243 resultados para Verification
Resumo:
Texture information in the iris image is not uniform in discriminatory information content for biometric identity verification. The bits in an iris code obtained from the image differ in their consistency from one sample to another for the same identity. In this work, errors in bit strings are systematically analysed in order to investigate the effect of light-induced and drug-induced pupil dilation and constriction on the consistency of iris texture information. The statistics of bit errors are computed for client and impostor distributions as functions of radius and angle. Under normal conditions, a V-shaped radial trend of decreasing bit errors towards the central region of the iris is obtained for client matching, and it is observed that the distribution of errors as a function of angle is uniform. When iris images are affected by pupil dilation or constriction the radial distribution of bit errors is altered. A decreasing trend from the pupil outwards is observed for constriction, whereas a more uniform trend is observed for dilation. The main increase in bit errors occurs closer to the pupil in both cases.
Resumo:
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.
Resumo:
This thesis focuses on providing reliable data transmissions in large-scale industrial wireless sensor networks through improving network layer protocols. It addresses three major problems: scalability, dynamic industrial environments and coexistence of multiple types of data traffic in a network. Theoretical developments are conducted, followed by simulation studies for verification of theoretic results. The approach proposed in this thesis has been shown to be effective for large-scale network implementation and to provide improved data transmission reliability for both periodic and sporadic traffic.
Resumo:
For robots operating in outdoor environments, a number of factors, including weather, time of day, rough terrain, high speeds, and hardware limitations, make performing vision-based simultaneous localization and mapping with current techniques infeasible due to factors such as image blur and/or underexposure, especially on smaller platforms and low-cost hardware. In this paper, we present novel visual place-recognition and odometry techniques that address the challenges posed by low lighting, perceptual change, and low-cost cameras. Our primary contribution is a novel two-step algorithm that combines fast low-resolution whole image matching with a higher-resolution patch-verification step, as well as image saliency methods that simultaneously improve performance and decrease computing time. The algorithms are demonstrated using consumer cameras mounted on a small vehicle in a mixed urban and vegetated environment and a car traversing highway and suburban streets, at different times of day and night and in various weather conditions. The algorithms achieve reliable mapping over the course of a day, both when incrementally incorporating new visual scenes from different times of day into an existing map, and when using a static map comprising visual scenes captured at only one point in time. Using the two-step place-recognition process, we demonstrate for the first time single-image, error-free place recognition at recall rates above 50% across a day-night dataset without prior training or utilization of image sequences. This place-recognition performance enables topologically correct mapping across day-night cycles.
Resumo:
Objective Exercise has the potential to offer a range of health benefits in addition to improving healing outcomes for people with venous leg ulcers. However despite evidence based recommendations, most of these individuals do not engage in regular exercise. The aim of this study was to gain an understanding of the perspectives of adults with venous leg ulcers, in relation to exercise. Method This was a qualitative design using semi-structured interviews and discussions. Ten participants with venous leg ulceration volunteered to participate. Recruitment was through a specialist wound clinic. Verbatim data were collected by an experienced moderator using a semi-structured guide. Data saturation was reached after three group discussions and two interviews. A random selection of transcripts was sent back to the participants for verification. Thematic content analysis was used to determine major themes and categories. Two transcripts were independently analysed, categories and themes independently developed, cross checked and found comparable. Remaining transcripts were analysed using developed categories and codes. Results Regardless of their current exercise routine, participants reported exercising prior to venous leg ulceration and expressed an interest in either becoming active or maintaining an active lifestyle. Overall four themes emerged from the findings: i) participant understanding of the relationship between chronic venous insufficiency and exercise patterns, ii) fear of harm impacts upon positive beliefs and attitudes to exercise, iii) perceived factors limit exercise and iv) structured management facilitates exercise. Conclusion The value of exercise in improving outcomes in venous leg ulcers lies in its capacity to promote venous return and reduce the risk of secondary conditions in this population. Despite motivation and interest in being exercise active, people with venous leg ulcers report many obstacles. Further exploration of mechanisms that assist this patient population and promote understanding about management of barriers, coupled with promotion of enabling factors is vital for improving their exercise participation.
Resumo:
Building information models are increasingly being utilised for facility management of large facilities such as critical infrastructures. In such environments, it is valuable to utilise the vast amount of data contained within the building information models to improve access control administration. The use of building information models in access control scenarios can provide 3D visualisation of buildings as well as many other advantages such as automation of essential tasks including path finding, consistency detection, and accessibility verification. However, there is no mathematical model for building information models that can be used to describe and compute these functions. In this paper, we show how graph theory can be utilised as a representation language of building information models and the proposed security related functions. This graph-theoretic representation allows for mathematically representing building information models and performing computations using these functions.
Resumo:
The growing knowledge of the genetic polymorphisms of enzymes metabolising xenobiotics in humans and their connections with individual susceptibility towards toxicants has created new and important interfaces between human epidemiology and experimental toxicology. The results of molecular epidemiological studies may provide new hypotheses and concepts, which call for experimental verification, and experimental concepts may obtain further proof by molecular epidemiological studies. If applied diligently, these possibilities may be combined to lead to new strategies of human-oriented toxicological research. This overview will present some outstanding examples for such strategies taken from the practically very important field of occupational toxicology. The main focus is placed on the effects of enzyme polymorphisms of the xenobiotic metabolism in association with the induction of bladder cancer and renal cell cancer after exposure to occupational chemicals. Also, smoking and induction of head and neck squamous cell cancer are considered.
