991 resultados para Bi-modal authentication


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Bi-directional Evolutionary Structural Optimisation (BESO) method is a numerical topology optimisation method developed for use in finite element analysis. This paper presents a particular application of the BESO method to optimise the energy absorbing capability of metallic structures. The optimisation objective is to evolve a structural geometry of minimum mass while ensuring that the kinetic energy of an impacting projectile is reduced to a level which prevents perforation. Individual elements in a finite element mesh are deleted when a prescribed damage criterion is exceeded. An energy absorbing structure subjected to projectile impact will fail once the level of damage results in a critical perforation size. It is therefore necessary to constrain an optimisation algorithm from producing such candidate solutions. An algorithm to detect perforation was implemented within a BESO framework which incorporated a ductile material damage model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigated how damage changes the modal parameters of a real bridge by means of a field experiment which was conducted on a real steel truss bridge consecutively subjected to four artificial damage scenarios. In the experiment, both the forced and free vibrations of the bridge were recorded, the former for identifying higher modes available exclusively and the latter for lower modes with higher resolution. Results show that modal parameters are little affected by damage causing low stress redistribution. Modal frequencies decrease as damage causing high stress redistribution is applied; such a change can be observed if the damage is at the non-nodal point of the corresponding mode shape. Mode shapes are distorted due to asymmetric damage; they show an amplification in the damaged side as damage is applied at the non-nodal point. Torsion modes become more dominant as damage is applied either asymmetrically or on an element against large design loads. © 2013 Taylor & Francis Group, London.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tetrahexahedral Pd nanocrystals (THH Pd NCs) were prepared on a glassy carbon electrode using a programmed square-wave potential electrodeposition method, and modified by Bi adatoms with a range of coverages via the cyclic voltammetry method. The reactivity of the catalysts prepared towards ethanol electrooxidation reaction (EOR) was studied in alkaline medium at various temperatures and under other conditions that practical fuel cells operate. Significant activity enhancements were observed for the Bi-modified THH Pd NCs with an optimum Bi coverage (θBi) of around 0.68 being obtained. Furthermore, it was found that increasing temperature from 25 ºC to 60 ºC enhances the reactivity significantly. The general kinetics data of EOR on Bi-decorated and bare THH Pd NCs have also been obtained, from the activation energy calculated based on Arrhenius plots, and compared. At the optimum Bi coverage, an enhancement in the activity of almost 3 times was achieved, and the corresponding activation energy was found to be reduced significantly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Goats’ milk is responsible for unique traditional products such as Halloumi cheese. The characteristics of Halloumi depend on the original features of the milk and on the conditions under which the milk has been produced such as feeding regime of the animals or region of production. Using a range of milk (33) and Halloumi (33) samples collected over a year from three different locations in Cyprus (A, Anogyra; K, Kofinou; P, Paphos), the potential for fingerprint VOC analysis as marker to authenticate Halloumi was investigated. This unique set up consists of an in-injector thermo desorption (VOCtrap needle) and a chromatofocusing system based on mass spectrometry (VOCscanner). The mass spectra of all the analyzed samples are treated by multivariate analysis (Principle component analysis and Discriminant functions analysis). Results showed that the highland area of product (P) is clearly identified in milks produced (discriminant score 67%). It is interesting to note that the higher similitude found on milks from regions “A” and “K” (with P being distractive; discriminant score 80%) are not ‘carried over’ on the cheeses (higher similitude between regions “A” and “P”, with “K” distinctive). Data have been broken down into three seasons. Similarly, the seasonality differences observed in different milks are not necessarily reported on the produced cheeses. This is expected due to the different VOC signatures developed in cheeses as part of the numerous biochemical changes during its elaboration compared to milk. VOC however it is an additional analytical tool that can aid in the identification of region origin in dairy products.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sixty samples of milk, Halloumi cheese and local grazing plants (i.e. shrubs) were collected over a year from dairy farms located on three different locations of Cyprus. Major and trace elements were quantified using inductively coupled plasma-atomic emission spectroscopy (ICP-AES). Milk and Halloumi cheese produced in different geographical locations presented significant differences in the concentration of some of the elements analysed. Principal component analysis showed grouping of samples according to the region of production for both milk and cheese samples. These findings show that the assay of elements can provide useful fingerprints for the characterisation of dairy products.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This document describes the cryptographic hash function BLAKE2 and makes the algorithm specification and C source code conveniently available to the Internet community. BLAKE2 comes in two main flavors: BLAKE2b is optimized for 64-bit platforms and BLAKE2s for smaller architectures. BLAKE2 can be directly keyed, making it functionally equivalent to a Message Authentication Code (MAC).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: Detection of pre-neoplastic gastric mucosal changes and early gastric cancer (EGC) by white-light endoscopy (WLE) is often difficult. In this study we investigated whether combined autofluorescence imaging (AFI) and narrow band imaging (NBI) can improve detection of pre-neoplastic lesions and early gastric cancer in high-risk patients.

