913 resultados para Packet-pair
Resumo:
This paper analyses the probabilistic linear discriminant analysis (PLDA) speaker verification approach with limited development data. This paper investigates the use of the median as the central tendency of a speaker’s i-vector representation, and the effectiveness of weighted discriminative techniques on the performance of state-of-the-art length-normalised Gaussian PLDA (GPLDA) speaker verification systems. The analysis within shows that the median (using a median fisher discriminator (MFD)) provides a better representation of a speaker when the number of representative i-vectors available during development is reduced, and that further, usage of the pair-wise weighting approach in weighted LDA and weighted MFD provides further improvement in limited development conditions. Best performance is obtained using a weighted MFD approach, which shows over 10% improvement in EER over the baseline GPLDA system on mismatched and interview-interview conditions.
Resumo:
Recent modelling of socio-economic costs by the Australian railway industry in 2010 has estimated the cost of level crossing accidents to exceed AU$116 million annually. To better understand causal factors that contribute to these accidents, the Cooperative Research Centre for Rail Innovation is running a project entitled Baseline Level Crossing Video. The project aims to improve the recording of level crossing safety data by developing an intelligent system capable of detecting near-miss incidents and capturing quantitative data around these incidents. To detect near-miss events at railway level crossings a video analytics module is being developed to analyse video footage obtained from forward-facing cameras installed on trains. This paper presents a vision base approach for the detection of these near-miss events. The video analytics module is comprised of object detectors and a rail detection algorithm, allowing the distance between a detected object and the rail to be determined. An existing publicly available Histograms of Oriented Gradients (HOG) based object detector algorithm is used to detect various types of vehicles in each video frame. As vehicles are usually seen from a sideway view from the cabin’s perspective, the results of the vehicle detector are verified using an algorithm that can detect the wheels of each detected vehicle. Rail detection is facilitated using a projective transformation of the video, such that the forward-facing view becomes a bird’s eye view. Line Segment Detector is employed as the feature extractor and a sliding window approach is developed to track a pair of rails. Localisation of the vehicles is done by projecting the results of the vehicle and rail detectors on the ground plane allowing the distance between the vehicle and rail to be calculated. The resultant vehicle positions and distance are logged to a database for further analysis. We present preliminary results regarding the performance of a prototype video analytics module on a data set of videos containing more than 30 different railway level crossings. The video data is captured from a journey of a train that has passed through these level crossings.
Resumo:
For industrial wireless sensor networks, maintaining the routing path for a high packet delivery ratio is one of the key objectives in network operations. It is important to both provide the high data delivery rate at the sink node and guarantee a timely delivery of the data packet at the sink node. Most proactive routing protocols for sensor networks are based on simple periodic updates to distribute the routing information. A faulty link causes packet loss and retransmission at the source until periodic route update packets are issued and the link has been identified as broken. We propose a new proactive route maintenance process where periodic update is backed-up with a secondary layer of local updates repeating with shorter periods for timely discovery of broken links. Proposed route maintenance scheme improves reliability of the network by decreasing the packet loss due to delayed identification of broken links. We show by simulation that proposed mechanism behaves better than the existing popular routing protocols (AODV, AOMDV and DSDV) in terms of end-to-end delay, routing overhead, packet reception ratio.
Resumo:
This study describes the evaluation of a clinical scar scale for our porcine burn scars, which includes scar cosmetic outcome, colour, height and hair, supplemented with reference porcine scar photographs representing each scar outcome and scar colour scores. A total of 72 porcine burn scars at week 6 after burn were rated in vivo and/or on photographs. Good agreements were achieved for both intra-rater reliability (correlation is 0.86-0.98) and inter-rater reliability (ICC=80-85%). The results showed statistically significant correlations for each pair in this clinical scar scale (p<0.01), with the best correlation found between scar cosmetic outcome and scar colour. A multivariate principle components analysis revealed that this clinical scar assessment was highly correlated with scar histology, wound size, and re-epithelialisation data (p<0.001). More severe scars are clinically characterised by darker purple colouration, more elevation, no presence of hair, histologically by thicker scar tissue, thinner remaining normal dermis, are more likely to have worse contraction, and slower re-epithelialisation. This study demonstrates that our clinical scar scale is a reliable, independent and valuable tool for assessing porcine burn outcome and truthfully reflects scar appearance and function. To our knowledge, this is the first study demonstrating a high correlation between clinical scar assessment and scar histology, wound contraction and re-epithelialisation data on porcine burn scars. We believe that the successful use of porcine scar scales is invaluable for assessing potential human burn treatments.
