42 resultados para Biometric Descriptor


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Robustness in multi-variable control system design requires that the solution to the design problem be insensitive to perturbations in the system data. In this paper we discuss measures of robustness for generalized state-space, or descriptor, systems and describe algorithmic techniques for optimizing robustness for various applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An incidence matrix analysis is used to model a three-dimensional network consisting of resistive and capacitive elements distributed across several interconnected layers. A systematic methodology for deriving a descriptor representation of the network with random allocation of the resistors and capacitors is proposed. Using a transformation of the descriptor representation into standard state-space form, amplitude and phase admittance responses of three-dimensional random RC networks are obtained. Such networks display an emergent behavior with a characteristic Jonscher-like response over a wide range of frequencies. A model approximation study of these networks is performed to infer the admittance response using integral and fractional order models. It was found that a fractional order model with only seven parameters can accurately describe the responses of networks composed of more than 70 nodes and 200 branches with 100 resistors and 100 capacitors. The proposed analysis can be used to model charge migration in amorphous materials, which may be associated to specific macroscopic or microscopic scale fractal geometrical structures in composites displaying a viscoelastic electromechanical response, as well as to model the collective responses of processes governed by random events described using statistical mechanics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An ongoing controversy in Amazonian palaeoecology is the manner in which Amazonian rainforest communities have responded to environmental change over the last glacial–interglacial cycle. Much of this controversy results from an inability to identify the floristic heterogeneity exhibited by rainforest communities within fossil pollen records. We apply multivariate (Principal Components Analysis) and classification (Unweighted Pair Group with Arithmetic Mean Agglomerative Classification) techniques to floral-biometric, modern pollen trap and lake sediment pollen data situated within different rainforest communities in the tropical lowlands of Amazonian Bolivia. Modern pollen rain analyses from artificial pollen traps show that evergreen terra firme (well-drained), evergreen terra firme liana, evergreen seasonally inundated, and evergreen riparian rainforests may be readily differentiated, floristically and palynologically. Analogue matching techniques, based on Euclidean distance measures, are employed to compare these pollen signatures with surface sediment pollen assemblages from five lakes: Laguna Bella Vista, Laguna Chaplin, and Laguna Huachi situated within the Madeira-Tapajós moist forest ecoregion, and Laguna Isirere and Laguna Loma Suarez, which are situated within forest patches in the Beni savanna ecoregion. The same numerical techniques are used to compare rainforest pollen trap signatures with the fossil pollen record of Laguna Chaplin.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter aims to discuss the relationship between femininity and representations of women involved in violence, focussing on visual representations. Miranda Alison has made the point that the repeated necessity to qualify the term 'combatant' with the descriptor 'female' draws attention to how women soldiers, female freedom fighters, female suicide bombers and female terrorists are exceptional figures. That the female combatant or the female terrorist is an aberration or a deviation from a masculine norm is undermined by the lengthy history of women as warriors, fighters, and terrorists. In that sense it is not so much that fighting women are rare but that there is amnesia within cultural memories concerning the woman fighter. However, in representations of conflict, the dominant image associated with femininity is passive; that is as the defenceless and the defended, or as the allegory of peace. Moreover, representations of men in wars as defeated or wounded means feminising such figures. Miriam Cooke, in her Women and the War Story, 1996, points out how a mythic war story provides men with political roles, in the politikon or public arena, whereas women are domesticated in the space of the oikon. In the mythic war story women may function as Mater Dolorosa, Patriotic Mother or Spartan Mother. It follows then that there are conditions in which it is permissible to represent women fighting on behalf of their children or in defence of the home, and in the absence of men. These images are also found in wider culture: Sarah Connor in Terminator or Ripley in Alien, for example. Images of the female terrorist raise new issues but I want to argue that it is also the case that discussing femininity and the terrorist must involve relating such imagery to representations of the female warrior over a longer timespan. Some questions have shifted since the late twentieth century. Dating from the early 1990s, most Western nations increasingly incorporated women into combat roles within their armed forces. This paper will aim to unpick some of the intricate connections between the increasing presence of women in the armed forces, what relationship this has to emancipation and the participation of women in violence classed as terrorist.