893 resultados para behavior-based systems


Relevância:

100.00% 100.00%

Publicador:

Resumo:

M.H.Lee, Q. Meng and H. Holstein, ?Learning and Reuse of Experience in Behavior-Based Service Robots?, Seventh International Conference on Control, Automation, Robotics and Vision (ICARCV2002), pp1019-24, December 2002, Singapore

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Conditional branches frequently exhibit similar behavior (bias, time-varying behavior,...), a property that can be used to improve branch prediction accuracy. Branch clustering constructs groups or clusters of branches with similar behavior and applies different branch prediction techniques to each branch cluster. We revisit the topic of branch clustering with the aim of generalizing branch clustering. We investigate several methods to measure cluster information, with the most effective the storage of information in the branch target buffer. Also, we investigate alternative methods of using the branch cluster identification in the branch predictor. By these improvements we arrive at a branch clustering technique that obtains higher accuracy than previous approaches presented in the literature for the gshare predictor. Furthermore, we evaluate our branch clustering technique in a wide range of predictors to show the general applicability of the method. Branch clustering improves the accuracy of the local history (PAg) predictor, the path-based perceptron and the PPM-like predictor, one of the 2004 CBP finalists.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Topical corticosteroids, e.g., dexamethasone acetate (DMA), are extensively used to treat cutaneous inflammatory disorders even though their use is correlated with potential local and systemic side effects. The objective of this study was to develop and test the topical delivery of DMA-loaded surfactant based systems in vitro; these studies could guarantee a suitable delivery and therapeutic efficacy, as well as minimize DMA's side effects. A phase diagram was constructed using polyoxypropylene (5) polyoxyethylene (20) cetyl alcohol as the surfactant (S), isopropyl myristate as the oil phase (O) and water (W). The systems were characterized using polarization light microscopy (PLM), as well as rheological and small angle X-ray scattering (SAXS) measurements. Depending on the concentration of the constituents, it was possible to obtain microemulsions (MEs) and liquid crystalline mesophases (lamellar and hexagonal). These types of arrangement were verified using PLM measurements. The SAXS results revealed that increasing the W/S ratio led to ME, as well as lamellar (LAM) and hexagonal (HEX) arrangements. The MEs displayed typical Newtonian behavior while the LAM and HEX phases exhibited pseudoplasticity and plasticity, respectively. The MEs displayed excellent drug solubilization that was approximately 10-fold higher than was observed with the individual components. The in vitro cutaneous permeation studies using pig ear skin and analysis of the mechanical parameters (hardness, compressibility, cohesiveness and adhesiveness) were carried out with a HEX phase and O/W emulsion. The HEX phase achieved better drug permeation and retention in the skin while its mechanical properties were suitable for skin administration. PPG-5-CETETH-20-based systems may be a promising platform delivering DMA and other topical corticosteroids through the skin.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The paper suggests a classification of dynamic rule-based systems. For each class of systems, limit behavior is studied. Systems with stabilizing limit states or stabilizing limit trajectories are identified, and such states and trajectories are found. The structure of the set of limit states and trajectories is investigated.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fast spreading unknown viruses have caused major damage on computer systems upon their initial release. Current detection methods have lacked capabilities to detect unknown viruses quickly enough to avoid mass spreading and damage. This dissertation has presented a behavior based approach to detecting known and unknown viruses based on their attempt to replicate. Replication is the qualifying fundamental characteristic of a virus and is consistently present in all viruses making this approach applicable to viruses belonging to many classes and executing under several conditions. A form of replication called self-reference replication, (SR-replication), has been formalized as one main type of replication which specifically replicates by modifying or creating other files on a system to include the virus itself. This replication type was used to detect viruses attempting replication by referencing themselves which is a necessary step to successfully replicate files. The approach does not require a priori knowledge about known viruses. Detection was accomplished at runtime by monitoring currently executing processes attempting to replicate. Two implementation prototypes of the detection approach called SRRAT were created and tested on the Microsoft Windows operating systems focusing on the tracking of user mode Win32 API system calls and Kernel mode system services. The research results showed SR-replication capable of distinguishing between file infecting viruses and benign processes with little or no false positives and false negatives. