942 resultados para Detecting
Resumo:
The integration of cultural elements into the operational planning process is a complex task that requires practical and theroretical tools for a wide comprehension of the context to help solve the problem. This article shows the results of an empirical research which presents conflicting cultural factors as the starting point for the construction of mediating structures. The main result of our research is a partial cognitive structure, a system of ideas, represented in a template listing the basic conflictive factors at the tactical level that military could find in the development of their tasks. The template is also a valuable aid to design military training curricula and to be applied to any post-conflict stability operation in complex environments resulting from irregular or asymmetric conflicts.
Resumo:
The adulteration of food has received substantial amounts of media attention in the last few years, with events such as the European horsemeat scandal in 2013 sending shockwaves through society. Almost all cases are motivated by the pursuit of profits and are often aided by long and complex supply chains. In the past few years, the rapid growth of ambient mass spectrometry (AMS) has been remarkable, with over thirty different ambient ionisation techniques available. Due to the increasing concerns of the food industry and regulators worldwide, AMS is now being utilised to investigate whether or not it can generate results which are faster yet comparable to those of conventional techniques. This article reviews some aspects of the adulteration of food and its impact on the economy and the public's health, the background to ambient mass spectrometry and the studies that have been undertaken to detect food adulteration using this technology.
Resumo:
Introduction: Detection of the ALK rearrangement in a solid tumor gives these patients the option of crizotinib as an oral form of anticancer treatment. The current test of choice is fluorescence in situ hybridization (FISH), but various cheaper and more convenient immunohistochemical (IHC) assays have been proposed as alternatives.
Methods: Fifteen FISH-positive cases from patients, seven with data on crizotinib therapy and clinical response, were evaluated for the presence of ALK protein using three different commercially available antibodies: D5F3, using the proprietary automated system (Ventana), ALK1 (Dako), and 5A4 (Abcam). A further 14 FISH-negative and three uncertain (<15% rearrangement detected) cases were also retrieved. Of the total 32 specimens, 17 were excisions and 15 were computed tomography-guided biopsies or cytological specimens. All three antibodies were applied to all cases. Antibodies were semiquantitatively scored on intensity, and the proportion of malignant cells stained was documented. Cutoffs were set by receiver operating curve analysis for positivity to optimize correct classification.
Results: All three IHC assays were 100% specific but sensitivity did vary: D5F3 86%, ALK 79%, 5A4 71%. Intensity was the most discriminating measure overall, with a combination of proportion and intensity not improving the test. No FISH-negative IHC-positive cases were seen. Two FISH-positive cases were negative with all three IHC assays. One of these had been treated with crizotinib and had failed to show clinical response. The other harbored a second driving mutation in the EGFR gene.
Conclusions: IHC with all three antibodies is especially highly specific (100%) although variably sensitive (71%-86%), specifically in cases with scanty material. D5F3 assay was most sensitive in these latter cases. Occasional cases are IHC-positive but FISH-negative, suggesting either inaccuracy of one assay or occasional tumors with ALK rearrangement that do not express high levels of ALK protein.
Resumo:
BACKGROUND: KRAS mutation testing is required to select patients with metastatic colorectal cancer (CRC) to receive anti-epidermal growth factor receptor antibodies, but the optimal KRAS mutation test method is uncertain. METHODS: We conducted a two-site comparison of two commercial KRAS mutation kits - the cobas KRAS Mutation Test and the Qiagen therascreen KRAS Kit - and Sanger sequencing. A panel of 120 CRC specimens was tested with all three methods. The agreement between the cobas test and each of the other methods was assessed. Specimens with discordant results were subjected to quantitative massively parallel pyrosequencing (MPP). DNA blends were tested to determine detection rates at 5% mutant alleles. RESULTS: Reproducibility of the cobas test between sites was 98%. Six mutations were detected by cobas that were not detected by Sanger, and five were confirmed by MPP. The cobas test detected eight mutations which were not detected by the therascreen test, and seven were confirmed by MPP. Detection rates with 5% mutant DNA blends were 100% for the cobas and therascreen tests and 19% for Sanger. CONCLUSION: The cobas test was reproducible between sites, and detected several mutations that were not detected by the therascreen test or Sanger. Sanger sequencing had poor sensitivity for low levels of mutation.
Resumo:
Stealthy attackers move patiently through computer networks - taking days, weeks or months to accomplish their objectives in order to avoid detection. As networks scale up in size and speed, monitoring for such attack attempts is increasingly a challenge. This paper presents an efficient monitoring technique for stealthy attacks. It investigates the feasibility of proposed method under number of different test cases and examines how design of the network affects the detection. A methodological way for tracing anonymous stealthy activities to their approximate sources is also presented. The Bayesian fusion along with traffic sampling is employed as a data reduction method. The proposed method has the ability to monitor stealthy activities using 10-20% size sampling rates without degrading the quality of detection.
