982 resultados para Admission control
Resumo:
Integration of biometrics is considered as an attractive solution for the issues associated with password based human authentication as well as for secure storage and release of cryptographic keys which is one of the critical issues associated with modern cryptography. However, the widespread popularity of bio-cryptographic solutions are somewhat restricted by the fuzziness associated with biometric measurements. Therefore, error control mechanisms must be adopted to make sure that fuzziness of biometric inputs can be sufficiently countered. In this paper, we have outlined such existing techniques used in bio-cryptography while explaining how they are deployed in different types of solutions. Finally, we have elaborated on the important facts to be considered when choosing appropriate error correction mechanisms for a particular biometric based solution.
Resumo:
It is commonplace to use digital video cameras in robotic applications. These cameras have built-in exposure control but they do not have any knowledge of the environment, the lens being used, the important areas of the image and do not always produce optimal image exposure. Therefore, it is desirable and often necessary to control the exposure off the camera. In this paper we present a scheme for exposure control which enables the user application to determine the area of interest. The proposed scheme introduces an intermediate transparent layer between the camera and the user application which combines the information from these for optimal exposure production. We present results from indoor and outdoor scenarios using directional and fish-eye lenses showing the performance and advantages of this framework.
Resumo:
Despite significant improvements in capacity-distortion performance, a computationally efficient capacity control is still lacking in the recent watermarking schemes. In this paper, we propose an efficient capacity control framework to substantiate the notion of watermarking capacity control to be the process of maintaining “acceptable” distortion and running time, while attaining the required capacity. The necessary analysis and experimental results on the capacity control are reported to address practical aspects of the watermarking capacity problem, in dynamic (size) payload embedding.
Resumo:
Background In China, the national malaria elimination programme has been operating since 2010. This study aimed to explore the epidemiological changes in patterns of malaria in China from intensified control to elimination stages. Methods Data on nationwide malaria cases from 2004 to 2012 were extracted from the Chinese national malaria surveillance system. The secular trend, gender and age features, seasonality, and spatial distribution by Plasmodium species were analysed. Results In total, 238,443 malaria cases were reported, and the proportion of Plasmodium falciparum increased drastically from <10% before 2010 to 55.2% in 2012. From 2004 to 2006, malaria showed a significantly increasing trend and with the highest incidence peak in 2006 (4.6/100,000), while from 2007 onwards, malaria decreased sharply to only 0.18/100,000 in 2012. Males and young age groups became the predominantly affected population. The areas affected by Plasmodium vivax malaria shrunk, while areas affected by P. falciparum malaria expanded from 294 counties in 2004 to 600 counties in 2012. Conclusions This study demonstrated that malaria has decreased dramatically in the last five years, especially since the Chinese government launched a malaria elimination programme in 2010, and areas with reported falciparum malaria cases have expanded over recent years. These findings suggest that elimination efforts should be improved to meet these changes, so as to achieve the nationwide malaria elimination goal in China in 2020.
Resumo:
We performed a contingent valuation survey to elicit the opportunity cost of bed-days consumed by healthcare-associated infections in 11 European hospitals. The opportunity cost of a bed-day was significantly lower than the accounting cost; median values were i72 and i929, respectively (P ! .001). Accounting methods overestimate the opportunity cost of bed-days...
Resumo:
This paper details the development of an online adaptive control system, designed to learn from the actions of an instructing pilot. Three learning architectures, single layer neural networks (SLNN), multi-layer neural networks (MLNN), and fuzzy associative memories (FAM) are considerd. Each method has been tested in simulation. While the SLNN and MLNN provided adequate control under some simulation conditions, the addition of pilot noise and pilot variation during simulation training caused these methods to fail.
Resumo:
Draglines are extremely large machines that are widely used in open-cut coal mines for overburden stripping. Since 1994 we have been working toward the development of a computer control system capable of automatically driving a dragline for a large portion of its operating cycle. This has necessitated the development and experimental evaluation of sensor systems, machines models, closed-loop control controllers, and an operator interface. This paper describes our steps toward the goal through scale-model and full-scale field experimentation.