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fast spreading unknown viruses have caused major damage on computer systems upon their initial release. Current detection methods have lacked capabilities to detect unknown virus quickly enough to avoid mass spreading and damage. This dissertation has presented a behavior based approach to detecting known and unknown viruses based on their attempt to replicate. Replication is the qualifying fundamental characteristic of a virus and is consistently present in all viruses making this approach applicable to viruses belonging to many classes and executing under several conditions. A form of replication called self-reference replication, (SR-replication), has been formalized as one main type of replication which specifically replicates by modifying or creating other files on a system to include the virus itself. This replication type was used to detect viruses attempting replication by referencing themselves which is a necessary step to successfully replicate files. The approach does not require a priori knowledge about known viruses. Detection was accomplished at runtime by monitoring currently executing processes attempting to replicate. Two implementation prototypes of the detection approach called SRRAT were created and tested on the Microsoft Windows operating systems focusing on the tracking of user mode Win32 API system calls and Kernel mode system services. The research results showed SR-replication capable of distinguishing between file infecting viruses and benign processes with little or no false positives and false negatives.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In attempting to build intelligent litigation support tools, we have moved beyond first generation, production rule legal expert systems. Our work supplements rule-based reasoning with case based reasoning and intelligent information retrieval. This research, specifies an approach to the case based retrieval problem which relies heavily on an extended object-oriented / rule-based system architecture that is supplemented with causal background information. Machine learning techniques and a distributed agent architecture are used to help simulate the reasoning process of lawyers. In this paper, we outline our implementation of the hybrid IKBALS II Rule Based Reasoning / Case Based Reasoning system. It makes extensive use of an automated case representation editor and background information.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In attempting to build intelligent litigation support tools, we have moved beyond first generation, production rule legal expert systems. Our work integrates rule based and case based reasoning with intelligent information retrieval. When using the case based reasoning methodology, or in our case the specialisation of case based retrieval, we need to be aware of how to retrieve relevant experience. Our research, in the legal domain, specifies an approach to the retrieval problem which relies heavily on an extended object oriented/rule based system architecture that is supplemented with causal background information. We use a distributed agent architecture to help support the reasoning process of lawyers. Our approach to integrating rule based reasoning, case based reasoning and case based retrieval is contrasted to the CABARET and PROLEXS architectures which rely on a centralised blackboard architecture. We discuss in detail how our various cooperating agents interact, and provide examples of the system at work. The IKBALS system uses a specialised induction algorithm to induce rules from cases. These rules are then used as indices during the case based retrieval process. Because we aim to build legal support tools which can be modified to suit various domains rather than single purpose legal expert systems, we focus on principles behind developing legal knowledge based systems. The original domain chosen was theAccident Compensation Act 1989 (Victoria, Australia), which relates to the provision of benefits for employees injured at work. For various reasons, which are indicated in the paper, we changed our domain to that ofCredit Act 1984 (Victoria, Australia). This Act regulates the provision of loans by financial institutions. The rule based part of our system which provides advice on the Credit Act has been commercially developed in conjunction with a legal firm. We indicate how this work has lead to the development of a methodology for constructing rule based legal knowledge based systems. We explain the process of integrating this existing commercial rule based system with the case base reasoning and retrieval architecture.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Construction is one of the most hazardous industries due to its dynamic, temporary, and decentralized nature. The Hong Kong Commissioner for Labor identifies worker behavior as the root cause of construction accidents. Behavior-based safety (BBS) is one effective approach in managing employee safety issues. However, there is little research on the application of BBS in the construction industry. This research proposes an extension of the BBS approach, proactive behavior-based safety (PBBS), to improve construction safety. PBBS integrates the theory of BBS with the technology of Proactive Construction Management System (PCMS). The innovations of PBBS are: (1) automatically monitoring location-based behaviors; (2)quantitatively measuring safety performance; (3) investigating potential causes of unsafe behaviors; and (4) improving the efficiency of safety management. A pilot study of a Hong Kong construction site practicing PBBS was conducted. The experiment results showed that PBBS performed well on construction accident prevention and the Safety Index (SI) of the two project teams, with increased improvements by 36.07% and 44.70% respectively. It is concluded that PBBS is effective and adaptable to construction industry.