892 resultados para Detection system


Relevância:

60.00% 60.00%

Publicador:

Resumo:

A decision-maker, when faced with a limited and fixed budget to collect data in support of a multiple attribute selection decision, must decide how many samples to observe from each alternative and attribute. This allocation decision is of particular importance when the information gained leads to uncertain estimates of the attribute values as with sample data collected from observations such as measurements, experimental evaluations, or simulation runs. For example, when the U.S. Department of Homeland Security must decide upon a radiation detection system to acquire, a number of performance attributes are of interest and must be measured in order to characterize each of the considered systems. We identified and evaluated several approaches to incorporate the uncertainty in the attribute value estimates into a normative model for a multiple attribute selection decision. Assuming an additive multiple attribute value model, we demonstrated the idea of propagating the attribute value uncertainty and describing the decision values for each alternative as probability distributions. These distributions were used to select an alternative. With the goal of maximizing the probability of correct selection we developed and evaluated, under several different sets of assumptions, procedures to allocate the fixed experimental budget across the multiple attributes and alternatives. Through a series of simulation studies, we compared the performance of these allocation procedures to the simple, but common, allocation procedure that distributed the sample budget equally across the alternatives and attributes. We found the allocation procedures that were developed based on the inclusion of decision-maker knowledge, such as knowledge of the decision model, outperformed those that neglected such information. Beginning with general knowledge of the attribute values provided by Bayesian prior distributions, and updating this knowledge with each observed sample, the sequential allocation procedure performed particularly well. These observations demonstrate that managing projects focused on a selection decision so that the decision modeling and the experimental planning are done jointly, rather than in isolation, can improve the overall selection results.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Shrimp farming is one of the activities that contribute most to the growth of global aquaculture. However, this business has undergone significant economic losses due to the onset of viral diseases such as Infectious Myonecrosis (IMN). The IMN is already widespread throughout Northeastern Brazil and affects other countries such as Indonesia, Thailand and China. The main symptom of disease is myonecrosis, which consists of necrosis of striated muscles of the abdomen and cephalothorax of shrimp. The IMN is caused by infectious myonecrosis virus (IMNV), a non-enveloped virus which has protrusions along its capsid. The viral genome consists of a single molecule of double-stranded RNA and has two Open Reading Frames (ORFs). The ORF1 encodes the major capsid protein (MCP) and a potential RNA binding protein (RBP). ORF2 encodes a probable RNA-dependent RNA polymerase (RdRp) and classifies IMNV in Totiviridae family. Thus, the objective of this research was study the IMNV complete genome and encoded proteins in order to develop a system differentiate virus isolates based on polymorphisms presence. The phylogenetic relationship among some totivirus was investigated and showed a new group to IMNV within Totiviridae family. Two new genomes were sequenced, analyzed and compared to two other genomes already deposited in GenBank. The new genomes were more similar to each other than those already described. Conserved and variable regions of the genome were identified through similarity graphs and alignments using the four IMNV sequences. This analyze allowed mapping of polymorphic sites and revealed that the most variable region of the genome is in the first half of ORF1, which coincides with the regions that possibly encode the viral protrusion, while the most stable regions of the genome were found in conserved domains of proteins that interact with RNA. Moreover, secondary structures were predicted for all proteins using various softwares and protein structural models were calculated using threading and ab initio modeling approaches. From these analyses was possible to observe that the IMNV proteins have motifs and shapes similar to proteins of other totiviruses and new possible protein functions have been proposed. The genome and proteins study was essential for development of a PCR-based detection system able to discriminate the four IMNV isolates based on the presence of polymorphic sites