Resumo:
Electric walking draglines are physically large and powerful machines used in the mining industry. However with the addition of suitable sensors and a controller a dragline can be considered as a numerically controlled machine or robot which can then perform parts of the operating cycle automatically. This paper presents an analysis of the electromechanical system necessary precursor to automatic control
Resumo:
The mining industry is highly suitable for the application of robotics and automation technology since the work is arduous, dangerous and often repetitive. This paper describes the development of an automation system for a physically large and complex field robotic system - a 3,500 tonne mining machine (a dragline). The major components of the system are discussed with a particular emphasis on the machine/operator interface. A very important aspect of this system is that it must work cooperatively with a human operator, seamlessly passing the control back and forth in order to achieve the main aim - increased productivity.
Resumo:
This paper reviews a variety of advanced signal processing algorithms that have been developed at the University of Southampton as part of the Prometheus (Programme for European traffic flow with highest efficiency and unprecedented safety) programme to achieve an intelligent driver warning system (IDWS). The IDWS includes the detection of road edges, lanes, obstacles and their tracking and identification, estimates of time to collision, and behavioural modelling of drivers for a variety of scenarios. The underlying algorithms are briefly discussed in support of the IDWS.
Resumo:
The mining industry is highly suitable for the application of robotics and automation technology since the work is both arduous and dangerous. Visual servoing is a means of integrating noncontact visual sensing with machine control to augment or replace operator based control. This article describes two of our current mining automation projects in order to demonstrate some, perhaps unusual, applications of visual servoing, and also to illustrate some very real problems with robust computer vision
Resumo:
Power line inspection is a vital function for electricity supply companies but it involves labor-intensive and expensive procedures which are tedious and error-prone for humans to perform. A possible solution is to use an unmanned aerial vehicle (UAV) equipped with video surveillance equipment to perform the inspection. This paper considers how a small, electrically driven rotorcraft conceived for this application could be controlled by visually tracking the overhead supply lines. A dynamic model for a ducted-fan rotorcraft is presented and used to control the action of an Air Vehicle Simulator (AVS), consisting of a cable-array robot. Results show how visual data can be used to determine, and hence regulate in closed loop, the simulated vehicle’s position relative to the overhead lines.
Resumo:
In the internet age, copyright owners are increasingly looking to online intermediaries to take steps to prevent copyright infringement. Sometimes these intermediaries are closely tied to the acts of infringement; sometimes – as in the case of ISPs – they are not. In 2012, the Australian High Court decided the Roadshow Films v iiNet case, in which it held that an Australian ISP was not liable under copyright’s authorization doctrine, which asks whether the intermediary has sanctioned, approved or countenanced the infringement. The Australian Copyright Act 1968 directs a court to consider, in these situations, whether the intermediary had the power to prevent the infringement and whether it took any reasonable steps to prevent or avoid the infringement. It is generally not difficult for a court to find the power to prevent infringement – power to prevent can include an unrefined technical ability to disconnect users from the copyright source, such as an ISP terminating users’ internet accounts. In the iiNet case, the High Court eschewed this broad approach in favor of focusing on a notion of control that was influenced by principles of tort law. In tort, when a plaintiff asserts that a defendant should be liable for failing to act to prevent harm caused to the plaintiff by a third party, there is a heavy burden on the plaintiff to show that the defendant had a duty to act. The duty must be clear and specific, and will often hinge on the degree of control that the defendant was able to exercise over the third party. Control in these circumstances relates directly to control over the third party’s actions in inflicting the harm. Thus, in iiNet’s case, the control would need to be directed to the third party’s infringing use of BitTorrent; control over a person’s ability to access the internet is too imprecise. Further, when considering omissions to act, tort law differentiates between the ability to control and the ability to hinder. The ability to control may establish a duty to act, and the court will then look to small measures taken to prevent the harm to determine whether these satisfy the duty. But the ability to hinder will not suffice to establish liability in the absence of control. This article argues that an inquiry grounded in control as defined in tort law would provide a more principled framework for assessing the liability of passive intermediaries in copyright. In particular, it would set a higher, more stable benchmark for determining the copyright liability of passive intermediaries, based on the degree of actual, direct control that the intermediary can exercise over the infringing actions of its users. This approach would provide greater clarity and consistency than has existed to date in this area of copyright law in Australia.
Resumo:
The objective of this review is to identify the effectiveness of education or behavioral interventions on adherence to phosphate control in adults with end stage kidney disease (ESKD) receiving hemodialysis (HD).
Resumo:
Mike Budd and Max H. Kirsch, eds. Rethinking Disney: Private Control, Public Dimensions. Middletown, CT: Wesleyan University Press, 2005. ix + 341pp. $27.95