WorldWideScience

Sample records for robust personal identification

  1. Set-Membership Identification for Robust Control Design

    Science.gov (United States)

    1993-04-28

    Clauifica lion) ( U) Set-Memnbership Identification for Robust Control Design ___________________ 1. PERSONAL A UTHOR(SI Dr. Robert L. Kosul. Final Report...Shalom, E.Tse "Caution, probing, and the value of information in the control of un- certain systems", Annals of Economic and Social Measurement, 5/3, pp...knowing a bound on I the impulse response is quantitative. A similar clasoitication can be made regarding signal charateristics . Knowing that a signal is

  2. Robust structural identification via polyhedral template matching

    DEFF Research Database (Denmark)

    Larsen, Peter Mahler; Schmidt, Søren; Schiøtz, Jakob

    2016-01-01

    Successful scientific applications of large-scale molecular dynamics often rely on automated methods for identifying the local crystalline structure of condensed phases. Many existing methods for structural identification, such as common neighbour analysis, rely on interatomic distances (or thres...... is made available under a Free and Open Source Software license....

  3. Identification and robust control of an experimental servo motor.

    Science.gov (United States)

    Adam, E J; Guestrin, E D

    2002-04-01

    In this work, the design of a robust controller for an experimental laboratory-scale position control system based on a dc motor drive as well as the corresponding identification and robust stability analysis are presented. In order to carry out the robust design procedure, first, a classic closed-loop identification technique is applied and then, the parametrization by internal model control is used. The model uncertainty is evaluated under both parametric and global representation. For the latter case, an interesting discussion about the conservativeness of this description is presented by means of a comparison between the uncertainty disk and the critical perturbation radius approaches. Finally, conclusions about the performance of the experimental system with the robust controller are discussed using comparative graphics of the controlled variable and the Nyquist stability margin as a robustness measurement.

  4. A robust firearm identification algorithm of forensic ballistics specimens

    Science.gov (United States)

    Chuan, Z. L.; Jemain, A. A.; Liong, C.-Y.; Ghani, N. A. M.; Tan, L. K.

    2017-09-01

    There are several inherent difficulties in the existing firearm identification algorithms, include requiring the physical interpretation and time consuming. Therefore, the aim of this study is to propose a robust algorithm for a firearm identification based on extracting a set of informative features from the segmented region of interest (ROI) using the simulated noisy center-firing pin impression images. The proposed algorithm comprises Laplacian sharpening filter, clustering-based threshold selection, unweighted least square estimator, and segment a square ROI from the noisy images. A total of 250 simulated noisy images collected from five different pistols of the same make, model and caliber are used to evaluate the robustness of the proposed algorithm. This study found that the proposed algorithm is able to perform the identical task on the noisy images with noise levels as high as 70%, while maintaining a firearm identification accuracy rate of over 90%.

  5. New methodology for a person identification system

    Indian Academy of Sciences (India)

    Abstract. Reliable person identification is a key factor for any safety measure. Unlike other biometrics such as the palm, retina, gait, face and fingerprints, the characteristic of the iris is stable in a person's lifetime. Iris patterns are chaotically distributed and well suited for recognizing persons throughout their lifetime with.

  6. A robust star identification algorithm with star shortlisting

    Science.gov (United States)

    Mehta, Deval Samirbhai; Chen, Shoushun; Low, Kay Soon

    2018-05-01

    A star tracker provides the most accurate attitude solution in terms of arc seconds compared to the other existing attitude sensors. When no prior attitude information is available, it operates in "Lost-In-Space (LIS)" mode. Star pattern recognition, also known as star identification algorithm, forms the most crucial part of a star tracker in the LIS mode. Recognition reliability and speed are the two most important parameters of a star pattern recognition technique. In this paper, a novel star identification algorithm with star ID shortlisting is proposed. Firstly, the star IDs are shortlisted based on worst-case patch mismatch, and later stars are identified in the image by an initial match confirmed with a running sequential angular match technique. The proposed idea is tested on 16,200 simulated star images having magnitude uncertainty, noise stars, positional deviation, and varying size of the field of view. The proposed idea is also benchmarked with the state-of-the-art star pattern recognition techniques. Finally, the real-time performance of the proposed technique is tested on the 3104 real star images captured by a star tracker SST-20S currently mounted on a satellite. The proposed technique can achieve an identification accuracy of 98% and takes only 8.2 ms for identification on real images. Simulation and real-time results depict that the proposed technique is highly robust and achieves a high speed of identification suitable for actual space applications.

  7. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  8. Personal identification and sex determination using cheiloscopy

    Directory of Open Access Journals (Sweden)

    Ravindra Naik Gugulothu

    2015-01-01

    Full Text Available Introduction: Identification of an individual is a prerequisite for certification of death and for personal, social, and legal reasons. The study of lip prints (cheiloscopy was thought of as a method of identification of a person. It is safe to assume that cheiloscopy, in its present stage of development, has become a means of criminal identification dealing with lip prints. Aims and Objectives: To evaluate the lip prints of different individuals in various parts of the lip, to find out the incidence of any particular pattern in relation to specific gender, to ascertain the authenticity of lip prints as a tool for identification of an individual and establish its evidentiary value. Materials and Methods: The study was conducted on 500 subjects, which included 250 males (4 twins and 250 females, in the age group of 18-30 years. After application of lipstick evenly, the lip print of each subject was obtained on a simple bond paper. The lip prints of each individual were scanned using an image scanner set at a resolution of 600 dpi for better interpretation. Results: We had correctly matched the gender of 487 individuals out of 500 samples taken. We also found that no lip prints were similar among the 500 subjects and even in twins. Interpretation and Conclusion: Along with other traditional methods, cheiloscopy can also serve as a very important tool in the identification of a person based on the characteristic arrangement of lines and grooves appearing on the red portion of the lips. It can be used for sex determination and personal identification for forensic purposes.

  9. [Personal identification with biometric and genetic methods].

    Science.gov (United States)

    Cabanis, Emmanuel-Alain; Le Gall, Jean-Yves; Ardaillou, Raymond

    2007-11-01

    The need for personal identification is growing in many avenues of society. To "identify" a person is to establish a link between his or her observed characteristics and those previously stored in a database. To "authenticate" is to decide whether or not someone is the person he or she claims to be. These two objectives can now be achieved by analysing biometric data and genetic prints. All biometric techniques proceed in several stages: acquisition of an image or physical parameters, encoding them with a mathematical model, comparing the results of this model with those contained in the database, and calculating the error risk. These techniques must be usable worldwide and must examine specific and permanent personal data. The most widely used are facial recognition, digital prints (flexion folds and dermatoglyphs, that offer the advantage of leaving marks), and the surface and texture of the iris. Other biometric techniques analyse behaviours such as walking, signing, typing, or speaking. Implanted radio-transmitters are another means of identification. All these systems are evaluated on the basis of the same parameters, namely the false rejection rate, the false acceptance rate, and the failure-to-enrol rate. The uses of biometrics are increasing and diversifying, and now include national and international identification systems, control of access to protected sites, criminal and victim identification, and transaction security. Genetic methods can identify individuals almost infallibly, based on short tandem repeats of 2-5 nucleotides, or microsatellites. The most recent kits analyze 11-16 independent autosomal markers. Mitochondrial DNA and Y chromosome DNA can also be analyzed. These genetic tests are currently used to identify suspected criminals or their victims from biological samples, and to establish paternity. Personal identification raises many ethical questions, however, such as when to create and how to use a database while preserving personal freedom

  10. The cognitive neuroscience of person identification.

    Science.gov (United States)

    Biederman, Irving; Shilowich, Bryan E; Herald, Sarah B; Margalit, Eshed; Maarek, Rafael; Meschke, Emily X; Hacker, Catrina M

    2018-02-14

    We compare and contrast five differences between person identification by voice and face. 1. There is little or no cost when a familiar face is to be recognized from an unrestricted set of possible faces, even at Rapid Serial Visual Presentation (RSVP) rates, but the accuracy of familiar voice recognition declines precipitously when the set of possible speakers is increased from one to a mere handful. 2. Whereas deficits in face recognition are typically perceptual in origin, those with normal perception of voices can manifest severe deficits in their identification. 3. Congenital prosopagnosics (CPros) and congenital phonagnosics (CPhon) are generally unable to imagine familiar faces and voices, respectively. Only in CPros, however, is this deficit a manifestation of a general inability to form visual images of any kind. CPhons report no deficit in imaging non-voice sounds. 4. The prevalence of CPhons of 3.2% is somewhat higher than the reported prevalence of approximately 2.0% for CPros in the population. There is evidence that CPhon represents a distinct condition statistically and not just normal variation. 5. Face and voice recognition proficiency are uncorrelated rather than reflecting limitations of a general capacity for person individuation. Copyright © 2018 Elsevier Ltd. All rights reserved.

  11. Enhancing Person Re-identification by Late Fusion of Low-, Mid-, and High-Level Features

    DEFF Research Database (Denmark)

    Lejbølle, Aske Rasch; Nasrollahi, Kamal; Moeslund, Thomas B.

    2018-01-01

    Person re-identification is the process of finding people across different cameras. In this process, focus often lies in developing strong feature descriptors or a robust metric learning algorithm. While the two aspects are the most important steps in order to secure a high performance, a less...

  12. Robust model identification applied to type 1diabetes

    DEFF Research Database (Denmark)

    Finan, Daniel Aaron; Jørgensen, John Bagterp; Poulsen, Niels Kjølstad

    2010-01-01

    In many realistic applications, process noise is known to be neither white nor normally distributed. When identifying models in these cases, it may be more effective to minimize a different penalty function than the standard sum of squared errors (as in a least-squares identification method). Thi...

  13. Robust uncertainty evaluation for system identification on distributed wireless platforms

    Science.gov (United States)

    Crinière, Antoine; Döhler, Michael; Le Cam, Vincent; Mevel, Laurent

    2016-04-01

    Health monitoring of civil structures by system identification procedures from automatic control is now accepted as a valid approach. These methods provide frequencies and modeshapes from the structure over time. For a continuous monitoring the excitation of a structure is usually ambient, thus unknown and assumed to be noise. Hence, all estimates from the vibration measurements are realizations of random variables with inherent uncertainty due to (unknown) process and measurement noise and finite data length. The underlying algorithms are usually running under Matlab under the assumption of large memory pool and considerable computational power. Even under these premises, computational and memory usage are heavy and not realistic for being embedded in on-site sensor platforms such as the PEGASE platform. Moreover, the current push for distributed wireless systems calls for algorithmic adaptation for lowering data exchanges and maximizing local processing. Finally, the recent breakthrough in system identification allows us to process both frequency information and its related uncertainty together from one and only one data sequence, at the expense of computational and memory explosion that require even more careful attention than before. The current approach will focus on presenting a system identification procedure called multi-setup subspace identification that allows to process both frequencies and their related variances from a set of interconnected wireless systems with all computation running locally within the limited memory pool of each system before being merged on a host supervisor. Careful attention will be given to data exchanges and I/O satisfying OGC standards, as well as minimizing memory footprints and maximizing computational efficiency. Those systems are built in a way of autonomous operations on field and could be later included in a wide distributed architecture such as the Cloud2SM project. The usefulness of these strategies is illustrated on

  14. Influence of binary mask estimation errors on robust speaker identification

    DEFF Research Database (Denmark)

    May, Tobias

    2017-01-01

    Missing-data strategies have been developed to improve the noise-robustness of automatic speech recognition systems in adverse acoustic conditions. This is achieved by classifying time-frequency (T-F) units into reliable and unreliable components, as indicated by a so-called binary mask. Different...... approaches have been proposed to handle unreliable feature components, each with distinct advantages. The direct masking (DM) approach attenuates unreliable T-F units in the spectral domain, which allows the extraction of conventionally used mel-frequency cepstral coefficients (MFCCs). Instead of attenuating....... Since each of these approaches utilizes the knowledge about reliable and unreliable feature components in a different way, they will respond differently to estimation errors in the binary mask. The goal of this study was to identify the most effective strategy to exploit knowledge about reliable...

  15. Robust

    DEFF Research Database (Denmark)

    2017-01-01

    Robust – Reflections on Resilient Architecture’, is a scientific publication following the conference of the same name in November of 2017. Researches and PhD-Fellows, associated with the Masters programme: Cultural Heritage, Transformation and Restoration (Transformation), at The Royal Danish...

  16. Robust sleep quality quantification method for a personal handheld device.

    Science.gov (United States)

    Shin, Hangsik; Choi, Byunghun; Kim, Doyoon; Cho, Jaegeol

    2014-06-01

    The purpose of this study was to develop and validate a novel method for sleep quality quantification using personal handheld devices. The proposed method used 3- or 6-axes signals, including acceleration and angular velocity, obtained from built-in sensors in a smartphone and applied a real-time wavelet denoising technique to minimize the nonstationary noise. Sleep or wake status was decided on each axis, and the totals were finally summed to calculate sleep efficiency (SE), regarded as sleep quality in general. The sleep experiment was carried out for performance evaluation of the proposed method, and 14 subjects participated. An experimental protocol was designed for comparative analysis. The activity during sleep was recorded not only by the proposed method but also by well-known commercial applications simultaneously; moreover, activity was recorded on different mattresses and locations to verify the reliability in practical use. Every calculated SE was compared with the SE of a clinically certified medical device, the Philips (Amsterdam, The Netherlands) Actiwatch. In these experiments, the proposed method proved its reliability in quantifying sleep quality. Compared with the Actiwatch, accuracy and average bias error of SE calculated by the proposed method were 96.50% and -1.91%, respectively. The proposed method was vastly superior to other comparative applications with at least 11.41% in average accuracy and at least 6.10% in average bias; average accuracy and average absolute bias error of comparative applications were 76.33% and 17.52%, respectively.

  17. Constraint Patch Matching for Faster Person Re-identification

    DEFF Research Database (Denmark)

    Lejbølle, Aske Rasch; Nasrollahi, Kamal; Moeslund, Thomas B.

