949 resultados para Primitive


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis addresses the problem of detecting and describing the same scene points in different wide-angle images taken by the same camera at different viewpoints. This is a core competency of many vision-based localisation tasks including visual odometry and visual place recognition. Wide-angle cameras have a large field of view that can exceed a full hemisphere, and the images they produce contain severe radial distortion. When compared to traditional narrow field of view perspective cameras, more accurate estimates of camera egomotion can be found using the images obtained with wide-angle cameras. The ability to accurately estimate camera egomotion is a fundamental primitive of visual odometry, and this is one of the reasons for the increased popularity in the use of wide-angle cameras for this task. Their large field of view also enables them to capture images of the same regions in a scene taken at very different viewpoints, and this makes them suited for visual place recognition. However, the ability to estimate the camera egomotion and recognise the same scene in two different images is dependent on the ability to reliably detect and describe the same scene points, or ‘keypoints’, in the images. Most algorithms used for this purpose are designed almost exclusively for perspective images. Applying algorithms designed for perspective images directly to wide-angle images is problematic as no account is made for the image distortion. The primary contribution of this thesis is the development of two novel keypoint detectors, and a method of keypoint description, designed for wide-angle images. Both reformulate the Scale- Invariant Feature Transform (SIFT) as an image processing operation on the sphere. As the image captured by any central projection wide-angle camera can be mapped to the sphere, applying these variants to an image on the sphere enables keypoints to be detected in a manner that is invariant to image distortion. Each of the variants is required to find the scale-space representation of an image on the sphere, and they differ in the approaches they used to do this. Extensive experiments using real and synthetically generated wide-angle images are used to validate the two new keypoint detectors and the method of keypoint description. The best of these two new keypoint detectors is applied to vision based localisation tasks including visual odometry and visual place recognition using outdoor wide-angle image sequences. As part of this work, the effect of keypoint coordinate selection on the accuracy of egomotion estimates using the Direct Linear Transform (DLT) is investigated, and a simple weighting scheme is proposed which attempts to account for the uncertainty of keypoint positions during detection. A word reliability metric is also developed for use within a visual ‘bag of words’ approach to place recognition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

My research investigates why nouns are learned disproportionately more frequently than other kinds of words during early language acquisition (Gentner, 1982; Gleitman, et al., 2004). This question must be considered in the context of cognitive development in general. Infants have two major streams of environmental information to make meaningful: perceptual and linguistic. Perceptual information flows in from the senses and is processed into symbolic representations by the primitive language of thought (Fodor, 1975). These symbolic representations are then linked to linguistic input to enable language comprehension and ultimately production. Yet, how exactly does perceptual information become conceptualized? Although this question is difficult, there has been progress. One way that children might have an easier job is if they have structures that simplify the data. Thus, if particular sorts of perceptual information could be separated from the mass of input, then it would be easier for children to refer to those specific things when learning words (Spelke, 1990; Pylyshyn, 2003). It would be easier still, if linguistic input was segmented in predictable ways (Gentner, 1982; Gleitman, et al., 2004) Unfortunately the frequency of patterns in lexical or grammatical input cannot explain the cross-cultural and cross-linguistic tendency to favor nouns over verbs and predicates. There are three examples of this failure: 1) a wide variety of nouns are uttered less frequently than a smaller number of verbs and yet are learnt far more easily (Gentner, 1982); 2) word order and morphological transparency offer no insight when you contrast the sentence structures and word inflections of different languages (Slobin, 1973) and 3) particular language teaching behaviors (e.g. pointing at objects and repeating names for them) have little impact on children's tendency to prefer concrete nouns in their first fifty words (Newport, et al., 1977). Although the linguistic solution appears problematic, there has been increasing evidence that the early visual system does indeed segment perceptual information in specific ways before the conscious mind begins to intervene (Pylyshyn, 2003). I argue that nouns are easier to learn because their referents directly connect with innate features of the perceptual faculty. This hypothesis stems from work done on visual indexes by Zenon Pylyshyn (2001, 2003). Pylyshyn argues that the early visual system (the architecture of the "vision module") segments perceptual data into pre-conceptual proto-objects called FINSTs. FINSTs typically correspond to physical things such as Spelke objects (Spelke, 1990). Hence, before conceptualization, visual objects are picked out by the perceptual system demonstratively, like a finger pointing indicating ‘this’ or ‘that’. I suggest that this primitive system of demonstration elaborates on Gareth Evan's (1982) theory of nonconceptual content. Nouns are learnt first because their referents attract demonstrative visual indexes. This theory also explains why infants less often name stationary objects such as plate or table, but do name things that attract the focal attention of the early visual system, i.e., small objects that move, such as ‘dog’ or ‘ball’. This view leaves open the question how blind children learn words for visible objects and why children learn category nouns (e.g. 'dog'), rather than proper nouns (e.g. 'Fido') or higher taxonomic distinctions (e.g. 'animal').

