154 resultados para Detection and segmentation


Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper presents 'vSpeak', the first initiative taken in Pakistan for ICT enabled conversion of dynamic Sign Urdu gestures into natural language sentences. To realize this, vSpeak has adopted a novel approach for feature extraction using edge detection and image compression which gives input to the Artificial Neural Network that recognizes the gesture. This technique caters for the blurred images as well. The training and testing is currently being performed on a dataset of 200 patterns of 20 words from Sign Urdu with target accuracy of 90% and above.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Detection and prevention of global network satellite system (GNSS) “spoofing” attacks, or the broadcast of false global navigation satellite system services, has recently attracted much research interest. This survey aims to fill three gaps in the literature: first, to assess in detail the exact nature of threat scenarios posed by spoofing against the most commonly cited targets; second, to investigate the many practical impediments, often underplayed, to carrying out GNSS spoofing attacks in the field; and third, to survey and assess the effectiveness of a wide range of proposed defences against GNSS spoofing. Our conclusion lists promising areas of future research.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Background Expenditure on dental and oral health services in Australia is $3.4 billion AUD annually. This is the sixth highest health cost and accounts for 7 % of total national health expenditure. Approximately 49 % of Australian children aged 6 years have caries experience in their deciduous teeth and this is rising. The aetiology of dental caries involves a complex interplay of individual, behavioural, social, economic, political and environmental conditions, and there is increasing interest in genetic predisposition and epigenetic modification. Methods The Oral Health Sub-study; a cross sectional study of a birth cohort began in November 2012 by examining mothers and their children who were six years old by the time of initiation of the study, which is ongoing. Data from detailed questionnaires of families from birth onwards and data on mothers’ knowledge, attitudes and practices towards oral health collected at the time of clinical examination are used. Subjects’ height, weight and mid-waist circumference are taken and Body Mass Index (BMI) computed, using an electronic Bio-Impedance balance. Dental caries experience is scored using the International Caries Detection and Assessment System (ICDAS). Saliva is collected for physiological measures. Salivary Deoxyribose Nucleic Acid (DNA) is extracted for genetic studies including epigenetics using the SeqCap Epi Enrichment Kit. Targets of interest are being confirmed by pyrosequencing to identify potential epigenetic markers of caries risk. Discussion This study will examine a wide range of potential determinants for childhood dental caries and evaluate inter-relationships amongst them. The findings will provide an evidence base to plan and implement improved preventive strategies.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

A Delay Tolerant Network (DTN) is a dynamic, fragmented, and ephemeral network formed by a large number of highly mobile nodes. DTNs are ephemeral networks with highly mobile autonomous nodes. This requires distributed and self-organised approaches to trust management. Revocation and replacement of security credentials under adversarial influence by preserving the trust on the entity is still an open problem. Existing methods are mostly limited to detection and removal of malicious nodes. This paper makes use of the mobility property to provide a distributed, self-organising, and scalable revocation and replacement scheme. The proposed scheme effectively utilises the Leverage of Common Friends (LCF) trust system concepts to revoke compromised security credentials, replace them with new ones, whilst preserving the trust on them. The level of achieved entity confidence is thereby preserved. Security and performance of the proposed scheme is evaluated using an experimental data set in comparison with other schemes based around the LCF concept. Our extensive experimental results show that the proposed scheme distributes replacement credentials up to 35% faster and spreads spoofed credentials of strong collaborating adversaries up to 50% slower without causing any significant increase on the communication and storage overheads, when compared to other LCF based schemes.