    2017-01-01

    In person re-identification, it is of great importance toextract very discriminative features in order to distinguishbetween images of different persons captured in differentcamera views. Features can be extracted globally from theentire or parts of the image, or locally from patches. Inaddition......36ms to compute per person....

  18. Adding Personality to Gifted Identification: Relationships among Traditional and Personality-Based Constructs

    Science.gov (United States)

    Carman, Carol A.

    2011-01-01

    One of the underutilized tools in gifted identification is personality-based measures. A multiple confirmatory factor analysis was utilized to examine the relationships between traditional identification methods and personality-based measures. The pattern of correlations indicated this model could be measuring two constructs, one related to…

  19. BIFOCAL STEREO FOR MULTIPATH PERSON RE-IDENTIFICATION

    Directory of Open Access Journals (Sweden)

    G. Blott

    2017-11-01

    Full Text Available This work presents an approach for the task of person re-identification by exploiting bifocal stereo cameras. Present monocular person re-identification approaches show a decreasing working distance, when increasing the image resolution to obtain a higher reidentification performance. We propose a novel 3D multipath bifocal approach, containing a rectilinear lens with larger focal length for long range distances and a fish eye lens of a smaller focal length for the near range. The person re-identification performance is at least on par with 2D re-identification approaches but the working distance of the approach is increased and on average 10% more re-identification performance can be achieved in the overlapping field of view compared to a single camera. In addition, the 3D information is exploited from the overlapping field of view to solve potential 2D ambiguities.

  20. A constrained robust least squares approach for contaminant release history identification

    Science.gov (United States)

    Sun, Alexander Y.; Painter, Scott L.; Wittmeyer, Gordon W.

    2006-04-01

    Contaminant source identification is an important type of inverse problem in groundwater modeling and is subject to both data and model uncertainty. Model uncertainty was rarely considered in the previous studies. In this work, a robust framework for solving contaminant source recovery problems is introduced. The contaminant source identification problem is first cast into one of solving uncertain linear equations, where the response matrix is constructed using a superposition technique. The formulation presented here is general and is applicable to any porous media flow and transport solvers. The robust least squares (RLS) estimator, which originated in the field of robust identification, directly accounts for errors arising from model uncertainty and has been shown to significantly reduce the sensitivity of the optimal solution to perturbations in model and data. In this work, a new variant of RLS, the constrained robust least squares (CRLS), is formulated for solving uncertain linear equations. CRLS allows for additional constraints, such as nonnegativity, to be imposed. The performance of CRLS is demonstrated through one- and two-dimensional test problems. When the system is ill-conditioned and uncertain, it is found that CRLS gave much better performance than its classical counterpart, the nonnegative least squares. The source identification framework developed in this work thus constitutes a reliable tool for recovering source release histories in real applications.

  1. System Identification and Resonant Control of Thermoacoustic Engines for Robust Solar Power

    Directory of Open Access Journals (Sweden)

    Boe-Shong Hong

    2015-05-01

    Full Text Available It was found that thermoacoustic solar-power generators with resonant control are more powerful than passive ones. To continue the work, this paper focuses on the synthesis of robustly resonant controllers that guarantee single-mode resonance not only in steady states, but also in transient states when modelling uncertainties happen and working temperature temporally varies. Here the control synthesis is based on the loop shifting and the frequency-domain identification in advance thereof. Frequency-domain identification is performed to modify the mathematical modelling and to identify the most powerful mode, so that the DSP-based feedback controller can online pitch the engine to the most powerful resonant-frequency robustly and accurately. Moreover, this paper develops two control tools, the higher-order van-der-Pol oscillator and the principle of Dynamical Equilibrium, to assist in system identification and feedback synthesis, respectively.

  2. Robust Query Processing for Personalized Information Access on the Semantic Web

    DEFF Research Database (Denmark)

    Dolog, Peter; Stuckenschmidt, Heiner; Wache, Holger

    and user preferences. We describe a framework for information access that combines query refinement and relaxation in order to provide robust, personalized access to heterogeneous RDF data as well as an implementation in terms of rewriting rules and explain its application in the context of e-learning...

  3. Multimodal Neural Network for Overhead Person Re-identification

    DEFF Research Database (Denmark)

    Lejbølle, Aske Rasch; Nasrollahi, Kamal; Krogh, Benjamin

    2017-01-01

    Person re-identification is a topic which has potential to be used for applications within forensics, flow analysis and queue monitoring. It is the process of matching persons across two or more camera views, most often by extracting colour and texture based hand-crafted features, to identify...

  4. Late Fusion in Part-based Person Re-identification

    DEFF Research Database (Denmark)

    Lejbølle, Aske Rasch; Nasrollahi, Kamal; Moeslund, Thomas B.

    2017-01-01

    In person re-identification, the purpose is to match persons across, typically, non-overlapping cameras. This introduces challenges such as occlusion and changes in view and light- ing. In order to overcome these challenges, discriminative features are extracted and used in combination with a su...

  5. Role of forensic odontologist in post mortem person identification

    Directory of Open Access Journals (Sweden)

    Jahagirdar B Pramod

    2012-01-01

    Full Text Available The natural teeth are the most durable organs in the bodies of vertebrates, and humankind′s understanding of their own past and evolution relies heavily upon remnant dental evidence found as fossils. The use of features unique to the human dentition as an aid to personal identification is widely accepted within the forensic field. Comparative dental identifications play a major role in identifying the victims of violence, disaster or other mass tragedies. The comparison of ante-mortem and postmortem dental records to determine human identity has long been established. Indeed, it is still a major identification method in criminal investigations, mass disasters, grossly decomposed or traumatized bodies, and in other situations where visual identification is neither possible nor desirable. This article has comprehensively described some of the methods, and additional factors aiding in postmortem person identification.

  6. A Parametric Learning and Identification Based Robust Iterative Learning Control for Time Varying Delay Systems

    Directory of Open Access Journals (Sweden)

    Lun Zhai

    2014-01-01

    Full Text Available A parametric learning based robust iterative learning control (ILC scheme is applied to the time varying delay multiple-input and multiple-output (MIMO linear systems. The convergence conditions are derived by using the H∞ and linear matrix inequality (LMI approaches, and the convergence speed is analyzed as well. A practical identification strategy is applied to optimize the learning laws and to improve the robustness and performance of the control system. Numerical simulations are illustrated to validate the above concepts.

  7. New methodology for a person identification system

    Indian Academy of Sciences (India)

    Home; Journals; Sadhana; Volume 31; Issue 3. New methodology for a person identification system. R Bremananth A Chitra. Volume 31 Issue 3 June 2006 pp 259-276 ... Experimental results illustrate that the proposed method has been easily espoused in elections, bank transactions and other security applications.

  8. Re-identification of persons in multi-camera surveillance under varying viewpoints and illumination

    Science.gov (United States)

    Bouma, Henri; Borsboom, Sander; den Hollander, Richard J. M.; Landsmeer, Sander H.; Worring, Marcel

    2012-06-01

    The capability to track individuals in CCTV cameras is important for surveillance and forensics alike. However, it is laborious to do over multiple cameras. Therefore, an automated system is desirable. In literature several methods have been proposed, but their robustness against varying viewpoints and illumination is limited. Hence performance in realistic settings is also limited. In this paper, we present a novel method for the automatic re-identification of persons in video from surveillance cameras in a realistic setting. The method is computationally efficient, robust to a wide variety of viewpoints and illumination, simple to implement and it requires no training. We compare the performance of our method to several state-of-the-art methods on a publically available dataset that contains the variety of viewpoints and illumination to allow benchmarking. The results indicate that our method shows good performance and enables a human operator to track persons five times faster.

  9. Robust stator resistance identification of an IM drive using model reference adaptive system

    International Nuclear Information System (INIS)

    Madadi Kojabadi, Hossein; Abarzadeh, Mostafa; Aghaei Farouji, Said

    2013-01-01

    Highlights: ► We estimate the stator resistance and rotor speed of the IM. ► We proposed a new quantity to estimate the speed and stator resistance of IM. ► The proposed algorithm is robust to rotor resistance variations. ► We estimate the IM speed and stator resistance simultaneously to avoid speed error. - Abstract: Model reference adaptive system (MRAS) based robust stator resistance estimator for sensorless induction motor (IM) drive is proposed. The MRAS is formed with a semi-active power quantity. The proposed identification method can be achieved with on-line tuning of the stator resistance with robustness against rotor resistance variations. Stable and efficient estimation of IM speed at low region will be guaranteed by simultaneous identification of IM speed and stator resistance. The stability of proposed stator resistance estimator is checked through Popov’s hyperstability theorem. Simulation and experimental results are given to highlight the feasibility, the simplicity, and the robustness of the proposed method.

  10. Multimodal Person Re-identification Using RGB-D Sensors and a Transient Identification Database

    DEFF Research Database (Denmark)

    Møgelmose, Andreas; Moeslund, Thomas B.; Nasrollahi, Kamal

    2013-01-01

    This paper describes a system for person re-identification using RGB-D sensors. The system covers the full flow, from detection of subjects, over contour extraction, to re-identification using soft biometrics. The biometrics in question are part-based color histograms and the subjects height...

  11. Personal Identification by Keystroke Dynamics in Japanese Free Text Typing

    Science.gov (United States)

    Samura, Toshiharu; Nishimura, Haruhiko

    Biometrics is classified into verification and identification. Many researchers on the keystroke dynamics have treated the verification of a fixed short password which is used for the user login. In this research, we pay attention to the identification and investigate several characteristics of the keystroke dynamics in Japanese free text typing. We developed Web-based typing software in order to collect the keystroke data on the Local Area Network and performed experiments on a total of 112 subjects, from which three groups of typing level, the beginner's level and above, the normal level and above and the middle level and above were constructed. Based on the identification methods by the weighted Euclid distance and the neural network for the extracted feature indexes in Japanese texts, we evaluated identification performances for the three groups. As a result, high accuracy of personal identification was confirmed in both methods, in proportion to the typing level of the group.

  12. 33 CFR 101.515 - TWIC/Personal Identification.

    Science.gov (United States)

    2010-07-01

    ....515 Section 101.515 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL Other Provisions § 101.515 TWIC/Personal Identification. (a... TWIC must allow his or her TWIC to be read by a reader and must submit his or her reference biometric...

  13. Attention in Multimodal Neural Networks for Person Re-identification

    DEFF Research Database (Denmark)

    Lejbølle, Aske Rasch; Krogh, Benjamin; Nasrollahi, Kamal

    2018-01-01

    In spite of increasing interest from the research commu- nity, person re-identification remains an unsolved problem. Correctly deciding on a true match by comparing images of a person, captured by several cameras, requires extrac- tion of discriminative features to counter challenges...... such as changes in lighting, viewpoint and occlusion. Besides de- vising novel feature descriptors, the setup can be changed to capture persons from an overhead viewpoint rather than a horizontal. Furthermore, additional modalities can be considered that are not affected by similar environmental changes as RGB...

  14. Robust Switching Control and Subspace Identification for Flutter of Flexible Wing

    Directory of Open Access Journals (Sweden)

    Yizhe Wang

    2018-01-01

    Full Text Available Active flutter suppression and subspace identification for a flexible wing model using micro fiber composite actuator were experimentally studied in a low speed wind tunnel. NACA0006 thin airfoil model was used for the experimental object to verify the performance of identification algorithm and designed controller. The equation of the fluid, vibration, and piezoelectric coupled motion was theoretically analyzed and experimentally identified under the open-loop and closed-loop condition by subspace method for controller design. A robust pole placement algorithm in terms of linear matrix inequality that accommodates the model uncertainty caused by identification deviation and flow speed variation was utilized to stabilize the divergent aeroelastic system. For further enlarging the flutter envelope, additional controllers were designed subject to the models beyond the flutter speed. Wind speed was measured online as the decision parameter of switching between the controllers. To ensure the stability of arbitrary switching, Common Lyapunov function method was applied to design the robust pole placement controllers for different models to ensure that the closed-loop system shared a common Lyapunov function. Wind tunnel result showed that the designed controllers could stabilize the time varying aeroelastic system over a wide range under arbitrary switching.

  15. ROBUST PERSON TRACKING WITH MULTIPLE NON-OVERLAPPING CAMERAS IN AN OUTDOOR ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    S. Hellwig

    2012-07-01

    Full Text Available The aim of our work is to combine multiple cameras for a robust tracking of persons in an outdoor environment. Although surveillance is a well established field, many algorithms apply various constraints like overlapping fields of view or precise calibration of the cameras to improve results. An application of these developed systems in a realistic outdoor environment is often difficult. Our aim is to be widely independent from the camera setup and the observed scene, in order to use existing cameras. Thereby our algorithm needs to be capable to work with both overlapping and non-overlapping fields of views. We propose an algorithm that allows flexible combination of different static cameras with varying properties. Another requirement of a practical application is that the algorithm is able to work online. Our system is able to process the data during runtime and to provide results immediately. In addition to seeking flexibility in the camera setup, we present a specific approach that combines state of the art algorithms in order to be robust to environment influences. We present results that indicate a good performance of our introduced algorithm in different scenarios. We show its robustness to different types of image artifacts. In addition we demonstrate that our algorithm is able to match persons between cameras in a non-overlapping scenario.