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Maintenance activities in a large-scale engineering system are usually scheduled according to the lifetimes of various components in order to ensure the overall reliability of the system. Lifetimes of components can be deduced by the corresponding probability distributions with parameters estimated from past failure data. While failure data of the components is not always readily available, the engineers have to be content with the primitive information from the manufacturers only, such as the mean and standard deviation of lifetime, to plan for the maintenance activities. In this paper, the moment-based piecewise polynomial model (MPPM) are proposed to estimate the parameters of the reliability probability distribution of the products when only the mean and standard deviation of the product lifetime are known. This method employs a group of polynomial functions to estimate the two parameters of the Weibull Distribution according to the mathematical relationship between the shape parameter of two-parameters Weibull Distribution and the ratio of mean and standard deviation. Tests are carried out to evaluate the validity and accuracy of the proposed methods with discussions on its suitability of applications. The proposed method is particularly useful for reliability-critical systems, such as railway and power systems, in which the maintenance activities are scheduled according to the expected lifetimes of the system components.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides being used to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted Networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor such encrypted traffic. We therefore describe how our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Confucius was and still is one of the most eminent Chinese philosophers. Such is the importance of Confucius’s teachings; it had influenced all aspects of social life in Chinese societies. In the post-Enron, post-Worldcom, and post-Global Financial Crisis era there are raising doubts in the mantra of the so-called conventional wisdom about law and economic order. Whilst many recent publications offered solutions to those problems like advocating for more laws, rules or reforms in regulatory institutions to enhance the regulation of corporate governance. What Confucius advocated was a non-legal, social mode of regulation based on moral ideals that should be embedded into the minds of every person. Whilst this is an ancient concept from primitive societies, its relevance and merits could be seen in modern Chinese societies like Hong Kong. In essence, Confucian principles of governance build on relational and paternalistic order based on moral ideals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Voluminous (≥3·9 × 105 km3), prolonged (∼18 Myr) explosive silicic volcanism makes the mid-Tertiary Sierra Madre Occidental province of Mexico one of the largest intact silicic volcanic provinces known. Previous models have proposed an assimilation–fractional crystallization origin for the rhyolites involving closed-system fractional crystallization from crustally contaminated andesitic parental magmas, with <20% crustal contributions. The lack of isotopic variation among the lower crustal xenoliths inferred to represent the crustal contaminants and coeval Sierra Madre Occidental rhyolite and basaltic andesite to andesite volcanic rocks has constrained interpretations for larger crustal contributions. Here, we use zircon age populations as probes to assess crustal involvement in Sierra Madre Occidental silicic magmatism. Laser ablation-inductively coupled plasma-mass spectrometry analyses of zircons from rhyolitic ignimbrites from the northeastern and southwestern sectors of the province yield U–Pb ages that show significant age discrepancies of 1–4 Myr compared with previously determined K/Ar and 40Ar/39Ar ages from the same ignimbrites; the age differences are greater than the errors attributable to analytical uncertainty. Zircon xenocrysts with new overgrowths in the Late Eocene to earliest Oligocene rhyolite ignimbrites from the northeastern sector provide direct evidence for some involvement of Proterozoic crustal materials, and, potentially more importantly, the derivation of zircon from Mesozoic and Eocene age, isotopically primitive, subduction-related igneous basement. The youngest rhyolitic ignimbrites from the southwestern sector show even stronger evidence for inheritance in the age spectra, but lack old inherited zircon (i.e. Eocene or older). Instead, these Early Miocene ignimbrites are dominated by antecrystic zircons, representing >33 to ∼100% of the dated population; most antecrysts range in age between ∼20 and 32 Ma. A sub-population of the antecrystic zircons is chemically distinct in terms of their high U (>1000 ppm to 1·3 wt %) and heavy REE contents; these are not present in the Oligocene ignimbrites in the northeastern sector of the Sierra Madre Occidental. The combination of antecryst zircon U–Pb ages and chemistry suggests that much of the zircon in the youngest rhyolites was derived by remelting of partially molten to solidified igneous rocks formed during preceding phases of Sierra Madre Occidental volcanism. Strong Zr undersaturation, and estimations for very rapid dissolution rates of entrained zircons, preclude coeval mafic magmas being parental to