881 resultados para Signature Verification, Forgery Detection, Fuzzy Modeling


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Nonindigenous species (NIS) are a major threat to marine ecosystems, with possible dramatic effects on biodiversity, biological productivity, habitat structure and fisheries. The Papahānaumokuākea Marine National Monument (PMNM) has taken active steps to mitigate the threats of NIS in Northwestern Hawaiian Islands (NWHI). Of particular concern are the 13 NIS already detected in NWHI and two invasive species found among the main Hawaiian Islands, snowflake coral (Carijoa riseii) and a red alga (Hypnea musciformis). Much of the information regarding NIS in NWHI has been collected or informed by surveys using conventional SCUBA or fishing gear. These technologies have significant drawbacks. SCUBA is generally constrained to depths shallower than 40 m and several NIS of concern have been detected well below this limit (e.g., L. kasmira – 256 m) and fishing gear is highly selective. Consequently, not all habitats or species can be properly represented. Effective management of NIS requires knowledge of their spatial distribution and abundance over their entire range. Surveys which provide this requisite information can be expensive, especially in the marine environment and even more so in deepwater. Technologies which minimize costs, increase the probability of detection and are capable of satisfying multiple objectives simultaneously are desired. This report examines survey technologies, with a focus on towed camera systems (TCSs), and modeling techniques which can increase NIS detection and sampling efficiency in deepwater habitats of NWHI; thus filling a critical data gap in present datasets. A pilot study conducted in 2008 at French Frigate Shoals and Brooks Banks was used to investigate the application of TCSs for surveying NIS in habitats deeper than 40 m. Cost and data quality were assessed. Over 100 hours of video was collected, in which 124 sightings of NIS were made among benthic habitats from 20 to 250 m. Most sightings were of a single cosmopolitan species, Lutjanus kasmira, but Cephalopholis argus, and Lutjanus fulvus, were also detected. The data expand the spatial distributions of observed NIS into deepwater habitats, identify algal plain as an important habitat and complement existing data collected using SCUBA and fishing gear. The technology’s principal drawback was its inability to identify organisms of particular concern, such as Carijoa riseii and Hypnea musciformis due to inadequate camera resolution and inability to thoroughly inspect sites. To solve this issue we recommend incorporating high-resolution cameras into TCSs, or using alternative technologies, such as technical SCUBA diving or remotely operated vehicles, in place of TCSs. We compared several different survey technologies by cost and their ability to detect NIS and these results are summarized in Table 3.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We conducted a comparative statistical analysis of tetra- through hexanucleotide frequencies in two sets of introns of yeast genes. The first set consisted of introns of genes that have transcription rates higher than 30 mRNAs/h while the second set contained introns of genes whose transcription rates were lower than or equal to 10 mRNAs/h. Some oligonucleotides whose occurrence frequencies in the first set of introns are significantly higher than those in the second set of introns were detected. The frequencies of occurrence of most of these detected oligonucleotides are also significantly higher than those in the exons flanking the introns of the first set. Interestingly some of these detected oligonucleotides are the same as well known "signature" sequences of transcriptional regulatory elements. This could imply the existence of potential positive regulatory motifs of transcription in yeast introns. (C) 2003 Elsevier Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The highly sensitive and molecule-specific technique of surface-enhanced Raman spectroscopy (SERS) generates high signal enhancements via localized optical fields on nanoscale metallic materials, which can be tuned by manipulation of the surface roughness and architecture on the submicrometer level. We investigate gold-functionalized vertically aligned carbon nanotube forests (VACNTs) as low-cost straightforward SERS nanoplatforms. We find that their SERS enhancements depend on their diameter and density, which are systematically optimized for their performance. Modeling of the VACNT-based SERS substrates confirms consistent dependence on structural parameters as observed experimentally. The created nanostructures span over large substrate areas, are readily configurable, and yield uniform and reproducible SERS enhancement factors. Further fabricated micropatterned VACNTs platforms are shown to deliver multiplexed SERS detection. The unique properties of CNTs, which can be synergistically utilized in VACNT-based substrates and patterned arrays, can thus provide new generation platforms for SERS detection. © 2012 American Chemical Society.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Planet bearings of wind turbine epicyclic gearboxes are considered as one of the most critical components due to their high failure rate. In order to develop effective vibration based detection algorithms for these bearings, a thorough understanding of their vibration signature is required. In this paper, we investigate the vibration behaviour of an epicyclic gearbox in the presence of a defective planet bearing both theoretically and experimentally. We also identify different sources of modulation sidebands using an analytical model which includes ring gear flexibility and planet bearing defects. The findings from this work will help engineers to develop more effective fault detection algorithms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An experimental investigation of a turbine stage featuring very high end wall angles is presented. The initial turbine design did not achieve a satisfactory performance and the difference between the design predictions and the test results was traced to a large separated region on the rear suction-surface. To improve the agreement between computational fluid dynamics (CFD) and experiment, it was found necessary to modify the turbulence modeling employed. The modified CFD code was then used to redesign the vane, and the changes made are described. When tested, the performance of the redesigned vane was found to have much closer agreement with the predictions than the initial vane. Finally, the flowfield and performance of the redesigned stage are compared to a similar turbine, designed to perform the same duty, which lies in an annulus of moderate end wall angles. A reduction in stage efficiency of at least 2.4% was estimated for the very high end wall angle design. © 2014 by ASME.