  16. An integer optimization algorithm for robust identification of non-linear gene regulatory networks

    Directory of Open Access Journals (Sweden)

    Chemmangattuvalappil Nishanth

    2012-09-01

    Full Text Available Abstract Background Reverse engineering gene networks and identifying regulatory interactions are integral to understanding cellular decision making processes. Advancement in high throughput experimental techniques has initiated innovative data driven analysis of gene regulatory networks. However, inherent noise associated with biological systems requires numerous experimental replicates for reliable conclusions. Furthermore, evidence of robust algorithms directly exploiting basic biological traits are few. Such algorithms are expected to be efficient in their performance and robust in their prediction. Results We have developed a network identification algorithm to accurately infer both the topology and strength of regulatory interactions from time series gene expression data in the presence of significant experimental noise and non-linear behavior. In this novel formulism, we have addressed data variability in biological systems by integrating network identification with the bootstrap resampling technique, hence predicting robust interactions from limited experimental replicates subjected to noise. Furthermore, we have incorporated non-linearity in gene dynamics using the S-system formulation. The basic network identification formulation exploits the trait of sparsity of biological interactions. Towards that, the identification algorithm is formulated as an integer-programming problem by introducing binary variables for each network component. The objective function is targeted to minimize the network connections subjected to the constraint of maximal agreement between the experimental and predicted gene dynamics. The developed algorithm is validated using both in silico and experimental data-sets. These studies show that the algorithm can accurately predict the topology and connection strength of the in silico networks, as quantified by high precision and recall, and small discrepancy between the actual and predicted kinetic parameters

  17. Robust synchronization of delayed neural networks based on adaptive control and parameters identification

    International Nuclear Information System (INIS)

    Zhou Jin; Chen Tianping; Xiang Lan

    2006-01-01

    This paper investigates synchronization dynamics of delayed neural networks with all the parameters unknown. By combining the adaptive control and linear feedback with the updated law, some simple yet generic criteria for determining the robust synchronization based on the parameters identification of uncertain chaotic delayed neural networks are derived by using the invariance principle of functional differential equations. It is shown that the approaches developed here further extend the ideas and techniques presented in recent literature, and they are also simple to implement in practice. Furthermore, the theoretical results are applied to a typical chaotic delayed Hopfied neural networks, and numerical simulation also demonstrate the effectiveness and feasibility of the proposed technique

  18. Unaware person recognition from the body when face identification fails.

    Science.gov (United States)

    Rice, Allyson; Phillips, P Jonathon; Natu, Vaidehi; An, Xiaobo; O'Toole, Alice J

    2013-11-01

    How does one recognize a person when face identification fails? Here, we show that people rely on the body but are unaware of doing so. State-of-the-art face-recognition algorithms were used to select images of people with almost no useful identity information in the face. Recognition of the face alone in these cases was near chance level, but recognition of the person was accurate. Accuracy in identifying the person without the face was identical to that in identifying the whole person. Paradoxically, people reported relying heavily on facial features over noninternal face and body features in making their identity decisions. Eye movements indicated otherwise, with gaze duration and fixations shifting adaptively toward the body and away from the face when the body was a better indicator of identity than the face. This shift occurred with no cost to accuracy or response time. Human identity processing may be partially inaccessible to conscious awareness.

  19. On-orbit real-time robust cooperative target identification in complex background

    Directory of Open Access Journals (Sweden)

    Wen Zhuoman

    2015-10-01

    Full Text Available Cooperative target identification is the prerequisite for the relative position and orientation measurement between the space robot arm and the to-be-arrested object. We propose an on-orbit real-time robust algorithm for cooperative target identification in complex background using the features of circle and lines. It first extracts only the interested edges in the target image using an adaptive threshold and refines them to about single-pixel-width with improved non-maximum suppression. Adapting a novel tracking approach, edge segments changing smoothly in tangential directions are obtained. With a small amount of calculation, large numbers of invalid edges are removed. From the few remained edges, valid circular arcs are extracted and reassembled to obtain circles according to a reliable criterion. Finally, the target is identified if there are certain numbers of straight lines whose relative positions with the circle match the known target pattern. Experiments demonstrate that the proposed algorithm accurately identifies the cooperative target within the range of 0.3–1.5 m under complex background at the speed of 8 frames per second, regardless of lighting condition and target attitude. The proposed algorithm is very suitable for real-time visual measurement of space robot arm because of its robustness and small memory requirement.

  20. Robust identification of noncoding RNA from transcriptomes requires phylogenetically-informed sampling.

    Directory of Open Access Journals (Sweden)

    Stinus Lindgreen

    2014-10-01

    Full Text Available Noncoding RNAs are integral to a wide range of biological processes, including translation, gene regulation, host-pathogen interactions and environmental sensing. While genomics is now a mature field, our capacity to identify noncoding RNA elements in bacterial and archaeal genomes is hampered by the difficulty of de novo identification. The emergence of new technologies for characterizing transcriptome outputs, notably RNA-seq, are improving noncoding RNA identification and expression quantification. However, a major challenge is to robustly distinguish functional outputs from transcriptional noise. To establish whether annotation of existing transcriptome data has effectively captured all functional outputs, we analysed over 400 publicly available RNA-seq datasets spanning 37 different Archaea and Bacteria. Using comparative tools, we identify close to a thousand highly-expressed candidate noncoding RNAs. However, our analyses reveal that capacity to identify noncoding RNA outputs is strongly dependent on phylogenetic sampling. Surprisingly, and in stark contrast to protein-coding genes, the phylogenetic window for effective use of comparative methods is perversely narrow: aggregating public datasets only produced one phylogenetic cluster where these tools could be used to robustly separate unannotated noncoding RNAs from a null hypothesis of transcriptional noise. Our results show that for the full potential of transcriptomics data to be realized, a change in experimental design is paramount: effective transcriptomics requires phylogeny-aware sampling.

  1. A Robust Identification of the Protein Standard Bands in Two-Dimensional Electrophoresis Gel Images

    Directory of Open Access Journals (Sweden)

    Serackis Artūras

    2017-12-01

    Full Text Available The aim of the investigation presented in this paper was to develop a software-based assistant for the protein analysis workflow. The prior characterization of the unknown protein in two-dimensional electrophoresis gel images is performed according to the molecular weight and isoelectric point of each protein spot estimated from the gel image before further sequence analysis by mass spectrometry. The paper presents a method for automatic and robust identification of the protein standard band in a two-dimensional gel image. In addition, the method introduces the identification of the positions of the markers, prepared by using pre-selected proteins with known molecular mass. The robustness of the method was achieved by using special validation rules in the proposed original algorithms. In addition, a self-organizing map-based decision support algorithm is proposed, which takes Gabor coefficients as image features and searches for the differences in preselected vertical image bars. The experimental investigation proved the good performance of the new algorithms included into the proposed method. The detection of the protein standard markers works without modification of algorithm parameters on two-dimensional gel images obtained by using different staining and destaining procedures, which results in different average levels of intensity in the images.

  2. Robust Identification of Developmentally Active Endothelial Enhancers in Zebrafish Using FANS-Assisted ATAC-Seq.

    Science.gov (United States)

    Quillien, Aurelie; Abdalla, Mary; Yu, Jun; Ou, Jianhong; Zhu, Lihua Julie; Lawson, Nathan D

    2017-07-18

    Identification of tissue-specific and developmentally active enhancers provides insights into mechanisms that control gene expression during embryogenesis. However, robust detection of these regulatory elements remains challenging, especially in vertebrate genomes. Here, we apply fluorescent-activated nuclei sorting (FANS) followed by Assay for Transposase-Accessible Chromatin with high-throughput sequencing (ATAC-seq) to identify developmentally active endothelial enhancers in the zebrafish genome. ATAC-seq of nuclei from Tg(fli1a:egfp) y1 transgenic embryos revealed expected patterns of nucleosomal positioning at transcriptional start sites throughout the genome and association with active histone modifications. Comparison of ATAC-seq from GFP-positive and -negative nuclei identified more than 5,000 open elements specific to endothelial cells. These elements flanked genes functionally important for vascular development and that displayed endothelial-specific gene expression. Importantly, a majority of tested elements drove endothelial gene expression in zebrafish embryos. Thus, FANS-assisted ATAC-seq using transgenic zebrafish embryos provides a robust approach for genome-wide identification of active tissue-specific enhancer elements. Copyright © 2017 The Author(s). Published by Elsevier Inc. All rights reserved.

  3. Personal Verification/Identification via Analysis of the Peripheral ECG Leads: Influence of the Personal Health Status on the Accuracy

    Directory of Open Access Journals (Sweden)

    Irena Jekova

    2015-01-01

    Full Text Available Traditional means for identity validation (PIN codes, passwords, and physiological and behavioral biometric characteristics (fingerprint, iris, and speech are susceptible to hacker attacks and/or falsification. This paper presents a method for person verification/identification based on correlation of present-to-previous limb ECG leads: I (rI, II (rII, calculated from them first principal ECG component (rPCA, linear and nonlinear combinations between rI, rII, and rPCA. For the verification task, the one-to-one scenario is applied and threshold values for rI, rII, and rPCA and their combinations are derived. The identification task supposes one-to-many scenario and the tested subject is identified according to the maximal correlation with a previously recorded ECG in a database. The population based ECG-ILSA database of 540 patients (147 healthy subjects, 175 patients with cardiac diseases, and 218 with hypertension has been considered. In addition a common reference PTB dataset (14 healthy individuals with short time interval between the two acquisitions has been taken into account. The results on ECG-ILSA database were satisfactory with healthy people, and there was not a significant decrease in nonhealthy patients, demonstrating the robustness of the proposed method. With PTB database, the method provides an identification accuracy of 92.9% and a verification sensitivity and specificity of 100% and 89.9%.

  4. Robust identification of transcriptional regulatory networks using a Gibbs sampler on outlier sum statistic.

    Science.gov (United States)

    Gu, Jinghua; Xuan, Jianhua; Riggins, Rebecca B; Chen, Li; Wang, Yue; Clarke, Robert

    2012-08-01

    Identification of transcriptional regulatory networks (TRNs) is of significant importance in computational biology for cancer research, providing a critical building block to unravel disease pathways. However, existing methods for TRN identification suffer from the inclusion of excessive 'noise' in microarray data and false-positives in binding data, especially when applied to human tumor-derived cell line studies. More robust methods that can counteract the imperfection of data sources are therefore needed for reliable identification of TRNs in this context. In this article, we propose to establish a link between the quality of one target gene to represent its regulator and the uncertainty of its expression to represent other target genes. Specifically, an outlier sum statistic was used to measure the aggregated evidence for regulation events between target genes and their corresponding transcription factors. A Gibbs sampling method was then developed to estimate the marginal distribution of the outlier sum statistic, hence, to uncover underlying regulatory relationships. To evaluate the effectiveness of our proposed method, we compared its performance with that of an existing sampling-based method using both simulation data and yeast cell cycle data. The experimental results show that our method consistently outperforms the competing method in different settings of signal-to-noise ratio and network topology, indicating its robustness for biological applications. Finally, we applied our method to breast cancer cell line data and demonstrated its ability to extract biologically meaningful regulatory modules related to estrogen signaling and action in breast cancer. The Gibbs sampler MATLAB package is freely available at http://www.cbil.ece.vt.edu/software.htm. xuan@vt.edu Supplementary data are available at Bioinformatics online.

  5. Evaluating common de-identification heuristics for personal health information.

    Science.gov (United States)

    El Emam, Khaled; Jabbouri, Sam; Sams, Scott; Drouet, Youenn; Power, Michael

    2006-11-21

    With the growing adoption of electronic medical records, there are increasing demands for the use of this electronic clinical data in observational research. A frequent ethics board requirement for such secondary use of personal health information in observational research is that the data be de-identified. De-identification heuristics are provided in the Health Insurance Portability and Accountability Act Privacy Rule, funding agency and professional association privacy guidelines, and common practice. The aim of the study was to evaluate whether the re-identification risks due to record linkage are sufficiently low when following common de-identification heuristics and whether the risk is stable across sample sizes and data sets. Two methods were followed to construct identification data sets. Re-identification attacks were simulated on these. For each data set we varied the sample size down to 30 individuals, and for each sample size evaluated the risk of re-identification for all combinations of quasi-identifiers. The combinations of quasi-identifiers that were low risk more than 50% of the time were considered stable. The identification data sets we were able to construct were the list of all physicians and the list of all lawyers registered in Ontario, using 1% sampling fractions. The quasi-identifiers of region, gender, and year of birth were found to be low risk more than 50% of the time across both data sets. The combination of gender and region was also found to be low risk more than 50% of the time. We were not able to create an identification data set for the whole population. Existing Canadian federal and provincial privacy laws help explain why it is difficult to create an identification data set for the whole population. That such examples of high re-identification risk exist for mainstream professions makes a strong case for not disclosing the high-risk variables and their combinations identified here. For professional subpopulations with published

  6. GPU-accelerated automatic identification of robust beam setups for proton and carbon-ion radiotherapy

    International Nuclear Information System (INIS)

    Ammazzalorso, F; Jelen, U; Bednarz, T

    2014-01-01

    We demonstrate acceleration on graphic processing units (GPU) of automatic identification of robust particle therapy beam setups, minimizing negative dosimetric effects of Bragg peak displacement caused by treatment-time patient positioning errors. Our particle therapy research toolkit, RobuR, was extended with OpenCL support and used to implement calculation on GPU of the Port Homogeneity Index, a metric scoring irradiation port robustness through analysis of tissue density patterns prior to dose optimization and computation. Results were benchmarked against an independent native CPU implementation. Numerical results were in agreement between the GPU implementation and native CPU implementation. For 10 skull base cases, the GPU-accelerated implementation was employed to select beam setups for proton and carbon ion treatment plans, which proved to be dosimetrically robust, when recomputed in presence of various simulated positioning errors. From the point of view of performance, average running time on the GPU decreased by at least one order of magnitude compared to the CPU, rendering the GPU-accelerated analysis a feasible step in a clinical treatment planning interactive session. In conclusion, selection of robust particle therapy beam setups can be effectively accelerated on a GPU and become an unintrusive part of the particle therapy treatment planning workflow. Additionally, the speed gain opens new usage scenarios, like interactive analysis manipulation (e.g. constraining of some setup) and re-execution. Finally, through OpenCL portable parallelism, the new implementation is suitable also for CPU-only use, taking advantage of multiple cores, and can potentially exploit types of accelerators other than GPUs.

  7. GPU-accelerated automatic identification of robust beam setups for proton and carbon-ion radiotherapy

    Science.gov (United States)

    Ammazzalorso, F.; Bednarz, T.; Jelen, U.

