138 resultados para Al-Alaoui Transform
Resumo:
In the recent manuscript published by Egodawatta et al. (2013), the authors investigated the build-up process of heavy metals (HMs) associated with road-deposited sediment (RDS) on residential road surfaces, and presented empirical models for the prediction of both the surface loads and build-up rates of HMs on these surfaces...
Resumo:
Highly sensitive infrared cameras can produce high-resolution diagnostic images of the temperature and vascular changes of breasts. Wavelet transform based features are suitable in extracting the texture difference information of these images due to their scale-space decomposition. The objective of this study is to investigate the potential of extracted features in differentiating between breast lesions by comparing the two corresponding pectoral regions of two breast thermograms. The pectoral regions of breastsare important because near 50% of all breast cancer is located in this region. In this study, the pectoral region of the left breast is selected. Then the corresponding pectoral region of the right breast is identified. Texture features based on the first and the second sets of statistics are extracted from wavelet decomposed images of the pectoral regions of two breast thermograms. Principal component analysis is used to reduce dimension and an Adaboost classifier to evaluate classification performance. A number of different wavelet features are compared and it is shown that complex non-separable 2D discrete wavelet transform features perform better than their real separable counterparts.
Resumo:
There is debate as to whether percutaneous coronary intervention (PCI) with drug-eluting stents or coronary artery bypass surgery (CABG) is the best procedure for subjects with type 2 diabetes and coronary artery disease requiring revascularization. There is some evidence that following these procedures there is less further revascularization with CABG than PCI in subjects with diabetes. Two recent studies; the FREEDOM (Future Revascularization Evaluation in patients with Diabetes mellitus: Optimal Management of Multivessel Disease) trial, and a trial using a real world diabetic population from a Registry, have shown that the benefits of CABG over PCI in subjects with type 2 diabetes extends to lower rates of death and myocardial infarct, in addition to lower rates of revascularization. However, the rates of stroke may be higher with CABG than PCI with drug-eluting stents in this population. Thus, if CABG is going to be preferred to PCI in subjects with type 2 diabetes and multivessel coronary disease, consideration should be given to how to reduce the rates of stroke with CABG.
Resumo:
Diagnostics of rotating machinery has developed significantly in the last decades, and industrial applications are spreading in different sectors. Most applications are characterized by varying velocities of the shaft and in many cases transients are the most critical to monitor. In these variable speed conditions, fault symptoms are clearer in the angular/order domains than in the common time/frequency ones. In the past, this issue was often solved by synchronously sampling data by means of phase locked circuits governing the acquisition; however, thanks to the spread of cheap and powerful microprocessors, this procedure is nowadays rarer; sampling is usually performed at constant time intervals, and the conversion to the order domain is made by means of digital signal processing techniques. In the last decades different algorithms have been proposed for the extraction of an order spectrum from a signal sampled asynchronously with respect to the shaft rotational velocity; many of them (the so called computed order tracking family) use interpolation techniques to resample the signal at constant angular increments, followed by a common discrete Fourier transform to shift from the angular domain to the order domain. A less exploited family of techniques shifts directly from the time domain to the order spectrum, by means of modified Fourier transforms. This paper proposes a new transform, named velocity synchronous discrete Fourier transform, which takes advantage of the instantaneous velocity to improve the quality of its result, reaching performances that can challenge the computed order tracking.
Resumo:
The signal processing techniques developed for the diagnostics of mechanical components operating in stationary conditions are often not applicable or are affected by a loss of effectiveness when applied to signals measured in transient conditions. In this chapter, an original signal processing tool is developed exploiting some data-adaptive techniques such as Empirical Mode Decomposition, Minimum Entropy Deconvolution and the analytical approach of the Hilbert transform. The tool has been developed to detect localized faults on bearings of traction systems of high speed trains and it is more effective to detect a fault in non-stationary conditions than signal processing tools based on envelope analysis or spectral kurtosis, which represent until now the landmark for bearings diagnostics.
Resumo:
Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones based on the hash-and-sign construction of Gentry et al.; and Lyubashevsky’s schemes, which are based on the Fiat-Shamir framework. In this paper we show for the first time how to adapt the schemes of Lyubashevsky to the ring signature setting. In particular we transform the scheme of ASIACRYPT 2009 into a ring signature scheme that provides strong properties of security under the random oracle model. Anonymity is ensured in the sense that signatures of different users are within negligible statistical distance even under full key exposure. In fact, the scheme satisfies a notion which is stronger than the classical full key exposure setting as even if the keypair of the signing user is adversarially chosen, the statistical distance between signatures of different users remains negligible. Considering unforgeability, the best lattice-based ring signature schemes provide either unforgeability against arbitrary chosen subring attacks or insider corruption in log-sized rings. In this paper we present two variants of our scheme. In the basic one, unforgeability is ensured in those two settings. Increasing signature and key sizes by a factor k (typically 80 − 100), we provide a variant in which unforgeability is ensured against insider corruption attacks for arbitrary rings. The technique used is pretty general and can be adapted to other existing schemes.
