990 resultados para Domain elimination method


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Creative arts research is often motivated by emotional, personal and subjective concerns; it operates not only on the basis of explicit and exact knowledge, but also on that of tacit and experiential knowledge. Experience operates within in the domain of the aesthetic and knowledge produced through aesthetic experience is always contextual and situated. The continuity of artistic experience with normal processes of living is derived from an impulse to handle materials and to think and feel through their handling. The key term for understanding the relationship between experience, practice and knowledge is ‘aesthetic experience’, not as it is understood through traditional eighteenth century accounts, but as ‘sense activity’. In this article, I will draw on the work of John Dewey, Michael Polanyi and others to argue that creative arts practice as research is an intensification of everyday experiences from which new knowledge or knowing emerges. The ideas presented here will be illustrated with reference to case studies based on reflections, by the artists themselves, on successful research projects in dance, creative writing and visual art.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Fabric pilling is a serious problem for the apparel industry. Resistance to pilling is normally tested by simulated accelerated wear and manual assessment of degree of pilling based on a visual comparison of the sample to a set of test images. A number of automated systems based on image analysis have been developed. The authors propose new methods of image analysis based on the two-dimensional wavelet transform to objectively measure the pilling intensity in sample images. Initial work employed the detail coefficients of the two-dimensional discrete wavelet transform (2DDWT) as a measure of the pilling intensity of woven/knitted fabrics.

This method is shown to be robust to image translation and brightness variation. Using the approximation coefficients of the 2DDWT, the method is extended to non-woven pilling image sets. Wavelet texture analysis (WTA) combined with principal components analysis are shown to produce a richer texture description of pilling for analysis and classification. Finally, employing the two-dimensional dual-tree complex wavelet transform as the basis for the WTA feature vector is shown to produce good automated classification on a range of standard pilling image sets.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A key process in the lifecycle of the malaria parasite Plasmodium falciparum is the fast invasion of human erythrocytes. Entry into the host cell requires the apical membrane antigen 1 (AMA-1), a type I transmembrane protein located in the micronemes of the merozoite. Although AMA-1 is evolving into the leading blood-stage malaria vaccine candidate, its precise role in invasion is still unclear. We investigate AMA-1 function using live video microscopy in the absence and presence of an AMA-1 inhibitory peptide. This data reveals a crucial function of AMA-1 during the primary contact period upstream of the entry process at around the time of moving junction formation. We generate a Plasmodium falciparum cell line that expresses a functional GFP-tagged AMA-1. This allows the visualization of the dynamics of AMA-1 in live parasites. We functionally validate the ectopically expressed AMA-1 by establishing a complementation assay based on strain-specific inhibition. This method provides the basis for the functional analysis of essential genes that are refractory to any genetic manipulation. Using the complementation assay, we show that the cytoplasmic domain of AMA-1 is not required for correct trafficking and surface translocation but is essential for AMA-1 function. Although this function can be mimicked by the highly conserved cytoplasmic domains of P. vivax and P. berghei, the exchange with the heterologous domain of the microneme protein EBA-175 or the rhoptry protein Rh2b leads to a loss of function. We identify several residues in the cytoplasmic tail that are essential for AMA-1 function. We validate this data using additional transgenic parasite lines expressing AMA-1 mutants with TY1 epitopes. We show that the cytoplasmic domain of AMA-1 is phosphorylated. Mutational analysis suggests an important role for the phosphorylation in the invasion process, which might translate into novel therapeutic strategies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Due to environmental loads, mechanical damages, structural aging and human factors, civil infrastructure inevitably deteriorate during their service lives. Since their damage may claim human lives and cause significant economic losses, how to identify damages and assess structural conditions timely and accurately has drawn increasingly more attentions from structural engineering community worldwide. In this study, a fast and sensitive time domain damage identification method will be developed. First, a high quality finite element model is built and the structural responses are simulated under different damage scenarios. Based on the simulated data, an Auto Regressive Moving Average Exogenous (ARMAX) model is then developed and calibrated. The calibrated ARMAX model can be used to identify damage in different scenarios through model updating process using clonal selection algorithm (CSA). The identification results demonstrate the performance of the proposed methodology, which has the potential to be used for damage identification in practices.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The availability of large amounts of protein-protein interaction (PPI) data makes it feasible to use computational approaches to predict protein functions. The base of existing computational approaches is to exploit the known function information of annotated proteins in the PPI data to predict functions of un-annotated proteins. However, these approaches consider the prediction domain (i.e. the set of proteins from which the functions are predicted) as unchangeable during the prediction procedure. This may lead to valuable information being overwhelmed by the unavoidable noise information in the PPI data when predicting protein functions, and in turn, the prediction results will be distorted. In this paper, we propose a novel method to dynamically predict protein functions from the PPI data. Our method regards the function prediction as a dynamic process of finding a suitable prediction domain, from which representative functions of the domain are selected to predict functions of un-annotated proteins. Our method exploits the topological structural information of a PPI network and the semantic relationship between protein functions to measure the relationship between proteins, dynamically select a suitable prediction domain and predict functions. The evaluation on real PPI datasets demonstrated the effectiveness of our proposed method, and generated better prediction results.