    2014-03-01

    We demonstrate acceleration on graphic processing units (GPU) of automatic identification of robust particle therapy beam setups, minimizing negative dosimetric effects of Bragg peak displacement caused by treatment-time patient positioning errors. Our particle therapy research toolkit, RobuR, was extended with OpenCL support and used to implement calculation on GPU of the Port Homogeneity Index, a metric scoring irradiation port robustness through analysis of tissue density patterns prior to dose optimization and computation. Results were benchmarked against an independent native CPU implementation. Numerical results were in agreement between the GPU implementation and native CPU implementation. For 10 skull base cases, the GPU-accelerated implementation was employed to select beam setups for proton and carbon ion treatment plans, which proved to be dosimetrically robust, when recomputed in presence of various simulated positioning errors. From the point of view of performance, average running time on the GPU decreased by at least one order of magnitude compared to the CPU, rendering the GPU-accelerated analysis a feasible step in a clinical treatment planning interactive session. In conclusion, selection of robust particle therapy beam setups can be effectively accelerated on a GPU and become an unintrusive part of the particle therapy treatment planning workflow. Additionally, the speed gain opens new usage scenarios, like interactive analysis manipulation (e.g. constraining of some setup) and re-execution. Finally, through OpenCL portable parallelism, the new implementation is suitable also for CPU-only use, taking advantage of multiple cores, and can potentially exploit types of accelerators other than GPUs.

  8. Robust volcano plot: identification of differential metabolites in the presence of outliers.

    Science.gov (United States)

    Kumar, Nishith; Hoque, Md Aminul; Sugimoto, Masahiro

    2018-04-11

    The identification of differential metabolites in metabolomics is still a big challenge and plays a prominent role in metabolomics data analyses. Metabolomics datasets often contain outliers because of analytical, experimental, and biological ambiguity, but the currently available differential metabolite identification techniques are sensitive to outliers. We propose a kernel weight based outlier-robust volcano plot for identifying differential metabolites from noisy metabolomics datasets. Two numerical experiments are used to evaluate the performance of the proposed technique against nine existing techniques, including the t-test and the Kruskal-Wallis test. Artificially generated data with outliers reveal that the proposed method results in a lower misclassification error rate and a greater area under the receiver operating characteristic curve compared with existing methods. An experimentally measured breast cancer dataset to which outliers were artificially added reveals that our proposed method produces only two non-overlapping differential metabolites whereas the other nine methods produced between seven and 57 non-overlapping differential metabolites. Our data analyses show that the performance of the proposed differential metabolite identification technique is better than that of existing methods. Thus, the proposed method can contribute to analysis of metabolomics data with outliers. The R package and user manual of the proposed method are available at https://github.com/nishithkumarpaul/Rvolcano .

  9. Personal Identification Based on Vectorcardiogram Derived from Limb Leads Electrocardiogram

    Directory of Open Access Journals (Sweden)

    Jongshill Lee

    2012-01-01

    Full Text Available We propose a new method for personal identification using the derived vectorcardiogram (dVCG, which is derived from the limb leads electrocardiogram (ECG. The dVCG was calculated from the standard limb leads ECG using the precalculated inverse transform matrix. Twenty-one features were extracted from the dVCG, and some or all of these 21 features were used in support vector machine (SVM learning and in tests. The classification accuracy was 99.53%, which is similar to the previous dVCG analysis using the standard 12-lead ECG. Our experimental results show that it is possible to identify a person by features extracted from a dVCG derived from limb leads only. Hence, only three electrodes have to be attached to the person to be identified, which can reduce the effort required to connect electrodes and calculate the dVCG.

  10. Person Re-Identification by Camera Correlation Aware Feature Augmentation.

    Science.gov (United States)

    Chen, Ying-Cong; Zhu, Xiatian; Zheng, Wei-Shi; Lai, Jian-Huang

    2018-02-01

    The challenge of person re-identification (re-id) is to match individual images of the same person captured by different non-overlapping camera views against significant and unknown cross-view feature distortion. While a large number of distance metric/subspace learning models have been developed for re-id, the cross-view transformations they learned are view-generic and thus potentially less effective in quantifying the feature distortion inherent to each camera view. Learning view-specific feature transformations for re-id (i.e., view-specific re-id), an under-studied approach, becomes an alternative resort for this problem. In this work, we formulate a novel view-specific person re-identification framework from the feature augmentation point of view, called Camera coR relation Aware Feature augmenTation (CRAFT). Specifically, CRAFT performs cross-view adaptation by automatically measuring camera correlation from cross-view visual data distribution and adaptively conducting feature augmentation to transform the original features into a new adaptive space. Through our augmentation framework, view-generic learning algorithms can be readily generalized to learn and optimize view-specific sub-models whilst simultaneously modelling view-generic discrimination information. Therefore, our framework not only inherits the strength of view-generic model learning but also provides an effective way to take into account view specific characteristics. Our CRAFT framework can be extended to jointly learn view-specific feature transformations for person re-id across a large network with more than two cameras, a largely under-investigated but realistic re-id setting. Additionally, we present a domain-generic deep person appearance representation which is designed particularly to be towards view invariant for facilitating cross-view adaptation by CRAFT. We conducted extensively comparative experiments to validate the superiority and advantages of our proposed framework over state

  11. Robust and Specific Personality Traits as Predictors of Adolescents' Final Grades and GPA at the End of Compulsory Schooling

    Science.gov (United States)

    Smrtnik Vitulic, Helena; Zupancic, Maja

    2013-01-01

    The study investigated the predictive value of robust and specific personality traits in adolescents (M[subscript age]?=?14.7 years), in explaining their academic achievement at the end of basic compulsory schooling. Personality data were obtained through self, maternal, and peer reports using the Inventory of Child/Adolescent Individual…

  12. A Robust Method to Detect Zero Velocity for Improved 3D Personal Navigation Using Inertial Sensors

    Science.gov (United States)

    Xu, Zhengyi; Wei, Jianming; Zhang, Bo; Yang, Weijun

    2015-01-01

    This paper proposes a robust zero velocity (ZV) detector algorithm to accurately calculate stationary periods in a gait cycle. The proposed algorithm adopts an effective gait cycle segmentation method and introduces a Bayesian network (BN) model based on the measurements of inertial sensors and kinesiology knowledge to infer the ZV period. During the detected ZV period, an Extended Kalman Filter (EKF) is used to estimate the error states and calibrate the position error. The experiments reveal that the removal rate of ZV false detections by the proposed method increases 80% compared with traditional method at high walking speed. Furthermore, based on the detected ZV, the Personal Inertial Navigation System (PINS) algorithm aided by EKF performs better, especially in the altitude aspect. PMID:25831086

  13. Performance-Driven Robust Identification and Control of Uncertain Dynamical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Basar, Tamer

    2001-10-29

    The grant DEFG02-97ER13939 from the Department of Energy has supported our research program on robust identification and control of uncertain dynamical systems, initially for the three-year period June 15, 1997-June 14, 2000, which was then extended on a no-cost basis for another year until June 14, 2001. This final report provides an overview of our research conducted during this period, along with a complete list of publications supported by the Grant. Within the scope of this project, we have studied fundamental issues that arise in modeling, identification, filtering, control, stabilization, control-based model reduction, decomposition and aggregation, and optimization of uncertain systems. The mathematical framework we have worked in has allowed the system dynamics to be only partially known (with the uncertainties being of both parametric or structural nature), and further the dynamics to be perturbed by unknown dynamic disturbances. Our research over these four years has generated a substantial body of new knowledge, and has led to new major developments in theory, applications, and computational algorithms. These have all been documented in various journal articles and book chapters, and have been presented at leading conferences, as to be described. A brief description of the results we have obtained within the scope of this project can be found in Section 3. To set the stage for the material of that section, we first provide in the next section (Section 2) a brief description of the issues that arise in the control of uncertain systems, and introduce several criteria under which optimality will lead to robustness and stability. Section 4 contains a list of references cited in these two sections. A list of our publications supported by the DOE Grant (covering the period June 15, 1997-June 14, 2001) comprises Section 5 of the report.

  14. Multi-patch matching for person re-identification

    Science.gov (United States)

    Labidi, Hocine; Luo, Sen-Lin; Boubekeur, Mohamed B.; Benlefki, Tarek

    2015-08-01

    Recognizing a target object across non-overlapping distributed cameras is known in the computer vision community as the problem of person re-identification. In this paper, a multi-patch matching method for person reidentification is presented. Starting from the assumption that: the appearance (clothes) of a person does not change during the time of passing in different cameras field of view , which means the regions with the same color in target image will be identical while crossing cameras. First, we extract distinctive features in the training procedure, where each image target is devised into small patches, the SIFT features and LAB color histograms are computed for each patch. Then we use the KNN approach to detect group of patches with high similarity in the target image and then we use a bi-directional weighted group matching mechanism for the re-identification. Experiments on a challenging VIPeR dataset show that the performances of the proposed method outperform several baselines and state of the art approaches.

  15. Processing of Natural Signals like EMG for Person Identification using NUFB-GMM

    OpenAIRE

    Suresh M; P G Krishnamohan; Mallikarjun S Holi

    2014-01-01

    Physiological signals like Electrocardiogram(ECG) and Electroencephalogram(EEG), including deoxyribonucleic acid(DNA) are person specific and distinct for different persons. The motor unit firing pattern, motor unit recruitment order and characteristics of muscle changing from person to person, and therefore Electromyogram (EMG) can be used for person identification. EMG records obtained from a single channel data acquisition system are used to develop person identification system. Non-unifor...

  16. Personal identification based on blood vessels of retinal fundus images

    Science.gov (United States)

    Fukuta, Keisuke; Nakagawa, Toshiaki; Hayashi, Yoshinori; Hatanaka, Yuji; Hara, Takeshi; Fujita, Hiroshi

    2008-03-01

    Biometric technique has been implemented instead of conventional identification methods such as password in computer, automatic teller machine (ATM), and entrance and exit management system. We propose a personal identification (PI) system using color retinal fundus images which are unique to each individual. The proposed procedure for identification is based on comparison of an input fundus image with reference fundus images in the database. In the first step, registration between the input image and the reference image is performed. The step includes translational and rotational movement. The PI is based on the measure of similarity between blood vessel images generated from the input and reference images. The similarity measure is defined as the cross-correlation coefficient calculated from the pixel values. When the similarity is greater than a predetermined threshold, the input image is identified. This means both the input and the reference images are associated to the same person. Four hundred sixty-two fundus images including forty-one same-person's image pairs were used for the estimation of the proposed technique. The false rejection rate and the false acceptance rate were 9.9×10 -5% and 4.3×10 -5%, respectively. The results indicate that the proposed method has a higher performance than other biometrics except for DNA. To be used for practical application in the public, the device which can take retinal fundus images easily is needed. The proposed method is applied to not only the PI but also the system which warns about misfiling of fundus images in medical facilities.

  17. Personal suicidality in reception and identification with suicidal film characters.

    Science.gov (United States)

    Till, Benedikt; Vitouch, Peter; Herberth, Arno; Sonneck, Gernot; Niederkrotenthaler, Thomas

    2013-04-01

    The authors investigated the impact of suicidality on identity work during film exposure. Adults with low suicidality (n = 150) watched either It's My Party or The Fire Within, censored versions of these films not depicting the suicide, or the control film that concluded with a non-suicidal death. Baseline suicidality was measured with questionnaires before the movie. Identity work and identification with the protagonist were measured after the movie. Suicidality was directly associated with identity work during film dramas depicting suicide methods. The reception of suicide-related media content seems to partially depend on personal suicidality. Potential implications for suicide prevention are discussed.

  18. Exploiting Multiple Detections for Person Re-Identification

    Directory of Open Access Journals (Sweden)

    Amran Bhuiyan

    2018-01-01

    Full Text Available Re-identification systems aim at recognizing the same individuals in multiple cameras, and one of the most relevant problems is that the appearance of same individual varies across cameras due to illumination and viewpoint changes. This paper proposes the use of cumulative weighted brightness transfer functions (CWBTFs to model these appearance variations. Different from recently proposed methods which only consider pairs of images to learn a brightness transfer function, we exploit such a multiple-frame-based learning approach that leverages consecutive detections of each individual to transfer the appearance. We first present a CWBTF framework for the task of transforming appearance from one camera to another. We then present a re-identification framework where we segment the pedestrian images into meaningful parts and extract features from such parts, as well as from the whole body. Jointly, both of these frameworks contribute to model the appearance variations more robustly. We tested our approach on standard multi-camera surveillance datasets, showing consistent and significant improvements over existing methods on three different datasets without any other additional cost. Our approach is general and can be applied to any appearance-based method.

  19. Robust identification and localization of intramedullary nail holes for distal locking using CBCT: a simulation study.

    Science.gov (United States)

    Kamarianakis, Z; Buliev, I; Pallikarakis, N

    2011-05-01

    Closed intramedullary nailing is a common technique for treatment of femur and tibia fractures. The most challenging step in this procedure is the precise placement of the lateral screws that stabilize the fragmented bone. The present work concerns the development and the evaluation of a method to accurately identify in the 3D space the axes of the nail hole canals. A limited number of projection images are acquired around the leg with the help of a C-arm. On two of them, the locking hole entries are interactively selected and a rough localization of the hole axes is performed. Perpendicularly to one of them, cone-beam computed tomography (CBCT) reconstructions are produced. The accurate identification and localization of the hole axes are done by an identification of the centers of the nail holes on the tomograms and a further 3D linear regression through principal component analysis (PCA). Various feature-based approaches (RANSAC, least-square fitting, Hough transform) have been compared for best matching the contours and the centers of the holes on the tomograms. The robustness of the suggested method was investigated using simulations. Programming is done in Matlab and C++. Results obtained on synthetic data confirm very good localization accuracy - mean translational error of 0.14 mm (std=0.08 mm) and mean angular error of 0.84° (std=0.35°) at no radiation excess. Successful localization can be further used to guide a surgeon or a robot for correct drilling the bone along the nail openings. Copyright © 2010 IPEM. Published by Elsevier Ltd. All rights reserved.

