992 resultados para Two-domain architecture


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The analysis and value of digital evidence in an investigation has been the domain of discourse in the digital forensic community for several years. While many works have considered different approaches to model digital evidence, a comprehensive understanding of the process of merging different evidence items recovered during a forensic analysis is still a distant dream. With the advent of modern technologies, pro-active measures are integral to keeping abreast of all forms of cyber crimes and attacks. This paper motivates the need to formalize the process of analyzing digital evidence from multiple sources simultaneously. In this paper, we present the forensic integration architecture (FIA) which provides a framework for abstracting the evidence source and storage format information from digital evidence and explores the concept of integrating evidence information from multiple sources. The FIA architecture identifies evidence information from multiple sources that enables an investigator to build theories to reconstruct the past. FIA is hierarchically composed of multiple layers and adopts a technology independent approach. FIA is also open and extensible making it simple to adapt to technological changes. We present a case study using a hypothetical car theft case to demonstrate the concepts and illustrate the value it brings into the field.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, a two-dimensional non-continuous seepage flow with fractional derivatives (2D-NCSF-FD) in uniform media is considered, which has modified the well known Darcy law. Using the relationship between Riemann-Liouville and Grunwald-Letnikov fractional derivatives, two modified alternating direction methods: a modified alternating direction implicit Euler method and a modified Peaceman-Rachford method, are proposed for solving the 2D-NCSF-FD in uniform media. The stability and consistency, thus convergence of the two methods in a bounded domain are discussed. Finally, numerical results are given.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper discusses similarities and differences in autonomous helicopters developed at USC and CSIRO. The most significant differences are in the accuracy and sample rate of the sensor systems used for control. The USC vehicle, like a number of others, makes use of a sensor suite that costs an order of magnitude more than the vehicle. The CSIRO system, by contrast, utilizes low-cost inertial, magnetic, vision and GPS to achieve the same ends. We describe the architecture of both autonomous helicopters, discuss the design issues and present comparative results.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper proposes a security architecture for the basic cross indexing systems emerging as foundational structures in current health information systems. In these systems unique identifiers are issued to healthcare providers and consumers. In most cases, such numbering schemes are national in scope and must therefore necessarily be used via an indexing system to identify records contained in pre-existing local, regional or national health information systems. Most large scale electronic health record systems envisage that such correlation between national healthcare identifiers and pre-existing identifiers will be performed by some centrally administered cross referencing, or index system. This paper is concerned with the security architecture for such indexing servers and the manner in which they interface with pre-existing health systems (including both workstations and servers). The paper proposes two required structures to achieve the goal of a national scale, and secure exchange of electronic health information, including: (a) the employment of high trust computer systems to perform an indexing function, and (b) the development and deployment of an appropriate high trust interface module, a Healthcare Interface Processor (HIP), to be integrated into the connected workstations or servers of healthcare service providers. This proposed architecture is specifically oriented toward requirements identified in the Connectivity Architecture for Australia’s e-health scheme as outlined by NEHTA and the national e-health strategy released by the Australian Health Ministers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Our objective was to determine the factors that lead users to continue working with process modeling grammars after their initial adoption. We examined the explanatory power of three theoretical models of IT usage by applying them to two popular process modeling grammars. We found that a hybrid model of technology acceptance and expectation-confirmation best explained user intentions to continue using the grammars. We examined differences in the model results, and used them to provide three contributions. First, the study confirmed the applicability of IT usage models to the domain of process modeling. Second, we discovered that differences in continued usage intentions depended on the grammar type instead of the user characteristics. Third, we suggest implications and practice.