895 resultados para Realistic threat
Resumo:
Robust facial expression recognition (FER) under occluded face conditions is challenging. It requires robust algorithms of feature extraction and investigations into the effects of different types of occlusion on the recognition performance to gain insight. Previous FER studies in this area have been limited. They have spanned recovery strategies for loss of local texture information and testing limited to only a few types of occlusion and predominantly a matched train-test strategy. This paper proposes a robust approach that employs a Monte Carlo algorithm to extract a set of Gabor based part-face templates from gallery images and converts these templates into template match distance features. The resulting feature vectors are robust to occlusion because occluded parts are covered by some but not all of the random templates. The method is evaluated using facial images with occluded regions around the eyes and the mouth, randomly placed occlusion patches of different sizes, and near-realistic occlusion of eyes with clear and solid glasses. Both matched and mis-matched train and test strategies are adopted to analyze the effects of such occlusion. Overall recognition performance and the performance for each facial expression are investigated. Experimental results on the Cohn-Kanade and JAFFE databases demonstrate the high robustness and fast processing speed of our approach, and provide useful insight into the effects of occlusion on FER. The results on the parameter sensitivity demonstrate a certain level of robustness of the approach to changes in the orientation and scale of Gabor filters, the size of templates, and occlusions ratios. Performance comparisons with previous approaches show that the proposed method is more robust to occlusion with lower reductions in accuracy from occlusion of eyes or mouth.
The role of the ethnic enclave in facilitating immigrant business performance and social integration
Resumo:
Chinese immigrant entrepreneurs, known the world over for their successful business practices (Kee, 1994), tend to start businesses within their ethnic enclave. But in a move away from multiculturalism, host countries increasingly fear that immigration and asylum pose a threat to social integration resulting in a lack of social cohesion and a plethora of government programs (Cheong, Edwards, Goulbourne & Solomos, 2007). For many immigrant entrepreneurs, the EE is an integral part of their social and cultural context and the location where ethnic resources reside (Logan, Alba & Stults, 2003). Immigrant entrepreneurs can harness the networks for labor and customers through various ties in their EE (Portes and Zhou, 1996). Yang, Ho and Chang (2010) illustrate in their paper that the Chinese immigrant entrepreneurs (IE) were able to utilize ethnic network resources as their social capital in order to reduce transaction costs and thus enhance business performance. Tilly (1990) explains that immigrants’ reliance on such networks for business or other information minimizes the socioeconomic hardships they would experience in host countries (Raijman & Tienda, 2000). Acquiring jobs in ethnic businesses and establishing businesses within an EE may facilitate migrants’ social integration into the host country (Tian & Shan, 1999). Although an EE has distinct economic advantages for immigrant entrepreneurs, Sequeira and Rasheed (2006: 367) argue that ‘Exclusive reliance on strong ties within the immigrant enclave has a negative effect on growth outside the enclave community.’ Similarly, Drori, Honig and Ginsberg (2010: 20) also propose that ‘The greater the reliance of transnational entrepreneurs on ethnic (versus societal) embedded resources and network structure, the narrower their possibilities of expanding the scope of their business.’ This research asks, ‘What is the role of the ethnic enclave in facilitating immigrant business growth and social integration? This project has the following important aims: A1 To better understand the role of IE, in particular Chinese IE in the Australian economy A2 To investigate the role of the EE in facilitating or inhibiting immigrant business performance A3 To understand how locating their firm inside or outside of the EE will affect the IE’s embeddedness in co-ethnic and nonco-ethnic networks and social integration A4 To understand how an IE’s social network affects business performance and social integration
Resumo:
Modern genetic research holds out the promise of a bold new future in which humanity has identified and conquered the genetic roots of many diseases. Genetic science also promises to shed light on who we are, what it is that makes us tick, what it is that makes us the way we are — in short, what it is that makes us human. Yet while genetics are a potential saviour (saving us from disease), it also appears as a threat that at the extremes appears to be the stuff of our worst nightmares, such as the prospect, probably more imagined than real, of rows of cloned individuals. The new genetics hold out the promise that through genetics we will be able to determine what we are, a promise that is simultaneously appealing and terrifying. This chapter discusses the cloning of people and parts, the law’s response to cloning, genetics and diversity, a framework for law reform.