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Gulf is experiencing a pandemic of lifestyle-induced obesity and type 2 diabetes mellitus (T2DM), with rates exceeding 50 and 30%, respectively. It is likely that T2DM represents the tip of a very large metabolic syndrome iceberg, which precedes T2DM by many years and is associated with abnormal/ectopic fat distribution, pathological systemic oxidative stress and inflammation. However, the definitions are still evolving with the role of different fat depots being critical. Hormetic stimuli, which include exercise, calorie restriction, temperature extremes, dehydration and even some dietary components (such as plant polyphenols), may well modulate fat deposition. All induce physiological levels of oxidative stress, which results in mitochondrial biogenesis and increased anti-oxidant capacity, improving metabolic flexibility and the ability to deal with lipids. We propose that the Gulf Metabolic Syndrome results from an unusually rapid loss of hormetic stimuli within an epigenetically important time frame of 2-3 generations. Epigenetics indicates that thriftiness can be programmed by the environment and passed down through several generations. Thus this loss of hormesis can result in continuation of metabolic inflexibility, with mothers exposing the foetus to a milieu that perpetuates a stressed epigenotype. As the metabolic syndrome increases oxidative stress and reduces life expectancy, a better descriptor may therefore be the Lifestyle-Induced Metabolic Inflexibility and accelerated AGEing syndrome – LIMIT-AGE. As life expectancy in the Gulf begins to fall, with perhaps a third of this life being unhealthy – including premature loss of sexual function, it is vital to detect evidence of this condition as early in life as possible. One effective way to do this is by detecting evidence of metabolic inflexibility by studying body fat content and distribution by magnetic resonance (MR). The Gulf Metabolic Syndrome thus represents an accelerated form of the metabolic syndrome induced by the unprecedented rapidity of lifestyle change in the region, the stress of which is being passed from generation to generation and may be accumulative. The fundamental cause is probably due to a rapid increase in countrywide wealth. This has benefited most socioeconomic groups, resulting in the development of an obesogenic environment as the result of the rapid adoption of Western labour saving and stress relieving devices (e.g. cars and air conditioning), as well as the associated high calorie diet.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Automated border control (ABC) is concerned with fast and secure processing for intelligence-led identification. The FastPass project aims to build a harmonised, modular reference system for future European ABC. When biometrics is taken on board as identity, spoofing attacks become a concern. This paper presents current research in algorithm development for counter-spoofing attacks in biometrics. Focussing on three biometric traits, face, fingerprint, and iris, it examines possible types of spoofing attacks, and reviews existing algorithms reported in relevant academic papers in the area of countering measures to biometric spoofing attacks. It indicates that the new developing trend is fusion of multiple biometrics against spoofing attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The current work discusses the compositional analysis of spectra that may be related to amorphous materials that lack discernible Lorentzian, Debye or Drude responses. We propose to model such response using a 3-dimensional random RLC network using a descriptor formulation which is converted into an input-output transfer function representation. A wavelet identification study of these networks is performed to infer the composition of the networks. It was concluded that wavelet filter banks enable a parsimonious representation of the dynamics in excited randomly connected RLC networks. Furthermore, chemometric classification using the proposed technique enables the discrimination of dielectric samples with different composition. The methodology is promising for the classification of amorphous dielectrics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Hourly sea level records from 1954 to 2012 at 20 tide gauges at and adjacent to the Chinese coasts are used to analyze extremes in sea level and in tidal residual. Tides and tropical cyclones determine the spatial distribution of sea level maxima. Tidal residual maxima are predominantly determined by tropical cyclones. The 50 year return level is found to be sensitive to the number of extreme events used in the estimation. This is caused by the small number of tropical cyclone events happening each year which lead to other local storm events included thus significantly affecting the estimates. Significant increase in sea level extremes is found with trends in the range between 2.0 and 14.1 mm yr−1. The trends are primarily driven by changes in median sea level but also linked with increases in tidal amplitudes at three stations. Tropical cyclones cause significant interannual variations in the extremes. The interannual variability in the sea level extremes is also influenced