PATIENTS AND METHODS: Chinese patients who were 50-years-old or above with dyspepsia were examined by both high-resolution WLE and combined AFI followed by NBI (AFI-NBI), consecutively in a prospective randomized cross-over setting, by two experienced endoscopists. The primary outcome was diagnostic ability of the two methods for patients with pre-neoplastic lesions such as intestinal metaplasia (IM) and mucosal atrophy.

RESULTS: Sixty-five patients were recruited. One patient with large advanced gastric cancer was found and excluded from the analysis. Among the remaining 64 patients, 38 (59%) had IM; of these, 26 (68%) were correctly identified by AFI-NBI (sensitivity 68%, specificity 23%) and only 13 (34%) by WLE (sensitivity 34%, specificity 65%). AFI-NBI detected more patients with IM than did WLE (p=0.011). Thirty-one patients (48%) had mucosal atrophy. Ten patients (32%) were identified by AFI-NBI (sensitivity 32%, specificity 79%) and four patients (13%) by WLE (sensitivity 13%, specificity 88%) (p=0.100). No dysplasia or EGC was found.

CONCLUSION: AFI-NBI identified significantly more patients with IM than did WLE. Our result warrants further studies to define the role of combined AFI-NBI endoscopy for detection of precancerous conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigated using lip movements as a behavioural biometric for person authentication. The system was trained, evaluated and tested using the XM2VTS dataset, following the Lausanne Protocol configuration II. Features were selected from the DCT coefficients of the greyscale lip image. This paper investigated the number of DCT coefficients selected, the selection process, and static and dynamic feature combinations. Using a Gaussian Mixture Model - Universal Background Model framework an Equal Error Rate of 2.20% was achieved during evaluation and on an unseen test set a False Acceptance Rate of 1.7% and False Rejection Rate of 3.0% was achieved. This compares favourably with face authentication results on the same dataset whilst not being susceptible to spoofing attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In order to protect user privacy on mobile devices, an event-driven implicit authentication scheme is proposed in this paper. Several methods of utilizing the scheme for recognizing legitimate user behavior are investigated. The investigated methods compute an aggregate score and a threshold in real-time to determine the trust level of the current user using real data derived from user interaction with the device. The proposed scheme is designed to: operate completely in the background, require minimal training period, enable high user recognition rate for implicit authentication, and prompt detection of abnormal activity that can be used to trigger explicitly authenticated access control. In this paper, we investigate threshold computation through standard deviation and EWMA (exponentially weighted moving average) based algorithms. The result of extensive experiments on user data collected over a period of several weeks from an Android phone indicates that our proposed approach is feasible and effective for lightweight real-time implicit authentication on mobile smartphones.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tese de mestrado integrado em Engenharia Biomédica e Biofísica, apresentada à Universidade de Lisboa, através da Faculdade de Ciências, 2014

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Adequate user authentication is a persistent problem, particularly with mobile devices, which tend to be highly personal and at the fringes of an organisation's influence. Yet these devices are being used increasingly in various business settings, where they pose a risk to security and privacy, not only from sensitive information they may contain, but also from the means they typically offer to access such information over wireless networks. User authentication is the first line of defence for a mobile device that falls into the hands of an unauthorised user. However, motivating users to enable simple password mechanisms and periodically update their authentication information is difficult at best. This paper examines some of the issues relating to the use of biometrics as a viable method of authentication on mobile wireless devices. It is also a critical analysis of some of the techniques currently employed and where appropriate, suggests novel hybrid ways in which they could be improved or modified. Both biometric technology and wireless setting based constraints that determine the feasibility and the performance of the authentication feature are specified. Some well known biometric technologies are briefly reviewed and their feasibility for wireless and mobile use is reviewed. Furthermore, a number of quantitative and qualitative parameters for evaluation are also presented. Biometric technologies are continuously advancing toward commercial implementation in wireless devices. When carefully designed and implemented, the advantage of biometric authentication arises mainly from increased convenience and coexistent improved security.