992 resultados para Recognition (Psychology)
Resumo:
Automatic speech recognition from multiple distant micro- phones poses significant challenges because of noise and reverberations. The quality of speech acquisition may vary between microphones because of movements of speakers and channel distortions. This paper proposes a channel selection approach for selecting reliable channels based on selection criterion operating in the short-term modulation spectrum domain. The proposed approach quantifies the relative strength of speech from each microphone and speech obtained from beamforming modulations. The new technique is compared experimentally in the real reverb conditions in terms of perceptual evaluation of speech quality (PESQ) measures and word error rate (WER). Overall improvement in recognition rate is observed using delay-sum and superdirective beamformers compared to the case when the channel is selected randomly using circular microphone arrays.
Resumo:
Highly efficient loading of bone morphogenetic protein-2 (BMP-2) onto carriers with desirable performance is still a major challenge in the field of bone regeneration. Till now, the nanoscaled surface-induced changes of the structure and bioactivity of BMP-2 remains poorly understood. Here, the effect of nanoscaled surface on the adsorption and bioactivity of BMP-2 was investigated with a series of hydroxyapatite surfaces (HAPs): HAP crystal-coated surface (HAP), HAP crystal-coated polished surface (HAP-Pol), and sintered HAP crystal-coated surface (HAP-Sin). The adsorption dynamics of recombinant human BMP-2 (rhBMP-2) and the accessibility of the binding epitopes of adsorbed rhBMP-2 for BMP receptors (BMPRs) were examined by a quartz crystal microbalance with dissipation. Moreover, the bioactivity of adsorbed rhBMP-2 and the BMP-induced Smad signaling were investigated with C2C12 model cells. A noticeably high mass-uptake of rhBMP-2 and enhanced recognition of BMPR-IA to adsorbed rhBMP-2 were found on the HAP-Pol surface. For the rhBMP-2-adsorbed HAPs, both ALP activity and Smad signaling increased in the order of HAP-Sin < HAP < HAP-Pol. Furthermore, hybrid molecular dynamics and steered molecular dynamics simulations validated that BMP-2 tightly anchored on the HAP-Pol surface with a relative loosened conformation, but the HAP-Sin surface induced a compact conformation of BMP-2. In conclusion, the nanostructured HAPs can modulate the way of adsorption of rhBMP-2, and thus the recognition of BMPR-IA and the bioactivity of rhBMP-2. These findings can provide insightful suggestions for the future design and fabrication of rhBMP-2-based scaffolds/implants.
Resumo:
Background Pollens of subtropical grasses, Bahia (Paspalum notatum), Johnson (Sorghum halepense), and Bermuda (Cynodon dactylon), are common causes of respiratory allergies in subtropical regions worldwide. Objective To evaluate IgE cross-reactivity of grass pollen (GP) found in subtropical and temperate areas. Methods Case and control serum samples from 83 individuals from the subtropical region of Queensland were tested for IgE reactivity with GP extracts by enzyme-linked immunosorbent assay. A randomly sampled subset of 21 serum samples from patients with subtropical GP allergy were examined by ImmunoCAP and cross-inhibition assays. Results Fifty-four patients with allergic rhinitis and GP allergy had higher IgE reactivity with P notatum and C dactylon than with a mixture of 5 temperate GPs. For 90% of 21 GP allergic serum samples, P notatum, S halepense, or C dactylon specific IgE concentrations were higher than temperate GP specific IgE, and GP specific IgE had higher correlations of subtropical GP (r = 0.771-0.950) than temperate GP (r = 0.317-0.677). In most patients (71%-100%), IgE with P notatum, S halepense, or C dactylon GPs was inhibited better by subtropical GP than temperate GP. When the temperate GP mixture achieved 50% inhibition of IgE with subtropical GP, there was a 39- to 67-fold difference in concentrations giving 50% inhibition and significant differences in maximum inhibition for S halepense and P notatum GP relative to temperate GP. Conclusion Patients living in a subtropical region had species specific IgE recognition of subtropical GP. Most GP allergic patients in Queensland would benefit from allergen specific immunotherapy with a standardized content of subtropical GP allergens.
Resumo:
BACKGROUND The workgroup of Traffic Psychology is concerned with the social, behavioral, and perceptual aspects that are associated with use and non-use of bicycle helmets, in their various forms and under various cycling conditions. OBJECTIVES The objectives of WG2 are to (1) share current knowledge among the people already working in the field, (2) suggest new ideas for research on and evaluation of the design of bicycle helmets, and (3) discuss options for funding of such research within the individual frameworks of the participants. Areas for research include 3.1. The patterns of use of helmets among different users: children, adults, and sports enthusiasts. 3.2. The use of helmets in different environments: rural roads, urban streets, and bike trails. 3.3. Concerns bicyclists have relative to their safety and convenience and the perceived impact of using helmets on comfort and convenience. 3.4. The benefit of helmets for enhancing visibility, and how variations in helmet design and colors affect daytime, nighttime, and dusktime visibility. 3.5. The role of helmets in the acceptance of city-wide pickup-and-drop-off bicycles. 3.6. The impact of helmets on visual search behaviour of bicyclists.