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Acquisition of domain ontology from database has been of catholic concern. This paper, taking relational schemes as example, analyzes how to identify the information about the structure of relational schemes in legacy systems. Then, it presents twelve extraction rules, which facilitate the obtaining of terms and relations from the relational schemes. Finally, it uses the EER diagram to further obtain semantic information from relational schemes for refining ontology model. The development method of domain ontology based on reverse engineering is a supplement to forward engineering. The union of the two development methods is certainly beneficial for the designers of domain ontology. © 2009 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a patchwork-based audio watermarking method to resist de-synchronization attacks such as pitch-scaling, time-scaling, and jitter attacks. At the embedding stage, the watermarks are embedded into the host audio signal in the discrete cosine transform (DCT) domain. Then, a set of synchronization bits are implanted into the watermarked signal in the logarithmic DCT (LDCT) domain. At the decoding stage, we analyze the received audio signal in the LDCT domain to find the scaling factor imposed by an attack. Then, we modify the received signal to remove the scaling effect, together with the embedded synchronization bits. After that, watermarks are extracted from the modified signal. Simulation results show that at the embedding rate of 10 bps, the proposed method achieves 98.9% detection rate on average under the considered de-synchronization attacks. At the embedding rate of 16 bps, it can still obtain 94.7% detection rate on average. So, the proposed method is much more robust to de-synchronization attacks than other patchwork watermarking methods. Compared with the audio watermarking methods designed for tackling de-synchronization attacks, our method has much higher embedding capacity.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Images published on online social sites such as Facebook are increasingly prone to be misused for malicious purposes. However, existing image forensic research assumes that the investigator can confiscate every piece of evidence and hence overlooks the fact that the original image is difficult to obtain. Because Facebook applies a Discrete Cosine Transform (DCT)-based compression on uploaded images, we are able to detect the modified images which are re-uploaded to Facebook. Specifically, we propose a novel method to effectively detect the presence of double compression via the spatial domain of the image: We select small image patches from a given image, define a distance metric to measure the differences between compressed images, and propose an algorithm to infer whether the given image is double compressed without referring to the original image. To demonstrate the correctness of our algorithm, we correctly predict the number of compressions being applied to a Facebook image.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A recent study in Science indicated that the confidence of a decision maker played an essential role in group decision making problems. In order to make use of the information of each individual's confidence of the current decision problem, a new hybrid weighted aggregation method to solve a group decision making peoblem is proposed in this paper. Specifically, the hybrid weight of each expert is generated by a convex combination of his/her subjective experience-based weight and objective problem-domain-based weight. The experience-based weight is derived from the expert's historical experiences and the problem-domain-based weight is characterized by the confidence degree and consensus degree of each expert's opinions in the current decision making process. Based on the hybrid weighted aggregation method, all the experts' opinions which are expressed in the form of fuzzy preference relations are consequently aggregated to obtain a collective group opinion. Some valuable properities of the proposed method are discussed. A nurse manager hiring problem in a hospital is employed to illustrate that the proposed method provides a rational and valid solution for the group decision making problem when the experts are not willing to change their initial preferences, or the cost of change is high due to time limitation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A multiple-iteration constrained conjugate gradient (MICCG) algorithm and a single-iteration constrained conjugate gradient (SICCG) algorithm are proposed to realize the widely used frequency-domain minimum-variance-distortionless-response (MVDR) beamformers and the resulting algorithms are applied to speech enhancement. The algorithms are derived based on the Lagrange method and the conjugate gradient techniques. The implementations of the algorithms avoid any form of explicit or implicit autocorrelation matrix inversion. Theoretical analysis establishes formal convergence of the algorithms. Specifically, the MICCG algorithm is developed based on a block adaptation approach and it generates a finite sequence of estimates that converge to the MVDR solution. For limited data records, the estimates of the MICCG algorithm are better than the conventional estimators and equivalent to the auxiliary vector algorithms. The SICCG algorithm is developed based on a continuous adaptation approach with a sample-by-sample updating procedure and the estimates asymptotically converge to the MVDR solution. An illustrative example using synthetic data from a uniform linear array is studied and an evaluation on real data recorded by an acoustic vector sensor array is demonstrated. Performance of the MICCG algorithm and the SICCG algorithm are compared with the state-of-the-art approaches.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we address a new problem of noisy images which present in the procedure of relevance feedback for medical image retrieval. We concentrate on the noisy images, caused by the users mislabeling some irrelevant images as relevant ones, and a noisy-smoothing relevance feedback (NS-RF) method is proposed. In NS-RF, a two-step strategy is proposed to handle the noisy images. In step 1, a noisy elimination algorithm is adopted to identify and eliminate the noisy images. In step 2, to further alleviate the influence of noisy images, a fuzzy membership function is employed to estimate the relevance probabilities of retained relevant images. After noisy handling, the fuzzy support vector machine, which can take into account different relevant images with different relevance probabilities, is adopted to re-rank the images. The experimental results on the IRMA medical image collection demonstrate that the proposed method can deal with the noisy images effectively.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In many network applications, the nature of traffic is of burst type. Often, the transient response of network to such traffics is the result of a series of interdependant events whose occurrence prediction is not a trivial task. The previous efforts in IEEE 802.15.4 networks often followed top-down approaches to model those sequences of events, i.e., through making top-view models of the whole network, they tried to track the transient response of network to burst packet arrivals. The problem with such approaches was that they were unable to give station-level views of network response and were usually complex. In this paper, we propose a non-stationary analytical model for the IEEE 802.15.4 slotted CSMA/CA medium access control (MAC) protocol under burst traffic arrival assumption and without the optional acknowledgements. We develop a station-level stochastic time-domain method from which the network-level metrics are extracted. Our bottom-up approach makes finding station-level details such as delay, collision and failure distributions possible. Moreover, network-level metrics like the average packet loss or transmission success rate can be extracted from the model. Compared to the previous models, our model is proven to be of lower memory and computational complexity order and also supports contention window sizes of greater than one. We have carried out extensive and comparative simulations to show the high accuracy of our model.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)