897 resultados para in-field detection


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The paper showcases the field- and lab-documentation system developed for Kinneret Regional Project, an international archaeological expedition to the Northwestern shore of the Sea of Galilee (Israel) under the auspices of the University of Bern, the University of Helsinki, Leiden University and Wofford College. The core of the data management system is a fully relational, server-based database framework, which also includes time-based and static GIS services, stratigraphic analysis tools and fully indexed document/digital image archives. Data collection in the field is based on mobile, hand-held devices equipped with a custom-tailored stand-alone application. Comprehensive three-dimensional documentation of all finds and findings is achieved by means of total stations and/or high-precision GPS devices. All archaeological information retrieved in the field – including tachymetric data – is synched with the core system on the fly and thus immediately available for further processing in the field lab (within the local network) or for post-excavation analysis at remote institutions (via the WWW). Besides a short demonstration of the main functionalities, the paper also presents some of the key technologies used and illustrates usability aspects of the system’s individual components.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BACKGROUND The accuracy of CT pulmonary angiography (CTPA) in detecting or excluding pulmonary embolism has not yet been assessed in patients with high body weight (BW). METHODS This retrospective study involved CTPAs of 114 patients weighing 75-99 kg and those of 123 consecutive patients weighing 100-150 kg. Three independent blinded radiologists analyzed all examinations in randomized order. Readers' data on pulmonary emboli were compared with a composite reference standard, comprising clinical probability, reference CTPA result, additional imaging when performed and 90-day follow-up. Results in both BW groups and in two body mass index (BMI) groups (BMI <30 kg/m(2) and BMI ≥ 30 kg/m(2), i.e., non-obese and obese patients) were compared. RESULTS The prevalence of pulmonary embolism was not significantly different in the BW groups (P=1.0). The reference CTPA result was positive in 23 of 114 patients in the 75-99 kg group and in 25 of 123 patients in the ≥ 100 kg group, respectively (odds ratio, 0.991; 95% confidence interval, 0.501 to 1.957; P=1.0). No pulmonary embolism-related death or venous thromboembolism occurred during follow-up. The mean accuracy of three readers was 91.5% in the 75-99 kg group and 89.9% in the ≥ 100 kg group (odds ratio, 1.207; 95% confidence interval, 0.451 to 3.255; P=0.495), and 89.9% in non-obese patients and 91.2% in obese patients (odds ratio, 0.853; 95% confidence interval, 0.317 to 2.319; P=0.816). CONCLUSION The diagnostic accuracy of CTPA in patients weighing 75-99 kg or 100-150 kg proved not to be significantly different.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents an empirical evidence of user bias within a laboratory-oriented evaluation of a Spoken Dialog System. Specifically, we addressed user bias in their satisfaction judgements. We question the reliability of this data for modeling user emotion, focusing on contentment and frustration in a spoken dialog system. This bias is detected through machine learning experiments that were conducted on two datasets, users and annotators, which were then compared in order to assess the reliability of these datasets. The target used was the satisfaction rating and the predictors were conversational/dialog features. Our results indicated that standard classifiers were significantly more successful in discriminating frustration and contentment and the intensities of these emotions (reflected by user satisfaction ratings) from annotator data than from user data. Indirectly, the results showed that conversational features are reliable predictors of the two abovementioned emotions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Assuring the sustainability of quality in photovoltaic rural electrification programmes involves enhancing the reliability of the components of solar home systems as well as the characterization of the overall programme cost structure. Batteries and photovoltaic modules have a great impact on both the reliability and the cost assessment, the battery being the weakest component of the solar home system and consequently the most expensive element of the programme. The photovoltaic module, despite being the most reliable component, has a significant impact cost-wise on the initial investment, even at current market prices. This paper focuses on the in-field testing of both batteries and photovoltaic modules working under real operating conditions within a sample of 41 solar home systems belonging to a large photovoltaic rural electrification programme with more than 13,000 installed photovoltaic systems. Different reliability parameters such as lifetime have been evaluated, taking into account different factors, for example energy consumption rates, or the manufacturing quality of batteries. A degradation model has been proposed relating both loss of capacity and time of operation. The user e solar home system binomial is also analysed in order to understand the meaning of battery lifetime in rural electrification.