945 resultados para Potential detection


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Damage detection in structures has become increasingly important in recent years. While a number of damage detection and localization methods have been proposed, few attempts have been made to explore the structure damage with frequency response functions (FRFs). This paper illustrates the damage identification and condition assessment of a beam structure using a new frequency response functions (FRFs) based damage index and Artificial Neural Networks (ANNs). In practice, usage of all available FRF data as an input to artificial neural networks makes the training and convergence impossible. Therefore one of the data reduction techniques Principal Component Analysis (PCA) is introduced in the algorithm. In the proposed procedure, a large set of FRFs are divided into sub-sets in order to find the damage indices for different frequency points of different damage scenarios. The basic idea of this method is to establish features of damaged structure using FRFs from different measurement points of different sub-sets of intact structure. Then using these features, damage indices of different damage cases of the structure are identified after reconstructing of available FRF data using PCA. The obtained damage indices corresponding to different damage locations and severities are introduced as input variable to developed artificial neural networks. Finally, the effectiveness of the proposed method is illustrated and validated by using the finite element modal of a beam structure. The illustrated results show that the PCA based damage index is suitable and effective for structural damage detection and condition assessment of building structures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Periprosthetic fractures are increasingly frequent. The fracture may be located over the shaft of the prosthesis, at its tip or below (21). The treatment of explosion fractures is difficult because the shaft blocks the application of implants, like screws, which need to penetrate the medullary cavity. The cerclage, as a simple periosteal loop, made of wire or more recently cable, does not only avoid the medullary cavity. Its centripetal mode of action is well suited for reducing and maintaining radially displaced fractures. Furthermore, the cerclage lends itself well for minimally invasive internal fixation. New insight challenges the disrepute of which the cerclage technology suffered for decades. The outcome of cerclage fixation benefits from an improved understanding of its technology, mechano-biology and periosteal blood supply. Preconceived and generally accepted opinions like "strangulation of blood supply" need to be re-examined. Recent mechanical evaluations (22) demonstrate that the wire application may be improved but cable is superior in hand- ling, maintenance of tension and strength. Beside the classical concepts of absolute and relative stability a defined stability condition needs consideration. It is typical for cerclage. Called "loose-lock stability" it specifies the situation where a loosened implant allows first unimpeded displacement changing abruptly into a locked fixation preventing further dislocation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We have previously reported that novel vitronectin:growth factor (VN:GF) complexes significantly increase re-epithelialization in a porcine deep dermal partial-thickness burn model. However, the potential exists to further enhance the healing response through combination with an appropriate delivery vehicle which facilitates sustained local release and reduced doses of VN:GF complexes. Hyaluronic acid (HA), an abundant constituent of the interstitium, is known to function as a reservoir for growth factors and other bioactive species. The physicochemical properties of HA confer it with an ability to sustain elevated pericellular concentrations of these species. This has been proposed to arise via HA prolonging interactions of the bioactive species with cell surface receptors and/or protecting them from degradation. In view of this, the potential of HA to facilitate the topical delivery of VN:GF complexes was evaluated. Two-dimensional (2D) monolayer cell cultures and 3D de-epidermised dermis (DED) human skin equivalent (HSE) models were used to test skin cell responses to HA and VN:GF complexes. Our 2D studies revealed that VN:GF complexes and HA stimulate the proliferation of human fibroblasts but not keratinocytes. Experiments in our 3D DED-HSE models showed that VN:GF complexes, both alone and in conjunction with HA, led to enhanced development of both the proliferative and differentiating layers in the DED-HSE models. However, there was no significant difference between the thicknesses of the epidermis treated with VN:GF complexes alone and VN:GF complexes together with HA. While the addition of HA did not enhance all the cellular responses to VN:GF complexes examined, it was not inhibitory, and may confer other advantages related to enhanced absorption and transport that could be beneficial in delivery of the VN:GF complexes to wounds.