924 resultados para floral authentication
Resumo:
The role of lipoxygenase (lox) in senescence ofAlstroemeria peruviana flowers was investigated using a combination of in vitro assays and chemical profiling of the lipid oxidation products generated. Phospholipids and galactolipids were extensively degraded during senescence in both sepals and petals and the ratio of saturated/unsaturated fatty acids increased. Lox protein levels and enzymatic activity declined markedly after flower opening. Stereochemical analysis of lox products showed that 13-lox was the major activity present in both floral tissues and high levels of 13-keto fatty acids were also synthesized. Lipid hydroperoxides accumulated in sepals, but not in petals, and sepals also had a higher chlorophyll to carotenoid ratio that favors photooxidation of lipids. Loss of membrane semipermeability was coincident for both tissue types and was chronologically separated from lox activity that had declined by over 80% at the onset of electrolyte leakage. Thus, loss of membrane function was not related to lox activity or accumulation of lipid hydroperoxides per se and differs in these respects from other ethylene-insensitive floral tissues representing a novel pattern of flower senescence.
Resumo:
This dissertation develops an image processing framework with unique feature extraction and similarity measurements for human face recognition in the thermal mid-wave infrared portion of the electromagnetic spectrum. The goals of this research is to design specialized algorithms that would extract facial vasculature information, create a thermal facial signature and identify the individual. The objective is to use such findings in support of a biometrics system for human identification with a high degree of accuracy and a high degree of reliability. This last assertion is due to the minimal to no risk for potential alteration of the intrinsic physiological characteristics seen through thermal infrared imaging. The proposed thermal facial signature recognition is fully integrated and consolidates the main and critical steps of feature extraction, registration, matching through similarity measures, and validation through testing our algorithm on a database, referred to as C-X1, provided by the Computer Vision Research Laboratory at the University of Notre Dame. Feature extraction was accomplished by first registering the infrared images to a reference image using the functional MRI of the Brain’s (FMRIB’s) Linear Image Registration Tool (FLIRT) modified to suit thermal infrared images. This was followed by segmentation of the facial region using an advanced localized contouring algorithm applied on anisotropically diffused thermal images. Thermal feature extraction from facial images was attained by performing morphological operations such as opening and top-hat segmentation to yield thermal signatures for each subject. Four thermal images taken over a period of six months were used to generate thermal signatures and a thermal template for each subject, the thermal template contains only the most prevalent and consistent features. Finally a similarity measure technique was used to match signatures to templates and the Principal Component Analysis (PCA) was used to validate the results of the matching process. Thirteen subjects were used for testing the developed technique on an in-house thermal imaging system. The matching using an Euclidean-based similarity measure showed 88% accuracy in the case of skeletonized signatures and templates, we obtained 90% accuracy for anisotropically diffused signatures and templates. We also employed the Manhattan-based similarity measure and obtained an accuracy of 90.39% for skeletonized and diffused templates and signatures. It was found that an average 18.9% improvement in the similarity measure was obtained when using diffused templates. The Euclidean- and Manhattan-based similarity measure was also applied to skeletonized signatures and templates of 25 subjects in the C-X1 database. The highly accurate results obtained in the matching process along with the generalized design process clearly demonstrate the ability of the thermal infrared system to be used on other thermal imaging based systems and related databases. A novel user-initialization registration of thermal facial images has been successfully implemented. Furthermore, the novel approach at developing a thermal signature template using four images taken at various times ensured that unforeseen changes in the vasculature did not affect the biometric matching process as it relied on consistent thermal features.