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The emergence of strains of Plasmodium falciparum resistant to the commonly used antimalarials warrants the development of new antimalarial agents. The discovery of type II fatty acid synthase (FAS) in Plasmodium distinct from the FAS in its human host (type I FAS) opened up new avenues for the development of novel antimalarials. The process of fatty acid synthesis takes place by iterative elongation of butyryl-acyl carrier protein (butyryl-ACP) by two carbon units, with the successive action of four enzymes constituting the elongation module of FAS until the desired acyl length is obtained. The study of the fatty acid synthesis machinery of the parasite inside the red blood cell culture has always been a challenging task. Here, we report the in vitro reconstitution of the elongation module of the FAS of malaria parasite involving all four enzymes, FabB/F (β-ketoacyl-ACP synthase), FabG (β-ketoacyl-ACP reductase), FabZ (β-ketoacyl-ACP dehydratase), and FabI (enoyl-ACP reductase), and its analysis by matrix-assisted laser desorption-time of flight mass spectrometry (MALDI-TOF MS). That this in vitro systems approach completely mimics the in vivo machinery is confirmed by the distribution of acyl products. Using known inhibitors of the enzymes of the elongation module, cerulenin, triclosan, NAS-21/91, and (–)-catechin gallate, we demonstrate that accumulation of intermediates resulting from the inhibition of any of the enzymes can be unambiguously followed by MALDI-TOF MS. Thus, this work not only offers a powerful tool for easier and faster throughput screening of inhibitors but also allows for the study of the biochemical properties of the FAS pathway of the malaria parasite.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The emergence of strains of Plasmodium falciparum resistant to the commonly used antimalarials warrants the development of new antimalarial agents. The discovery of type II fatty acid synthase (FAS) in Plasmodium distinct from the FAS in its human host (type I FAS) opened up new avenues for the development of novel antimalarials. The process of fatty acid synthesis takes place by iterative elongation of butyryl-acyl carrier protein (butyryl-ACP) by two carbon units, with the successive action of four enzymes constituting the elongation module of FAS until the desired acyl length is obtained. The study of the fatty acid synthesis machinery of the parasite inside the red blood cell culture has always been a challenging task. Here, we report the in vitro reconstitution of the elongation module of the FAS of malaria parasite involving all four enzymes, FabB/F (β-ketoacyl-ACP synthase), FabG (β-ketoacyl-ACP reductase), FabZ (β-ketoacyl-ACP dehydratase), and FabI (enoyl-ACP reductase), and its analysis by matrix-assisted laser desorption-time of flight mass spectrometry (MALDI-TOF MS). That this in vitro systems approach completely mimics the in vivo machinery is confirmed by the distribution of acyl products. Using known inhibitors of the enzymes of the elongation module, cerulenin, triclosan, NAS-21/91, and (–)-catechin gallate, we demonstrate that accumulation of intermediates resulting from the inhibition of any of the enzymes can be unambiguously followed by MALDI-TOF MS. Thus, this work not only offers a powerful tool for easier and faster throughput screening of inhibitors but also allows for the study of the biochemical properties of the FAS pathway of the malaria parasite.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Liposomes composed of cationic lipids have become very popular gene delivery vehicles. A great deal of research is being pursued to make efficient vectors by varying their molecular architecture. Cholesterol being ubiquitous component in most of the animal cell membranes is increasingly being used as a hydrophobic segment of synthetic cationic lipids. In this review we describe various cholesterol based cationic lipids and focus on the effect of modifying various structural segments like linker and the head group of the cationic lipids on gene transfection efficiency with a special emphasis on the importance of ether linkage between cholesteryl backbone and the polar head group. Interaction of cationic cholesteryl lipids with dipalmitylphosphatidycholine membranes is also discussed here. Apart from cholesterol being an attractive scaffold in the drug/gene delivery vehicles, certain cholesteryl derivatives have also been shown to be attractive room temperature liquid-crystalline materials.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many knowledge based systems (KBS) transform a situation information into an appropriate decision using an in built knowledge base. As the knowledge in real world situation is often uncertain, the degree of truth of a proposition provides a measure of uncertainty in the underlying knowledge. This uncertainty can be evaluated by collecting `evidence' about the truth or falsehood of the proposition from multiple sources. In this paper we propose a simple framework for representing uncertainty in using the notion of an evidence space.