Resumo:
This paper presents a method for the estimation of thrust model parameters of uninhabited airborne systems using specific flight tests. Particular tests are proposed to simplify the estimation. The proposed estimation method is based on three steps. The first step uses a regression model in which the thrust is assumed constant. This allows us to obtain biased initial estimates of the aerodynamic coeficients of the surge model. In the second step, a robust nonlinear state estimator is implemented using the initial parameter estimates, and the model is augmented by considering the thrust as random walk. In the third step, the estimate of the thrust obtained by the observer is used to fit a polynomial model in terms of the propeller advanced ratio. We consider a numerical example based on Monte-Carlo simulations to quantify the sampling properties of the proposed estimator given realistic flight conditions.
Resumo:
Wikipedia is often held up as an example of the potential of the internet to foster open, free and non-commercial collaboration. However such discourses often conflate these values without recognising how they play out in reality in a peer-production community. As Wikipedia is evolving, it is an ideal time to examine these discourses and the tensions that exist between its initial ideals and the reality of commercial activity in the encyclopaedia. Through an analysis of three failed proposals to ban paid advocacy editing in the English language Wikipedia, this paper highlights the shift in values from the early editorial community that forked encyclopaedic content over the threat of commercialisation, to one that today values the freedom that allows anyone to edit the encyclopaedia.
Resumo:
Over the past decade there has been an increased awareness in the field of international relations of the potential impact of an infectious disease epidemic on national security. While states’ attempts to combat infectious disease have a long history, what is new in this area is the adoption at the international level of securitized responses regarding the containment of infectious disease. This article argues that the securitization of infectious disease by states and the World Health Organization (WHO) has led to two key developments. First, the WHO has had to assert itself as the primary actor that all states, particularly western states, can rely upon to contain the threat of infectious diseases. The WHO's apparent success in this is evidenced by the development of the Global Outbreak Alert Response Network (GOARN), which has led to arguments that the WHO has emerged as the key authority in global health governance. The second outcome that this article seeks to explore is the development of the WHO's authority in the area of infectious disease surveillance. In particular, is GOARN a representation of the WHO's consummate authority in the area of coordinating infectious disease response or is GOARN the product of the WHO's capitulation to western states’ concerns with preventing infectious disease outbreaks from reaching their borders and as a result, are arguments expressing the authority of the WHO in infectious disease response premature?
Resumo:
Classical ballet requires dancers to exercise significant muscle control and strength both while stationary and when moving. Following the Royal Academy of Dance (RAD) syllabus, 8 male and 27 female dancers (aged 20.2 + 1.9 yr) in a fulltime university undergraduate dance training program were asked to stand in first position for 10 seconds and then perform 10 repeats of a demi-plié exercise to a counted rhythm. Accelerometer records from the wrist, sacrum, knee and ankle were compared with the numerical scores from a professional dance instructor. The sacrum mounted sensor detected lateral tilts of the torso in dances with lower scores (Spearman’s rank correlation coefficient r = -0.64, p < 0.005). The RMS acceleration amplitude of wrist mounted sensor was linearly correlated to the movement scores (Spearman’s rank correlation coefficient r = 0.63, p < 0.005). The application of sacrum and wrist mounted sensors for biofeedback during dance training is a realistic, low cost option.
Resumo:
Engineering design processes are necessary to attain the requisite standards of integrity for high-assurance safety-related systems. Additionally, human factors design initiatives can provide critical insights that parameterise their development. Unfortunately, the popular perception of human factors as a “forced marriage” between engineering and psychology often provokes views where the ‘human factor’ is perceived as a threat to systems design. Some popular performance-based standards for developing safety-related systems advocate identifying and managing human factors throughout the system lifecycle. However, they also have a tendency to fall short in their guidance on the application of human factors methods and tools, let alone how the outputs generated can be integrated in to various stages of the design process. This case study describes a project that converged engineering with human factors to develop a safety argument for new low-cost railway level crossing technology for system-wide implementation in Australia. The paper enjoins the perspectives of a software engineer and cognitive psychologist and their involvement in the project over two years of collaborative work to develop a safety argument for low-cost level crossing technology. Safety and reliability requirements were informed by applying human factors analytical tools that supported the evaluation and quantification of human reliability where users interfaced with the technology. The project team was confronted with significant challenges in cross-disciplinary engagement, particularly with the complexities of dealing with incongruences in disciplinary language. They were also encouraged to think ‘outside the box’ as to how users of a system interpreted system states and ehaviour. Importantly, some of these states, while considered safe within the boundary of the constituent systems that implemented safety-related functions, could actually lead the users to engage in deviant behaviour. Psychology explained how user compliance could be eroded to levels that effectively undermined levels of risk reduction afforded by systems. Linking the engineering and psychology disciplines intuitively, overall safety performance was improved by introducing technical requirements and making design decisions that minimized the system states and behaviours that led to user deviancy. As a commentary on the utility of transdisciplinary collaboration for technical specification, the processes used to bridge the two disciplines are conceptualised in a graphical model.