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, the commonly used switching schemes for sliding mode control of power converters is analyzed and designed in the frequency domain. Particular application of a distribution static compensator (DSTATCOM) in voltage control mode is investigated in a power distribution system. Tsypkin's method and describing function is used to obtain the switching conditions for the two-level and three-level voltage source inverters. Magnitude conditions of carrier signals are developed for robust switching of the inverter under carrier-based modulation scheme of sliding mode control. The existence of border collision bifurcation is identified to avoid the complex switching states of the inverter. The load bus voltage of an unbalanced three-phase nonstiff radial distribution system is controlled using the proposed carrier-based design. The results are validated using PSCAD/EMTDC simulation studies and through a scaled laboratory model of DSTATCOM that is developed for experimental verification

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Introduction. There are two binding sites on the β1-adrenoceptor (AR), β1H and β1L corresponding to high and low affinity binding sites respectively, which can be activated to cause cardiostimulation. Some β-blockers that block β1AR and β2ARs can activate β1LARs at higher concentrations than those required to cause blockade. The β2AR does not form a corresponding low affinity binding site and therefore we postulated that heterologous amino acids are responsible for the formation of β1LAR. Aim. To investigate whether heterologous amino acids of transmembrane domain V (TMDV) of β1AR and β2ARs contribute to β1LAR. Methods. β1ARs, β2ARs and mutant β1ARs containing all (β1(β2TMDV)AR) or single amino acids of TMDV of the β2AR were prepared and stably expressed in Chinese Hamster Ovary cells. Concentration-effect curves for cyclicAMP accumulation were carried out for (-)-CGP12177 in the absence or presence of (-)-bupranolol. Results. The potencies (pEC50) of (-)-CGP12177 were β2AR (9.24 ± 0.14, n = 5), β1(V230I)AR (9.07 ± 0.07, n = 10), β1(β2TMDV)AR (8.86 ± 0.10, n = 15), β1(R222Q)AR (8.09 ± 0.29, n = 6), β1AR (8.00 ± 0.11, n = 11). The affinities (pKB) of (-)-bupranolol were β2AR (9.82 ± 0.52, n = 5), β1(V230I)AR (7.64 ± 0.12, n = 8), β1(β2TMV)AR (8.06 ± 0.17, n = 8), β1(R222Q)AR (7.33 ± 0.23, n = 5), β1AR (7.23 ± 0.23, n = 5). Discussion. The potency of (-)-CGP12177 was higher at β2AR than at β1AR consistent with activation through a low affinity site at the β1AR (β1LAR). The presence of V230 in β1AR accounted for the lower potency of (-)-CGP 12177. The affinity of (-)-bupranolol was lower at β1AR compared to β2AR. The presence of V230 in β1AR accounted in part for the lower affinity. In conclusion TMDV of the β1AR contributes in part to the low affinity binding site of β1AR.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There are two binding sites on the β1-adrenoceptor (AR), β1H and β1L corresponding to high and low affinity binding sites respectively, which can be activated to cause cardiostimulation (reviewed Kaumann and Molenaar, 2008). Some β-blockers that block β1AR and β2ARs can activate β1LARs at higher concentrations than those required to cause blockade. The β2AR does not form a corresponding low affinity binding site (Baker et al 2002) and therefore we postulated that heterologous amino acids are responsible for the formation of β1LAR. Our aim was to investigate whether heterologous amino acids of transmembrane domain V (TMDV) of β1AR and β2ARs contribute to β1LAR. β1ARs, β2ARs and mutant β1ARs containing all (β1(β2TMDV)AR) or single amino acids of TMDV of the β2AR were prepared and stably expressed in Chinese Hamster Ovary cells. Concentration-effect curves for cyclicAMP accumulation were carried out for (-)-CGP12177 or (-)-isoprenaline in the absence or presence of (-)-bupranolol. _______________________________________________________________________ (-)-CGP 12177 (-)-Bupranolol affinity (pKB) pEC50 vs (-)-CGP 12177 vs (-)-isoprenaline _______________________________________________________________________ β1AR 8.00 ± 0.11 (11) 7.23 ± 0.23 (5) 9.52 ± 0.28 (5) β2AR (high density) 9.24 ± 0.14 (5) 9.82 ± 0.52 (8) xPaulxxxxxxx β2AR (low density) no effect β1(β2TMV)AR 8.86 ± 0.10 (15) 8.06 ± 0.17 (8) 9.08 ± 0.22 (6) β1(V230I)AR 9.07 ± 0.07 (10) 7.64 ± 0.12 (8) 9.36 ± 0.28 (9) β1(R222Q)AR 8.09 ± 0.29 (6) 7.33 ± 0.23 (5) 9.36 ± 0.08 (6) β1(V230A)AR 7.59 ± 0.09 (6) 7.32 ± 0.24 (4) 8.62 ± 0.18 (5) _______________________________________________________________________ The potency of (-)-CGP12177 was higher at β2AR than at β1AR consistent with activation through a low affinity site at the β1AR (β1LAR) but not β2AR. The presence of V230 in β1AR accounted for the lower potency of (-)-CGP 12177. The affinity of (-)-bupranolol at β1AR and mutants was higher when determined with (-)-isoprenaline than with (-)-CGP 12177. The affinity of (-)-bupranolol determined against (-)-CGP 12177 was lower at β1AR compared to β2AR. The presence of V230 in β1AR accounted in part for the lower affinity. In conclusion V230 of the β1AR contributes in part to the low affinity binding site of β1AR. Baker JG, Hall IP, Hill SJ (2002). Pharmacological characterization of CGP12177 at the human β2-adrenoceptor. Br J Pharmacol 137, 400−408 Kaumann AJ, Molenaar P (2008) The low-affinity site of the β1-adrenoceptor and its relevance to cardiovascular pharmacology. Pharmacol Ther 118, 303-336