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Gender detection is a very important objective to improve efficiency in tasks as speech or speaker recognition, among others. Traditionally gender detection has been focused on fundamental frequency (f0) and cepstral features derived from voiced segments of speech. The methodology presented here consists in obtaining uncorrelated glottal and vocal tract components which are parameterized as mel-frequency coefficients. K-fold and cross-validation using QDA and GMM classifiers showed that better detection rates are reached when glottal source and vocal tract parameters are used in a gender-balanced database of running speech from 340 speakers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents the impact of non-homogeneous deposits of dust on the performance of a PV array. The observations have been made in a 2-MW PV park in the southeast region of Spain. The results are that inhomogeneous dust leads to more significant consequences than the mere short-circuit current reduction resulting from transmittance losses. In particular, when the affected PV modules are part of a string together with other cleaned (or less dusty) ones, operation voltage losses arise. These voltage losses can be several times larger than the short-circuit ones, leading to power losses that can be much larger than what measurements suggest when the PV modules are considered separately. Significant hot-spot phenomena can also arise leading to cells exhibiting temperature differences of more than 20 degrees and thus representing a threat to the PV modules' lifetime.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Esta tesis se centra en el análisis de dos aspectos complementarios de la ciberdelincuencia (es decir, el crimen perpetrado a través de la red para ganar dinero). Estos dos aspectos son las máquinas infectadas utilizadas para obtener beneficios económicos de la delincuencia a través de diferentes acciones (como por ejemplo, clickfraud, DDoS, correo no deseado) y la infraestructura de servidores utilizados para gestionar estas máquinas (por ejemplo, C & C, servidores explotadores, servidores de monetización, redirectores). En la primera parte se investiga la exposición a las amenazas de los ordenadores victimas. Para realizar este análisis hemos utilizado los metadatos contenidos en WINE-BR conjunto de datos de Symantec. Este conjunto de datos contiene metadatos de instalación de ficheros ejecutables (por ejemplo, hash del fichero, su editor, fecha de instalación, nombre del fichero, la versión del fichero) proveniente de 8,4 millones de usuarios de Windows. Hemos asociado estos metadatos con las vulnerabilidades en el National Vulnerability Database (NVD) y en el Opens Sourced Vulnerability Database (OSVDB) con el fin de realizar un seguimiento de la decadencia de la vulnerabilidad en el tiempo y observar la rapidez de los usuarios a remiendar sus sistemas y, por tanto, su exposición a posibles ataques. Hemos identificado 3 factores que pueden influir en la actividad de parches de ordenadores victimas: código compartido, el tipo de usuario, exploits. Presentamos 2 nuevos ataques contra el código compartido y un análisis de cómo el conocimiento usuarios y la disponibilidad de exploit influyen en la actividad de aplicación de parches. Para las 80 vulnerabilidades en nuestra base de datos que afectan código compartido entre dos aplicaciones, el tiempo entre el parche libera en las diferentes aplicaciones es hasta 118 das (con una mediana de 11 das) En la segunda parte se proponen nuevas técnicas de sondeo activos para detectar y analizar las infraestructuras de servidores maliciosos. Aprovechamos técnicas de sondaje activo, para detectar servidores maliciosos en el internet. Empezamos con el análisis y la detección de operaciones de servidores explotadores. Como una operación identificamos los servidores que son controlados por las mismas personas y, posiblemente, participan en la misma campaña de infección. Hemos analizado un total de 500 servidores explotadores durante un período de 1 año, donde 2/3 de las operaciones tenían un único servidor y 1/2 por varios servidores. Hemos desarrollado la técnica para detectar servidores explotadores a diferentes tipologías de servidores, (por ejemplo, C & C, servidores de monetización, redirectores) y hemos logrado escala de Internet de sondeo para las distintas categorías de servidores maliciosos. Estas nuevas técnicas se han incorporado en una nueva herramienta llamada CyberProbe. Para detectar estos servidores hemos desarrollado una novedosa técnica llamada Adversarial Fingerprint Generation, que es una metodología para generar un modelo único de solicitud-respuesta para identificar la familia de servidores (es decir, el tipo y la operación que el servidor apartenece). A partir de una fichero de malware y un servidor activo de una determinada familia, CyberProbe puede generar un fingerprint válido para detectar todos los servidores vivos de esa familia. Hemos realizado 11 exploraciones en todo el Internet detectando 151 servidores maliciosos, de estos 151 servidores 75% son desconocidos a bases de datos publicas de servidores maliciosos. Otra cuestión que se plantea mientras se hace la detección de servidores maliciosos es que algunos de estos servidores podrán estar ocultos detrás de un proxy inverso silente. Para identificar la prevalencia de esta configuración de red y mejorar el capacidades de CyberProbe hemos desarrollado RevProbe una nueva herramienta a través del aprovechamiento de leakages en la configuración de la Web proxies inversa puede detectar proxies inversos. RevProbe identifica que el 16% de direcciones IP maliciosas activas analizadas corresponden a proxies inversos, que el 92% de ellos son silenciosos en comparación con 55% para los proxies inversos benignos, y que son utilizado principalmente para equilibrio de carga a través de múltiples servidores. ABSTRACT In this dissertation we investigate two fundamental aspects of cybercrime: the infection of machines used to monetize the crime and the malicious server infrastructures that are used to manage the infected machines. In the first part of this dissertation, we analyze how fast software vendors apply patches to secure client applications, identifying