Resumo:
A new approach for recognizing the iris of the human eye is presented. Zero-crossings of the wavelet transform at various resolution levels are calculated over concentric circles on the iris, and the resulting one-dimensional (1-D) signals are compared with model features using different dissimilarity functions.
Resumo:
A security system based on the recognition of the iris of human eyes using the wavelet transform is presented. The zero-crossings of the wavelet transform are used to extract the unique features obtained from the grey-level profiles of the iris. The recognition process is performed in two stages. The first stage consists of building a one-dimensional representation of the grey-level profiles of the iris, followed by obtaining the wavelet transform zerocrossings of the resulting representation. The second stage is the matching procedure for iris recognition. The proposed approach uses only a few selected intermediate resolution levels for matching, thus making it computationally efficient as well as less sensitive to noise and quantisation errors. A normalisation process is implemented to compensate for size variations due to the possible changes in the camera-to-face distance. The technique has been tested on real images in both noise-free and noisy conditions. The technique is being investigated for real-time implementation, as a stand-alone system, for access control to high-security areas.
Resumo:
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.
Resumo:
This project develops and evaluates a model of curriculum design that aims to assist student learning of foundational disciplinary ‘Threshold Concepts’. The project uses phenomenographic action research, cross-institutional peer collaboration and the Variation Theory of Learning to develop and trial the model. Two contrasting disciplines (Physics and Law) and four institutions (two research-intensive and two universities of technology) were involved in the project, to ensure broad applicability of the model across different disciplines and contexts. The Threshold Concepts that were selected for curriculum design attention were measurement uncertainty in Physics and legal reasoning in Law. Threshold Concepts are key disciplinary concepts that are inherently troublesome, transformative and integrative in nature. Once understood, such concepts transform students’ views of the discipline because they enable students to coherently integrate what were previously seen as unrelated aspects of the subject, providing new ways of thinking about it (Meyer & Land 2003, 2005, 2006; Land et al. 2008). However, the integrative and transformative nature of such threshold concepts make them inherently difficult for students to learn, with resulting misunderstandings of concepts being prevalent...
Resumo:
"The authors agree with the statements made by Mills and Christy on the study of kapundaite [1]. These authors are correct and have removed any confusion about the origin of the sample kapundaite. The authors (Frost et al.) confirm the sample of kapundaite studied in this work is from the Tom‘s quarry, Australia and can be considered a type material. The authors do not accept the statements by Mills and Christy on “type minerals”. The sample of kapundaite from the Australian source is from the collection of the Geology Department of the Federal University of Ouro Preto, Minas Gerais, Brazil with sample code SAC-111. At least if our mineral sample is not a co-type mineral, our sample is from the same origin as the type mineral. Samples..."--publisher website.
Resumo:
The editorial indicates that the issue contains a diverse array of project reports, the theme of sustainability can be discerned, with ethical and aspirational aspects evident. Aspects of what is termed a 'sustainability project’ include a commitment to change, to meaningfully involve people over time, having an eye to detail, fostering creativity, embedding action learning and action research qualities into the systems we work in, producing resources and artifacts that can support communities beyond the confines of a particular project, and articulating models and frameworks that help platform the efforts of others.
Effect of Al content on the structure of Al-substituted goethite : a micro-Raman spectroscopic study
Resumo:
The characterization of X-ray diffraction, X-ray fluorescence, and field emission scanning electron microscope were used to confirm the successful preparation of Al-substituted goethite with different Al content. The micro-Raman spectroscopy was utilized to investigate the effect of Al content on the goethite lattice. The results show that all the feature bands of goethite shifted to high wavenumbers after the occurrence of Al substitution for Fe in the structure of goethite. The shift of wavenumber shows a good linear relationship as a function of increasing Al content especially for the band at 299 cm−1 (R2 = 0.9992). The in situ Raman spectroscopy of thermally treated goethite indicated that the Al substitution not only hinders the transformation of goethite, but also retarded the crystallization of thermally formed hematite. All the results indicated that Raman spectrum displayed an excellent performance in characterizing Al-substituted goethite, which implied the promising application in other substituted metal oxides or hydroxides.
Resumo:
Nanostructured high strength Mg-5%Al-x%Nd alloys were prepared by mechanical alloying. Microstructural characterization reveled average crystalline size to be about 30 nm after mechanical alloying while it increased to about 90 nm after sintering and extrusion. Mechanical properties showed increase in 0.2% yield stress, ultimate tensile strength was attributed to reduction in gain size as well as to the enhanced diffusion after mechanical activation. Although ultra high yield stress was observed from the specimen with 5% Nd, its ductility was reduced to about 1.6%.
Resumo:
In this work, nanocrystalline Mg-Al-Nd alloys were fabricated using mechanical alloying method. Phase structure of the extrided rods was examined using X-ray diffraction (XRD) and the microstructures were observed using transmission electronic microscopy (TEM). High yield strength was obtained in the alloys with a high Nd content due to grain refinement and Nd rich precipitate phase.