Resumo:
We propose a novel multiview fusion scheme for recognizing human identity based on gait biometric data. The gait biometric data is acquired from video surveillance datasets from multiple cameras. Experiments on publicly available CASIA dataset show the potential of proposed scheme based on fusion towards development and implementation of automatic identity recognition systems.
What triggers problem recognition? An exploration on young Australian male problematic online gamers
Resumo:
Help-seeking is a complex decision-making process that first begins with problem recognition. However, little is understood about the conceptualisation of the helpseeking process and the triggers of problem recognition. This research proposes the use of the Critical Incident Technique (CIT) to examine and classify incidents that serve as key triggers of problem recognition among young Australian male problematic online gamers. The research provides a classification of five different types of triggers that will aid social marketers into developing effective early detection, prevention and treatment focused social marketing interventions.
Resumo:
While historically linked with psychoanalysis, countertransference is recognised as an important component of the experience of therapists, regardless of the therapeutic modality. This study considers the implications of this for the training of psychologists. Fifty-five clinical psychology trainees from four university training programmes completed an anonymous questionnaire that collected written reports of countertransference experiences, ratings of confidence in managing these responses, and supervision in this regard. The reports were analysed using a process of thematic analysis. Several themes emerged including a desire to protect or rescue clients, feeling criticised or controlled by clients, feeling helpless, and feeling disengaged. Trainees varied in their reports of awareness of countertransference and the regularity of supervision in this regard. The majority reported a lack of confidence in managing their responses, and all reported interest in learning about countertransference. The implications for reflective practice in postgraduate psychology training are discussed.
Resumo:
Pattern recognition is a promising approach for the identification of structural damage using measured dynamic data. Much of the research on pattern recognition has employed artificial neural networks (ANNs) and genetic algorithms as systematic ways of matching pattern features. The selection of a damage-sensitive and noise-insensitive pattern feature is important for all structural damage identification methods. Accordingly, a neural networks-based damage detection method using frequency response function (FRF) data is presented in this paper. This method can effectively consider uncertainties of measured data from which training patterns are generated. The proposed method reduces the dimension of the initial FRF data and transforms it into new damage indices and employs an ANN method for the actual damage localization and quantification using recognized damage patterns from the algorithm. In civil engineering applications, the measurement of dynamic response under field conditions always contains noise components from environmental factors. In order to evaluate the performance of the proposed strategy with noise polluted data, noise contaminated measurements are also introduced to the proposed algorithm. ANNs with optimal architecture give minimum training and testing errors and provide precise damage detection results. In order to maximize damage detection results, the optimal architecture of ANN is identified by defining the number of hidden layers and the number of neurons per hidden layer by a trial and error method. In real testing, the number of measurement points and the measurement locations to obtain the structure response are critical for damage detection. Therefore, optimal sensor placement to improve damage identification is also investigated herein. A finite element model of a two storey framed structure is used to train the neural network. It shows accurate performance and gives low error with simulated and noise-contaminated data for single and multiple damage cases. As a result, the proposed method can be used for structural health monitoring and damage detection, particularly for cases where the measurement data is very large. Furthermore, it is suggested that an optimal ANN architecture can detect damage occurrence with good accuracy and can provide damage quantification with reasonable accuracy under varying levels of damage.
Resumo:
In the field of face recognition, sparse representation (SR) has received considerable attention during the past few years, with a focus on holistic descriptors in closed-set identification applications. The underlying assumption in such SR-based methods is that each class in the gallery has sufficient samples and the query lies on the subspace spanned by the gallery of the same class. Unfortunately, such an assumption is easily violated in the face verification scenario, where the task is to determine if two faces (where one or both have not been seen before) belong to the same person. In this study, the authors propose an alternative approach to SR-based face verification, where SR encoding is performed on local image patches rather than the entire face. The obtained sparse signals are pooled via averaging to form multiple region descriptors, which then form an overall face descriptor. Owing to the deliberate loss of spatial relations within each region (caused by averaging), the resulting descriptor is robust to misalignment and various image deformations. Within the proposed framework, they evaluate several SR encoding techniques: l1-minimisation, Sparse Autoencoder Neural Network (SANN) and an implicit probabilistic technique based on Gaussian mixture models. Thorough experiments on AR, FERET, exYaleB, BANCA and ChokePoint datasets show that the local SR approach obtains considerably better and more robust performance than several previous state-of-the-art holistic SR methods, on both the traditional closed-set identification task and the more applicable face verification task. The experiments also show that l1-minimisation-based encoding has a considerably higher computational cost when compared with SANN-based and probabilistic encoding, but leads to higher recognition rates.
