962 resultados para Systems identification
Resumo:
This paper presents flow regimes identification methodology in multiphase system in annular, stratified and homogeneous oil-water-gas regimes. The principle is based on recognition of the pulse height distributions (PHD) from gamma-ray with supervised artificial neural network (ANN) systems. The detection geometry simulation comprises of two NaI(Tl) detectors and a dual-energy gamma-ray source. The measurement of scattered radiation enables the dual modality densitometry (DMD) measurement principle to be explored. Its basic principle is to combine the measurement of scattered and transmitted radiation in order to acquire information about the different flow regimes. The PHDs obtained by the detectors were used as input to ANN. The data sets required for training and testing the ANN were generated by the MCNP-X code from static and ideal theoretical models of multiphase systems. The ANN correctly identified the three different flow regimes for all data set evaluated. The results presented show that PHDs examined by ANN may be applied in the successfully flow regime identification.
Resumo:
L’automatisation de la détection et de l’identification des animaux est une tâche qui a de l’intérêt dans plusieurs domaines de recherche en biologie ainsi que dans le développement de systèmes de surveillance électronique. L’auteur présente un système de détection et d’identification basé sur la vision stéréo par ordinateur. Plusieurs critères sont utilisés pour identifier les animaux, mais l’accent a été mis sur l’analyse harmonique de la reconstruction en temps réel de la forme en 3D des animaux. Le résultat de l’analyse est comparé avec d’autres qui sont contenus dans une base évolutive de connaissances.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-08
Resumo:
The saddle gall midge, Haplodiplosis marginata (von Roser) (Diptera: Cecidomyiidae), has undergone a resurgence recently as a pest of cereals in Belgium and other European countries. An effective monitoring tool of saddle gall midge flights is needed to understand the enigmatic population dynamics of this pest, and to design an integrated management strategy. Therefore, volatile compounds emitted by females (alkan-2-ols and alk-2-yl butanoates) were identified, and the chirality of the emitted esters was determined to be the R absolute configuration. In field-trapping experiments, racemic non-2-yl butanoate attracted substantial numbers of H.marginata males. Thus, this compound will be useful in baited traps for monitoring seasonal flight patterns, and improving integrated management of the saddle gall midge in agricultural systems.
Resumo:
The use of human brain electroencephalography (EEG) signals for automatic person identi cation has been investigated for a decade. It has been found that the performance of an EEG-based person identication system highly depends on what feature to be extracted from multi-channel EEG signals. Linear methods such as Power Spectral Density and Autoregressive Model have been used to extract EEG features. However these methods assumed that EEG signals are stationary. In fact, EEG signals are complex, non-linear, non-stationary, and random in nature. In addition, other factors such as brain condition or human characteristics may have impacts on the performance, however these factors have not been investigated and evaluated in previous studies. It has been found in the literature that entropy is used to measure the randomness of non-linear time series data. Entropy is also used to measure the level of chaos of braincomputer interface systems. Therefore, this thesis proposes to study the role of entropy in non-linear analysis of EEG signals to discover new features for EEG-based person identi- cation. Five dierent entropy methods including Shannon Entropy, Approximate Entropy, Sample Entropy, Spectral Entropy, and Conditional Entropy have been proposed to extract entropy features that are used to evaluate the performance of EEG-based person identication systems and the impacts of epilepsy, alcohol, age and gender characteristics on these systems. Experiments were performed on the Australian EEG and Alcoholism datasets. Experimental results have shown that, in most cases, the proposed entropy features yield very fast person identication, yet with compatible accuracy because the feature dimension is low. In real life security operation, timely response is critical. The experimental results have also shown that epilepsy, alcohol, age and gender characteristics have impacts on the EEG-based person identication systems.
Resumo:
Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.
Resumo:
We propose a novel analysis alternative, based on two Fourier Transforms for emotion recognition from speech -- Fourier analysis allows for display and synthesizes different signals, in terms of power spectral density distributions -- A spectrogram of the voice signal is obtained performing a short time Fourier Transform with Gaussian windows, this spectrogram portraits frequency related features, such as vocal tract resonances and quasi-periodic excitations during voiced sounds -- Emotions induce such characteristics in speech, which become apparent in spectrogram time-frequency distributions -- Later, the signal time-frequency representation from spectrogram is considered an image, and processed through a 2-dimensional Fourier Transform in order to perform the spatial Fourier analysis from it -- Finally features related with emotions in voiced speech are extracted and presented
Resumo:
Telomeres are DNA-protein complexes which cap the ends of eukaryotic linear chromosomes. In normal somatic cells telomeres shorten and become dysfunctional during ageing due to the DNA end replication problem. This leads to activation of signalling pathways that lead to cellular senescence and apoptosis. However, cancer cells typically bypass this barrier to immortalisation in order to proliferate indefinitely. Therefore enhancing our understanding of telomere dysfunction and pathways involved in regulation of the process is essential. However, the pathways involved are highly complex and involve interaction between a wide range of biological processes. Therefore understanding how telomerase dysfunction is regulated is a challenging task and requires a systems biology approach. In this study I have developed a novel methodology for visualisation and analysis of gene lists focusing on the network level rather than individual or small lists of genes. Application of this methodology to an expression data set and a gene methylation data set allowed me to enhance my understanding of the biology underlying a senescence inducing drug and the process of immortalisation respectively. I then used the methodology to compare the effect of genetic background on induction of telomere uncapping. Telomere uncapping was induced in HCT116 WT, p21-/- and p53-/- cells using a viral vector expressing a mutant variant of hTR, the telomerase RNA template. p21-/- cells showed enhanced sensitivity to telomere uncapping. Analysis of a candidate pathway, Mismatch Repair, revealed a role for the process in response to telomere uncapping and that induction of the pathway was p21 dependent. The methodology was then applied to analysis of the telomerase inhibitor GRN163L and synergistic effects of hypoglycaemia with this drug. HCT116 cells were resistant to GRN163L treatment. However, under hypoglycaemic conditions the dose required for ablation of telomerase activity was reduced significantly and telomere shortening was enhanced. Overall this new methodology has allowed our group and collaborators to identify new biology and improve our understanding of processes regulating telomere dysfunction.