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper investigates the design and modelling of an integrated device for acoustic resonance spectroscopy (ARS). Miniaturisation of such platforms can be achieved using MEMS technology thereby enabling scaling of device dimensions to investigate smaller specimens while simultaneously operating at higher frequencies. We propose an integrated device where the transducers are mounted in close proximity with the specimen to be analysed (e.g. by integrating ultrasound transducers within a microfluidic channel). A finite element (FE) model and a simplified analytical model have been constructed to predict the acoustic response of a sample embedded in such a device configuration. A FE simulation is performed in COMSOL by embedding the piezoelectric transducers in representative fluid media. Resonant frequencies associated with the measurement can be extracted from this data. The response of various media modelled through FEA matches with analytical predictions for a range of biological media. A variety of biological media may be identified by using the measured resonant frequencies as a signature of relevant physical characteristics. The paper establishes the modelling basis of an integrated acoustic resonant spectrometer that is then applied to examine the impact of geometrical scaling on system resolution. © 2013 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An effective face detection system used for detecting multi pose frontal face in gray images is presented. Image preprocessing approaches are applied to reduce the influence of the complex illumination. Eye-analog pairing and improved multiple related template matching are used to glancing and accurate face detecting, respectively. To shorten the time cost of detecting process, we employ prejudge rules in checking candidate image segments before template matching. Test by our own face database with complicated illumination and background, the system has high calculation speed and illumination independency, and obtains good experimental results.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We propose the exploding-reflector method to simulate a monostatic survey with a single simulation. The exploding reflector, used in seismic modeling, is adapted for ground-penetrating radar (GPR) modeling by using the analogy between acoustic and electromagnetic waves. The method can be used with ray tracing to obtain the location of the interfaces and estimate the properties of the medium on the basis of the traveltimes and reflection amplitudes. In particular, these can provide a better estimation of the conductivity and geometrical details. The modeling methodology is complemented with the use of the plane-wave method. The technique is illustrated with GPR data from an excavated tomb of the nineteenth century.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Malicious software (malware) have significantly increased in terms of number and effectiveness during the past years. Until 2006, such software were mostly used to disrupt network infrastructures or to show coders’ skills. Nowadays, malware constitute a very important source of economical profit, and are very difficult to detect. Thousands of novel variants are released every day, and modern obfuscation techniques are used to ensure that signature-based anti-malware systems are not able to detect such threats. This tendency has also appeared on mobile devices, with Android being the most targeted platform. To counteract this phenomenon, a lot of approaches have been developed by the scientific community that attempt to increase the resilience of anti-malware systems. Most of these approaches rely on machine learning, and have become very popular also in commercial applications. However, attackers are now knowledgeable about these systems, and have started preparing their countermeasures. This has lead to an arms race between attackers and developers. Novel systems are progressively built to tackle the attacks that get more and more sophisticated. For this reason, a necessity grows for the developers to anticipate the attackers’ moves. This means that defense systems should be built proactively, i.e., by introducing some security design principles in their development. The main goal of this work is showing that such proactive approach can be employed on a number of case studies. To do so, I adopted a global methodology that can be divided in two steps. First, understanding what are the vulnerabilities of current state-of-the-art systems (this anticipates the attacker’s moves). Then, developing novel systems that are robust to these attacks, or suggesting research guidelines with which current systems can be improved. This work presents two main case studies, concerning the detection of PDF and Android malware. The idea is showing that a proactive approach can be applied both on the X86 and mobile world. The contributions provided on this two case studies are multifolded. With respect to PDF files, I first develop novel attacks that can empirically and optimally evade current state-of-the-art detectors. Then, I propose possible solutions with which it is possible to