Resumo:
The transcriptome response of Atlantic salmon (Salmo salar) displaying advanced stages of amoebic gill disease (AGD) was investigated. Naïve smolt were challenged with AGD for 19 days, at which time all fish were euthanized and their severity of infection quantified through histopathological scoring. Gene expression profiles were compared between heavily infected and naïve individuals using a 17 K Atlantic salmon cDNA microarray with real-time quantitative RT-PCR (qPCR) verification. Expression profiles were examined in the gill, anterior kidney, and liver. Twenty-seven transcripts were significantly differentially expressed within the gill; 20 of these transcripts were down-regulated in the AGD-affected individuals compared with naïve individuals. In contrast, only nine transcripts were significantly differentially expressed within the anterior kidney and five within the liver. Again the majority of these transcripts were down-regulated within the diseased individuals. A down-regulation of transcripts involved in apoptosis (procathepsin L, cathepsin H precursor, and cystatin B) was observed in AGD-affected Atlantic salmon. Four transcripts encoding genes with antioxidant properties also were down-regulated in AGD-affected gill tissue according to qPCR analysis. The most up-regulated transcript within the gill was an unknown expressed sequence tag (EST) whose expression was 218-fold (± SE 66) higher within the AGD affected gill tissue. Our results suggest that Atlantic salmon experiencing advanced stages of AGD demonstrate general down-regulation of gene expression, which is most pronounced within the gill. We propose that this general gene suppression is parasite-mediated, thus allowing the parasite to withstand or ameliorate the host response. © 2008 Springer Science+Business Media, LLC.
Resumo:
We learn from the past that invasive species have caused tremendous damage to native species and serious disruption to agricultural industries. It is crucial for us to prevent this in the future. The first step of this process is to identify correctly an invasive species from native ones. Current identification methods, relying on mainly 2D images, can result in low accuracy and be time consuming. Such methods provide little help to a quarantine officer who has time constraints to response when on duty. To deal with this problem, we propose new solutions using 3D virtual models of insects. We explain how working with insects in the 3D domain can be much better than the 2D domain. We also describe how to create true-color 3D models of insects using an image-based 3D reconstruction method. This method is ideal for quarantine control and inspection tasks that involve the verification of a physical specimen against known invasive species. Finally we show that these insect models provide valuable material for other applications such as research, education, arts and entertainment. © 2013 IEEE.
Resumo:
Intensity Modulated Radiotherapy (IMRT) is a well established technique for delivering highly conformal radiation dose distributions. The complexity of the delivery techniques and high dose gradients around the target volume make verification of the patient treatment crucial to the success of the treatment. Conventional treatment protocols involve imaging the patient prior to treatment, comparing the patient set-up to the planned set-up and then making any necessary shifts in the patient position to ensure target volume coverage. This paper presents a method for calibrating electronic portal imaging device (EPID) images acquired during IMRT delivery so that they can be used for verifying the patient set-up.
Resumo:
In this paper, the recent results of the space project IMPERA are presented. The goal of IMPERA is the development of a multirobot planning and plan execution architecture with a focus on a lunar sample collection scenario in an unknown environment. We describe the implementation and verification of different modules that are integrated into a distributed system architecture. The modules include a mission planning approach for a multirobot system and modules for task and skill execution within a lunar use-case scenario. The skills needed for the test scenario include cooperative exploration and mapping strategies for an unknown environment, the localization and classification of sample containers using a novel approach of semantic perception, and the skill of transporting sample containers to a collection point using a mobile manipulation robot. Additionally, we present our approach of a reliable communication framework that can deal with communication loss during the mission. Several modules are tested within several experiments in the domain of planning and plan execution, communication, coordinated exploration, perception, and object transportation. An overall system integration is tested on a mission scenario experiment using three robots.
Resumo:
PURPOSE: This paper describes dynamic agent composition, used to support the development of flexible and extensible large-scale agent-based models (ABMs). This approach was motivated by a need to extend and modify, with ease, an ABM with an underlying networked structure as more information becomes available. Flexibility was also sought after so that simulations are set up with ease, without the need to program. METHODS: The dynamic agent composition approach consists in having agents, whose implementation has been broken into atomic units, come together at runtime to form the complex system representation on which simulations are run. These components capture information at a fine level of detail and provide a vast range of combinations and options for a modeller to create ABMs. RESULTS: A description of the dynamic agent composition is given in this paper, as well as details about its implementation within MODAM (MODular Agent-based Model), a software framework which is applied to the planning of the electricity distribution network. Illustrations of the implementation of the dynamic agent composition are consequently given for that domain throughout the paper. It is however expected that this approach will be beneficial to other problem domains, especially those with a networked structure, such as water or gas networks. CONCLUSIONS: Dynamic agent composition has many advantages over the way agent-based models are traditionally built for the users, the developers, as well as for agent-based modelling as a scientific approach. Developers can extend the model without the need to access or modify previously written code; they can develop groups of entities independently and add them to those already defined to extend the model. Users can mix-and-match already implemented components to form large-scales ABMs, allowing them to quickly setup simulations and easily compare scenarios without the need to program. The dynamic agent composition provides a natural simulation space over which ABMs of networked structures are represented, facilitating their implementation; and verification and validation of models is facilitated by quickly setting up alternative simulations.