921 resultados para Biologically inspired
Resumo:
This paper shows initial results in deploying the biologically inspired Simultaneous Localisation and Mapping system, RatSLAM, in an outdoor environment. RatSLAM has been widely tested in indoor environments on the task of producing topologically coherent maps based on a fusion of odometric and visual information. This paper details the changes required to deploy RatSLAM on a small tractor equipped with odometry and an omnidirectional camera. The principal changes relate to the vision system, with others required for RatSLAM to use omnidirectional visual data. The initial results from mapping around a 500 m loop are promising, with many improvements still to be made.
Resumo:
The estimation of pavement layer moduli through the use of an artificial neural network is a new concept which provides a less strenuous strategy for backcalculation procedures. Artificial Neural Networks are biologically inspired models of the human nervous system. They are specifically designed to carry out a mapping characteristic. This study demonstrates how an artificial neural network uses non-destructive pavement test data in determining flexible pavement layer moduli. The input parameters include plate loadings, corresponding sensor deflections, temperature of pavement surface, pavement layer thicknesses and independently deduced pavement layer moduli.
Resumo:
This paper outlines the development of a crosscorrelation algorithm and a spiking neural network (SNN) for sound localisation based on real sound recorded in a noisy and dynamic environment by a mobile robot. The SNN architecture aims to simulate the sound localisation ability of the mammalian auditory pathways by exploiting the binaural cue of interaural time difference (ITD). The medial superior olive was the inspiration for the SNN architecture which required the integration of an encoding layer which produced biologically realistic spike trains, a model of the bushy cells found in the cochlear nucleus and a supervised learning algorithm. The experimental results demonstrate that biologically inspired sound localisation achieved using a SNN can compare favourably to the more classical technique of cross-correlation.
Resumo:
A fundamental problem in biology is understanding how and why things group together. Collective behavior is observed on all organismic levels - from cells and slime molds, to swarms of insects, flocks of birds, and schooling fish, and in mammals, including humans. The long-term goal of this research is to understand the functions and mechanisms underlying collective behavior in groups. This dissertation focuses on shoaling (aggregating) fish. Shoaling behaviors in fish confer foraging and anti-predator benefits through social cues from other individuals in the group. However, it is not fully understood what information individuals receive from one another or how this information is propagated throughout a group. It is also not fully understood how the environmental conditions and perturbations affect group behaviors. The specific research objective of this dissertation is to gain a better understanding of how certain social and environmental factors affect group behaviors in fish. I focus on two ecologically relevant decision-making behaviors: (i) rheotaxis, or orientation with respect to a flow, and (ii) startle response, a rapid response to a perceived threat. By integrating behavioral and engineering paradigms, I detail specifics of behavior in giant danio Devario aequipinnatus (McClelland 1893), and numerically analyze mathematical models that may be extended to group behavior for fish in general, and potentially other groups of animals as well. These models that predict behavior data, as well as generate additional, testable hypotheses. One of the primary goals of neuroethology is to study an organism's behavior in the context of evolution and ecology. Here, I focus on studying ecologically relevant behaviors in giant danio in order to better understand collective behavior in fish. The experiments in this dissertation provide contributions to fish ecology, collective behavior, and biologically-inspired robotics.
Resumo:
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we collate the algorithms used, the development of the systems and the outcome of their implementation. It provides an introduction and review of the key developments within this field, in addition to making suggestions for future research.
Resumo:
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we review the algorithms used, the development of the systems and the outcome of their implementation. We provide an introduction and analysis of the key developments within this field, in addition to making suggestions for future research.
Resumo:
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we collate the algorithms used, the development of the systems and the outcome of their implementation. It provides an introduction and review of the key developments within this field, in addition to making suggestions for future research.
Resumo:
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we review the algorithms used, the development of the systems and the outcome of their implementation. We provide an introduction and analysis of the key developments within this field, in addition to making suggestions for future research.
Resumo:
Ensuring the security of computers is a non-trivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to perform complex distributed attacks such as denial of service and to obtain sensitive data such as password information. These zombie machines are said to be infected with a dasiahotpsila - a malicious piece of software which is installed on a host machine and is controlled by a remote attacker, termed the dasiabotmaster of a botnetpsila. In this work, we use the biologically inspired dendritic cell algorithm (DCA) to detect the existence of a single hot on a compromised host machine. The DCA is an immune-inspired algorithm based on an abstract model of the behaviour of the dendritic cells of the human body. The basis of anomaly detection performed by the DCA is facilitated using the correlation of behavioural attributes such as keylogging and packet flooding behaviour. The results of the application of the DCA to the detection of a single hot show that the algorithm is a successful technique for the detection of such malicious software without responding to normally running programs.
