301 resultados para Detecting
Resumo:
This is the first report of an antibody-fusion protein expressed in transgenic plants for direct use in a medical diagnostic assay. By the use of gene constructs with appropriate promoters, high level expression of an anti-glycophorin single-chain antibody fused to an epitope of the HIV virus was obtained in the leaves and stems of tobacco, tubers of potato and seed of barley. This fusion protein replaces the SimpliRED™ diagnostic reagent, used for detecting the presence of HIV-1 antibodies in human blood. The reagent is expensive and laborious to produce by conventional means since chemical modifications to a monoclonal antibody are required. The plant-produced fusion protein was fully functional (by ELISA) in crude extracts and, for tobacco at least, could be used without further purification in the HIV agglutination assay. All three crop species produced sufficient reagent levels to be superior bioreactors to bacteria or mice, however barley grain was the most attractive bioreactor as it expressed the highest level (150 μg of reagent g-1), is inexpensive to produce and harvest, poses a minuscule gene flow problem in the field, and the activity of the reagent is largely undiminished in stored grain. This work suggests that barley seed will be an ideal factory for the production of antibodies, diagnostic immunoreagents, vaccines and other pharmaceutical proteins.
Resumo:
The Modicon Communication Bus (Modbus) protocol is one of the most commonly used protocols in industrial control systems. Modbus was not designed to provide security. This paper confirms that the Modbus protocol is vulnerable to flooding attacks. These attacks involve injection of commands that result in disrupting the normal operation of the control system. This paper describes a set of experiments that shows that an anomaly-based change detection algorithm and signature-based Snort threshold module are capable of detecting Modbus flooding attacks. In comparing these intrusion detection techniques, we find that the signature-based detection requires a carefully selected threshold value, and that the anomaly-based change detection algorithm may have a short delay before detecting the attacks depending on the parameters used. In addition, we also generate a network traffic dataset of flooding attacks on the Modbus control system protocol.
Resumo:
Design of hydraulic turbines has often to deal with hydraulic instability. It is well-known that Francis and Kaplan types present hydraulic instability in their design power range. Even if modern CFD tools may help to define these dangerous operating conditions and optimize runner design, hydraulic instabilities may fortuitously arise during the turbine life and should be timely detected in order to assure a long-lasting operating life. In a previous paper, the authors have considered the phenomenon of helical vortex rope, which happens at low flow rates when a swirling flow, in the draft tube conical inlet, occupies a large portion of the inlet. In this condition, a strong helical vortex rope appears. The vortex rope causes mechanical effects on the runner, on the whole turbine and on the draft tube, which may eventually produce severe damages on the turbine unit and whose most evident symptoms are vibrations. The authors have already shown that vibration analysis is suitable for detecting vortex rope onset, thanks to an experimental test campaign performed during the commissioning of a 23 MW Kaplan hydraulic turbine unit. In this paper, the authors propose a sophisticated data driven approach to detect vortex rope onset at different power load, based on the analysis of the vibration signals in the order domain and introducing the so-called "residual order spectrogram", i.e. an order-rotation representation of the vibration signal. Some experimental test runs are presented and the possibility to detect instability onset, especially in real-time, is discussed.
Resumo:
Every motorised jurisdiction mandates legal driving behaviour which facilitates driver mobility and road user safety through explicit road rules that are enforced by regulatory authorities such as the Police. In road safety, traffic law enforcement has been very successfully applied to modify road user behaviour, and increasingly technology is fundamental in detecting illegal road user behaviour. Furthermore, there is also sound evidence that highly visible and/or intensive enforcement programs achieve long-term deterrent effects. To illustrate, in Australia random breath testing has considerably reduced the incidence and prevalence of driving whilst under the influence of alcohol. There is, however, evidence that many road rules continue to be broken, including speeding and using a mobile phone whilst driving, and there are many instances where drivers are not detected or sufficiently sanctioned for these transgressions. Furthermore, there is a growing body of evidence suggesting that experiences of punishment avoidance – that is, successful attempts at avoiding punishment such as drivers talking themselves out of a ticket, or changing driving routes to evade detection –are associated with and predictive of the extent of illegal driving behaviour and future illegal driving intentions. Therefore there is a need to better understand the phenomenon of punishment avoidance to enhance our traffic law enforcement procedures and therefore safety of all road users. This chapter begins with a review of the young driver road safety problem, followed by an examination of contemporary deterrence theory to enhance our understanding of both the experiences and implications of punishment avoidance in the road environment. It is noteworthy that in situations where detection and punishment remain relatively rare, such as on extensive road networks, the research evidence suggests that experiences of punishment avoidance may have a stronger influence upon risky driving behaviour than experiences of punishment. Finally, data from a case study examining the risky behaviour of young drivers will be presented, and the implications for ‘getting away with it’ will be discussed.