increase the robustness of such detectors against known and novel attacks. With respect to the Android case study, I first show how current signature-based tools and academically developed systems are weak against empirical obfuscation attacks, which can be easily employed without particular knowledge of the targeted systems. Then, I examine a possible strategy to build a machine learning detector that is robust against both empirical obfuscation and optimal attacks. Finally, I will show how proactive approaches can be also employed to develop systems that are not aimed at detecting malware, such as mobile fingerprinting systems. In particular, I propose a methodology to build a powerful mobile fingerprinting system, and examine possible attacks with which users might be able to evade it, thus preserving their privacy. To provide the aforementioned contributions, I co-developed (with the cooperation of the researchers at PRALab and Ruhr-Universität Bochum) various systems: a library to perform optimal attacks against machine learning systems (AdversariaLib), a framework for automatically obfuscating Android applications, a system to the robust detection of Javascript malware inside PDF files (LuxOR), a robust machine learning system to the detection of Android malware, and a system to fingerprint mobile devices. I also contributed to develop Android PRAGuard, a dataset containing a lot of empirical obfuscation attacks against the Android platform. Finally, I entirely developed Slayer NEO, an evolution of a previous system to the detection of PDF malware. The results attained by using the aforementioned tools show that it is possible to proactively build systems that predict possible evasion attacks. This suggests that a proactive approach is crucial to build systems that provide concrete security against general and evasion attacks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

T.Boongoen and Q. Shen. Semi-Supervised OWA Aggregation for Link-Based Similarity Evaluation and Alias Detection. Proceedings of the 18th International Conference on Fuzzy Systems (FUZZ-IEEE'09), pp. 288-293, 2009. Sponsorship: EPSRC

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Shen, Q., Zhao, R., Tang, W. (2008). Modelling random fuzzy renewal reward processes. IEEE Transactions on Fuzzy Systems, 16 (5),1379-1385

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In our previous work, we developed TRAFFIC(X), a specification language for modeling bi-directional network flows featuring a type system with constrained polymorphism. In this paper, we present two ways to customize the constraint system: (1) when using linear inequality constraints for the constraint system, TRAFFIC(X) can describe flows with numeric properties such as MTU (maximum transmission unit), RTT (round trip time), traversal order, and bandwidth allocation over parallel paths; (2) when using Boolean predicate constraints for the constraint system, TRAFFIC(X) can describe routing policies of an IP network. These examples illustrate how to use the customized type system.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly in the Bytecode Verifier, a critical component used to verify class semantics before loading is complete. This paper describes a method for representing Java security constraints using the Alloy modeling language. It further describes a system for performing a security analysis on any block of Java bytecodes by converting the bytes into relation initializers in Alloy. Any counterexamples found by the Alloy analyzer correspond directly to insecure code. Analysis of the approach in the context of known security exploits is provided. This type of analysis represents a significant departure from standard malware analysis methods based on signatures or anomaly detection.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In research areas involving mathematical rigor, there are numerous benefits to adopting a formal representation of models and arguments: reusability, automatic evaluation of examples, and verification of consistency and correctness. However, accessibility has not been a priority in the design of formal verification tools that can provide these benefits. In earlier work [30] we attempt to address this broad problem by proposing several specific design criteria organized around the notion of a natural context: the sphere of awareness a working human user maintains of the relevant constructs, arguments, experiences, and background materials necessary to accomplish the task at hand. In this report we evaluate our proposed design criteria by utilizing within the context of novel research a formal reasoning system that is designed according to these criteria. In particular, we consider how the design and capabilities of the formal reasoning system that we employ influence, aid, or hinder our ability to accomplish a formal reasoning task – the assembly of a machine-verifiable proof pertaining to the NetSketch formalism. NetSketch is a tool for the specification of constrained-flow applications and the certification of desirable safety properties imposed thereon. NetSketch is conceived to assist system integrators in two types of activities: modeling and design. It provides capabilities for compositional analysis based on a strongly-typed domain-specific language (DSL) for describing and reasoning about constrained-flow networks and invariants that need to be enforced thereupon. In a companion paper [13] we overview NetSketch, highlight its salient features, and illustrate how it could be used in actual applications. In this paper, we define using a machine-readable syntax major parts of the formal system underlying the operation of NetSketch, along with its semantics and a corresponding notion of validity. We then provide a proof of soundness for the formalism that can be partially verified using a lightweight formal reasoning system that simulates natural contexts. A traditional presentation of these definitions and arguments can be found in the full report on the NetSketch formalism [12].