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a method of voice activity detection (VAD) suitable for high noise scenarios, based on the fusion of two complementary systems. The first system uses a proposed non-Gaussianity score (NGS) feature based on normal probability testing. The second system employs a histogram distance score (HDS) feature that detects changes in the signal through conducting a template-based similarity measure between adjacent frames. The decision outputs by the two systems are then merged using an open-by-reconstruction fusion stage. Accuracy of the proposed method was compared to several baseline VAD methods on a database created using real recordings of a variety of high-noise environments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a method of voice activity detection (VAD) for high noise scenarios, using a noise robust voiced speech detection feature. The developed method is based on the fusion of two systems. The first system utilises the maximum peak of the normalised time-domain autocorrelation function (MaxPeak). The second zone system uses a novel combination of cross-correlation and zero-crossing rate of the normalised autocorrelation to approximate a measure of signal pitch and periodicity (CrossCorr) that is hypothesised to be noise robust. The score outputs by the two systems are then merged using weighted sum fusion to create the proposed autocorrelation zero-crossing rate (AZR) VAD. Accuracy of AZR was compared to state of the art and standardised VAD methods and was shown to outperform the best performing system with an average relative improvement of 24.8% in half-total error rate (HTER) on the QUT-NOISE-TIMIT database created using real recordings from high-noise environments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents the results of testing to determine pavement forces from three heavy vehicles (HVs). The HVs were instrumented to measure their wheel forces. A “novel roughness” value of the roads during testing is also derived. The various dynamic pavement forces are presented according to the range of novel roughness of pavement surfacings encountered during testing. The paper then examines the relationship between the two derived wavelengths predominant within the HV suspensions; those of axle hop and body-bounce. How these may be considered as contributing to spatial repetition of pavement forces from HVs is discussed. The paper concludes that pavement models need to be revised since dynamic forces from HVs in particular are not generally considered in current pavement design.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper considers the problem of building a software architecture for a human-robot team. The objective of the team is to build a multi-attribute map of the world by performing information fusion. A decentralized approach to information fusion is adopted to achieve the system properties of scalability and survivability. Decentralization imposes constraints on the design of the architecture and its implementation. We show how a Component-Based Software Engineering approach can address these constraints. The architecture is implemented using Orca – a component-based software framework for robotic systems. Experimental results from a deployed system comprised of an unmanned air vehicle, a ground vehicle, and two human operators are presented. A section on the lessons learned is included which may be applicable to other distributed systems with complex algorithms. We also compare Orca to the Player software framework in the context of distributed systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In fault detection and diagnostics, limitations coming from the sensor network architecture are one of the main challenges in evaluating a system’s health status. Usually the design of the sensor network architecture is not solely based on diagnostic purposes, other factors like controls, financial constraints, and practical limitations are also involved. As a result, it quite common to have one sensor (or one set of sensors) monitoring the behaviour of two or more components. This can significantly extend the complexity of diagnostic problems. In this paper a systematic approach is presented to deal with such complexities. It is shown how the problem can be formulated as a Bayesian network based diagnostic mechanism with latent variables. The developed approach is also applied to the problem of fault diagnosis in HVAC systems, an application area with considerable modeling and measurement constraints.