Resumo:
Although soil algae are among the main primary producers in most terrestrial ecosystems of continental Antarctica, there are very few quantitative studies on their relative proportion in the main algal groups and on how their distribution is affected by biotic and abiotic factors. Such knowledge is essential for understanding the functioning of Antarctic terrestrial ecosystems. We therefore analyzed biological soil crusts from northern Victoria Land to determine their pH, electrical conductivity (EC), water content (W), total and organic C (TC and TOC) and total N (TN) contents, and the presence and abundance of photosynthetic pigments. In particular, the latter were tested as proxies for biomass and coarse-resolution community structure. Soil samples were collected from five sites with known soil algal communities and the distribution of pigments was shown to reflect differences in the relative proportions of Chlorophyta, Cyanophyta and Bacillariophyta in these sites. Multivariate and univariate models strongly indicated that almost all soil variables (EC, W, TOC and TN) were important environmental correlates of pigment distribution. However, a significant amount of variation is independent of these soil variables and may be ascribed to local variability such as changes in microclimate at varying spatial and temporal scales. There are at least five possible sources of local variation: pigment preservation, temporal variations in water availability, temporal and spatial interactions among environmental and biological components, the local-scale patchiness of organism distribution, and biotic interactions.
Resumo:
In the context of products from certain regions or countries being banned because of an identified or non-identified hazard, proof of geographical origin is essential with regard to feed and food safety issues. Usually, the product labeling of an affected feed lot shows origin, and the paper documentation shows traceability. Incorrect product labeling is common in embargo situations, however, and alternative analytical strategies for controlling feed authenticity are therefore needed. In this study, distillers' dried grains and solubles (DDGS) were chosen as the product on which to base a comparison of analytical strategies aimed at identifying the most appropriate one. Various analytical techniques were investigated for their ability to authenticate DDGS, including spectroscopic and spectrometric techniques combined with multivariate data analysis, as well as proven techniques for authenticating food, such as DNA analysis and stable isotope ratio analysis. An external validation procedure (called the system challenge) was used to analyze sample sets blind and to compare analytical techniques. All the techniques were adapted so as to be applicable to the DDGS matrix. They produced positive results in determining the botanical origin of DDGS (corn vs. wheat), and several of them were able to determine the geographical origin of the DDGS in the sample set. The maintenance and extension of the databanks generated in this study through the analysis of new authentic samples from a single location are essential in order to monitor developments and processing that could affect authentication.
Resumo:
Abstract Honey is a high value food commodity with recognized nutraceutical properties. A primary driver of the value of honey is its floral origin. The feasibility of applying multivariate data analysis to various chemical parameters for the discrimination of honeys was explored. This approach was applied to four authentic honeys with different floral origins (rata, kamahi, clover and manuka) obtained from producers in New Zealand. Results from elemental profiling, stable isotope analysis, metabolomics (UPLC-QToF MS), and NIR, FT-IR, and Raman spectroscopic fingerprinting were analyzed. Orthogonal partial least square discriminant analysis (OPLS-DA) was used to determine which technique or combination of techniques provided the best classification and prediction abilities. Good prediction values were achieved using metabolite data (for all four honeys, Q2 = 0.52; for manuka and clover, Q2 = 0.76) and the trace element/isotopic data (for manuka and clover, Q2 = 0.65), while the other chemical parameters showed promise when combined (for manuka and clover, Q2 = 0.43).
Resumo:
In recent years, the adaptation of Wireless Sensor Networks (WSNs) to application areas requiring mobility increased the security threats against confidentiality, integrity and privacy of the information as well as against their connectivity. Since, key management plays an important role in securing both information and connectivity, a proper authentication and key management scheme is required in mobility enabled applications where the authentication of a node with the network is a critical issue. In this paper, we present an authentication and key management scheme supporting node mobility in a heterogeneous WSN that consists of several low capabilities sensor nodes and few high capabilities sensor nodes. We analyze our proposed solution by using MATLAB (analytically) and by simulation (OMNET++ simulator) to show that it has less memory requirement and has good network connectivity and resilience against attacks compared to some existing schemes. We also propose two levels of secure authentication methods for the mobile sensor nodes for secure authentication and key establishment.