Resumo:
Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.
Resumo:
The effect of an ordered array of nanocones on a conducting substrate immersed in the plasma on the transport of the plasma ions is investigated. The real conical shape of the cones is rigorously incorporated into the model. The movement of 10^5 CH3+ ions in the plasma sheath modified by the nanocone array is simulated. The ions are driven by the electric fields produced by the sheath and the nanostructures. The surface charge density and the total charge on the nanotips with different aspect ratios are computed. The ion transport simulation provides important characteristics of the displacement and velocity of the ions. The relative ion distribution along the lateral surfaces of the carbon nanotips is computed as well. It is shown that a rigorous account of the realistic nanostructure shape leads to very different distribution of the ion fluxes on the nanostructured surfaces compared to the previously reported works. The ion flux distribution is a critical factor in the nucleation process on the substrate and determines the nanostructure growth patterns.
Resumo:
Convectively driven downburst winds pose a threat to structures and communities in many regions of Australia not subject to tropical cyclones. Extreme value analysis shows that for return periods of interest to engineering design these events produce higher gust wind speeds than synoptic scale windstorms. Despite this, comparatively little is known of the near ground wind structure of these potentially hazardous windstorms. With this in mind, a series of idealised three-dimensional numerical simulations were undertaken to investigate convective storm wind fields. A dry, non-hydrostatic, sub-cloud model with parameterisation of the microphysics was used. Simulations were run with a uniform 20 m horizontal grid resolution and a variable vertical resolution increasing from 1 m. A systematic grid resolution study showed further refinement did not alter the morphological structure of the outflow. Simulations were performed for stationary downbursts in a quiescent air field, stationary downbursts embedded within environmental boundary layer winds, and also translating downbursts embedded within environmental boundary layer winds.
Resumo:
Some important issues related to the self-organization in the arrays of nanoparticles on solid surfaces exposed to the low-temperature plasma are analysed and discussed. The available tools for the characterization of the size and position uniformity in nanoarrays are examined. The technique capable of revealing the realistic adsorbed atom and adsorbed radical capture zone pattern based on the surface physics is indicated as the most promising characterization tool. The processes responsible for the self-organization are analysed, the main driving forces of the self-organization are discussed, and possible ways to control the self-organization by controlling the plasma parameters are introduced. A view on the possible ways to further improve the methods of nanoarray characterization and self-organization is presented as well.
Resumo:
A comparative study involving both experimental and numerical investigations was made to resolve a long-standing problem of understanding electron conductivity mechanism across magnetic field in low-temperature plasmas. We have calculated the plasma parameters from experimentally obtained electric field distribution, and then made a 'back' comparison with the distributions of electron energy and plasma density obtained in the experiment. This approach significantly reduces an influence of the assumption about particular phenomenology of the electron conductivity in plasma. The results of the experiment and calculations made by this technique have showed that the classical conductivity is not capable of providing realistic total current and electron energy, whereas the phenomenological anomalous Bohm mobility has demonstrated a very good agreement with the experiment. These results provide an evidence in favor of the Bohm conductivity, thus making it possible to clarify this pressing long-living question about the main driving mechanism responsible for the electron transport in low-temperature plasmas.
Resumo:
The charge of an isolated dust grain and ion drag forces on the grain in a collisionless, high-voltage, capacitive rf sheath are studied theoretically. The studies are carried out assuming that the positive ions are monoenergetic, as well as in more realistic approximation, assuming that the time-averaged energy distribution of ions impinging on the dust grain has a double-peaked hollow profile. For the nonmonoenergetic case, an analytical expression for the ion flux to the dust grain is obtained. It is studied how the dust charge and ion drag forces depend on the rf frequency, electron density at plasma-sheath boundary, electron temperature and ratio of the effective oscillation amplitude of rf current to the electron Debye length. It is shown that the dust charge and ion drag forces obtained in the monoenergetic ion approximation may differ from those calculated assuming that the ions are nonmonoenergetic. The difference increases with increasing the width of the ion energy spread in the ion distribution. © 2009 American Institute of Physics.
Resumo:
The finite-signal-to-noise ratio (SNR) diversity-multiplexing trade-off (DMT) of cooperative diversity protocols are investigated in vehicular networks based on cascaded Rayleigh fading. Lower bounds of DMT at finite SNR for orthogonal and non-orthogonal protocols are derived. The results showcase the first look into the achievable DMT trade-off of cooperative diversity in volatile vehicular environments. It is shown that the diversity gains are significantly suboptimal at realistic SNRs.