Resumo:
This retrospective review examines healing in different sites on a porcine burn model; 24 pairs of burns on 18 pigs from other animal trials were selected for analysis. Each pair of burns was located on the either the cranial or the caudal part of the thoracic ribs region, on the same side of the animal. The burns were 40-50 cm(2) in size and of uniform deep-dermal partial thickness. Caudal burns healed significantly better than cranial burns, demonstrated by earlier closure of wounds, less scar formation and better cosmesis. To our knowledge, this is the first detailed study reporting that burn healing is affected by location on a porcine burn model. We recommend that similar symmetrical burns should be used for future comparative assessments of burn healing.
Resumo:
"It’s late in the night. And after a long day at work, you have a splitting headache. You rattle around in the bottom drawer of the bathroom vanity to find a packet of paracetamol tablets you know are hiding there. Phew, relief is at hand! Then you turn the packet over and discover that the crumpled box of pills actually expired two years ago..."--http://theconversation.com/explainer-do-we-need-to-follow-medication-use-by-dates-4329
Resumo:
Freestanding membranes created from Bombyx mori silk fibroin (BMSF) offer a potential vehicle for corneal cell transplantation since they are transparent and support the growth of human corneal epithelial cells (HCE). Fibroin derived from the wild silkworm Antheraea pernyi (APSF) might provide a superior material by virtue of containing putative cell- attachment sites that are absent from BMSF. Thus we have investigated the feasibility of producing transparent, freestanding membranes from APSF and have analysed the behaviour of HCE cells on this material. No significant differences in cell numbers or phenotype were observed in short term HCE cell cultures established on either fibroin. Production of transparent freestanding APSF membranes, however, proved to be problematic as cast solutions of APSF were more prone to becoming opaque, displayed significantly lower permeability and were more brittle than BMSF-membranes. Cultures of HCE cells established on either membrane developed a normal stratified morphology with cytokeratin pair 3/12 being immuno-localized to the superficial layers. We conclude that while it is feasible to produce transparent freestanding membranes from APSF, the technical difficulties associated with this biomaterial, along with an absence of enhanced cell growth, currently favours the continued development of BMSF as a preferred vehicle for corneal cell transplantation. Nevertheless, it remains possible that refinement of techniques for processing APSF might yet lead to improvements in the handling properties and performance of this material.
Resumo:
Spreading cell fronts play an essential role in many physiological processes. Classically, models of this process are based on the Fisher-Kolmogorov equation; however, such continuum representations are not always suitable as they do not explicitly represent behaviour at the level of individual cells. Additionally, many models examine only the large time asymptotic behaviour, where a travelling wave front with a constant speed has been established. Many experiments, such as a scratch assay, never display this asymptotic behaviour, and in these cases the transient behaviour must be taken into account. We examine the transient and asymptotic behaviour of moving cell fronts using techniques that go beyond the continuum approximation via a volume-excluding birth-migration process on a regular one-dimensional lattice. We approximate the averaged discrete results using three methods: (i) mean-field, (ii) pair-wise, and (iii) one-hole approximations. We discuss the performace of these methods, in comparison to the averaged discrete results, for a range of parameter space, examining both the transient and asymptotic behaviours. The one-hole approximation, based on techniques from statistical physics, is not capable of predicting transient behaviour but provides excellent agreement with the asymptotic behaviour of the averaged discrete results, provided that cells are proliferating fast enough relative to their rate of migration. The mean-field and pair-wise approximations give indistinguishable asymptotic results, which agree with the averaged discrete results when cells are migrating much more rapidly than they are proliferating. The pair-wise approximation performs better in the transient region than does the mean-field, despite having the same asymptotic behaviour. Our results show that each approximation only works in specific situations, thus we must be careful to use a suitable approximation for a given system, otherwise inaccurate predictions could be made.
Resumo:
This work aims to promote integrity in autonomous perceptual systems, with a focus on outdoor unmanned ground vehicles equipped with a camera and a 2D laser range finder. A method to check for inconsistencies between the data provided by these two heterogeneous sensors is proposed and discussed. First, uncertainties in the estimated transformation between the laser and camera frames are evaluated and propagated up to the projection of the laser points onto the image. Then, for each pair of laser scan-camera image acquired, the information at corners of the laser scan is compared with the content of the image, resulting in a likelihood of correspondence. The result of this process is then used to validate segments of the laser scan that are found to be consistent with the image, while inconsistent segments are rejected. Experimental results illustrate how this technique can improve the reliability of perception in challenging environmental conditions, such as in the presence of airborne dust.
Resumo:
Wireless networked control systems (WNCSs) have been increasingly deployed in industrial applications. As they require timely data packet transmissions, it is difficult to make efficient use of the limited channel resources, particularly in contention based wireless networks in the layered network architecture. Aiming to maintain the WNCSs under critical real-time traffic condition at which the WNCSs marginally meet the real-time requirements, a cross-layer design (CLD) approach is presented in this paper to adaptively adjust the control period to achieve improved channel utilization while still maintaining effective and timely packet transmissions. The effectiveness of the proposed approach is demonstrated through simulation studies.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to prove the security of AKE protocols even when the adversary learns certain secret values. In this work, we address more granular leakage: partial leakage of long-term secrets of protocol principals, even after the session key is established. We introduce a generic key exchange security model, which can be instantiated allowing bounded or continuous leakage, even when the adversary learns certain ephemeral secrets or session keys. Our model is the strongest known partial-leakage-based security model for key exchange protocols. We propose a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the proposed model, by introducing a new concept: the leakage-resilient NAXOS trick. We identify a special property for public-key cryptosystems: pair generation indistinguishability, and show how to obtain the leakage-resilient NAXOS trick from a pair generation indistinguishable leakage-resilient public-key cryptosystem.