  20. FINGERPRINT VERIFICATION IN PERSONAL IDENTIFICATION BY APPLYING LOCAL WALSH HADAMARD TRANSFORM AND GABOR COEFFICIENTS

    Directory of Open Access Journals (Sweden)

    K N Pushpalatha

    2017-05-01

    Full Text Available In an era of advanced computer technology world where innumerable services such as access to bank accounts, or access to secured data or entry to some national important organizations require authentication of genuine individual. Among all biometric personal identification systems, fingerprint recognition system is most accurate and economical technology. In this paper we have proposed fingerprint recognition system using Local Walsh Hadamard Transform (LWHT with Phase Magnitude Histograms (PMHs for feature extraction. Fingerprints display oriented texture-like patterns. Gabor filters have the property of capturing global and local texture information from blur or unclear images and filter bank provides the orientation features which are robust to image distortion and rotation. The LWHT algorithm is compared with other two approaches viz., Gabor Coefficients and Directional Features. The three methods are compared using FVC 2006 Finger print database images. It is found from the observation that the values of TSR, FAR and FRR have improved results compared to existing algorithm.

  1. Are subject-specific musculoskeletal models robust to the uncertainties in parameter identification?

    Directory of Open Access Journals (Sweden)

    Giordano Valente

    Full Text Available Subject-specific musculoskeletal modeling can be applied to study musculoskeletal disorders, allowing inclusion of personalized anatomy and properties. Independent of the tools used for model creation, there are unavoidable uncertainties associated with parameter identification, whose effect on model predictions is still not fully understood. The aim of the present study was to analyze the sensitivity of subject-specific model predictions (i.e., joint angles, joint moments, muscle and joint contact forces during walking to the uncertainties in the identification of body landmark positions, maximum muscle tension and musculotendon geometry. To this aim, we created an MRI-based musculoskeletal model of the lower limbs, defined as a 7-segment, 10-degree-of-freedom articulated linkage, actuated by 84 musculotendon units. We then performed a Monte-Carlo probabilistic analysis perturbing model parameters according to their uncertainty, and solving a typical inverse dynamics and static optimization problem using 500 models that included the different sets of perturbed variable values. Model creation and gait simulations were performed by using freely available software that we developed to standardize the process of model creation, integrate with OpenSim and create probabilistic simulations of movement. The uncertainties in input variables had a moderate effect on model predictions, as muscle and joint contact forces showed maximum standard deviation of 0.3 times body-weight and maximum range of 2.1 times body-weight. In addition, the output variables significantly correlated with few input variables (up to 7 out of 312 across the gait cycle, including the geometry definition of larger muscles and the maximum muscle tension in limited gait portions. Although we found subject-specific models not markedly sensitive to parameter identification, researchers should be aware of the model precision in relation to the intended application. In fact, force

  2. Robust Online Multi-Task Learning with Correlative and Personalized Structures

    KAUST Repository

    Yang, Peng

    2017-06-29

    Multi-Task Learning (MTL) can enhance a classifier\\'s generalization performance by learning multiple related tasks simultaneously. Conventional MTL works under the offline setting and suffers from expensive training cost and poor scalability. To address such issues, online learning techniques have been applied to solve MTL problems. However, most existing algorithms of online MTL constrain task relatedness into a presumed structure via a single weight matrix, which is a strict restriction that does not always hold in practice. In this paper, we propose a robust online MTL framework that overcomes this restriction by decomposing the weight matrix into two components: the first one captures the low-rank common structure among tasks via a nuclear norm; the second one identifies the personalized patterns of outlier tasks via a group lasso. Theoretical analysis shows the proposed algorithm can achieve a sub-linear regret with respect to the best linear model in hindsight. However, the nuclear norm that simply adds all nonzero singular values together may not be a good low-rank approximation. To improve the results, we use a log-determinant function as a non-convex rank approximation. Experimental results on a number of real-world applications also verify the efficacy of our approaches.

  3. Robust Online Multi-Task Learning with Correlative and Personalized Structures

    KAUST Repository

    Yang, Peng; Zhao, Peilin; Gao, Xin

    2017-01-01

    Multi-Task Learning (MTL) can enhance a classifier's generalization performance by learning multiple related tasks simultaneously. Conventional MTL works under the offline setting and suffers from expensive training cost and poor scalability. To address such issues, online learning techniques have been applied to solve MTL problems. However, most existing algorithms of online MTL constrain task relatedness into a presumed structure via a single weight matrix, which is a strict restriction that does not always hold in practice. In this paper, we propose a robust online MTL framework that overcomes this restriction by decomposing the weight matrix into two components: the first one captures the low-rank common structure among tasks via a nuclear norm; the second one identifies the personalized patterns of outlier tasks via a group lasso. Theoretical analysis shows the proposed algorithm can achieve a sub-linear regret with respect to the best linear model in hindsight. However, the nuclear norm that simply adds all nonzero singular values together may not be a good low-rank approximation. To improve the results, we use a log-determinant function as a non-convex rank approximation. Experimental results on a number of real-world applications also verify the efficacy of our approaches.

  4. Developing a personal computer based expert system for radionuclide identification

    International Nuclear Information System (INIS)

    Aarnio, P.A.; Hakulinen, T.T.

    1990-01-01

    Several expert system development tools are available for personal computers today. We have used one of the LISP-based high end tools for nearly two years in developing an expert system for identification of gamma sources. The system contains a radionuclide database of 2055 nuclides and 48000 gamma transitions with a knowledge base of about sixty rules. This application combines a LISP-based inference engine with database management and relatively heavy numerical calculations performed using C-language. The most important feature needed has been the possibility to use LISP and C together with the more advanced object oriented features of the development tool. Main difficulties have been long response times and the big amount (10-16 MB) of computer memory required

  5. Significance of Dental Records in Personal Identification in Forensic Sciences

    Directory of Open Access Journals (Sweden)

    Vagish Kumar L Shanbhag

    2016-01-01

    Full Text Available Forensic odontology is a branch that connects dentistry and the legal profession. One of the members in the forensic investigation team is a dentist. Dentists play an important and significant role in various aspects of the identification of persons in various forensic circumstances. However, several dentists and legal professionals are quite ignorant of this fascinating aspect of forensic odontology. A need was felt to fill this gap. The dental record is a legal document possessed by the dentist and it contains subjective and objective information about the patient. A PubMed search and Google search were done for articles highlighting the importance of dental records in forensic sciences using the key words "forensic odontology, forensic dentistry, forensic dentists, identification, dental records, and dental chart". A total of 42 articles relevant to the title of the article were found and reviewed. The present article highlights the role of dentists in forensic sciences, their possible contributions to forensics, and the various aspects of forensic dentistry, thus bridging the gap of knowledge between the legal and the dental fraternities.

  6. The role of patient personality in the identification of depression in older primary care patients.

    Science.gov (United States)

    McCray, Laura W; Bogner, Hillary R; Sammel, Mary D; Gallo, Joseph J

    2007-11-01

    Our aim was to evaluate whether personality factors significantly contribute to the identification of depression in older primary care patients, even after controlling for depressive symptoms. We examined the association between personality factors and the identification of depression among 318 older adults who participated in the Spectrum study. High neuroticism (unadjusted Odds Ratio (OR) 2.36, 95% Confidence Interval (CI) [1.42, 3.93]) and low extraversion (adjusted OR 2.24, CI [1.26, 4.00]) were associated with physician identification of depression. Persons with high conscientiousness were less likely to be identified as depressed by the doctor (adjusted OR 0.45, CI [0.22, 0.91]). Personality factors influence the identification of depression among older persons in primary care over and above the relationship of depressive symptoms with physician identification. Knowledge of personality may influence the diagnosis and treatment of depression in primary care. Copyright 2007 John Wiley & Sons, Ltd.

  7. A Robust Iris Identification System Based on Wavelet Packet Decomposition and Local Comparisons of the Extracted Signatures

    Directory of Open Access Journals (Sweden)

    Rossant Florence

    2010-01-01

    Full Text Available Abstract This paper presents a complete iris identification system including three main stages: iris segmentation, signature extraction, and signature comparison. An accurate and robust pupil and iris segmentation process, taking into account eyelid occlusions, is first detailed and evaluated. Then, an original wavelet-packet-based signature extraction method and a novel identification approach, based on the fusion of local distance measures, are proposed. Performance measurements validating the proposed iris signature and demonstrating the benefit of our local-based signature comparison are provided. Moreover, an exhaustive evaluation of robustness, with regards to the acquisition conditions, attests the high performances and the reliability of our system. Tests have been conducted on two different databases, the well-known CASIA database (V3 and our ISEP database. Finally, a comparison of the performances of our system with the published ones is given and discussed.

  8. Large data analysis: automatic visual personal identification in a demography of 1.2 billion persons

    Science.gov (United States)

    Daugman, John

    2014-05-01

    The largest biometric deployment in history is now underway in India, where the Government is enrolling the iris patterns (among other data) of all 1.2 billion citizens. The purpose of the Unique Identification Authority of India (UIDAI) is to ensure fair access to welfare benefits and entitlements, to reduce fraud, and enhance social inclusion. Only a minority of Indian citizens have bank accounts; only 4 percent possess passports; and less than half of all aid money reaches its intended recipients. A person who lacks any means of establishing their identity is excluded from entitlements and does not officially exist; thus the slogan of UIDAI is: To give the poor an identity." This ambitious program enrolls a million people every day, across 36,000 stations run by 83 agencies, with a 3-year completion target for the entire national population. The halfway point was recently passed with more than 600 million persons now enrolled. In order to detect and prevent duplicate identities, every iris pattern that is enrolled is first compared against all others enrolled so far; thus the daily workflow now requires 600 trillion (or 600 million-million) iris cross-comparisons. Avoiding identity collisions (False Matches) requires high biometric entropy, and achieving the tremendous match speed requires phase bit coding. Both of these requirements are being delivered operationally by wavelet methods developed by the author for encoding and comparing iris patterns, which will be the focus of this Large Data Award" presentation.

  9. Identifying Robust Co-Occurrence Patterns in Personal Care Product Purchases

    Science.gov (United States)

    Personal care products (PCPs) are used for beautification and personal hygiene, and because they are applied to the skin, hair, and mouth, they provide an efficient delivery vehicle for chemicals into our bodies. Although efforts have been made to enumerate the chemicals in indiv...

  10. Identification and robust water level control of horizontal steam generators using quantitative feedback theory

    International Nuclear Information System (INIS)

    Safarzadeh, O.; Khaki-Sedigh, A.; Shirani, A.S.

    2011-01-01

    Highlights: → A robust water level controller for steam generators (SGs) is designed based on the Quantitative Feedback Theory. → To design the controller, fairly accurate linear models are identified for the SG. → The designed controller is verified using a developed novel global locally linear neuro-fuzzy model of the SG. → Both of the linear and nonlinear models are based on the SG mathematical thermal-hydraulic model developed using the simulation computer code. → The proposed method is easy to apply and guarantees desired closed loop performance. - Abstract: In this paper, a robust water level control system for the horizontal steam generator (SG) using the quantitative feedback theory (QFT) method is presented. To design a robust QFT controller for the nonlinear uncertain SG, control oriented linear models are identified. Then, the nonlinear system is modeled as an uncertain linear time invariant (LTI) system. The robust designed controller is applied to the nonlinear plant model. This nonlinear model is based on a locally linear neuro-fuzzy (LLNF) model. This model is trained using the locally linear model tree (LOLIMOT) algorithm. Finally, simulation results are employed to show the effectiveness of the designed QFT level controller. It is shown that it will ensure the entire designer's water level closed loop specifications.

  11. Identification and robust water level control of horizontal steam generators using quantitative feedback theory

    Energy Technology Data Exchange (ETDEWEB)

    Safarzadeh, O., E-mail: O_Safarzadeh@sbu.ac.ir [Shahid Beheshti University, P.O. Box: 19839-63113, Tehran (Iran, Islamic Republic of); Khaki-Sedigh, A. [K. N. Toosi University of Technology, Tehran (Iran, Islamic Republic of); Shirani, A.S. [Shahid Beheshti University, P.O. Box: 19839-63113, Tehran (Iran, Islamic Republic of)

    2011-09-15

    Highlights: {yields} A robust water level controller for steam generators (SGs) is designed based on the Quantitative Feedback Theory. {yields} To design the controller, fairly accurate linear models are identified for the SG. {yields} The designed controller is verified using a developed novel global locally linear neuro-fuzzy model of the SG. {yields} Both of the linear and nonlinear models are based on the SG mathematical thermal-hydraulic model developed using the simulation computer code. {yields} The proposed method is easy to apply and guarantees desired closed loop performance. - Abstract: In this paper, a robust water level control system for the horizontal steam generator (SG) using the quantitative feedback theory (QFT) method is presented. To design a robust QFT controller for the nonlinear uncertain SG, control oriented linear models are identified. Then, the nonlinear system is modeled as an uncertain linear time invariant (LTI) system. The robust designed controller is applied to the nonlinear plant model. This nonlinear model is based on a locally linear neuro-fuzzy (LLNF) model. This model is trained using the locally linear model tree (LOLIMOT) algorithm. Finally, simulation results are employed to show the effectiveness of the designed QFT level controller. It is shown that it will ensure the entire designer's water level closed loop specifications.

  12. A robust estimate of the number and characteristics of persons released from prison in Australia.

    Science.gov (United States)

    Avery, Alex; Kinner, Stuart A

    2015-08-01

    To estimate the number and characteristics of adults released from prison in Australia. We calculated ratios, stratified by age, sex and Indigenous status, by comparing the number of persons released from prison in New South Wales (NSW), with the number in NSW prisons on 30 June of the corresponding year. These stratified ratios were applied to Australia-wide prison data to estimate the number and characteristics of persons released annually. We estimated that in 2013, 38,576 persons were released from prison in Australia - 25.3% more than the daily prison population. Young people, Indigenous people and women were over-represented among those released. We estimated that 3.69 Indigenous women aged 18-24 were released annually for each equivalent person in prison; and 2.75 non-Indigenous women aged 18-24 were released annually for each equivalent person in prison. The annual 'flow' through Australia's prisons is well in excess of the daily number, but information on those moving through prison systems is not yet publicly available. The characteristics of those released from prison differ meaningfully from those of people in prison. Routine, national reporting of prison separations is critical to informing upscaling and targeting of Throughcare services for this profoundly vulnerable population. © 2015 Public Health Association of Australia.

