885 resultados para elliptical human detection
Resumo:
Approaches with Vertical Guidance (APV) can provide greater safety and cost savings to general aviation through accurate GPS horizontal and vertical navigation. However, GPS needs augmentation to achieve APV fault detection requirements. Aircraft Based Augmentation Systems (ABAS) fuse GPS with additional sensors at the aircraft. Typical ABAS designs assume high-quality inertial sensors with Kalman filters but these are too expensive for general aviation. Instead of using high-quality (and expensive) sensors, the purpose of this paper is to investigate augmenting GPS with a low-quality MEMS IMU and Aircraft Dynamic Model (ADM). The IMU and ADM are fused together using a multiple model fusion strategy in a bank of Extended Kalman Filters (EKF) with the Normalized Solution Separation (NSS) fault detection scheme. A tightly-coupled configuration with GPS is used and frequent GPS updates are applied to the IMU and ADM to compensate for their errors. Based upon a simulated APV approach, the performance of this architecture in detecting a GPS ramp fault is investigated showing a performance improvement over a GPS-only “snapshot” implementation of the NSS method. The effect of fusing the IMU with the ADM is evaluated by comparing a GPS-IMU-ADM EKF with a GPS-IMU EKF where a small improvement in protection levels is shown.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.
Resumo:
Multipotent mesenchymal stem cells (MSCs), first identified in the bone marrow, have subsequently been found in many other tissues, including fat, cartilage, muscle, and bone. Adipose tissue has been identified as an alternative to bone marrow as a source for the isolation of MSCs, as it is neither limited in volume nor as invasive in the harvesting. This study compares the multipotentiality of bone marrow-derived mesenchymal stem cells (BMSCs) with that of adipose-derived mesenchymal stem cells (AMSCs) from 12 age- and sex-matched donors. Phenotypically, the cells are very similar, with only three surface markers, CD106, CD146, and HLA-ABC, differentially expressed in the BMSCs. Although colony-forming units-fibroblastic numbers in BMSCs were higher than in AMSCs, the expression of multiple stem cell-related genes, like that of fibroblast growth factor 2 (FGF2), the Wnt pathway effectors FRAT1 and frizzled 1, and other self-renewal markers, was greater in AMSCs. Furthermore, AMSCs displayed enhanced osteogenic and adipogenic potential, whereas BMSCs formed chondrocytes more readily than AMSCs. However, by removing the effects of proliferation from the experiment, AMSCs no longer out-performed BMSCs in their ability to undergo osteogenic and adipogenic differentiation. Inhibition of the FGF2/fibroblast growth factor receptor 1 signaling pathway demonstrated that FGF2 is required for the proliferation of both AMSCs and BMSCs, yet blocking FGF2 signaling had no direct effect on osteogenic differentiation. Disclosure of potential conflicts of interest is found at the end of this article.
Resumo:
Gabor representations have been widely used in facial analysis (face recognition, face detection and facial expression detection) due to their biological relevance and computational properties. Two popular Gabor representations used in literature are: 1) Log-Gabor and 2) Gabor energy filters. Even though these representations are somewhat similar, they also have distinct differences as the Log-Gabor filters mimic the simple cells in the visual cortex while the Gabor energy filters emulate the complex cells, which causes subtle differences in the responses. In this paper, we analyze the difference between these two Gabor representations and quantify these differences on the task of facial action unit (AU) detection. In our experiments conducted on the Cohn-Kanade dataset, we report an average area underneath the ROC curve (A`) of 92.60% across 17 AUs for the Gabor energy filters, while the Log-Gabor representation achieved an average A` of 96.11%. This result suggests that small spatial differences that the Log-Gabor filters pick up on are more useful for AU detection than the differences in contours and edges that the Gabor energy filters extract.