shared code as an important factor in patch deployment. Shared code is code present in multiple programs. When a vulnerability affects shared code the usual linear vulnerability life cycle is not anymore effective to describe how the patch deployment takes place. In this work we show which are the consequences of shared code vulnerabilities and we demonstrate two novel attacks that can be used to exploit this condition. In the second part of this dissertation we analyze malicious server infrastructures, our contributions are: a technique to cluster exploit server operations, a tool named CyberProbe to perform large scale detection of different malicious servers categories, and RevProbe a tool that detects silent reverse proxies. We start by identifying exploit server operations, that are, exploit servers managed by the same people. We investigate a total of 500 exploit servers over a period of more 13 months. We have collected malware from these servers and all the metadata related to the communication with the servers. Thanks to this metadata we have extracted different features to group together servers managed by the same entity (i.e., exploit server operation), we have discovered that 2/3 of the operations have a single server while 1/3 have multiple servers. Next, we present CyberProbe a tool that detects different malicious server types through a novel technique called adversarial fingerprint generation (AFG). The idea behind CyberProbe’s AFG is to run some piece of malware and observe its network communication towards malicious servers. Then it replays this communication to the malicious server and outputs a fingerprint (i.e. a port selection function, a probe generation function and a signature generation function). Once the fingerprint is generated CyberProbe scans the Internet with the fingerprint and finds all the servers of a given family. We have performed a total of 11 Internet wide scans finding 151 new servers starting with 15 seed servers. This gives to CyberProbe a 10 times amplification factor. Moreover we have compared CyberProbe with existing blacklists on the internet finding that only 40% of the server detected by CyberProbe were listed. To enhance the capabilities of CyberProbe we have developed RevProbe, a reverse proxy detection tool that can be integrated with CyberProbe to allow precise detection of silent reverse proxies used to hide malicious servers. RevProbe leverages leakage based detection techniques to detect if a malicious server is hidden behind a silent reverse proxy and the infrastructure of servers behind it. At the core of RevProbe is the analysis of differences in the traffic by interacting with a remote server.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We have developed a technique, methylation-specific PCR in situ hybridization (MSP-ISH), which allows for the methylation status of specific DNA sequences to be visualized in individual cells. We use MSP-ISH to monitor the timing and consequences of aberrant hypermethylation of the p16 tumor suppresser gene during the progression of cancers of the lung and cervix. Hypermethylation of p16 was localized only to the neoplastic cells in both in situ lesions and invasive cancers, and was associated with loss of p16 protein expression. MSP-ISH allowed us to dissect the surprising finding that p16 hypermethylation occurs in cervical carcinoma. This tumor is associated with infection of the oncogenic human papillomavirus, which expresses a protein, E7, that inactivates the retinoblastoma (Rb) protein. Thus, simultaneous Rb and p16 inactivation would not be needed to abrogate the critical cyclin D–Rb pathway. MSP-ISH reveals that p16 hypermethylation occurs heterogeneously within early cervical tumor cell populations that are separate from those expressing viral E7 transcripts. In advanced cervical cancers, the majority of cells have a hypermethylated p16, lack p16 protein, but no longer express E7. These data suggest that p16 inactivation is selected as the most effective mechanism of blocking the cyclin D–Rb pathway during the evolution of an invasive cancer from precursor lesions. These studies demonstrate that MSP-ISH is a powerful approach for studying the dynamics of aberrant methylation of critical tumor suppressor genes during tumor evolution.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Funding: This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no. 613960 (SMARTBEES) (http://www.smartbees-fp7.eu/) and Veterinary Medicines Directorate, Department for Environment Food & Rural Affairs (Project # VM0517) (https://www.gov.uk/government/organisations/veterinary-medicines-directorate). CHM was supported by a Biosciences Knowledge Transfer Network Biotechnology and Biological Sciences Research Council (KTN-BBSRC CASE) Studentship (BB/L502467/1) (http://www.bbsrc.ac.uk/). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. Acknowledgments We gratefully acknowledge Mr Sebastian Bacz’s expert help and advice with beekeeping.