  13. Robustness of personal initiative in moderating entrepreneurial intentions and actions of disabled students

    Directory of Open Access Journals (Sweden)

    Dakung Reuel Johnmark

    2016-12-01

    Full Text Available Entrepreneurship is vital in the areas of innovation, job creation, nations’ economic and societal advancement. In view of that, personal initiative is seen to be important in moderating the relationship between intention and entrepreneurial action. This study focuses on investigating the moderating role of personal initiative on intention and entrepreneurial action relationship of disabled students. The study followed a descriptive survey where quantitative approach was employed. A total number of 250 questionnaires were administered to disabled students across the tertiary institutions (Universities, Polytechnics and colleges in Plateau State and Abuja-Nigeria. Analysis of data involved the use of statistical package for social sciences (SPSS version 22.0. Hypotheses were tested using structural equation model. Results revealed that pedagogy significantly and positively influences entrepreneurial actions. Also, personal initiative (proactiveness, resilience and innovation moderates the relationship between intention and entrepreneurial actions of disabled students.

  14. Neutral face classification using personalized appearance models for fast and robust emotion detection.

    Science.gov (United States)

    Chiranjeevi, Pojala; Gopalakrishnan, Viswanath; Moogi, Pratibha

    2015-09-01

    Facial expression recognition is one of the open problems in computer vision. Robust neutral face recognition in real time is a major challenge for various supervised learning-based facial expression recognition methods. This is due to the fact that supervised methods cannot accommodate all appearance variability across the faces with respect to race, pose, lighting, facial biases, and so on, in the limited amount of training data. Moreover, processing each and every frame to classify emotions is not required, as user stays neutral for majority of the time in usual applications like video chat or photo album/web browsing. Detecting neutral state at an early stage, thereby bypassing those frames from emotion classification would save the computational power. In this paper, we propose a light-weight neutral versus emotion classification engine, which acts as a pre-processer to the traditional supervised emotion classification approaches. It dynamically learns neutral appearance at key emotion (KE) points using a statistical texture model, constructed by a set of reference neutral frames for each user. The proposed method is made robust to various types of user head motions by accounting for affine distortions based on a statistical texture model. Robustness to dynamic shift of KE points is achieved by evaluating the similarities on a subset of neighborhood patches around each KE point using the prior information regarding the directionality of specific facial action units acting on the respective KE point. The proposed method, as a result, improves emotion recognition (ER) accuracy and simultaneously reduces computational complexity of the ER system, as validated on multiple databases.

  15. Social and personal normative influences on healthcare professionals to use information technology: Towards a more robust social ergonomics.

    Science.gov (United States)

    Holden, Richard J

    2012-09-01

    Social structures and processes are increasingly acknowledged and studied within the human factors/ergonomics (HFE) discipline. At the same time, social phenomena are rarely the focus of HFE work, leaving a knowledge gap. The present study directly addresses social and personal normative forces that influence technology use and performance. Social and personal normative influence to use electronic health records (EHR) were investigated using semi-structured qualitative interviews with 20 attending physicians at two US hospitals. Analyses used a comprehensive framework based on leading social scientific theories and revealed numerous sources of influence, including hospital administration, colleagues, patients, clinical and professional groups, government, and one's self. Influence was achieved through different means and invoked different psychological processes. Findings motivate a new view of professionals' technology use as a highly social process occurring in a social context, with implications for research, policy, design, and in general the development of a robust social ergonomics.

  16. Multi-Frame Rate Based Multiple-Model Training for Robust Speaker Identification of Disguised Voice

    DEFF Research Database (Denmark)

    Prasad, Swati; Tan, Zheng-Hua; Prasad, Ramjee

    2013-01-01

    Speaker identification systems are prone to attack when voice disguise is adopted by the user. To address this issue,our paper studies the effect of using different frame rates on the accuracy of the speaker identification system for disguised voice.In addition, a multi-frame rate based multiple......-model training method is proposed. The experimental results show the superior performance of the proposed method compared to the commonly used single frame rate method for three types of disguised voice taken from the CHAINS corpus....

  17. The Fregoli delusion: a disorder of person identification and tracking.

    Science.gov (United States)

    Langdon, Robyn; Connaughton, Emily; Coltheart, Max

    2014-10-01

    Fregoli delusion is the mistaken belief that some person currently present in the deluded person's environment (typically a stranger) is a familiar person in disguise. The stranger is believed to be psychologically identical to this known person (who is not present) even though the deluded person perceives the physical appearance of the stranger as being different from the known person's typical appearance. To gain a deeper understanding of this contradictory error in the normal system for tracking and identifying known persons, we conducted a detailed survey of all the Fregoli cases reported in the literature since the seminal Courbon and Fail (1927) paper. Our preliminary reading of these cases revealed a notable lack of definitional clarity. So, we first formulated a classification scheme of different person misidentification delusions so as to identify those cases that qualified as instances of Fregoli according to the above characterization: the mistaken belief that a known person is present in the environment in a different guise to his or her typical appearance. We identified 38 clear cases of this type and set out to answer a series of questions motivated by current hypotheses about the origin of the Fregoli delusion. We asked whether the patients misidentified particular strangers, made reference to the misidentified known persons using wigs or plastic surgery (or other techniques to disguise their appearance), misidentified many different strangers or only one, showed other symptoms (in particular, other misidentification delusions), and made inferences about the motives of the known persons in disguise. We conclude by discussing the implications of our findings for current hypotheses concerning the origin of the Fregoli delusion. Copyright © 2014 Cognitive Science Society, Inc.

  18. A Crowd Avoidance Method Using Circular Avoidance Path for Robust Person Following

    Directory of Open Access Journals (Sweden)

    Kohei Morishita

    2017-01-01

    Full Text Available A life-support service robot must avoid both static and dynamic obstacles for working in a real environment. Here, a static obstacle means an obstacle that does not move, and a dynamic obstacle is the one that moves. Assuming the robot is following a target person, we discuss how the robot avoids a crowd through which the target person passes and arrives at the target position. The purpose of this paper is to propose a crowd avoidance method that makes a robot to be able to avoid both static and dynamic obstacles. The method uses the surface points of the obstacles to form an avoidance region, and the robot moves along the edge of the region. We conducted experiments assuming various situations such that the robot was blocked, there was a wide gap in the crowd, or a person in the crowd yielded for the robot to pass through. As an experimental result, it was confirmed the robot could avoid the crowd even when the obstacles were aligned in an “inverted wedge” shape.

  19. Social Identification in Sports Teams: The Role of Personal, Social, and Collective Identity Motives.

    Science.gov (United States)

    Thomas, William E; Brown, Rupert; Easterbrook, Matthew J; Vignoles, Vivian L; Manzi, Claudia; D'Angelo, Chiara; Holt, Jeremy J

    2017-04-01

    Based on motivated identity construction theory (MICT; Vignoles, 2011), we offer an integrative approach examining the combined roles of six identity motives (self-esteem, distinctiveness, belonging, meaning, continuity, and efficacy) instantiated at three different motivational levels (personal, social, and collective identity) as predictors of group identification. These identity processes were investigated among 369 members of 45 sports teams from England and Italy in a longitudinal study over 6 months with four time points. Multilevel change modeling and cross-lagged analyses showed that satisfaction of four personal identity motives (individuals' personal feelings of self-esteem, distinctiveness, meaning, and efficacy derived from team membership), three social identity motives (individuals' feelings that the team identity carries a sense of belonging, meaning, and continuity), and one collective identity motive (a shared belief in group distinctiveness) significantly predicted group identification. Motivational processes underlying group identification are complex, multilayered, and not reducible to personal needs.

  20. Person identification from aerial footage by a remote-controlled drone.

    Science.gov (United States)

    Bindemann, Markus; Fysh, Matthew C; Sage, Sophie S K; Douglas, Kristina; Tummon, Hannah M

    2017-10-19

    Remote-controlled aerial drones (or unmanned aerial vehicles; UAVs) are employed for surveillance by the military and police, which suggests that drone-captured footage might provide sufficient information for person identification. This study demonstrates that person identification from drone-captured images is poor when targets are unfamiliar (Experiment 1), when targets are familiar and the number of possible identities is restricted by context (Experiment 2), and when moving footage is employed (Experiment 3). Person information such as sex, race and age is also difficult to access from drone-captured footage (Experiment 4). These findings suggest that such footage provides a particularly poor medium for person identification. This is likely to reflect the sub-optimal quality of such footage, which is subject to factors such as the height and velocity at which drones fly, viewing distance, unfavourable vantage points, and ambient conditions.

  1. Attitude Toward Ambiguity: Empirically Robust Factors in Self-Report Personality Scales.

    Science.gov (United States)

    Lauriola, Marco; Foschi, Renato; Mosca, Oriana; Weller, Joshua

    2016-06-01

    Two studies were conducted to examine the factor structure of attitude toward ambiguity, a broad personality construct that refers to personal reactions to perceived ambiguous stimuli in a variety of context and situations. Using samples from two countries, Study 1 mapped the hierarchical structure of 133 items from seven tolerance-intolerance of ambiguity scales (N = 360, Italy; N = 306, United States). Three major factors-Discomfort with Ambiguity, Moral Absolutism/Splitting, and Need for Complexity and Novelty-were recovered in each country with high replicability coefficients across samples. In Study 2 (N = 405, Italian community sample; N =366, English native speakers sample), we carried out a confirmatory analysis on selected factor markers. A bifactor model had an acceptable fit for each sample and reached the construct-level invariance for general and group factors. Convergent validity with related traits was assessed in both studies. We conclude that attitude toward ambiguity can be best represented a multidimensional construct involving affective (Discomfort with Ambiguity), cognitive (Moral Absolutism/Splitting), and epistemic (Need for Complexity and Novelty) components. © The Author(s) 2015.

  2. Control system design for electrical stimulation in upper limb rehabilitation modelling, identification and robust performance

    CERN Document Server

    Freeman, Chris

    2016-01-01

    This book presents a comprehensive framework for model-based electrical stimulation (ES) controller design, covering the whole process needed to develop a system for helping people with physical impairments perform functional upper limb tasks such as eating, grasping and manipulating objects. The book first demonstrates procedures for modelling and identifying biomechanical models of the response of ES, covering a wide variety of aspects including mechanical support structures, kinematics, electrode placement, tasks, and sensor locations. It then goes on to demonstrate how complex functional activities of daily living can be captured in the form of optimisation problems, and extends ES control design to address this case. It then lays out a design methodology, stability conditions, and robust performance criteria that enable control schemes to be developed systematically and transparently, ensuring that they can operate effectively in the presence of realistic modelling uncertainty, physiological variation an...

  3. Algorithm for personal identification in distance learning system based on registration of keyboard rhythm

    Science.gov (United States)

    Nikitin, P. V.; Savinov, A. N.; Bazhenov, R. I.; Sivandaev, S. V.

    2018-05-01

    The article describes the method of identifying a person in distance learning systems based on a keyboard rhythm. An algorithm for the organization of access control is proposed, which implements authentication, identification and verification of a person using the keyboard rhythm. Authentication methods based on biometric personal parameters, including those based on the keyboard rhythm, due to the inexistence of biometric characteristics without a particular person, are able to provide an advanced accuracy and inability to refuse authorship and convenience for operators of automated systems, in comparison with other methods of conformity checking. Methods of permanent hidden keyboard monitoring allow detecting the substitution of a student and blocking the key system.

  4. An automated procedure for identification of a person using gait analysis

    Directory of Open Access Journals (Sweden)

    Alena Galajdová

    2016-10-01

    Full Text Available Different biometric methods are available for identification purpose of a person. The most commonly used are fingerprints, but there are also other biometric methods such as voice, morphology of ears, structure of iris and so on. In some cases, it is required to identify a person according to his/her biomechanical parameters or even his/her gait pattern. Gait is an outstanding biometric behavioural characteristic that is not widely used yet for identification purposes because efficient and proven automated processes are not yet available. Several systems and gait pattern databases have been developed for rapid evaluation and processing of gait. This article describes an original automated evaluation procedure of gait pattern and identification of unique gait parameters for automatic identification purposes.

  5. Identification of a robust gene signature that predicts breast cancer outcome in independent data sets

    International Nuclear Information System (INIS)

    Korkola, James E; Waldman, Frederic M; Blaveri, Ekaterina; DeVries, Sandy; Moore, Dan H II; Hwang, E Shelley; Chen, Yunn-Yi; Estep, Anne LH; Chew, Karen L; Jensen, Ronald H

    2007-01-01

    Breast cancer is a heterogeneous disease, presenting with a wide range of histologic, clinical, and genetic features. Microarray technology has shown promise in predicting outcome in these patients. We profiled 162 breast tumors using expression microarrays to stratify tumors based on gene expression. A subset of 55 tumors with extensive follow-up was used to identify gene sets that predicted outcome. The predictive gene set was further tested in previously published data sets. We used different statistical methods to identify three gene sets associated with disease free survival. A fourth gene set, consisting of 21 genes in common to all three sets, also had the ability to predict patient outcome. To validate the predictive utility of this derived gene set, it was tested in two published data sets from other groups. This gene set resulted in significant separation of patients on the basis of survival in these data sets, correctly predicting outcome in 62–65% of patients. By comparing outcome prediction within subgroups based on ER status, grade, and nodal status, we found that our gene set was most effective in predicting outcome in ER positive and node negative tumors. This robust gene selection with extensive validation has identified a predictive gene set that may have clinical utility for outcome prediction in breast cancer patients

  6. S/HIC: Robust Identification of Soft and Hard Sweeps Using Machine Learning.

    Directory of Open Access Journals (Sweden)

    Daniel R Schrider

    2016-03-01

    Full Text Available Detecting the targets of adaptive natural selection from whole genome sequencing data is a central problem for population genetics. However, to date most methods have shown sub-optimal performance under realistic demographic scenarios. Moreover, over the past decade there has been a renewed interest in determining the importance of selection from standing variation in adaptation of natural populations, yet very few methods for inferring this model of adaptation at the genome scale have been introduced. Here we introduce a new method, S/HIC, which uses supervised machine learning to precisely infer the location of both hard and soft selective sweeps. We show that S/HIC has unrivaled accuracy for detecting sweeps under demographic histories that are relevant to human populations, and distinguishing sweeps from linked as well as neutrally evolving regions. Moreover, we show that S/HIC is uniquely robust among its competitors to model misspecification. Thus, even if the true demographic model of a population differs catastrophically from that specified by the user, S/HIC still retains impressive discriminatory power. Finally, we apply S/HIC to the case of resequencing data from human chromosome 18 in a European population sample, and demonstrate that we can reliably recover selective sweeps that have been identified earlier using less specific and sensitive methods.