the rhyolite magmas by a process of lower crustal assimilation followed by closed-system crystal fractionation as interpreted in previous studies of the Sierra Madre Occidental rhyolites. Mafic magmas were more probably important in providing a long-lived heat and material flux into the crust, resulting in the remelting and recycling of older crust and newly formed igneous materials related to Sierra Madre Occidental magmatism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper explores the genealogies of bio-power that cut across punitive state interventions aimed at regulating or normalising several distinctive ‘problem’ or ‘suspect’ deviant populations, such as state wards, non-lawful citizens and Indigenous youth. It begins by making some general comments about the theoretical approach to bio-power taken in this paper. It then outlines the distinctive features of bio-power in Australia and how these intersected with the emergence of penal welfarism to govern the unruly, unchaste, unlawful, and the primitive. The paper draws on three examples to illustrate the argument – the gargantuan criminalisation rates of Aboriginal youth, the history of incarcerating state wards in state institutions, and the mandatory detention of unlawful non-citizens and their children. The construction of Indigenous people as a dangerous presence, alongside the construction of the unruly neglected children of the colony — the larrikin descendants of convicts as necessitating special regimes of internal controls and institutions, found a counterpart in the racial and other exclusionary criteria operating through immigration controls for much of the twentieth century. In each case the problem child or population was expelled from the social body through forms of bio-power, rationalised as strengthening, protecting or purifying the Australian population.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Stem cells are unprogrammed cells which possess plasticity and self renewal capability. The term of stem cell was first used to describe cells committed to give rise to germline cells, and to describe proposed progenitor cells of the blood system [1]. A unique feature of stem cell is to remain quiescent in vivo in an uncommitted state. They serve as reservoir or natural support system to replenish cells lost due to disease, injury or aging. When triggered by appropriate signals these cells divide and may become specialized, committed cells; however being able to control this differentiation process still remains one of the biggest challenge in stem cell research [2]. The cell division of stem cells is a distinct aspect of their biology, since this division may be either symmetric or asymmetric. Symmetric division takes place when the stem cells divides and forms two new daughter cells. Asymmetric division is thought to take place only under certain conditions where stem cells divides and gives rise to a daughter cell which remains primitive and does not proliferate, and one committed progenitor cell, which heads down a path of differentiation. Asymmetric division of stem cells helps reparative process, and also ensures that the stem cells pool does not decrease, whereas symmetric division is responsible for stem cells undergoing self renewal and proliferation. The factors which prompt the stem cells to undergo asymmetric division are, however, not well understood, but it is clear that the delicate balance between the self renewal and differentiation is what maintains tissue homeostasis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Huntingtin, the HD gene encoded protein mutated by polyglutamine expansion in Huntington's disease, is required in extraembryonic tissues for proper gastrulation, implicating its activities in nutrition or patterning of the developing embryo. To test these possibilities, we have used whole mount in situ hybridization to examine embryonic patterning and morphogenesis in homozygous Hdhex4/5 huntingtin deficient embryos. Results In the absence of huntingtin, expression of nutritive genes appears normal but E7.0–7.5 embryos exhibit a unique combination of patterning defects. Notable are a shortened primitive streak, absence of a proper node and diminished production of anterior streak derivatives. Reduced Wnt3a, Tbx6 and Dll1 expression signify decreased paraxial mesoderm and reduced Otx2 expression and lack of headfolds denote a failure of head development. In addition, genes initially broadly expressed are not properly restricted to the posterior, as evidenced by the ectopic expression of Nodal, Fgf8 and Gsc in the epiblast and T (Brachyury) and Evx1 in proximal mesoderm derivatives. Despite impaired posterior restriction and anterior streak deficits, overall anterior/posterior polarity is established. A single primitive streak forms and marker expression shows that the anterior epiblast and anterior visceral endoderm (AVE) are specified. Conclusion Huntingtin is essential in the early patterning of the embryo for formation of the anterior region of the primitive streak, and for down-regulation of a subset of dynamic growth and transcription factor genes. These findings provide fundamental starting points for identifying the novel cellular and molecular activities of huntingtin in the extraembryonic tissues that govern normal anterior streak development. This knowledge may prove to be important for understanding the mechanism by which the dominant polyglutamine expansion in huntingtin determines the loss of neurons in Huntington's disease.