Resumo:
Cable structures find many applications such as in power transmission, in anchors and especially in bridges. They serve as major load bearing elements in suspension bridges, which are capable of spanning long distances. All bridges, including suspension bridges, are designed to have long service lives. However, during this long life, they become vulnerable to damage due to changes in loadings, deterioration with age and random action such as impacts. The main cables are more vulnerable to corrosion and fatigue, compared to the other bridge components, and consequently reduces the serviceability and ultimate capacity of the bridge. Detecting and locating such damage at the earliest stage is challenging in the current structural health monitoring (SHM) systems of long span suspension bridges. Damage or deterioration of a structure alters its stiffness, mass and damping properties which in turn modify its vibration characteristics. This phenomenon can therefore be used to detect damage in a structure. The modal flexibility, which depends on the vibration characteristics of a structure, has been identified as a successful damage indicator in beam and plate elements, trusses and simple structures in reinforced concrete and steel. Successful application of the modal flexibility phenomenon to detect and locate the damage in suspension bridge main cables has received limited attention in recent research work. This paper, therefore examines the potential of the modal flexibility based Damage Index (DI) for detecting and locating damage in the main cable of a suspension bridge under four different damage scenarios. Towards this end, a numerical model of a suspension bridge cable was developed to extract the modal parameters at both damaged and undamaged states. Damage scenarios considered in this study with varied location and severity were simulated by changing stiffness at particular locations of the cable model. Results confirm that the DI has the potential to successfully detect and locate damage in suspension bridge main cables. This simple method can therefore enable bridge engineers and managers to detect and locate damage in suspension bridges at an early stage, minimize expensive retrofitting and prevent bridge collapse.
Resumo:
Recent modelling of socio-economic costs by the Australian railway industry in 2010 has estimated the cost of level crossing accidents to exceed AU$116 million annually. To better understand causal factors that contribute to these accidents, the Cooperative Research Centre for Rail Innovation is running a project entitled Baseline Level Crossing Video. The project aims to improve the recording of level crossing safety data by developing an intelligent system capable of detecting near-miss incidents and capturing quantitative data around these incidents. To detect near-miss events at railway level crossings a video analytics module is being developed to analyse video footage obtained from forward-facing cameras installed on trains. This paper presents a vision base approach for the detection of these near-miss events. The video analytics module is comprised of object detectors and a rail detection algorithm, allowing the distance between a detected object and the rail to be determined. An existing publicly available Histograms of Oriented Gradients (HOG) based object detector algorithm is used to detect various types of vehicles in each video frame. As vehicles are usually seen from a sideway view from the cabin’s perspective, the results of the vehicle detector are verified using an algorithm that can detect the wheels of each detected vehicle. Rail detection is facilitated using a projective transformation of the video, such that the forward-facing view becomes a bird’s eye view. Line Segment Detector is employed as the feature extractor and a sliding window approach is developed to track a pair of rails. Localisation of the vehicles is done by projecting the results of the vehicle and rail detectors on the ground plane allowing the distance between the vehicle and rail to be calculated. The resultant vehicle positions and distance are logged to a database for further analysis. We present preliminary results regarding the performance of a prototype video analytics module on a data set of videos containing more than 30 different railway level crossings. The video data is captured from a journey of a train that has passed through these level crossings.