Resumo:
The detection of voice activity is a challenging problem, especially when the level of acoustic noise is high. Most current approaches only utilise the audio signal, making them susceptible to acoustic noise. An obvious approach to overcome this is to use the visual modality. The current state-of-the-art visual feature extraction technique is one that uses a cascade of visual features (i.e. 2D-DCT, feature mean normalisation, interstep LDA). In this paper, we investigate the effectiveness of this technique for the task of visual voice activity detection (VAD), and analyse each stage of the cascade and quantify the relative improvement in performance gained by each successive stage. The experiments were conducted on the CUAVE database and our results highlight that the dynamics of the visual modality can be used to good effect to improve visual voice activity detection performance.
Resumo:
High renewal and maintenance of multipotency of human adult stem cells (hSCs), are a prerequisite for experimental analysis as well as for potential clinical usages. The most widely used strategy for hSC culture and proliferation is using serum. However, serum is poorly defined and has a considerable degree of inter-batch variation, which makes it difficult for large-scale mesenchymal stem cells (MSCs) expansion in homogeneous culture conditions. Moreover, it is often observed that cells grown in serum-containing media spontaneously differentiate into unknown and/or undesired phenotypes. Another way of maintaining hSC development is using cytokines and/or tissue-specific growth factors; this is a very expensive approach and can lead to early unwanted differentiation. In order to circumvent these issues, we investigated the role of sphingosine-1-phosphate (S1P), in the growth and multipotency maintenance of human bone marrow and adipose tissue-derived MSCs. We show that S1P induces growth, and in combination with reduced serum, or with the growth factors FGF and platelet-derived growth factor-AB, S1P has an enhancing effect on growth. We also show that the MSCs cultured in S1P-supplemented media are able to maintain their differentiation potential for at least as long as that for cells grown in the usual serum-containing media. This is shown by the ability of cells grown in S1P-containing media to be able to undergo osteogenic as well as adipogenic differentiation. This is of interest, since S1P is a relatively inexpensive natural product, which can be obtained in homogeneous high-purity batches: this will minimize costs and potentially reduce the unwanted side effects observed with serum. Taken together, S1P is able to induce proliferation while maintaining the multipotency of different human stem cells, suggesting a potential for S1P in developing serum-free or serum-reduced defined medium for adult stem cell cultures.
Resumo:
Articular cartilage exhibits limited intrinsic regenerative capacity and focal tissue defects can lead to the development of osteoarthritis (OA), a painful and debilitating loss of cartilage tissue. In Australia, 1.4 million people are affected by OA and its prevalence is increasing in line with current demographics. As treatment options are limited, new therapeutic approaches are being investigated including biological resurfacing of joints with tissue-engineered cartilage. Despite some progress in the field, major challenges remain to be addressed for large scale clinical success. For example, large numbers of chondrogenic cells are required for cartilage formation, but chondrocytes lose their chondrogenic phenotype (dedifferentiate) during in vitro propagation. Additionally, the zonal organization of articular cartilage is critical for normal cartilage function, but development of zonal structure has been largely neglected in cartilage repair strategies. Therefore, we hypothesised that culture conditions for freshly isolated human articular chondrocytes from non-OA and OA sources can be improved by employing microcarrier cultures and a reduced oxygen environment and that oxygen is a critical factor in the maintenance of the zonal chondrocyte phenotype. Microcarriers have successfully been used to cultivate bovine chondrocytes, and offer a potential alternative for clinical expansion of human chondrocytes. We hypothesised that improved yields can be achieved by propagating human chondrocytes on microcarriers. We found that cells on microcarriers acquired a flattened, polygonal morphology and initially proliferated faster than monolayercultivated cells. However, microcarrier cultivation over four weeks did not improve growth rates or the chondrogenic potential of non-OA and OA human articular chondrocytes over conventional monolayer cultivation. Based on these observations, we aimed to optimise culture conditions by modifying oxygen tension, to more closely reflect the in vivo environment. We found that propagation at 5% oxygen tension (moderate hypoxia) did not improve proliferation or redifferentiation capacity of human osteoarthritic chondrocytes. Moderate hypoxia increased the expression of chondrogenic markers during redifferentiation. However, osteoarthritic chondrocytes cultivated on microcarriers exhibited lower expression levels of chondrogenic surface marker proteins and had at best equivalent redifferentiation capacities