Resumo:
Data mining can be defined as the extraction of implicit, previously un-known, and potentially useful information from data. Numerous re-searchers have been developing security technology and exploring new methods to detect cyber-attacks with the DARPA 1998 dataset for Intrusion Detection and the modified versions of this dataset KDDCup99 and NSL-KDD, but until now no one have examined the performance of the Top 10 data mining algorithms selected by experts in data mining. The compared classification learning algorithms in this thesis are: C4.5, CART, k-NN and Naïve Bayes. The performance of these algorithms are compared with accuracy, error rate and average cost on modified versions of NSL-KDD train and test dataset where the instances are classified into normal and four cyber-attack categories: DoS, Probing, R2L and U2R. Additionally the most important features to detect cyber-attacks in all categories and in each category are evaluated with Weka’s Attribute Evaluator and ranked according to Information Gain. The results show that the classification algorithm with best performance on the dataset is the k-NN algorithm. The most important features to detect cyber-attacks are basic features such as the number of seconds of a network connection, the protocol used for the connection, the network service used, normal or error status of the connection and the number of data bytes sent. The most important features to detect DoS, Probing and R2L attacks are basic features and the least important features are content features. Unlike U2R attacks, where the content features are the most important features to detect attacks.
Resumo:
Recent progress in the technology for single unit recordings has given the neuroscientific community theopportunity to record the spiking activity of large neuronal populations. At the same pace, statistical andmathematical tools were developed to deal with high-dimensional datasets typical of such recordings.A major line of research investigates the functional role of subsets of neurons with significant co-firingbehavior: the Hebbian cell assemblies. Here we review three linear methods for the detection of cellassemblies in large neuronal populations that rely on principal and independent component analysis.Based on their performance in spike train simulations, we propose a modified framework that incorpo-rates multiple features of these previous methods. We apply the new framework to actual single unitrecordings and show the existence of cell assemblies in the rat hippocampus, which typically oscillate attheta frequencies and couple to different phases of the underlying field rhythm
Resumo:
Thesis (Master's)--University of Washington, 2016-08
Resumo:
Food safety has always been a social issue that draws great public attention. With the rapid development of wireless communication technologies and intelligent devices, more and more Internet of Things (IoT) systems are applied in the food safety tracking field. However, connection between things and information system is usually established by pre-storing information of things into RFID Tag, which is inapplicable for on-field food safety detection. Therefore, considering pesticide residue is one of the severe threaten to food safety, a new portable, high-sensitivity, low-power, on-field organophosphorus (OP) compounds detection system is proposed in this thesis to realize the on-field food safety detection. The system is designed based on optical detection method by using a customized photo-detection sensor. A Micro Controller Unit (MCU) and a Bluetooth Low Energy (BLE) module are used to quantize and transmit detection result. An Android Application (APP) is also developed for the system to processing and display detection result as well as control the detection process. Besides, a quartzose sample container and black system box are also designed and made for the system demonstration. Several optimizations are made in wireless communication, circuit layout, Android APP and industrial design to realize the mobility, low power and intelligence.
Resumo:
Background - Image blurring in Full Field Digital Mammography (FFDM) is reported to be a problem within many UK breast screening units resulting in significant proportion of technical repeats/recalls. Our study investigates monitors of differing pixel resolution, and whether there is a difference in blurring detection between a 2.3 MP technical review monitor and a 5MP standard reporting monitor. Methods - Simulation software was created to induce different magnitudes of blur on 20 artifact free FFDM screening images. 120 blurred and non-blurred images were randomized and displayed on the 2.3 and 5MP monitors; they were reviewed by 28 trained observers. Monitors were calibrated to the DICOM Grayscale Standard Display Function. T-test was used to determine whether significant differences exist in blurring detection between the monitors. Results - The blurring detection rate on the 2.3MP monitor for 0.2, 0.4, 0.6, 0.8 and 1 mm blur was 46, 59, 66, 77and 78% respectively; and on the 5MP monitor 44, 70, 83 , 96 and 98%. All the non-motion images were identified correctly. A statistical difference (p <0.01) in the blurring detection rate between the two monitors was demonstrated. Conclusions - Given the results of this study and knowing that monitors as low as 1 MP are used in clinical practice, we speculate that technical recall/repeat rates because of blurring could be reduced if higher resolution monitors are used for technical review at the time of imaging. Further work is needed to determine monitor minimum specification for visual blurring detection.
Resumo:
INTRODUCTION In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves current methods with significant room for improvement. Computer scientists have recently drawn inspiration from mechanisms found in biological systems and, in the context of computer security, have focused on the human immune system (HIS). The human immune system provides an example of a robust, distributed system that provides a high level of protection from constant attacks. By examining the precise mechanisms of the human immune system, it is hoped the paradigm will improve the performance of real intrusion detection systems. This paper presents an introduction to recent developments in the field of immunology. It discusses the incorporation of a novel immunological paradigm, Danger Theory, and how this concept is inspiring artificial immune systems (AIS). Applications within the context of computer security are outlined drawing direct reference to the underlying principles of Danger Theory and finally, the current state of intrusion detection systems is discussed and improvements suggested.