Resumo:
In order to address the increasing compromise of user privacy on mobile devices, a Fuzzy Logic based implicit authentication scheme is proposed in this paper. The proposed scheme computes an aggregate score based on selected features and a threshold in real-time based on current and historic data depicting user routine. The tuned fuzzy system is then applied to the aggregated score and the threshold to determine the trust level of the current user. The proposed fuzzy-integrated implicit authentication scheme is designed to: operate adaptively and completely in the background, require minimal training period, enable high system accuracy while provide timely detection of abnormal activity. In this paper, we explore Fuzzy Logic based authentication in depth. Gaussian and triangle-based membership functions are investigated and compared using real data over several weeks from different Android phone users. The presented results show that our proposed Fuzzy Logic approach is a highly effective, and viable scheme for lightweight real-time implicit authentication on mobile devices.
Resumo:
Natural selection mediated by pollinators has influenced the evolution of floral diversity of the flowering plants (angiosperms). The scope of this thesis was to study: 1) phenotypic selection, 2) mating systems, and 3) floral shifts involved in plant speciation. Model plant species were Platanthera bifolia and P. chlorantha (Orchidaceae). These orchids are moth-pollinated, strictly co-sexual (bisexual flowers), and produce a spike that displays 10-20 white flowers. I explored the influence of characters on plant fitness by using multiple linear regressions. Pollen removal (male fitness) and fruit set (female fitness) increased with more flowers per plant in three P. bifolia populations. There was selection towards longer spurs in a dry year when average spur length was shorter than in normal-wet years. Female function was sensitive to drought, which enabled an application of the male function hypothesis of floral evolution (Bateman's principle). The results show that selection may vary between populations, years, and sex-functions. I examined inbreeding by estimating levels of geitonogamy (self-pollination between flowers of an individual) with an emasculation method in two P. bifolia populations. Geitonogamy did not vary with inflorescence size. Levels of geitonogamy was 20-40% in the smaller, but non-significant in the larger population. This may relate to lower number of possible mates and pollinator activity in the smaller population. Platanthera bifolia exhibits the ancestral character state of tongue-attachment of pollinia on the pollinator. Its close relative P. chlorantha attaches its pollinia onto the pollinator's eyes. To explore the mechanism of a floral shift, pollination efficiency and speed was compared between the two species. The results showed no differences in pollination efficiency, but P. chlorantha had faster pollen export and import. Efficiency of pollination in terms of speed may cause floral shifts, and thus speciation.
Resumo:
This work presents a tool to support authentication studies of paintings attributed to the modernist Portuguese artist Amadeo de Souza-Cardoso (1887-1918). The strategy adopted was to quantify and combine the information extracted from the analysis of the brushstroke with information on the pigments present in the paintings. The brushstroke analysis was performed combining Gabor filter and Scale Invariant Feature Transform. Hyperspectral imaging and elemental analysis were used to compare the materials in the painting with those present in a database of oil paint tubes used by the artist. The outputs of the tool are a quantitative indicator for authenticity, and a mapping image that indicates the areas where materials not coherent with Amadeo's palette were detected, if any. This output is a simple and effective way of assessing the results of the system. The method was tested in twelve paintings obtaining promising results.
Resumo:
Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.
Resumo:
The effect of a pre-shipment hypochlorite treatment on botrytis incidence was evaluated in a large number of rose cultivars and under different long-term storage conditions. Application parameters, stability and sources of hypochlorite were investigated. Irrespective of the type of packaging and shipment conditions, roses that received a pre-shipment treatment with 100 to 150 mg/L hypochlorite showed a significantly decreased botrytis incidence compared to non-hypochlorite treated roses. The hypochlorite treatment generally was more effective than a comparable treatment with commercial fungicides. Dipping the flower heads for approximately one second in a hypochlorite solution was more effective than spraying the heads. In few cases minor hypochlorite-induced damage on the petal tips was observed at higher concentrations (>200 mg/L). Apart from the effect on botrytis incidence, the treatment resulted in reduced water loss that may have an additional beneficial effect on the eventual flower quality. It is concluded that, apart from other obvious measures to reduce botrytis incidence (prevention of high humidity at the flower heads) a pre-shipment floral dip in 100 to 150 mg/L hypochlorite from commercial household bleach is an easy and cost effective way to reduce botrytis incidence following long term storage/transportation of roses. © 2015, International Society for Horticultural Science. All rights reserved.