Resumo:
Objective Child maltreatment is a problem that has longer recognition in the northern hemisphere and in high-income countries. Recent work has highlighted the nearly universal nature of the problem in other countries but demonstrated the lack of comparability of studies because of the variations in definitions and measures used. The International Society for the Prevention of Child Abuse and Neglect has developed instrumentation that may be used with cross-cultural and cross-national benchmarking by local investigators. Design and sampling The instrument design began with a team of expert in Brisbane in 2004. A large bank of questions were subjected to two rounds of Delphi review to develop the fielded version of the instrument. Convenience samples included approximately 120 parent respondents with children under the age of 18 in each of six countries (697 total). Results This paper presents an instrument that measures parental behaviors directed at children and reports data from pilot work in 6 countries and 7 languages. Patterns of response revealed few missing values and distributions of responses that generally were similar in the six countries. Subscales performed well in terms of internal consistency with Cronbach's alpha in very good range (0.77–0.88) with the exception of the neglect and sex abuse subscales. Results varied by child age and gender in expected directions but with large variations among the samples. About 15% of children were shaken, 24% hit on the buttocks with an object, and 37% were spanked. Reports of choking and smothering were made by 2% of parents. Conclusion These pilot data demonstrate that the instrument is well tolerated and captures variations in, and potentially harmful forms of child discipline. Practice implications The ISPCAN Child Abuse Screening Tool – Parent Version (ICAST-P) has been developed as a survey instrument to be administered to parents for the assessment of child maltreatment in a multi-national and multi-cultural context. It was developed with broad input from international experts and subjected to Dephi review, translation, and pilot testing in six countries. The results of the Delphi study and pilot testing are presented. This study demonstrates that a single instrument can be used in a broad range of cultures and languages with low rates of missing data and moderate to high internal consistency.
Resumo:
This thesis investigates the use of fusion techniques and mathematical modelling to increase the robustness of iris recognition systems against iris image quality degradation, pupil size changes and partial occlusion. The proposed techniques improve recognition accuracy and enhance security. They can be further developed for better iris recognition in less constrained environments that do not require user cooperation. A framework to analyse the consistency of different regions of the iris is also developed. This can be applied to improve recognition systems using partial iris images, and cancelable biometric signatures or biometric based cryptography for privacy protection.
Resumo:
This chapter interrogates what recognition of prior learning (RPL) can and does mean in the higher education sector—a sector in the grip of the widening participation agenda and an open access age. The chapter discusses how open learning is making inroads into recognition processes and examines two studies in open learning recognition. A case study relating to e-portfolio-style RPL for entry into a Graduate Certificate in Policy and Governance at a metropolitan university in Queensland is described. In the first instance, candidates who do not possess a relevant Bachelor degree need to demonstrate skills in governmental policy work in order to be eligible to gain entry to a Graduate Certificate (at Australian Qualifications Framework Level 8) (Australian Qualifications Framework Council, 2013, p. 53). The chapter acknowledges the benefits and limitations of recognition in open learning and those of more traditional RPL, anticipating future developments in both (or their convergence).
Resumo:
Semi-rigid molecular tweezers 1, 3 and 4 bind picric acid with more than tenfold increment in tetrachloromethane as compared to chloroform.
Resumo:
The baculovirus expression system using the Autographa californica nuclear polyhedrosis virus (AcNPV) has been extensively utilized for high-level expression of cloned foreign genes, driven by the strong viral promoters of polyhedrin (polh) and p10 encoding genes. A parallel system using Bombyx mori nuclear polyhedrosis virus (BmNPV) is much less exploited because the choice and variety of BmNPV-based transfer vectors are limited. Using a transient expression assay, we have demonstrated here that the heterologous promoters of the very late genes polh and p10 from AcNPV function as efficiently in BmN cells as the BmNPV promoters. The location of the cloned foreign gene with respect to the promoter sequences was critical for achieving the highest levels of expression, following the order +35 > +1 > -3 > -8 nucleotides (nt) with respect to the polh or p10 start codons. We have successfully generated recombinant BmNPV harboring AcNPV promoters by homeologous recombination between AcNPV-based transfer vectors and BmNPV genomic DNA. Infection of BmN cell lines with recombinant BmNPV showed a temporal expression pattern, reaching very high levels in 60-72 h post infection. The recombinant BmNPV harboring the firefly luciferase-encoding gene under the control of AcNPV polh or p10 promoters, on infection of the silkworm larvae led to the synthesis of large quantities of luciferase. Such larvae emanated significant luminiscence instantaneously on administration of the substrate luciferin resulting in 'glowing silkworms'. The virus-infected larvae continued to glow for several hours and revealed the most abundant distribution of virus in the fat bodies. In larval expression also, the highest levels were achieved when the reporter gene was located at +35 nt of the polh.
Resumo:
Abstract-The success of automatic speaker recognition in laboratory environments suggests applications in forensic science for establishing the Identity of individuals on the basis of features extracted from speech. A theoretical model for such a verification scheme for continuous normaliy distributed featureIss developed. The three cases of using a) single feature, b)multipliendependent measurements of a single feature, and c)multpleindependent features are explored.The number iofndependent features needed for areliable personal identification is computed based on the theoretcal model and an expklatory study of some speech featues.