by the changes in median sea level at the north and by the 18.6 year nodal cycle at the South China Sea. Neither of PDO and ENSO is found to be an indicator of changes in the size of extremes, but ENSO appears to regulate the number of tropical cyclones that reach the Chinese coasts. Global mean atmospheric temperature appears to be a good descriptor of the interannual variability of tidal residual extremes induced by tropical cyclones but the trend in global temperature is inconsistent with the lack of trend in the residuals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The seasonal sea level variations observed from tide gauges over 1900-2013 and gridded satellite altimeter product AVISO over 1993-2013 in the northwest Pacific have been explored. The seasonal cycle is able to explain 60-90% of monthly sea level variance in the marginal seas, while it explains less than 20% of variance in the eddy-rich regions. The maximum annual and semi-annual sea level cycles (30cm and 6cm) are observed in the north of the East China Sea and the west of the South China Sea respectively. AVISO was found to underestimate the annual amplitude by 25% compared to tide gauge estimates along the coasts of China and Russia. The forcing for the seasonal sea level cycle was identified. The atmospheric pressure and the steric height produce 8-12cm of the annual cycle in the middle continental shelf and in the Kuroshio Current regions separately. The removal of the two attributors from total sea level permits to identify the sea level residuals that still show significant seasonality in the marginal seas. Both nearby wind stress and surface currents can explain well the long-term variability of the seasonal sea level cycle in the marginal seas and the tropics because of their influence on the sea level residuals. Interestingly, the surface currents are a better descriptor in the areas where the ocean currents are known to be strong. Here, they explain 50-90% of inter-annual variability due to the strong links between the steric height and the large-scale ocean currents.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anti-spoofing is attracting growing interest in biometrics, considering the variety of fake materials and new means to attack biometric recognition systems. New unseen materials continuously challenge state-of-the-art spoofing detectors, suggesting for additional systematic approaches to target anti-spoofing. By incorporating liveness scores into the biometric fusion process, recognition accuracy can be enhanced, but traditional sum-rule based fusion algorithms are known to be highly sensitive to single spoofed instances. This paper investigates 1-median filtering as a spoofing-resistant generalised alternative to the sum-rule targeting the problem of partial multibiometric spoofing where m out of n biometric sources to be combined are attacked. Augmenting previous work, this paper investigates the dynamic detection and rejection of livenessrecognition pair outliers for spoofed samples in true multi-modal configuration with its inherent challenge of normalisation. As a further contribution, bootstrap aggregating (bagging) classifiers for fingerprint spoof-detection algorithm is presented. Experiments on the latest face video databases (Idiap Replay- Attack Database and CASIA Face Anti-Spoofing Database), and fingerprint spoofing database (Fingerprint Liveness Detection Competition 2013) illustrate the efficiency of proposed techniques.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Multibiometrics aims at improving biometric security in presence of spoofing attempts, but exposes a larger availability of points of attack. Standard fusion rules have been shown to be highly sensitive to spoofing attempts – even in case of a single fake instance only. This paper presents a novel spoofing-resistant fusion scheme proposing the detection and elimination of anomalous fusion input in an ensemble of evidence with liveness information. This approach aims at making multibiometric systems more resistant to presentation attacks by modeling the typical behaviour of human surveillance operators detecting anomalies as employed in many decision support systems. It is shown to improve security, while retaining the high accuracy level of standard fusion approaches on the latest Fingerprint Liveness Detection Competition (LivDet) 2013 dataset.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper investigates the potential of fusion at normalisation/segmentation level prior to feature extraction. While there are several biometric fusion methods at data/feature level, score level and rank/decision level combining raw biometric signals, scores, or ranks/decisions, this type of fusion is still in its infancy. However, the increasing demand to allow for more relaxed and less invasive recording conditions, especially for on-the-move iris recognition, suggests to further investigate fusion at this very low level. This paper focuses on the approach of multi-segmentation fusion for iris biometric systems investigating the benefit of combining the segmentation result of multiple normalisation algorithms, using four methods from two different public iris toolkits (USIT, OSIRIS) on the public CASIA and IITD iris datasets. Evaluations based on recognition accuracy and ground truth segmentation data indicate high sensitivity with regards to the type of errors made by segmentation algorithms.