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new ‘Danger Theory’ (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of ‘grounding’ the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approach to anomaly detection is presented. Our approach is based on a simple yet powerful analogy from the innate part of the human immune system, the Toll-Like Receptors. We argue that such receptors incorporated as part of an anomaly detector enhance the detector’s ability to distinguish normal and anomalous behaviour. In addition we propose that Toll-Like Receptors enable the classification of detected anomalies based on the types of attacks that perpetrate the anomalous behaviour. Classification of such type is either missing in existing literature or is not fit for the purpose of reducing the burden of an administrator of an intrusion detection system. For our model to work, we propose the creation of a taxonomy of the digital Acytota, based on which our receptors are created.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The dendritic cell algorithm (DCA) is an immune-inspired algorithm, developed for the purpose of anomaly detection. The algorithm performs multi-sensor data fusion and correlation which results in a ‘context aware’ detection system. Previous applications of the DCA have included the detection of potentially malicious port scanning activity, where it has produced high rates of true positives and low rates of false positives. In this work we aim to compare the performance of the DCA and of a self-organizing map (SOM) when applied to the detection of SYN port scans, through experimental analysis. A SOM is an ideal candidate for comparison as it shares similarities with the DCA in terms of the data fusion method employed. It is shown that the results of the two systems are comparable, and both produce false positives for the same processes. This shows that the DCA can produce anomaly detection results to the same standard as an established technique.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The structure of an animal’s eye is determined by the tasks it must perform. While vertebrates rely on their two eyes for all visual functions, insects have evolved a wide range of specialized visual organs to support behaviors such as prey capture, predator evasion, mate pursuit, flight stabilization, and navigation. Compound eyes and ocelli constitute the vision forming and sensing mechanisms of some flying insects. They provide signals useful for flight stabilization and navigation. In contrast to the well-studied compound eye, the ocelli, seen as the second visual system, sense fast luminance changes and allows for fast visual processing. Using a luminance-based sensor that mimics the insect ocelli and a camera-based motion detection system, a frequency-domain characterization of an ocellar sensor and optic flow (due to rotational motion) are analyzed. Inspired by the insect neurons that make use of signals from both vision sensing mechanisms, advantages, disadvantages and complementary properties of ocellar and optic flow estimates are discussed.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A lógica fuzzy admite infinitos valores lógicos intermediários entre o falso e o verdadeiro. Com esse princípio, foi elaborado neste trabalho um sistema baseado em regras fuzzy, que indicam o índice de massa corporal de animais ruminantes com objetivo de obter o melhor momento para o abate. O sistema fuzzy desenvolvido teve como entradas as variáveis massa e altura, e a saída um novo índice de massa corporal, denominado Índice de Massa Corporal Fuzzy (IMC Fuzzy), que poderá servir como um sistema de detecção do momento de abate de bovinos, comparando-os entre si através das variáveis linguísticas )Muito BaixaM, ,BaixaB, ,MédiaM, ,AltaA e Muito AltaM. Para a demonstração e aplicação da utilização deste sistema fuzzy, foi feita uma análise de 147 vacas da raça Nelore, determinando os valores do IMC Fuzzy para cada animal e indicando a situação de massa corpórea de todo o rebanho. A validação realizada do sistema foi baseado em uma análise estatística, utilizando o coeficiente de correlação de Pearson 0,923, representando alta correlação positiva e indicando que o método proposto está adequado. Desta forma, o presente método possibilita a avaliação do rebanho, comparando cada animal do rebanho com seus pares do grupo, fornecendo desta forma um método quantitativo de tomada de decisão para o pecuarista. Também é possível concluir que o presente trabalho estabeleceu um método computacional baseado na lógica fuzzy capaz de imitar parte do raciocínio humano e interpretar o índice de massa corporal de qualquer tipo de espécie bovina e em qualquer região do País.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in an understandable way. Several algorithms exist for this purpose which use attack graphs to model the ways in which attacks can be combined. These algorithms can be classified in to two broad categories namely scenario-graph approaches, which create an attack model starting from a vulnerability assessment and type-graph approaches which rely on an abstract model of the relations between attack types. Some research in to improving the efficiency of type-graph correlation has been carried out but this research has ignored the hypothesizing of missing alerts. Our work is to present a novel type-graph algorithm which unifies correlation and hypothesizing in to a single operation. Our experimental results indicate that the approach is extremely efficient in the face of intensive alerts and produces compact output graphs comparable to other techniques.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Ion channels are a large class of integral membrane proteins that allow for the diffusion of ions across a cellular membrane and are found in all forms of life. Pentameric ligand-gated ion channels (pLGICs) comprise a large family of proteins that include the nicotinic acetylcholine receptor (nAChR) and the γ-aminobutyric acid (GABA) receptor. These ion channels are responsible for the fast synaptic transmission that occurs in humans and as a result are of fundamental biological importance. pLGICs bind ligands (neurotransmitters), and upon ligand-binding undergo activation. The activation event causes an ion channel to enter a new physical state that is able to conduct ions. Ion channels allow for the flux of ions across the membrane through a pore that is formed upon ion channel activation. For pLGICs to function properly both ligand-binding and ion channel activation must occur. The ligand-binding event has been studied extensively over the past few decades, and a detailed mechanism of binding has emerged. During activation the ion channel must undergo structural rearrangements that allow the protein to enter a conformation in which ions can flow through. Despite this great and ubiquitous importance, a fundamental understanding of the ion channel activation mechanism and kinetics, as well as concomitant structural arrangements, remains elusive.