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Visual activity detection of lip movements can be used to overcome the poor performance of voice activity detection based solely in the audio domain, particularly in noisy acoustic conditions. However, most of the research conducted in visual voice activity detection (VVAD) has neglected addressing variabilities in the visual domain such as viewpoint variation. In this paper we investigate the effectiveness of the visual information from the speaker’s frontal and profile views (i.e left and right side views) for the task of VVAD. As far as we are aware, our work constitutes the first real attempt to study this problem. We describe our visual front end approach and the Gaussian mixture model (GMM) based VVAD framework, and report the experimental results using the freely available CUAVE database. The experimental results show that VVAD is indeed possible from profile views and we give a quantitative comparison of VVAD based on frontal and profile views The results presented are useful in the development of multi-modal Human Machine Interaction (HMI) using a single camera, where the speaker’s face may not always be frontal.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Diabetic neuropathy is a significant clinical problem that currently has no effective therapy, and in advanced cases, leads to foot ulceration and lower limb amputation. The accurate detection, characterization and quantification of this condition are important in order to define at-risk patients, anticipate deterioration, monitor progression, and assess new therapies This review evaluates novel corneal methods of assessing diabetic neuropathy. Two new non-invasive corneal markers have emerged, and in cross-sectional studies have demonstrated their ability to stratify the severity of this disease. Corneal confocal microscopy allows quantification of corneal nerve parameters and non-contact corneal esthesiometry, the functional correlate of corneal structure, assesses the sensitivity of the cornea. Both these techniques are quick to perform, produce little or no discomfort for the patient, and are suitable for clinical settings. Each has advantages and disadvantages over traditional techniques for assessing diabetic neuropathy. Application of these new corneal markers for longitudinal evaluation of diabetic neuropathy has the potential to reduce dependence on more invasive, costly, and time-consuming assessments, such as skin biopsy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a preliminary flight test based detection range versus false alarm performance characterisation of a morphological-hidden Markov model filtering approach to vision-based airborne dim-target collision detection. On the basis of compelling in-flight collision scenario data, we calculate system operating characteristic (SOC) curves that concisely illustrate the detection range versus false alarm rate performance design trade-offs. These preliminary SOC curves provide a more complete dim-target detection performance description than previous studies (due to the experimental difficulties involved, previous studies have been limited to very short flight data sample sets and hence have not been able to quantify false alarm behaviour). The preliminary investigation here is based on data collected from 4 controlled collision encounters and supporting non-target flight data. This study suggests head-on detection ranges of approximately 2.22 km under blue sky background conditions (1.26 km in cluttered background conditions), whilst experiencing false alarms at a rate less than 1.7 false alarms/hour (ie. less than once every 36 minutes). Further data collection is currently in progress.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Influenza is a widespread disease occurring in seasonal epidemics, and each year is responsible for up to 500,000 deaths worldwide. Influenza can develop into strains which cause severe symptoms and high mortality rates, and could potentially reach pandemic status if the virus’ properties allow easy transmission. Influenza is transmissible via contact with the virus, either directly (infected people) or indirectly (contaminated objects); via reception of large droplets over short distances (one metre or less); or through inhalation of aerosols containing the virus expelled by infected individuals during respiratory activities, that can remain suspended in the air and travel distances of more than one metre (the aerosol route). Aerosol transmission of viruses involves three stages: production of the droplets containing viruses; transport of the droplets and ability of a virus to remain intact and infectious; and reception of the droplets (via inhalation). Our understanding of the transmission of influenza viruses via the aerosol route is poor, and thus our ability to prevent a widespread outbreak is limited. This study explored the fate of viruses in droplets by investigating the effects of some physical factors on the recovery of both a bacteriophage model and influenza virus. Experiments simulating respiratory droplets were carried out using different types of droplets, generated from a commonly used water-like matrix, and also from an ‘artificial mucous’ matrix which was used to more closely resemble respiratory fluids. To detect viruses in droplets, we used the traditional plaque assay techniques, and also a sensitive, quantitative PCR assay specifically developed for this study. Our results showed that the artificial mucous suspension enhanced the recovery of infectious bacteriophage. We were able to report detection limits of infectious bacteriophage (no bacteriophage was detected by the plaque assay when aerosolised from a suspension of 103 PFU/mL, for three of the four droplet types tested), and that bacteriophage could remain infectious in suspended droplets for up to 20 minutes. We also