Resumo:
Biologically-inspired methods such as evolutionary algorithms and neural networks are proving useful in the field of information fusion. Artificial immune systems (AISs) are a biologically-inspired approach which take inspiration from the biological immune system. Interestingly, recent research has shown how AISs which use multi-level information sources as input data can be used to build effective algorithms for realtime computer intrusion detection. This research is based on biological information fusion mechanisms used by the human immune system and as such might be of interest to the information fusion community. The aim of this paper is to present a summary of some of the biological information fusion mechanisms seen in the human immune system, and of how these mechanisms have been implemented as AISs.
Resumo:
The classical computer vision methods can only weakly emulate some of the multi-level parallelisms in signal processing and information sharing that takes place in different parts of the primates’ visual system thus enabling it to accomplish many diverse functions of visual perception. One of the main functions of the primates’ vision is to detect and recognise objects in natural scenes despite all the linear and non-linear variations of the objects and their environment. The superior performance of the primates’ visual system compared to what machine vision systems have been able to achieve to date, motivates scientists and researchers to further explore this area in pursuit of more efficient vision systems inspired by natural models. In this paper building blocks for a hierarchical efficient object recognition model are proposed. Incorporating the attention-based processing would lead to a system that will process the visual data in a non-linear way focusing only on the regions of interest and hence reducing the time to achieve real-time performance. Further, it is suggested to modify the visual cortex model for recognizing objects by adding non-linearities in the ventral path consistent with earlier discoveries as reported by researchers in the neuro-physiology of vision.
Resumo:
In the past years, genome biology had disclosed an ever-growing kind of biological targets that emerged as ideal points for therapeutic intervention. Nevertheless, the number of new chemical entities (NCEs) translated into effective therapies employed in the clinic, still not observed. Innovative strategies in drug discovery combined with different approaches to drug design should be searched for bridge this gap. In this context organic synthetic chemistry had to provide for effective strategies to achieve biologically active small molecules to consider not only as potentially drug candidates, but also as chemical tools to dissect biological systems. In this scenario, during my PhD, inspired by the Biology-oriented Synthesis approach, a small library of hybrid molecules endowed with privileged scaffolds, able to block cell cycle and to induce apoptosis and cell differentiation, merged with natural-like cores were synthesized. A synthetic platform which joined a Domino Knoevenagel-Diels Alder reaction with a Suzuki coupling was performed in order to reach the hybrid compounds. These molecules can represent either antitumor lead candidates, or valuable chemical tools to study molecular pathways in cancer cells. The biological profile expressed by some of these derivatives showed a well defined antiproliferative activity on leukemia Bcr-Abl expressing K562 cell lines. A parallel project regarded the rational design and synthesis of minimally structurally hERG blockers with the purpose of enhancing the SAR studies of a previously synthesized collection. A Target-Oriented Synthesis approach was applied. Combining conventional and microwave heating, the desired final compounds were achieved in good yields and reaction rates. The preliminary biological results of the compounds, showed a potent blocking activity. The obtained small set of hERG blockers, was able to gain more insight the minimal structural requirements for hERG liability, which is mandatory to investigate in order to reduce the risk of potential side effects of new drug candidates.
Resumo:
In this thesis is described the design and synthesis of potential agents for the treatment of the multifactorial Alzheimer’s disease (AD). Our multi-target approach was to consider cannabinoid system involved in AD, together with classic targets. In the first project, designed modifications were performed on lead molecule in order to increase potency and obtain balanced activities on fatty acid amide hydrolase and cholinesterases. A small library of compounds was synthesized and biological results showed increased inhibitory activity (nanomolar range) related to selected target. The second project was focused on the benzofuran framework, a privileged structure being a common moiety found in many biologically active natural products and therapeutics. Hybrid molecules were designed and synthesized, focusing on the inhibition of cholinesterases, Aβ aggregation, FAAH and on the interaction with CB receptors. Preliminary results showed that several compounds are potent CB ligands, in particular the high affinity for CB2 receptors, could open new opportunities to modulate neuroinflammation. The third and the fourth project were carried out at the IMS, Aberdeen, under the supervision of Prof. Matteo Zanda. The role of the cannabinoid system in the brain is still largely unexplored and the relationship between the CB1 receptors functional modification, density and distribution and the onset of a pathological state is not well understood. For this reasons, Rimonabant analogues suitable as radioligands were synthesized. The latter, through PET, could provide reliable measurements of density and distribution of CB1 receptors in the brain. In the fifth project, in collaboration with CHyM of York, the goal was to develop arginine analogues that are target specific due to their exclusively location into NOS enzymes and could work as MRI contrasting agents. Synthesized analogues could be suitable substrate for the transfer of polarization by p-H2 molecules through SABRE technique transforming MRI a more sensitive and faster technique.
Resumo:
Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the most predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.