This dissertation describes efforts that have been made to temporally control the activation of ligand-gated ion channels. Temporal control of ion channel activation provides a means by which to activate ion channels when desired. The majority of this work examines the use of light to activate ion channels. Several photocages were examined in this thesis; photocages are molecules that release a ligand under irradiation, and, for the work described here, the released ligand then activates the ion channel. First, a new water-soluble photoacid was developed for the activation of proton-sensitive ion channels. Activation of acid-sensing ion channels, ASIC2a and GLIC, was observed only upon irradiation. Next, a variety of Ru2+ photocages were also developed for the release of amine ligands. The Ru2+ systems interacted in a deleterious manner with a representative subset of biologically essential ion channels. The rapid mixing of ion channels with agonist was also examined. A detection system was built to monitor ion channels activation in the rapid mixing experiments. I have shown that liposomes, and functionally-reconstituted ELIC, are not destroyed during the mixing process. The work presented here provides the means to deliver agonist to ligand-gated ion channels in a controlled fashion.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Abstract Purpose – To study the possibility of using a NIR hardware solution to photograph individuals in a private vehicle as well as an analysis of its images. Method – A study of existing theories around the NIR-method’s performance in selected conditions and individual tests were performed to examine if the literature statements were valid for this study. Two empirical tests have been carried out, the first was carried out at Kapsch test track and the other outside the test track in a single stationary test. An interview which formed the basis for the assessment on the quality of empirical data with a focus on computer-based detection of the number of individuals in the vehicle. Findings – The results have demonstrated the potential of the NIR method’s performance in a fully automated detection system for the number of individuals inside the vehicle. Empirical data indicates that the method can depict individuals inside vehicles of sufficiently high quality, but it is greatly affected by reflections, weather and light conditions. Implications – Result supports the assumption that the NIR method using an external light source can be used to image the interior through a varying number of weather and lightning conditions. The study originated until the results suggested that a NIR-based hardware setup can create images with high enough quality for the human eye to be able to detect the number of individuals inside the vehicle.If the overall performance into account, it suggests that the main problem with the use of the hardware set is to maintain the quality of the whole sample and that the crucial variables for the method’s performance is the influence of light and reflection conditions. Limitations – The major limitations have been that we limited ourselves to a subjective analysis of the selection and assessment on the image features for computer-based detection of the number of individuals in the vehicle. We were limited to two tests, one in tough conditions where only the driver was in the vehicle and the second stationary test, where the focus was on the number of people in vehicles and light sources impact on the result.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Biomarkers are biological indicators of human health conditions. Their ultra-sensitive quantification is of cardinal importance in clinical monitoring and early disease diagnosis. Biosensors are some worldwide simple and easy-to-use analytical devices as a matter of fact, biosensors using electrochemiluminescence (ECL) are one of the most promising biosensors that needs an ever-increasing sensitivity for improving its clinical effectiveness. The principal aspiration of this project is the investigation of the ECL generation mechanisms for enhancing the ECL intensity and the development of an ultrasensitive sensor, the use of metal-oxide materials (Mox) and the substitution of metal-free dyes. Novel dyes such as BODIPY, TADF are used to improve the sensitivity of ECL techniques thanks to their advantageous and tunable properties, enhancing the signal and also the ECL efficiency. Additionally, the use of Mox could be beneficial for the investigation of two different ECL mechanisms, which occur simultaneously. In this thesis, the investigation of size and distance effects on electrochemical (EC) mechanisms was carried out through the innovative combination of a standard detection system using different size of micromagnetic beads (MBs). That allowed the discovery of an unexpected and highly efficient mechanistic path for electrochemical generation at small distances from the electrode’s surface. The smallest MBs (0.1μm) demostrate an enhancement of electrochemical signal than the bigger one (2.8μm) until 4 times of magnitude. Finally, a novel ultrasensitive sensor, based on the coreactant-luminophores mechanism, was developed for the determination of whole viral genome specific for cardiac HBV and COVID-19 virus. In conclusion, the ECL and the use of EC techniques (such as amperometry), improved the understanding of mechanisms responsible for the ECL/EC signal led to a great enhancement in the signal.