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A methodology, fluorescence-intensity distribution analysis, has been developed for confocal microscopy studies in which the fluorescence intensity of a sample with a heterogeneous brightness profile is monitored. An adjustable formula, modeling the spatial brightness distribution, and the technique of generating functions for calculation of theoretical photon count number distributions serve as the two cornerstones of the methodology. The method permits the simultaneous determination of concentrations and specific brightness values of a number of individual fluorescent species in solution. Accordingly, we present an extremely sensitive tool to monitor the interaction of fluorescently labeled molecules or other microparticles with their respective biological counterparts that should find a wide application in life sciences, medicine, and drug discovery. Its potential is demonstrated by studying the hybridization of 5′-(6-carboxytetramethylrhodamine)-labeled and nonlabeled complementary oligonucleotides and the subsequent cleavage of the DNA hybrids by restriction enzymes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We have investigated mRNA 3′-end-processing signals in each of six eukaryotic species (yeast, rice, arabidopsis, fruitfly, mouse, and human) through the analysis of more than 20,000 3′-expressed sequence tags. The use and conservation of the canonical AAUAAA element vary widely among the six species and are especially weak in plants and yeast. Even in the animal species, the AAUAAA signal does not appear to be as universal as indicated by previous studies. The abundance of single-base variants of AAUAAA correlates with their measured processing efficiencies. As found previously, the plant polyadenylation signals are more similar to those of yeast than to those of animals, with both common content and arrangement of the signal elements. In all species examined, the complete polyadenylation signal appears to consist of an aggregate of multiple elements. In light of these and previous results, we present a broadened concept of 3′-end-processing signals in which no single exact sequence element is universally required for processing. Rather, the total efficiency is a function of all elements and, importantly, an inefficient word in one element can be compensated for by strong words in other elements. These complex patterns indicate that effective tools to identify 3′-end-processing signals will require more than consensus sequence identification.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Bruton’s tyrosine kinase (Btk) is a critical transducer of signals originating from the B cell antigen receptor (BCR). Dosage, sequential phosphorylation, and protein interactions are interdependent mechanisms influencing Btk function. Phosphopeptide-specific mAbs recognizing two distinct phosphotyrosine modifications were used to quantify Btk activation by immunofluorescent techniques during B cell stimulation. In a population of cultured B cells stimulated by BCR crosslinking and analyzed by flow cytometry, transient phosphorylation of the regulatory Btk tyrosine residues (551Y and 223Y) was detected. The kinetics of phosphorylation of the residues were temporally distinct. Tyrosine 551, a transactivating substrate site for Src-family kinases, was maximally phosphorylated within ≈30 seconds of stimulation as monitored by flow cytometry. Tyrosine 223, an autophosphorylation site within the SH3 domain, was maximally phosphorylated at ≈5 minutes. Btk returned to a low tyrosine phosphorylation level within 30 minutes, despite persistent elevation of global tyrosine phosphorylation. Colocalization of activated Btk molecules with the crosslinked BCR signaling complex was observed to coincide with the period of maximal Btk tyrosine phosphorylation when stimulated B cells were analyzed with confocal microscopy. The results of these in situ temporal and spatial analyses imply that Btk signaling occurs in the region of the Ig receptor signaling complex, suggesting a similar location for downstream targets of its activity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Strategies for delaying pest resistance to genetically modified crops that produce Bacillus thuringiensis (Bt) toxins are based primarily on theoretical models. One key assumption of such models is that genes conferring resistance are rare. Previous estimates for lepidopteran pests targeted by Bt crops seem to meet this assumption. We report here that the estimated frequency of a recessive allele conferring resistance to Bt toxin Cry1Ac was 0.16 (95% confidence interval = 0.05–0.26) in strains of pink bollworm (Pectinophora gossypiella) derived from 10 Arizona cotton fields during 1997. Unexpectedly, the estimated resistance allele frequency did not increase from 1997 to 1999 and Bt cotton remained extremely effective against pink bollworm. These results demonstrate that the assumptions and predictions of resistance management models must be reexamined.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

One of the earliest events in programmed cell death is the externalization of phosphatidylserine, a membrane phospholipid normally restricted to the inner leaflet of the lipid bilayer. Annexin V, an endogenous human protein with a high affinity for membrane bound phosphatidylserine, can be used in vitro to detect apoptosis before other well described morphologic or nuclear changes associated with programmed cell death. We tested the ability of exogenously administered radiolabeled annexin V to concentrate at sites of apoptotic cell death in vivo. After derivatization with hydrazinonicotinamide, annexin V was radiolabeled with technetium 99m. In vivo localization of technetium 99m hydrazinonicotinamide-annexin V was tested in three models: fuminant hepatic apoptosis induced by anti-Fas antibody injection in BALB/c mice; acute rejection in ACI rats with transplanted heterotopic PVG cardiac allografts; and cyclophosphamide treatment of transplanted 38C13 murine B cell lymphomas. External radionuclide imaging showed a two- to sixfold increase in the uptake of radiolabeled annexin V at sites of apoptosis in all three models. Immunohistochemical staining of cardiac allografts for exogenously administered annexin V revealed intense staining of numerous myocytes at the periphery of mononuclear infiltrates of which only a few demonstrated positive apoptotic nuclei by the terminal deoxynucleotidyltransferase-mediated UTP end labeling method. These results suggest that radiolabeled annexin V can be used in vivo as a noninvasive means to detect and serially image tissues and organs undergoing programmed cell death.