compared to monolayer-cultured cells. This suggests that monolayer culture with multiple passaging potentially selects for a subpopulation of cells with higher differentiation capacity, which are otherwise rare in osteoarthritic, aged cartilage. However, fibroblastic proteins were found to be highly expressed in all cultures of human osteoarthritic chondrocytes indicating the presence of a high proportion of dedifferentiated, senescent cells with a chondrocytic phenotype that was not rescued by moderate hypoxia. The different zones of cartilage support chondrocyte subpopulations, which exhibit characteristic protein expression and experience varying oxygen tensions. We, therefore, hypothesised that oxygen tension affects the zonal marker expression of human articular chondrocytes isolated from the different cartilage layers. We found that zonal chondrocytes maintained these phenotypic differences during in vitro cultivation. Low oxygen environments favoured the expression of the zonal marker proteoglycan 4 in superficial cells, most likely through the promotion of chondrogenesis. The putative zonal markers clusterin and cartilage intermediate layer protein were found to be expressed by all subpopulations of human osteoarthritic chondrocytes ex vivo and, thus, may not be reliable predictors of in vitro stratification using these clinically relevant cells. The findings in this thesis underline the importance of considering low oxygen conditions and zonal stratification when creating native-like cartilaginous constructs. We have not yet found the right cues to successfully cultivate clinically-relevant human osteoarthritic chondrocytes in vitro. A more thorough understanding of chondrocyte biology and the processes of chondrogenesis are required to ensure the clinical success of cartilage tissue engineering.
Resumo:
The previous investigations have shown that the modal strain energy correlation method, MSEC, could successfully identify the damage of truss bridge structures. However, it has to incorporate the sensitivity matrix to estimate damage and is not reliable in certain damage detection cases. This paper presents an improved MSEC method where the prediction of modal strain energy change vector is differently obtained by running the eigensolutions on-line in optimisation iterations. The particular trail damage treatment group maximising the fitness function close to unity is identified as the detected damage location. This improvement is then compared with the original MSEC method along with other typical correlation-based methods on the finite element model of a simple truss bridge. The contributions to damage detection accuracy of each considered mode is also weighed and discussed. The iterative searching process is operated by using genetic algorithm. The results demonstrate that the improved MSEC method suffices the demand in detecting the damage of truss bridge structures, even when noised measurement is considered.
Resumo:
The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. The clustering protocols can be taken as an additional advantage in these processing constrained networks to collaboratively detect intrusions with less power usage and minimal overhead. Existing clustering protocols are not suitable for intrusion detection purposes, because they are linked with the routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore a trusted monitoring node should be available to detect and respond against intrusions in time. This can be achieved only if the clusters are stable for a long period of time. If the clusters are regularly changed due to routes, the intrusion detection will not prove to be effective. Therefore, a generalized clustering algorithm has been proposed that can run on top of any routing protocol and can monitor the intrusions constantly irrespective of the routes. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network. Clustering is also useful to detect intrusions collaboratively since an individual node can neither detect the malicious node alone nor it can take action against that node on its own.
Resumo:
Mobile ad-hoc networks (MANETs) are temporary wireless networks useful in emergency rescue services, battlefields operations, mobile conferencing and a variety of other useful applications. Due to dynamic nature and lack of centralized monitoring points, these networks are highly vulnerable to attacks. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. We take benefit of the clustering concept in MANETs for the effective communication between nodes, where each cluster involves a number of member nodes and is managed by a cluster-head. It can be taken as an advantage in these battery and memory constrained networks for the purpose of intrusion detection, by separating tasks for the head and member nodes, at the same time providing opportunity for launching collaborative detection approach. The clustering schemes are generally used for the routing purposes to enhance the route efficiency. However, the effect of change of a cluster tends to change the route; thus degrades the performance. This paper presents a low overhead clustering algorithm for the benefit of detecting intrusion rather than efficient routing. It also discusses the intrusion detection techniques with the help of this simplified clustering scheme.