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The hadrontherapy exploits beams of charged particles against deep cancers. These ions have a depth-dose profile in which there is a little release of energy at the beginning of their path, whereas there is a sharp maximum, the Bragg Peak, near its end path. However, if heavy ions are used, the fragmentation of the projectile can happen and the fragments can release some dose outside the treatment volume beyond the Bragg peak. The fragmentation process takes place also when the Galactic Cosmic Rays at high energy hit the spaceship during space missions. In both cases some neutrons can be produced and if they interact with the absorbing materials nuclei some secondary particles are generated which can release energy. For this reason, studies about the cross section measurements of the fragments generated during the collisions of heavy ions against the tissues nuclei are very important. In this context, the FragmentatiOn Of Target (FOOT) experiment was born, and aims at measuring the differential and double differential fragmentation cross sections for different kinetic energies relevant to hadrontherapy and space radioprotection with high accuracy. Since during fragmentation processes also neutrons are produced, tests of a neutron detection system are ongoing. In particular, recently a neutron detector made up of a liquid organic scintillator, BC-501A with neutrons/gammas discrimination capability was studied, and it represents the core of this thesis. More in details, an analysis of the data collected at the GSI laboratory, in Darmstadt, Germany, is effectuated which consists in discriminating neutral and charged particles and then to separate neutrons from gammas. From this analysis, a preliminary energy-differential reaction cross-section for the production of neutrons in the 16O + (C_2H_4)_(n) and 16O + C reactions was estimated.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Infections of the central nervous systems (CNS) present a diagnostic problem for which an accurate laboratory diagnosis is essential. Invasive practices, such as cerebral biopsy, have been replaced by obtaining a polymerase chain reaction (PCR) diagnosis using cerebral spinal fluid (CSF) as a reference method. Tests on DNA extracted from plasma are noninvasive, thus avoiding all of the collateral effects and patient risks associated with CSF collection. This study aimed to determine whether plasma can replace CSF in nested PCR analysis for the detection of CNS human herpesvirus (HHV) diseases by analysing the proportion of patients whose CSF nested PCR results were positive for CNS HHV who also had the same organism identified by plasma nested PCR. In this study, CSF DNA was used as the gold standard, and nested PCR was performed on both types of samples. Fifty-two patients with symptoms of nervous system infection were submitted to CSF and blood collection. For the eight HHV, one positive DNA result-in plasma and/or CSF nested PCR-was considered an active HHV infection, whereas the occurrence of two or more HHVs in the same sample was considered a coinfection. HHV infections were positively detected in 27/52 (51.9%) of the CSF and in 32/52 (61.5%) of the plasma, difference not significant, thus nested PCR can be performed on plasma instead of CSF. In conclusion, this findings suggest that plasma as a useful material for the diagnosis of cases where there is any difficulty to perform a CSF puncture.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A new flow procedure based on multicommutation with chemiluminometric detection was developed to quantify gentamicin sulphate in pharmaceutical formulations. This approach is based on gentamicin's ability to inhibit the chemiluminometric reaction between luminol and hypochlorite in alkaline medium, causing a decrease in the analytical signal. The inhibition of the analytical signal is proportional to the concentration of gentamicin sulphate, within a linear range of 1 to 4 mu g mL(-1) with a coefficient variation <3%. A sample throughput of 55 samples h(-1) was obtained. The developed method is sensitive, simple, with low reagent consumption, reproducible, and inexpensive, and when applied to the analysis of pharmaceutical formulations (eye drops and injections) it gave results with RSD between 1.10 and 4.40%.