  7. Robust cell tracking in epithelial tissues through identification of maximum common subgraphs.

    Science.gov (United States)

    Kursawe, Jochen; Bardenet, Rémi; Zartman, Jeremiah J; Baker, Ruth E; Fletcher, Alexander G

    2016-11-01

    Tracking of cells in live-imaging microscopy videos of epithelial sheets is a powerful tool for investigating fundamental processes in embryonic development. Characterizing cell growth, proliferation, intercalation and apoptosis in epithelia helps us to understand how morphogenetic processes such as tissue invagination and extension are locally regulated and controlled. Accurate cell tracking requires correctly resolving cells entering or leaving the field of view between frames, cell neighbour exchanges, cell removals and cell divisions. However, current tracking methods for epithelial sheets are not robust to large morphogenetic deformations and require significant manual interventions. Here, we present a novel algorithm for epithelial cell tracking, exploiting the graph-theoretic concept of a 'maximum common subgraph' to track cells between frames of a video. Our algorithm does not require the adjustment of tissue-specific parameters, and scales in sub-quadratic time with tissue size. It does not rely on precise positional information, permitting large cell movements between frames and enabling tracking in datasets acquired at low temporal resolution due to experimental constraints such as phototoxicity. To demonstrate the method, we perform tracking on the Drosophila embryonic epidermis and compare cell-cell rearrangements to previous studies in other tissues. Our implementation is open source and generally applicable to epithelial tissues. © 2016 The Authors.

  8. Identification of persons entering through the door from the accelerometers data

    OpenAIRE

    Vodopivec, Tadej

    2013-01-01

    This thesis presents a system for automatic identification of a person who walks through a door based on the information gathered with acceleration sensors, which are mounted on the door. The proccedure for automatic identification consists of four steps. In the first step, data acquisition and coordinate system rotation is performed. Coordinate system rotation is needed in order to match the direction of measured accelerations with the direction of components of the forces acting on the door...

  9. Hyperspectral Based Skin Detection for Person of Interest Identification

    Science.gov (United States)

    2015-03-01

    short-wave infrared VIS visible spectrum PCA principal component analysis FCBF Fast Correlation- Based Filter POI person of interest ANN artificial neural...an artificial neural network (ANN) that is created in MATLAB® using the Neural Network Toolbox to identify a POI based on their skin spectral data. A...identifying a POI based on skin spectral data. She identified an optimal feature subset to be used with the hyperspectral data she collected using a

  10. Personal Identification and the Assessment of the Psychophysiological State While Writing a Signature

    Directory of Open Access Journals (Sweden)

    Pavel Lozhnikov

    2015-08-01

    Full Text Available This article discusses the problem of user identification and psychophysiological state assessment while writing a signature using a graphics tablet. The solution of the problem includes the creation of templates containing handwriting signature features simultaneously with the hidden registration of physiological parameters of a person being tested. Heart rate variability description in the different time points is used as a physiological parameter. As a result, a signature template is automatically generated for psychophysiological states of an identified person. The problem of user identification and psychophysiological state assessment is solved depending on the registered value of a physiological parameter.

  11. Automated personal identification: a new technique for controlling access to nuclear materials and facilities

    International Nuclear Information System (INIS)

    Eccles, D.R.

    1975-01-01

    Special nuclear materials must be protected against the threat of diversion or theft, and nuclear facilities against the threat of industrial sabotage. Implicit in this protection is the means of controlling access to protected areas, material access areas, and vital areas. With the advent of automated personal identification technology, the processes of access control can be automated to yield both higher security and reduced costs. This paper first surveys the conventional methods of access control; next, automated personal identification concepts are presented and various systems approaches are highlighted; finally, Calspan's FINGERSCAN /sub TM/ system for identity verification is described

  12. Efficient and robust identification of cortical targets in concurrent TMS-fMRI experiments

    Science.gov (United States)

    Yau, Jeffrey M.; Hua, Jun; Liao, Diana A.; Desmond, John E.

    2014-01-01

    Transcranial magnetic stimulation (TMS) can be delivered during fMRI scans to evoke BOLD responses in distributed brain networks. While concurrent TMS-fMRI offers a potentially powerful tool for non-invasively investigating functional human neuroanatomy, the technique is currently limited by the lack of methods to rapidly and precisely localize targeted brain regions – a reliable procedure is necessary for validly relating stimulation targets to BOLD activation patterns, especially for cortical targets outside of motor and visual regions. Here we describe a convenient and practical method for visualizing coil position (in the scanner) and identifying the cortical location of TMS targets without requiring any calibration or any particular coil-mounting device. We quantified the precision and reliability of the target position estimates by testing the marker processing procedure on data from 9 scan sessions: Rigorous testing of the localization procedure revealed minimal variability in coil and target position estimates. We validated the marker processing procedure in concurrent TMS-fMRI experiments characterizing motor network connectivity. Together, these results indicate that our efficient method accurately and reliably identifies TMS targets in the MR scanner, which can be useful during scan sessions for optimizing coil placement and also for post-scan outlier identification. Notably, this method can be used generally to identify the position and orientation of MR-compatible hardware placed near the head in the MR scanner. PMID:23507384

  13. Model reduction and frequency residuals for a robust estimation of nonlinearities in subspace identification

    Science.gov (United States)

    De Filippis, G.; Noël, J. P.; Kerschen, G.; Soria, L.; Stephan, C.

    2017-09-01

    The introduction of the frequency-domain nonlinear subspace identification (FNSI) method in 2013 constitutes one in a series of recent attempts toward developing a realistic, first-generation framework applicable to complex structures. If this method showed promising capabilities when applied to academic structures, it is still confronted with a number of limitations which needs to be addressed. In particular, the removal of nonphysical poles in the identified nonlinear models is a distinct challenge. In the present paper, it is proposed as a first contribution to operate directly on the identified state-space matrices to carry out spurious pole removal. A modal-space decomposition of the state and output matrices is examined to discriminate genuine from numerical poles, prior to estimating the extended input and feedthrough matrices. The final state-space model thus contains physical information only and naturally leads to nonlinear coefficients free of spurious variations. Besides spurious variations due to nonphysical poles, vibration modes lying outside the frequency band of interest may also produce drifts of the nonlinear coefficients. The second contribution of the paper is to include residual terms, accounting for the existence of these modes. The proposed improved FNSI methodology is validated numerically and experimentally using a full-scale structure, the Morane-Saulnier Paris aircraft.

  14. Multi-stage robust scheme for citrus identification from high resolution airborne images

    Science.gov (United States)

    Amorós-López, Julia; Izquierdo Verdiguier, Emma; Gómez-Chova, Luis; Muñoz-Marí, Jordi; Zoilo Rodríguez-Barreiro, Jorge; Camps-Valls, Gustavo; Calpe-Maravilla, Javier

    2008-10-01

    Identification of land cover types is one of the most critical activities in remote sensing. Nowadays, managing land resources by using remote sensing techniques is becoming a common procedure to speed up the process while reducing costs. However, data analysis procedures should satisfy the accuracy figures demanded by institutions and governments for further administrative actions. This paper presents a methodological scheme to update the citrus Geographical Information Systems (GIS) of the Comunidad Valenciana autonomous region, Spain). The proposed approach introduces a multi-stage automatic scheme to reduce visual photointerpretation and ground validation tasks. First, an object-oriented feature extraction process is carried out for each cadastral parcel from very high spatial resolution (VHR) images (0.5m) acquired in the visible and near infrared. Next, several automatic classifiers (decision trees, multilayer perceptron, and support vector machines) are trained and combined to improve the final accuracy of the results. The proposed strategy fulfills the high accuracy demanded by policy makers by means of combining automatic classification methods with visual photointerpretation available resources. A level of confidence based on the agreement between classifiers allows us an effective management by fixing the quantity of parcels to be reviewed. The proposed methodology can be applied to similar problems and applications.

  15. PhasePApy: A robust pure Python package for automatic identification of seismic phases

    Science.gov (United States)

    Chen, Chen; Holland, Austin

    2016-01-01

    We developed a Python phase identification package: the PhasePApy for earthquake data processing and near‐real‐time monitoring. The package takes advantage of the growing number of Python libraries including Obspy. All the data formats supported by Obspy can be supported within the PhasePApy. The PhasePApy has two subpackages: the PhasePicker and the Associator, aiming to identify phase arrival onsets and associate them to phase types, respectively. The PhasePicker and the Associator can work jointly or separately. Three autopickers are implemented in the PhasePicker subpackage: the frequency‐band picker, the Akaike information criteria function derivative picker, and the kurtosis picker. All three autopickers identify picks with the same processing methods but different characteristic functions. The PhasePicker triggers the pick with a dynamic threshold and can declare a pick with false‐pick filtering. Also, the PhasePicker identifies a pick polarity and uncertainty for further seismological analysis, such as focal mechanism determination. Two associators are included in the Associator subpackage: the 1D Associator and 3D Associator, which assign phase types to picks that can best fit potential earthquakes by minimizing root mean square (rms) residuals of the misfits in distance and time, respectively. The Associator processes multiple picks from all channels at a seismic station and aggregates them to increase computational efficiencies. Both associators use travel‐time look up tables to determine the best estimation of the earthquake location and evaluate the phase type for picks. The PhasePApy package has been used extensively for local and regional earthquakes and can work for active source experiments as well.

  16. Personalized identification of differentially expressed pathways in pediatric sepsis.

    Science.gov (United States)

    Li, Binjie; Zeng, Qiyi

    2017-10-01

    Sepsis is a leading killer of children worldwide with numerous differentially expressed genes reported to be associated with sepsis. Identifying core pathways in an individual is important for understanding septic mechanisms and for the future application of custom therapeutic decisions. Samples used in the study were from a control group (n=18) and pediatric sepsis group (n=52). Based on Kauffman's attractor theory, differentially expressed pathways associated with pediatric sepsis were detected as attractors. When the distribution results of attractors are consistent with the distribution of total data assessed using support vector machine, the individualized pathway aberrance score (iPAS) was calculated to distinguish differences. Through attractor and Kyoto Encyclopedia of Genes and Genomes functional analysis, 277 enriched pathways were identified as attractors. There were 81 pathways with Ppathways with Ppathway clusters and four sample clusters. Thus, in the majority pediatric sepsis samples, core pathways can be detected as different from accumulated normal samples. In conclusion, a novel procedure that identified the dysregulated attractors in individuals with pediatric sepsis was constructed. Attractors can be markers to identify pathways involved in pediatric sepsis. iPAS may provide a correlation score for each of the signaling pathways present in an individual patient. This process may improve the personalized interpretation of disease mechanisms and may be useful in the forthcoming era of personalized medicine.

  17. A Study of Hand Back Skin Texture Patterns for Personal Identification and Gender Classification

    Directory of Open Access Journals (Sweden)

    Jin Xie

    2012-06-01

    Full Text Available Human hand back skin texture (HBST is often consistent for a person and distinctive from person to person. In this paper, we study the HBST pattern recognition problem with applications to personal identification and gender classification. A specially designed system is developed to capture HBST images, and an HBST image database was established, which consists of 1,920 images from 80 persons (160 hands. An efficient texton learning based method is then presented to classify the HBST patterns. First, textons are learned in the space of filter bank responses from a set of training images using the -minimization based sparse representation (SR technique. Then, under the SR framework, we represent the feature vector at each pixel over the learned dictionary to construct a representation coefficient histogram. Finally, the coefficient histogram is used as skin texture feature for classification. Experiments on personal identification and gender classification are performed by using the established HBST database. The results show that HBST can be used to assist human identification and gender classification.

  18. The clinical identification of peripheral neuropathy among older persons.

    Science.gov (United States)

    Richardson, James K

    2002-11-01

    To identify simple clinical rules for the detection of a diffuse peripheral neuropathy among older outpatients. Observational, blinded, controlled study. A tertiary-care electrodiagnostic laboratory and biomechanics laboratory. One hundred research subjects, 68 with electrodiagnostic evidence of peripheral neuropathy, between the ages of 50 and 80 years. Not applicable. One examiner, unaware of the results of electrodiagnostic testing, evaluated Achilles' and patellar reflexes, Romberg testing, semiquantified vibration, and position sense at the toe and ankle in all subjects, and unipedal stance time and the Michigan Diabetes Neuropathy Score in a subset of subjects. Significant group differences were present in all clinical measures tested. Three signs, Achilles' reflex (absent despite facilitation), vibration (128Hz tuning fork perceived for <10s), and position sense (<8/10 1-cm trials) at the toe, were the best predictors of peripheral neuropathy on both univariate and logistic regression (pseudo R(2)=.744) analyses. The presence of 2 or 3 signs versus 0 or 1 sign identified peripheral neuropathy with sensitivity, specificity, and positive and negative predictive values of 94.1%, 84.4%, 92.8%, and 87.1%, respectively. Values were similar among subgroups of subjects with and without diabetes mellitus. When other clinicians applied the technique to 12 more subjects, excellent interrater reliability regarding the presence of peripheral neuropathy (kappa=.833) and good to excellent interrater reliability for each sign (kappa range,.667-1.00) were shown. Among older persons, the presence of 2 or 3 of the 3 clinical signs strongly suggested electrodiagnostic evidence of a peripheral neuropathy, regardless of etiology. Age-related decline in peripheral nerve function need not be a barrier to the clinical recognition of a diffuse peripheral neuropathy among older persons. Copyright 2002 by the American Congress of Rehabilitation Medicine and the American Academy of

  19. Person re-identification using height-based gait in colour depth camera

    NARCIS (Netherlands)

    John, V.; Englebienne, G.; Kröse, B.

