109 resultados para Maire
Resumo:
RATIONALE: Characterization of bacterial populations in infectious respiratory diseases will provide improved understanding of the relationship between the lung microbiota, disease pathogenesis and treatment outcomes.
OBJECTIVES: To comprehensively define lung microbiota composition during stable disease and exacerbation in bronchiectasis patients.
METHODS: Sputum was collected from patients when clinically stable and before and after completion of antibiotic treatment of exacerbations. Bacterial abundance and community composition were analyzed using anaerobic culture and 16S rDNA pyrosequencing.
MEASUREMENTS AND MAIN RESULTS: In clinically stable patients, aerobic and anaerobic bacteria were detected in 40/40 (100%) and 33/40 (83%) sputum samples, respectively. The dominant organisms cultured were P. aeruginosa (n=10 patients), H. influenzae (n=12), Prevotella (n=18) and Veillonella (n=13). Pyrosequencing generated over 150,000 sequences, representing 113 distinct microbial taxa; the majority of observed community richness resulted from taxa present in low abundance with similar patterns of phyla distribution in clinically stable patients and patients at the onset of exacerbation. Following treatment of exacerbation, there was no change in total (p=0.925), aerobic (p=0.917) or anaerobic (p=0.683) load and only a limited shift in community composition. Agreement for detection of bacteria by culture and pyrosequencing was good for aerobic bacteria such as P. aeruginosa (kappa=0.84) but poorer for other genera including anaerobes. Lack of agreement was largely due to bacteria been detected by pyrosequencing but not by culture.
CONCLUSIONS: A complex microbiota is present in the lungs of bronchiectasis patients which remains stable through treatment of exacerbations suggesting that changes in microbiota composition do not account for exacerbations.
Resumo:
Privacy region protection in video surveillance systems is an active topic at present. In previous research, a binary mask mechanism has been developed to indicate the privacy region; however this incurs a significant bitrate overhead. In this paper, an adaptive binary mask is proposed to represent the privacy region. In a practical privacy region protection application, in which the privacy region typically occupies less than half of the overall frame and is rectangular or approximately rectangular, the proposed adaptive binary mask can effectively reduce the bitrate overhead. The proposed method can also be easily applied to the FMO mechanism of H.264/AVC, providing both error resilience and a lower bitrate overhead.
Resumo:
In this paper, an improved video encryption method for encrypting the sign bit of motion vectors is proposed based on H.264/AVC, which belongs to selective encryption. This method improves upon previous work involving the sign bit encryption of motion vectors by ensuring the four candidates for the encrypted motion vectors are always located in two orthogonal lines. The improved method can provide a much more effective scrambling effect while keeping the encrypted stream format-compliant and the compression ratio unchanged. The combination of the proposed method with encryption of intra prediction modes can further enhance the scrambling effect, especially for the first few frames which are left clear when only the motion vectors are encrypted.
Resumo:
As ubiquitous computing becomes a reality, sensitive information is increasingly processed and transmitted by smart cards, mobile devices and various types of embedded systems. This has led to the requirement of a new class of lightweight cryptographic algorithm to ensure security in these resource constrained environments. The International Organization for Standardization (ISO) has recently standardised two low-cost block ciphers for this purpose, Clefia and Present. In this paper we provide the first comprehensive hardware architecture comparison between these ciphers, as well as a comparison with the current National Institute of Standards and Technology (NIST) standard, the Advanced Encryption Standard.
Resumo:
Recently, two fast selective encryption methods for context-adaptive variable length coding and context-adaptive binary arithmetic coding in H.264/AVC were proposed by Shahid et al. In this paper, it was demonstrated that these two methods are not as efficient as only encrypting the sign bits of nonzero coefficients. Experimental results showed that without encrypting the sign bits of nonzero coefficients, these two methods can not provide a perceptual scrambling effect. If a much stronger scrambling effect is required, intra prediction modes, and the sign bits of motion vectors can be encrypted together with the sign bits of nonzero coefficients. For practical applications, the required encryption scheme should be customized according to a user's specified requirement on the perceptual scrambling effect and the computational cost. Thus, a tunable encryption scheme combining these three methods is proposed for H.264/AVC. To simplify its implementation and reduce the computational cost, a simple control mechanism is proposed to adjust the control factors. Experimental results show that this scheme can provide different scrambling levels by adjusting three control factors with no or very little impact on the compression performance. The proposed scheme can run in real-time and its computational cost is minimal. The security of the proposed scheme is also discussed. It is secure against the replacement attack when all three control factors are set to one.
Resumo:
An overview of research on reconfigurable architectures for network processing applications within the Institute of Electronics, Communications and Information Technology (ECIT) is presented. Three key network processing topics, namely node throughput, Quality of Service (QoS) and security are examined where custom reconfigurability allows network nodes to adapt to fluctuating network traffic and customer demands. Various architectural possibilities have been investigated in order to explore the options and tradeoffs available when using reconfigurability for packet/frame processing, packet-scheduling and data encryption/decryption. This research has shown there is no common approach that can be applied. Rather the methodologies used and the cost-benefits for incorporation of reconfigurability depend on each of the functions considered, for example being well suited to encryption/decryption but not packet/frame processing. © 2005 IEEE.