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The most common human cancers are malignant neoplasms of the skin. Incidence of cutaneous melanoma is rising especially steeply, with minimal progress in non-surgical treatment of advanced disease. Despite significant effort to identify independent predictors of melanoma outcome, no accepted histopathological, molecular or immunohistochemical marker defines subsets of this neoplasm. Accordingly, though melanoma is thought to present with different 'taxonomic' forms, these are considered part of a continuous spectrum rather than discrete entities. Here we report the discovery of a subset of melanomas identified by mathematical analysis of gene expression in a series of samples. Remarkably, many genes underlying the classification of this subset are differentially regulated in invasive melanomas that form primitive tubular networks in vitro, a feature of some highly aggressive metastatic melanomas. Global transcript analysis can identify unrecognized subtypes of cutaneous melanoma and predict experimentally verifiable phenotypic characteristics that may be of importance to disease progression.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Living mammals can be divided into three subclasses (monotremes, marsupials and placentals) and within these, about 27 orders. Final resolution of the relationships between the orders is only now being achieved with the increased availability of deoxyribonucleic acid (DNA) sequences. Highlights include the deep division of placental mammals into African (Afrotheria), South American (Xenarthra) and northern hemisphere (Boreoeutheria) super-orders, and the finding that the once considered primitive ‘Insectivora’ and ‘Edentata’ clades, in fact, have members distributed widely among these super-orders. Another surprise finding from DNA studies has been that whale origins lie among the even-toed ungulates (Artiodactyla). Our order, Primates is most closely related to the flying lemurs and next, the tree shrews. With the mammal phylogeny becoming well resolved, it is increasingly being used as a framework for inferring evolutionary and ecological processes, such as adaptive radiation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD protocols still require authentication of classical communication, although existing security proofs of QKD typically assume idealized authentication. It is generally considered folklore that QKD when used with computationally secure authentication is still secure against an unbounded adversary, provided the adversary did not break the authentication during the run of the protocol. We describe a security model for quantum key distribution extending classical authenticated key exchange (AKE) security models. Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary. By basing our model on traditional AKE models, we can more readily compare the relative merits of various forms of QKD and existing classical AKE protocols. This comparison illustrates in which types of adversarial environments different quantum and classical key agreement protocols can be secure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The application of epoxy embedding and microtomy to individual chondritic interplanetary dust particles (lOP's)(Bradley and Brownlee, 1986a) provides not only higher precision in thin-film elemental analyses (Bradley and Brownlee, 19861:1), but also allows a wealth of other important techniques for the micro-characterization of these primitive extraterrestrial materials. For example, individual sections (e.g. 100 nm thick) or a series of sections, can be examined using image analysis techniques which utilize either transmitted or scanned secondary electron images, or alternatively, secondary X-ray spectra collected concurrently from a given region of sample. Individual particles, or groups of particles with similar image characteristics can then be rapidly identified using conventional grey-scale/particle recognition techniques for each microtomed section of lOP. This type of image analysis provides a suitable method for determination of particle size and shape distribution as well as porosity throughout the aggregate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Chondritic porous aggregates (CPA's) belong to an important subset of small particles (usually between 5 and 50 micrometers) collected from the stratosphere by high flying aircraft. These aggregates are approximately chondritic in elemental abundance and are composed of many thousands of small­er, submicrometer particles. CPA particles have been the subject of intensive study during the past few years [1-3] and there is strong evidence that they are a new class of extraterrestrial material not represented in the meteorite collection [3,4]. However, CPA's may be related to carbonaceous chondrites and in fact, both may be part of a continuum of primitive extraterrestrial materials [5]. The importance of CPA's stems from suggestions that they are very primitive solar system material possibly derived from early formed proto­ planets, chondritic parent bodies, or comets [3, 6]. To better understand the origin and evolution of these particles, we have attempted to summarize all of the mineralogical data on identified CPA's published since about 1976.