harvesting the splenic lymphocytes for fusion. Preliminary screening by the Indirect Fluorescent Antibody technique indicated the occurrence of discrete groups of monoclonals differing(More)