Resumo:
BACKGROUND Burns and their associated wound care procedures evoke significant stress and anxiety, particularly for children. Little is known about the body's physiological stress reactions throughout the stages of re-epithelialization following an acute burn injury. Previously, serum and urinary cortisol have been used to measure stress in burn patients, however these measures are not suitable for a pediatric burn outpatient setting. AIM To assess the sensitivity of salivary cortisol and sAA in detecting stress during acute burn wound care procedures and to investigate the body's physiological stress reactions throughout burn re-epithelialization. METHODS Seventy-seven participants aged four to thirteen years who presented with an acute burn injury to the burn center at the Royal Children's Hospital, Brisbane, Australia, were recruited between August 2011 and August 2012. RESULTS Both biomarkers were responsive to the stress of burn wound care procedures. sAA levels were on average 50.2U/ml higher (p<0.001) at 10min post-dressing removal compared to baseline levels. Salivary cortisol levels showed a blunted effect with average levels at ten minutes post dressing removal decreasing by 0.54nmol/L (p<0.001) compared to baseline levels. sAA levels were associated with pain (p=0.021), no medication (p=0.047) and Child Trauma Screening Questionnaire scores at three months post re-epithelialization (p=0.008). Similarly, salivary cortisol was associated with no medication (p<0.001), pain scores (p=0.045) and total body surface area of the burn (p=0.010). CONCLUSION Factors which support the use of sAA over salivary cortisol to assess stress during morning acute burn wound care procedures include; sensitivity, morning clinic times relative to cortisol's diurnal peaks, and relative cost.
Resumo:
Human genetic association studies have shown gene variants in the α5 subunit of the neuronal nicotinic receptor (nAChR) influence both ethanol and nicotine dependence. The α5 subunit is an accessory subunit that facilitates α4* nAChRs assembly in vitro. However, it is unknown whether this occurs in the brain, as there are few research tools to adequately address this question. As the α4*-containing nAChRs are highly expressed in the ventral tegmental area (VTA) we assessed the molecular, functional and pharmacological roles of α5 in α4*-containing nAChRs in the VTA. We utilized transgenic mice α5+/+(α4YFP) and α5-/-(α4YFP) that allow the direct visualization and measurement of α4-YFP expression and the effect of the presence (α5+/+) and absence of α5 (-/-) subunit, as the antibodies for detecting the α4* subunits of the nAChR are not specific. We performed voltage clamp electrophysiological experiments to study baseline nicotinic currents in VTA dopaminergic neurons. We show that in the presence of the α5 subunit, the overall expression of α4 subunit is increased significantly by 60% in the VTA. Furthermore, the α5 subunit strengthens baseline nAChR currents, suggesting the increased expression of α4* nAChRs to be likely on the cell surface. While the presence of the α5 subunit blunts the desensitization of nAChRs following nicotine exposure, it does not alter the amount of ethanol potentiation of VTA dopaminergic neurons. Our data demonstrates a major regulatory role for the α5 subunit in both the maintenance of α4*-containing nAChRs expression and in modulating nicotinic currents in VTA dopaminergic neurons. Additionally, the α5α4* nAChR in VTA dopaminergic neurons regulates the effect of nicotine but not ethanol on currents. Together, the data suggest that the α5 subunit is critical for controlling the expression and functional role of a population of α4*-containing nAChRs in the VTA.
Resumo:
There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.
Resumo:
Purpose - The purpose of this paper is to explore the perceptions of near-misses and mistakes among new graduate occupational therapists from Australia and Aotearoa/New Zealand (NZ), and their knowledge of current incident reporting systems. Design/methodology/approach - New graduate occupational therapists in Australia and Aotearoa/NZ in their first year of practice (n=228) participated in an online electronic survey that examined five areas of work preparedness. Near-misses and mistakes was one focus area. Findings - The occurrence and disclosure of practice errors among new graduate occupational therapists are similar between Australian and Aotearoa/NZ participants. Rural location, structured supervision and registration status significantly influenced the perceptions and reporting of practice errors. Structured supervision significantly impacted on reporting procedure knowledge. Current registration status was strongly correlated with perceptions that the workplace encouraged event reporting. Research limitations/ implications - Areas for further investigation include investigating the perceptions and knowledge of practice errors within a broader profession and the need to explore definitional aspects and contextual factors of adverse events that occur in allied health settings. Selection bias may be a factor in this study. Practical implications - Findings have implications for university and workplace structures, such as clinical management, supervision, training about practice errors and reporting mechanisms in allied health. Originality/value - Findings may enable the development of better strategies for detecting, managing and preventing practice errors in the allied health professions.