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Since manually constructing domain-specific sentiment lexicons is extremely time consuming and it may not even be feasible for domains where linguistic expertise is not available. Research on the automatic construction of domain-specific sentiment lexicons has become a hot topic in recent years. The main contribution of this paper is the illustration of a novel semi-supervised learning method which exploits both term-to-term and document-to-term relations hidden in a corpus for the construction of domain specific sentiment lexicons. More specifically, the proposed two-pass pseudo labeling method combines shallow linguistic parsing and corpusbase statistical learning to make domain-specific sentiment extraction scalable with respect to the sheer volume of opinionated documents archived on the Internet these days. Another novelty of the proposed method is that it can utilize the readily available user-contributed labels of opinionated documents (e.g., the user ratings of product reviews) to bootstrap the performance of sentiment lexicon construction. Our experiments show that the proposed method can generate high quality domain-specific sentiment lexicons as directly assessed by human experts. Moreover, the system generated domain-specific sentiment lexicons can improve polarity prediction tasks at the document level by 2:18% when compared to other well-known baseline methods. Our research opens the door to the development of practical and scalable methods for domain-specific sentiment analysis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Notwithstanding the obvious potential advantages of information and communications technology (ICT) in the enhanced provision of healthcare services, there are some concerns associated with integration of and access to electronic health records. A security violation in health records, such as an unauthorised disclosure or unauthorised alteration of an individual's health information, can significantly undermine both healthcare providers' and consumers' confidence and trust in e-health systems. A crisis in confidence in any national level e-health system could seriously degrade the realisation of the system's potential benefits. In response to the privacy and security requirements for the protection of health information, this research project investigated national and international e-health development activities to identify the necessary requirements for the creation of a trusted health information system architecture consistent with legislative and regulatory requirements and relevant health informatics standards. The research examined the appropriateness and sustainability of the current approaches for the protection of health information. It then proposed an architecture to facilitate the viable and sustainable enforcement of privacy and security in health information systems under the project title "Open and Trusted Health Information Systems (OTHIS)". OTHIS addresses necessary security controls to protect sensitive health information when such data is at rest, during processing and in transit with three separate and achievable security function-based concepts and modules: a) Health Informatics Application Security (HIAS); b) Health Informatics Access Control (HIAC); and c) Health Informatics Network Security (HINS). The outcome of this research is a roadmap for a viable and sustainable architecture for providing robust protection and security of health information including elucidations of three achievable security control subsystem requirements within the proposed architecture. The successful completion of two proof-of-concept prototypes demonstrated the comprehensibility, feasibility and practicality of the HIAC and HIAS models for the development and assessment of trusted health systems. Meanwhile, the OTHIS architecture has provided guidance for technical and security design appropriate to the development and implementation of trusted health information systems whilst simultaneously offering guidance for ongoing research projects. The socio-economic implications of this research can be summarised in the fact that this research embraces the need for low cost security strategies against economic realities by using open-source technologies for overall test implementation. This allows the proposed architecture to be publicly accessible, providing a platform for interoperability to meet real-world application security demands. On the whole, the OTHIS architecture sets a high level of security standard for the establishment and maintenance of both current and future health information systems. This thereby increases healthcare providers‘ and consumers‘ trust in the adoption of electronic health records to realise the associated benefits.