Resumo:
International audience
Resumo:
The liver is one of the most important organs of human body, being involved in several vital functions and regulation of physiological processes. Given its pivotal role in the excretion of waste metabolites and drugs detoxification, the liver is often subjected to oxidative stress that leads to lipid peroxidation and severe cellular damage. The conventional treatments of liver diseases such as cirrhosis, fatty liver and chronic hepatitis are frequently inadequate due to side effects caused by hepatotoxic chemical drugs. To overcome this problematic paradox, medicinal plants, owing to their natural richness in phenolic compounds, have been intensively exploited concerning their extracts and fraction composition in order to find bioactive compounds that could be isolated and applied in the treatment of liver ailments. The present review aimed to collect the main results of recent studies carried out in this field and systematize the information for a better understanding of the hepatoprotective capacity of medicinal plants in in vitro and in vivo systems. Generally, the assessed plant extracts revealed good hepatoprotective properties, justifying the fractionation and further isolation of phenolic compounds from different parts of the plant. Twenty-five phenolic compounds, including flavonoids, lignan compounds, phenolic acids and other phenolic compounds, have been isolated and identified, and proved to be effective in the prevention and/or treatment of chemically induced liver damage. In this perspective, the use of medicinal plant extracts, fractions and phenolic compounds seems to be a promising strategy to avoid side effects caused by hepatotoxic chemicals.
Resumo:
Part 4: Transition Towards Product-Service Systems
Resumo:
Buses are considered a slow, low comfort and low reliability transport system, thus its negative and por image. In the framework of the 3iBS project (2012), several examples of innovative and/or effective solutions regarding the Level of Service (LoS) were analysed aiming to provide operators, practitioners and policy makers with a set of Good Practice Guidelines to strengthen the competitiveness of the bus in the urban environment. The identification of the key indicators regarding vehicles, infrastructure and operation was possible through the analysis of a set of case studies -among which Barcelona (Spain), Cagliari (Italy), London (United Kingdom), Paris and Nantes (France). A cross comparison between the case studies was carried out for contrasting the level of achievement of the different criteria considered. The information provided on Regulatory, Financial and Technical issues allows the identification of a number of specific factors influencing the implementation of a high quality transport scheme, and set the basis for the elaboration of a set of Guidelines for the implementation of an intelligent, innovative and integrated bus system, including the main barriers to be tackled.
Resumo:
Dissertação de Mestrado, Ciências da Linguagem, Faculdade de Ciências Humanas e Sociais, Universidade do Algarve, 2014
Resumo:
This research investigates the implementation of battery-less RFID sensing platforms inside lossy media, such as, concrete and grout. Both concrete and novel grouts can be used for nuclear plant decommissioning as part of the U.S. Department of Energy’s (DOE’s) cleanup projects. Our research examines the following: (1) material characterization, (2) analytical modeling of transmission and propagation losses inside lossy media, (3) maximum operational range of RFID wireless sensors embedded inside concrete and grout, and (4) best positioning of antennas for achieving longer communication range between RFID antennas and wireless sensors. Our research uses the battery-less Wireless Identification and Sensing Platform (WISP) which can be used to monitor temperature, and humidity inside complex materials. By using a commercial Agilent open-ended coaxial probe (HP8570B), the measurements of the dielectric permittivity of concrete and grout are performed. Subsequently, the measured complex permittivity is used to formulate analytical Debye models. Also, the transmission and propagation losses of a uniform plane wave inside grout are calculated. Our results show that wireless sensors will perform better in concrete than grout. In addition, the maximum axial and radial ranges for WISP are experimentally determined. Our work illustrates the feasibility of battery-less wireless sensors that are embedded inside concrete and grout. Also, our work provides information that can be used to optimize the power management, sampling rate, and antenna design of such sensors.