showed that the nested real-time PCR assay was able to detect the presence of bacteriophage RNA where the plaque assay could not detect any intact particles. Finally, when applying knowledge from the bacteriophage experiments, we reported the quantitative recoveries of influenza viruses in droplets, which were more consistent and stable than we had anticipated. Influenza viruses can be detected up to 20 minutes (after aerosolisation) in suspended aerosols and possibly beyond. It also was detectable from nebulising suspensions with relatively low concentrations of viruses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many existing schemes for malware detection are signature-based. Although they can effectively detect known malwares, they cannot detect variants of known malwares or new ones. Most network servers do not expect executable code in their in-bound network traffic, such as on-line shopping malls, Picasa, Youtube, Blogger, etc. Therefore, such network applications can be protected from malware infection by monitoring their ports to see if incoming packets contain any executable contents. This paper proposes a content-classification scheme that identifies executable content in incoming packets. The proposed scheme analyzes the packet payload in two steps. It first analyzes the packet payload to see if it contains multimedia-type data (such as . If not, then it classifies the payload either as text-type (such as or executable. Although in our experiments the proposed scheme shows a low rate of false negatives and positives (4.69% and 2.53%, respectively), the presence of inaccuracies still requires further inspection to efficiently detect the occurrence of malware. In this paper, we also propose simple statistical and combinatorial analysis to deal with false positives and negatives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents the hardware development and testing of a new concept for air sampling via the integration of a prototype spore trap onboard an unmanned aerial system (UAS).We propose the integration of a prototype spore trap onboard a UAS to allow multiple capture of spores of pathogens in single remote locations at high or low altitude, otherwise not possible with stationary sampling devices.We also demonstrate the capability of this system for the capture of multiple time-stamped samples during a single mission.Wind tunnel testing was followed by simulation, and flight testing was conducted to measure and quantify the spread during simulated airborne air sampling operations. During autonomous operations, the onboard autopilot commands the servo to rotate the sampling device to a new indexed location once the UAS vehicle reaches the predefined waypoint or set of waypoints (which represents the region of interest). Time-stamped UAS data are continuously logged during the flight to assist with analysis of the particles collected. Testing and validation of the autopilot and spore trap integration, functionality, and performance is described. These tools may enhance the ability to detect new incursions of spores

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Computer vision is an attractive solution for uninhabited aerial vehicle (UAV) collision avoidance, due to the low weight, size and power requirements of hardware. A two-stage paradigm has emerged in the literature for detection and tracking of dim targets in images, comprising of spatial preprocessing, followed by temporal filtering. In this paper, we investigate a hidden Markov model (HMM) based temporal filtering approach. Specifically, we propose an adaptive HMM filter, in which the variance of model parameters is refined as the quality of the target estimate improves. Filters with high variance (fat filters) are used for target acquisition, and filters with low variance (thin filters) are used for target tracking. The adaptive filter is tested in simulation and with real data (video of a collision-course aircraft). Our test results demonstrate that our adaptive filtering approach has improved tracking performance, and provides an estimate of target heading not present in previous HMM filtering approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Reducing road crashes and associated trauma is a critical focus as the Decade of Action for Road Safety commences. China is one of many rapidly-motorizing nations to experience recent increases in private-vehicle ownership and an associated escalation in novice drivers. Unfortunately, however, China also experiences a high rate of death and injury from road crashes. Several key pieces of legislation have been introduced in recent decades in China to deal with these changes. While managing the legal aspects of road use is important, social influences on driver behaviour may offer additional avenues for promoting safe driving, particularly in a culture where such factors carry high importance. To date, there is limited research on the role of social influence factors on driver behaviour in China, yet we know that Chinese society is strongly based on social rules, customs, and relationships. There is reason to assume therefore, that road use and driving-related issues may also be strongly influenced by social relationships. One previous study that has investigated such issues highlighted the need to consider culturally-specific issues such as interpersonal networks and social hierarchy when examining driver behaviour in China (Xie & Parker, 2002). Those authors suggested that there are some concepts relating to Chinese