Resumo:
Newman and Nelson (2012) describe three ‘dances’ to explain the vacillating psychological states of trauma survivors: the dance of approach and avoidance; the dance of fragmentation and integration; and the dance of resilience and vulnerability. The first pair of seemingly opposite responses describes how survivors at times cope by ‘approaching’ the trauma, for example by gathering information about what happened; whilst at other times, the same person will cope by ‘avoiding’ the trauma by engaging in activities which distract them from the memory of the trauma or having to deal with the consequences of it. The ‘dance’ of fragmentation and integration describes the opposing individual or group experiences encountered after traumas or disasters. Individuals may experience fragmentation, or emotional disconnection, from the trauma as an adaptive means of survival. The ‘dance’ of resilience and vulnerability refers to an individual’s ability to ‘process’ trauma and return to a resilient state in which they re-learn to trust people and the world around them and ‘bounce back’ to a state of being resilient again. This paper will illustrate how an understanding of the three dances can be used to enable survivors of child sexual assault to engage with the media to tell their stories. I will give current examples from six months of journalism research, collaboration and writing of a series of news stories and features which broke an exclusive story simultaneously in The Australian and The Times in London during 2013.
Resumo:
The complete structural elucidation of complex lipids, including glycerophospholipids, using only mass spectrometry represents a major challenge to contemporary analytical technologies. Here, we demonstrate that product ions arising from the collision-induced dissociation (CID) of the [M + Na] + adduct ions of phospholipids can be isolated and subjected to subsequent gas-phase ozonolysis-known as ozone-induced dissociation (OzID)-in a linear ion-trap mass spectrometer. The resulting CID/OzID experiment yields abundant product ions that are characteristic of the acyl substitution on the glycerol backbone (i.e., sn-position). This approach is shown to differentiate sn-positional isomers, such as the regioisomeric phosphatidylcholine pair of PC 16:0/18:1 and PC 18:1/16:0. Importantly, CID/OzID provides a sensitive diagnostic for the existence of an isomeric mixture in a given sample. This is of very high value for the analysis of tissue extracts since CID/OzID analyses can reveal changes in the relative abundance of isomeric constituents even within different tissues from the same animal. Finally, we demonstrate the ability to assign carbon-carbon double bond positions to individual acyl chains at specific backbone positions by adding subsequent CID and/or OzID steps to the workflow and that this can be achieved in a single step using a hybrid triple quadrupole-linear ion trap mass spectrometer. This unique approach represents the most complete and specific structural analysis of lipids by mass spectrometry demonstrated to date and is a significant step towards comprehensive top-down lipidomics. This journal is © The Royal Society of Chemistry 2014. Grant Number ARC/DP0986628, ARC/FT110100249, ARC/LP110200648
Resumo:
We propose to use a simple and effective way to achieve secure quantum direct secret sharing. The proposed scheme uses the properties of fountain codes to allow a realization of the physical conditions necessary for the implementation of no-cloning principle for eavesdropping-check and authentication. In our scheme, to achieve a variety of security purposes, nonorthogonal state particles are inserted in the transmitted sequence carrying the secret shares to disorder it. However, the positions of the inserted nonorthogonal state particles are not announced directly, but are obtained by sending degrees and positions of a sequence that are pre-shared between Alice and each Bob. Moreover, they can confirm that whether there exists an eavesdropper without exchanging classical messages. Most importantly, without knowing the positions of the inserted nonorthogonal state particles and the sequence constituted by the first particles from every EPR pair, the proposed scheme is shown to be secure.
Resumo:
Since their introduction, the notions of indistinguishability and non-malleability have been changed and extended by different authors to support different goals. In this paper, we propose new flavors of these notions, investigate their relative strengths with respect to previous notions, and provide the full picture of relationships (i.e., implications and separations) among the security notions for public-key encryption schemes. We take into account the two general security goals of indistinguishability and non-malleability, each in the message space, key space, and hybrid message-key space to find six specific goals, a couple of them, namely complete indistinguishability and key non-malleability, are new. Then for each pair of goals, coming from the indistinguishability or non-malleability classes, we prove either an implication or a separation, completing the full picture of relationships among all these security notions. The implications and separations are respectively supported by formal proofs (i.e., reductions) in the concrete-security framework and by counterexamples.