Resumo:
Frontline employees constitute one of the key interfaces that service organisations have with their markets. Many strategies to enhance the ability of these employees to satisfy the needs of customers have been proposed. Amongst these, empowering employees has been suggested to enhance the customer orientation of the firm and consequently its effectiveness in serving the market. However, the impact of empowerment in service organisations remains somewhat contentious. This paper examines the role of empowerments an organisational service strategy and identifies its consequences for role stress, job satisfaction and the willingness of service employees to serve their customers.
Resumo:
Distributed Denial of Services DDoS, attacks has become one of the biggest threats for resources over Internet. Purpose of these attacks is to make servers deny from providing services to legitimate users. These attacks are also used for occupying media bandwidth. Currently intrusion detection systems can just detect the attacks but cannot prevent / track the location of intruders. Some schemes also prevent the attacks by simply discarding attack packets, which saves victim from attack, but still network bandwidth is wasted. In our opinion, DDoS requires a distributed solution to save wastage of resources. The paper, presents a system that helps us not only in detecting such attacks but also helps in tracing and blocking (to save the bandwidth as well) the multiple intruders using Intelligent Software Agents. The system gives dynamic response and can be integrated with the existing network defense systems without disturbing existing Internet model. We have implemented an agent based networking monitoring system in this regard.
Resumo:
Current train of thought in appetite research is favouring an interest in non-homeostatic or hedonic (reward) mechanisms in relation to overconsumption and energy balance. This tendency is supported by advances in neurobiology that precede the emergence of a new conceptual approach to reward where affect and motivation (liking and wanting) can be seen as the major force in guiding human eating behaviour. In this review, current progress in applying processes of liking and wanting to the study of human appetite are examined by discussing the following issues: How can these concepts be operationalised for use in human research to reflect the neural mechanisms by which they may be influenced? Do liking and wanting operate independently to produce functionally significant changes in behaviour? Can liking and wanting be truly experimentally separated or will an expression of one inevitably contain elements of the other? The review contains a re-examination of selected human appetite research before exploring more recent methodological approaches to the study of liking and wanting in appetite control. In addition, some theoretical developments are described in four diverse models that may enhance current understanding of the role of these processes in guiding ingestive behaviour. Finally, the implications of a dual process modulation of food reward for weight gain and obesity are discussed. The review concludes that processes of liking and wanting are likely to have independent roles in characterising susceptibility to weight gain. Further research into the dissociation of liking and wanting through implicit and explicit levels of processing would help to disclose the relative importance of these components of reward for appetite control and weight regulation.
Resumo:
This paper presents the feasibility of using structural modal strain energy as a parameter employed in correlation- based damage detection method for truss bridge structures. It is an extension of the damage detection method adopting multiple damage location assurance criterion. In this paper, the sensitivity of modal strain energy to damage obtained from the analytical model is incorporated into the correlation objective function. Firstly, the sensitivity matrix of modal strain energy to damage is conducted offline, and for an arbitrary damage case, the correlation coefficient (objective function) is calculated by multiplying the sensitivity matrix and damage vector. Then, a genetic algorithm is used to iteratively search the damage vector maximising the correlation between the corresponding modal strain energy change (hypothesised) and its counterpart in measurement. The proposed method is simulated and compared with the conventional methods, e.g. frequency-error method, coordinate modal assurance criterion and multiple damage location assurance criterion using mode shapes on a numerical truss bridge structure. The result demonstrates the modal strain energy correlation method is able to yield acceptable damage detection outcomes with less computing efforts, even in a noise contaminated condition.