driving culture that may not necessarily have been identified from research conducted in western contexts and that research conducted in China must be considered in light of such concepts. The current paper reports qualitative research conducted with Beijing drivers to investigate such social influence factors. Findings indicated that family members, friends, and driving instructors appear influential on driver behaviour and that some novice drivers seek additional assistance after obtaining their licence. The finding relating to the influence of driving instructors was not surprising, given the substantial number of new drivers in China. In Beijing, driving instruction is conducted off-road in purpose-specific driving facilities rather than on the road network. Once licensed, it is common for new drivers to have little or no experience driving in complex traffic situations. This learning situation is unlikely to provide all the skills necessary to successfully negotiate crowded city streets and assess the related risk associated with such driving. Therefore, it was not surprising to find that one reported strategy to assist new drivers was to employ the services of an ‘accompanying driver’ to provide ongoing driving instruction once licensed. In more highly motorised countries supervised practice is part of a graduated licensing system where it is compulsory for new drivers to be supervised by a more experienced driver for a requisite period of time before progressing to solo driving. However, as this system is not in place in China, it appears that some drivers seek out and pay for additional support once they commence on-road driving. Additionally, strategies to avoid detection and penalties for inappropriate road use were discussed, many of which involve the use of a third person. These findings indicate potential barriers to implementing effective traffic enforcement and highlight the importance of understanding culturally-specific social factors relating to driver behaviour.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article presents a novel approach to confidentiality violation detection based on taint marking. Information flows are dynamically tracked between applications and objects of the operating system such as files, processes and sockets. A confidentiality policy is defined by labelling sensitive information and defining which information may leave the local system through network exchanges. Furthermore, per application profiles can be defined to restrict the sets of information each application may access and/or send through the network. In previous works, we focused on the use of mandatory access control mechanisms for information flow tracking. In this current work, we have extended the previous information flow model to track network exchanges, and we are able to define a policy attached to network sockets. We show an example application of this extension in the context of a compromised web browser: our implementation detects a confidentiality violation when the browser attempts to leak private information to a remote host over the network.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Video surveillance systems using Closed Circuit Television (CCTV) cameras, is one of the fastest growing areas in the field of security technologies. However, the existing video surveillance systems are still not at a stage where they can be used for crime prevention. The systems rely heavily on human observers and are therefore limited by factors such as fatigue and monitoring capabilities over long periods of time. This work attempts to address these problems by proposing an automatic suspicious behaviour detection which utilises contextual information. The utilisation of contextual information is done via three main components: a context space model, a data stream clustering algorithm, and an inference algorithm. The utilisation of contextual information is still limited in the domain of suspicious behaviour detection. Furthermore, it is nearly impossible to correctly understand human behaviour without considering the context where it is observed. This work presents experiments using video feeds taken from CAVIAR dataset and a camera mounted on one of the buildings Z-Block) at the Queensland University of Technology, Australia. From these experiments, it is shown that by exploiting contextual information, the proposed system is able to make more accurate detections, especially of those behaviours which are only suspicious in some contexts while being normal in the others. Moreover, this information gives critical feedback to the system designers to refine the system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Automatic species recognition plays an important role in assisting ecologists to monitor the environment. One critical issue in this research area is that software developers need prior knowledge of specific targets people are interested in to build templates for these targets. This paper proposes a novel approach for automatic species recognition based on generic knowledge about acoustic events to detect species. Acoustic component detection is the most critical and fundamental part of this proposed approach. This paper gives clear definitions of acoustic components and presents three clustering algorithms for detecting four acoustic components in sound recordings; whistles, clicks, slurs, and blocks. The experiment result demonstrates that these acoustic component recognisers have achieved high precision and recall rate.