Resumo:
This work aims at developing a planetary rover capable of acting as an assistant astrobiologist: making a preliminary analysis of the collected visual images that will help to make better use of the scientists time by pointing out the most interesting pieces of data. This paper focuses on the problem of detecting and recognising particular types of stromatolites. Inspired by the processes actual astrobiologists go through in the field when identifying stromatolites, the processes we investigate focus on recognising characteristics associated with biogenicity. The extraction of these characteristics is based on the analysis of geometrical structure enhanced by passing the images of stromatolites into an edge-detection filter and its Fourier Transform, revealing typical spatial frequency patterns. The proposed analysis is performed on both simulated images of stromatolite structures and images of real stromatolites taken in the field by astrobiologists.
Resumo:
Considering the wide spectrum of situations that it may encounter, a robot navigating autonomously in outdoor environments needs to be endowed with several operating modes, for robustness and efficiency reasons. Indeed, the terrain it has to traverse may be composed of flat or rough areas, low cohesive soils such as sand dunes, concrete road etc. . .Traversing these various kinds of environment calls for different navigation and/or locomotion functionalities, especially if the robot is endowed with different locomotion abilities, such as the robots WorkPartner, Hylos [4], Nomad or the Marsokhod rovers. Numerous rover navigation techniques have been proposed, each of them being suited to a particular environment context (e.g. path following, obstacle avoidance in more or less cluttered environments, rough terrain traverses...). However, seldom contributions in the literature tackle the problem of selecting autonomously the most suited mode [3]. Most of the existing work is indeed devoted to the passive analysis of a single navigation mode, as in [2]. Fault detection is of course essential: one can imagine that a proper monitoring of the Mars Exploration Rover Opportunity could have avoided the rover to be stuck during several weeks in a dune, by detecting non-nominal behavior of some parameters. But the ability to recover the anticipated problem by switching to a better suited navigation mode would bring higher autonomy abilities, and therefore a better overall efficiency. We propose here a probabilistic framework to achieve this, which fuses environment related and robot related information in order to actively control the rover operations.
Resumo:
This paper proposes an approach to obtain a localisation that is robust to smoke by exploiting multiple sensing modalities: visual and infrared (IR) cameras. This localisation is based on a state-of-the-art visual SLAM algorithm. First, we show that a reasonably accurate localisation can be obtained in the presence of smoke by using only an IR camera, a sensor that is hardly affected by smoke, contrary to a visual camera (operating in the visible spectrum). Second, we demonstrate that improved results can be obtained by combining the information from the two sensor modalities (visual and IR cameras). Third, we show that by detecting the impact of smoke on the visual images using a data quality metric, we can anticipate and mitigate the degradation in performance of the localisation by discarding the most affected data. The experimental validation presents multiple trajectories estimated by the various methods considered, all thoroughly compared to an accurate dGPS/INS reference.
Resumo:
Genomic sequences are fundamentally text documents, admitting various representations according to need and tokenization. Gene expression depends crucially on binding of enzymes to the DNA sequence at small, poorly conserved binding sites, limiting the utility of standard pattern search. However, one may exploit the regular syntactic structure of the enzyme's component proteins and the corresponding binding sites, framing the problem as one of detecting grammatically correct genomic phrases. In this paper we propose new kernels based on weighted tree structures, traversing the paths within them to capture the features which underpin the task. Experimentally, we and that these kernels provide performance comparable with state of the art approaches for this problem, while offering significant computational advantages over earlier methods. The methods proposed may be applied to a broad range of sequence or tree-structured data in molecular biology and other domains.
Resumo:
The Chinese government should be commended for its open, concerted, and rapid response to the recent H7N9 influenza outbreak. However, the first known case was not reported until 48 days after disease onset.1 Although the difficulties in detecting the virus and the lack of suitable diagnostic methods have been the focus of discussion,2 systematic limitations that may have contributed to this delay have hardly been discussed. The detection speed of surveillance systems is limited by the highly structured nature of information flow and hierarchical organisation of these systems. Flu surveillance usually relies on notification to a central authority of laboratory confirmed cases or presentations to sentinel practices for flu-like illness. Each step in this pathway presents a bottleneck at which information and time can be lost; this limitation must be dealt with...