    2013-01-01

    We address the problem of person re-identification in colour-depth camera using the height temporal information of people. Our proposed gait-based feature corresponds to the frequency response of the height temporal information. We demonstrate that the discriminative periodic motion associated with

  20. Preschoolers' Person Description and Identification Accuracy: A Comparison of the Simultaneous and Elimination Lineup Procedures

    Science.gov (United States)

    Pozzulo, Joanna D.; Dempsey, Julie; Crescini, Charmagne

    2009-01-01

    Preschoolers' (3- to 6-year-olds) person description and identification abilities were examined using the simultaneous and elimination lineup procedures. Participants (N = 100) were exposed to a 20-minute mask-making session conducted by a female confederate who acted as the mask-making teacher. After a brief delay (20 min), participants were…

  1. Identification during imposed change: the roles of personal values, type of change, and anxiety.

    Science.gov (United States)

    Sverdlik, Noga; Oreg, Shaul

    2015-06-01

    Using a person-situation perspective, we explain what happens to individuals' identification with a collective in the context of a change. We propose that given the anxiety that often emerges during change, individuals' personal values (conservation and openness to change) interact with type of change (imposed vs. voluntary) in predicting identification following change. In a pilot, longitudinal field study (N = 61, 67% female) of an imposed university campus relocation, we measured employees' values and identification with the university before and several months after the relocation. In two lab experiments (Study 1: N = 104, 91.3% female; Study 2: N = 113, 75.2% female), we manipulated a change to be either imposed or voluntary and compared the relationships between values and identification across types of change. In Study 2, we also measured anxiety from the change. When change was imposed (all three studies), but not when voluntary (Studies 1 and 2), individuals' conservation was positively, and openness negatively, related to individuals' post-change identification. The effects emerged only for individuals who experienced change-related anxiety (Study 2). Our findings demonstrate that individuals' identification with a changing collective depends on the amount of anxiety change elicits and on the particular combination of their values and type of change. © 2014 Wiley Periodicals, Inc.

  2. How do brand personality, identification, and relationship length drive loyalty in sports?

    OpenAIRE

    Karjaluoto, Heikki; Munnukka, Juha; Salmi, Milja

    2016-01-01

    Purpose – The purpose of this paper is to extend brand identification theory to the sports team context by testing the direct and indirect effects of a sports team’s personality, sports fans’ identification with the team, and the effect of the length of fans’ relationship with a team on their loyalty to it. Design/methodology/approach – The authors conducted a quantitative study among ice hockey fans of one Finnish hockey team before play-off games. Data came from an online question...

  3. Tri-modal Person Re-identification with RGB, Depth and Thermal Features

    DEFF Research Database (Denmark)

    Møgelmose, Andreas; Bahnsen, Chris; Moeslund, Thomas B.

    2013-01-01

    Person re-identification is about recognizing people who have passed by a sensor earlier. Previous work is mainly based on RGB data, but in this work we for the first time present a system where we combine RGB, depth, and thermal data for re-identification purposes. First, from each of the three...... modalities, we obtain some particular features: from RGB data, we model color information from different regions of the body, from depth data, we compute different soft body biometrics, and from thermal data, we extract local structural information. Then, the three information types are combined in a joined...

  4. Molecular formula and METLIN Personal Metabolite Database matching applied to the identification of compounds generated by LC/TOF-MS.

    Science.gov (United States)

    Sana, Theodore R; Roark, Joseph C; Li, Xiangdong; Waddell, Keith; Fischer, Steven M

    2008-09-01

    In an effort to simplify and streamline compound identification from metabolomics data generated by liquid chromatography time-of-flight mass spectrometry, we have created software for constructing Personalized Metabolite Databases with content from over 15,000 compounds pulled from the public METLIN database (http://metlin.scripps.edu/). Moreover, we have added extra functionalities to the database that (a) permit the addition of user-defined retention times as an orthogonal searchable parameter to complement accurate mass data; and (b) allow interfacing to separate software, a Molecular Formula Generator (MFG), that facilitates reliable interpretation of any database matches from the accurate mass spectral data. To test the utility of this identification strategy, we added retention times to a subset of masses in this database, representing a mixture of 78 synthetic urine standards. The synthetic mixture was analyzed and screened against this METLIN urine database, resulting in 46 accurate mass and retention time matches. Human urine samples were subsequently analyzed under the same analytical conditions and screened against this database. A total of 1387 ions were detected in human urine; 16 of these ions matched both accurate mass and retention time parameters for the 78 urine standards in the database. Another 374 had only an accurate mass match to the database, with 163 of those masses also having the highest MFG score. Furthermore, MFG calculated a formula for a further 849 ions that had no match to the database. Taken together, these results suggest that the METLIN Personal Metabolite database and MFG software offer a robust strategy for confirming the formula of database matches. In the event of no database match, it also suggests possible formulas that may be helpful in interpreting the experimental results.

  5. The native-language benefit for talker identification is robust in 7.5-month-old infants.

    Science.gov (United States)

    Fecher, Natalie; Johnson, Elizabeth K

    2018-04-26

    Adults recognize talkers better when the talkers speak a familiar language than when they speak an unfamiliar language. This language familiarity effect (LFE) demonstrates the inseparable nature of linguistic and indexical information in adult spoken language processing. Relatively little is known about children's integration of linguistic and indexical information in speech. For example, to date, only one study has explored the LFE in infants. Here, we sought to better understand the maturation of speech processing abilities in infants by replicating this earlier study using a more stringent experimental design (eliminating a potential voice-language confound), a different test population (English- rather than Dutch-learning infants), and a new language pairing (English vs. Polish rather than Dutch vs. Italian or Japanese). Furthermore, we explored the language exposure conditions required for infants to develop an LFE for a formerly unfamiliar language. We hypothesized based on previous studies (including the perceptual narrowing literature) that infants might develop an LFE more readily than would adults. Although our findings replicate those of the earlier study-demonstrating that the LFE is robust in 7.5-month-olds-we found no evidence that infants need less language exposure than do adults to develop an LFE. We concluded that both infants and adults need extensive (potentially live) exposure to an unfamiliar language before talker identification in that language improves. Moreover, our study suggests that the LFE is likely rooted in early emerging phonology rather than shared lexical knowledge and that infants already closely resemble adults in their processing of linguistic and indexical information. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  6. How brand personality, brand identification and service quality influence service brand equity

    Directory of Open Access Journals (Sweden)

    Sandra Maria Correia Loureiro

    2014-12-01

    Full Text Available During the past couple of decades, brand equity has emerged as one of the key concepts in marketing. Literature concerned with consumer brand relationship is calling for more studies in order to increase understanding of brand equity dimensions. Therefore, this study aims to contribute to the existing body of knowledge by examining the strength of relational variables on brand equity perceived by consumers. Findings support the proposed model in the service industry revealing that brand loyalty, brand identification, trust, brand personality and brand awareness are the variables that have a greatest impact on brand equity. Thus, this study is the first to measure the strength of assorted relational variables, and variables related with identification and personality on brand equity for brands in the service industry. In this vein, brand managers should be aware of the importance of building a brand regarding the way they communicate the features of the brand.

  7. Ensemble of different approaches for a reliable person re-identification system

    Directory of Open Access Journals (Sweden)

    Loris Nanni

    2016-07-01

    Full Text Available An ensemble of approaches for reliable person re-identification is proposed in this paper. The proposed ensemble is built combining widely used person re-identification systems using different color spaces and some variants of state-of-the-art approaches that are proposed in this paper. Different descriptors are tested, and both texture and color features are extracted from the images; then the different descriptors are compared using different distance measures (e.g., the Euclidean distance, angle, and the Jeffrey distance. To improve performance, a method based on skeleton detection, extracted from the depth map, is also applied when the depth map is available. The proposed ensemble is validated on three widely used datasets (CAVIAR4REID, IAS, and VIPeR, keeping the same parameter set of each approach constant across all tests to avoid overfitting and to demonstrate that the proposed system can be considered a general-purpose person re-identification system. Our experimental results show that the proposed system offers significant improvements over baseline approaches. The source code used for the approaches tested in this paper will be available at https://www.dei.unipd.it/node/2357 and http://robotics.dei.unipd.it/reid/.

  8. Assessment of the stability of morphological ECG features and their potential for person verification/identification

    Directory of Open Access Journals (Sweden)

    Matveev Mikhail

    2017-01-01

    Full Text Available This study investigates the potential of a set of ECG morphological features for person verification/identification. The measurements are done over 145 pairs of ECG recordings from healthy subjects, acquired 5 years apart (T1, T2 = T1+5 years. Time, amplitude, area and slope descriptors of the QRS-T pattern are analysed in 4 ECG leads, forming quasi-orthogonal lead system (II&III, V1, V5. The correspondence between feature values in T1 and T2 is verified via factor analysis by principal components extraction method; correlation analysis applied over the measurements in T1 and T2; synthesis of regression equations for prediction of features’ values in T2 based on T1 measurements; and cluster analysis for assessment of the correspondence between measured and predicted feature values. Thus, 11 amplitude descriptors of the QRS complex are highlighted as stable, i.e. keeping their strong correlation (≥0.7 within a certain factor, weak correlation (<0.3 with the features from the remaining factors and presenting high correlation in the two measurement periods that is a sign for their person verification/identification potential. The observed coincidence between feature values measured in T2 and predicted via the designed regression models (r=0.93 suggests about the confidence of person identification via the proposed morphological features.

  9. The Use of Personal Projects Analysis to Enhance Occupational Therapy Goal Identification

    Directory of Open Access Journals (Sweden)

    Mary Egan

    2016-01-01

    Full Text Available Background: Client-centered occupational therapy begins with the identification of personally-relevant patient goals. This study aimed to determine whether the elicitation module of Personal Projects Analysis (PPA could help patients in an acquired brain injury day hospital program identify more meaningful goals than those identified using the Canadian Occupational Performance Measure (COPM alone. Method: Ten patients completed the COPM. They rated the importance of each goal and their confidence that they could attain each goal. During the next session, using the elicitation module of PPA, they identified personal projects just prior to their brain injuries, current personal projects, and future desired personal projects. They were then invited to revise their COPM goals and re-rate them for importance and confidence. Results: Following completion of the elicitation module of PPA, seven participants changed at least one goal. Of the goals that were changed, half were revised to include the mention of another person. There were no significant changes in average goal importance or perceived attainability. Occupational therapists reported that the elicitation module of PPA helped them get to know their patients better and identify potential therapeutic occupations. Discussion: The elicitation module of PPA may help people develop goals that are more embedded in their social contexts.

  10. Interpreting Low Personality Psychopathology--Five Aggressiveness Scores on the MMPI-2: Graphical, Robust, and Resistant Data Analysis

    Science.gov (United States)

    Weisenburger, Susan M.; Harkness, Allan R.; McNulty, John L.; Graham, John R.; Ben-Porath, Yossef S.

    2008-01-01

    The Minnesota Mutiphasic Personality Inventory-2 (MMPI-2)-based Personality Psychopathology-Five (PSY-5) scales provide an overview of personality individual differences. Several textbooks and a test report offer instruction on interpreting MMPI-2 PSY-5 scores. On the basis of an earlier item response theory article (S. V. Rouse, M. S. Finger,…

  11. Robust Speaker Authentication Based on Combined Speech and Voiceprint Recognition

    Science.gov (United States)

    Malcangi, Mario

    2009-08-01

    Personal authentication is becoming increasingly important in many applications that have to protect proprietary data. Passwords and personal identification numbers (PINs) prove not to be robust enough to ensure that unauthorized people do not use them. Biometric authentication technology may offer a secure, convenient, accurate solution but sometimes fails due to its intrinsically fuzzy nature. This research aims to demonstrate that combining two basic speech processing methods, voiceprint identification and speech recognition, can provide a very high degree of robustness, especially if fuzzy decision logic is used.

  12. Retrival experience as an accurate indicator of person identification in line-ups

    Directory of Open Access Journals (Sweden)

    María José Contreras

    2011-07-01

    Full Text Available Responses in eyewitness identification of a person in a line-up may be based on two types of recovery experiences, remember and know experiences. Remember responses involve eyewitness identification of the target person as an episodic memory task, because it implies retrieving information about the target person in the place and at the time of the event. Know responses, in contrast, engage recognition based on familiarity or perceptual facilitation, that is, as a semantic memory task. To explore the relation between retrieval experiences and recognition accuracy, 86 participants took part in a recognition task with two conditions: one with an interpolated target absent line-up and the other only with the target present line-up. Accuracy of recognition and retrieval experience was measured. The results showed that, having previously participated in a target-absent line-up, increased omissions, while the number of hits decreased. Furthermore, participants’ know responses were associated to false recognition, whilst remember responses were associated to hits in recognition. Thus, asking eyewitnesses to inform about the kind of retrieval experience in which they based their recognition responses, may serve as a reliable indicator of accuracy in recognition. Future studies are needed to investigate whether this is also the case in natural settings.

  13. Evaluation of 13 short tandem repeated loci for use in personal identification applications

    Energy Technology Data Exchange (ETDEWEB)

    Hammond, H.A.; Caskey, C.T. (Baylor College of Medicine, Houston, TX (United States)); Jin, L.; Zhong, Y.; Chakraborty, R. (Univ. of Texas Graduate School of Biomedical Sciences, Houston, TX (United States))

    1994-07-01

    Personal identification by using DNA typing methodologies has been an issue in the popular and scientific press for several years. The authors present a PCR-based DNA-typing method using 13 unlinked short tandem repeat (STR) loci. Validation of the loci and methodology has been performed to meet standards set by the forensic community and the accrediting organization for parentage testing. Extensive statistical analysis has addressed the issues surrounding the presentation of [open quotes]match[close quotes] statistics. The authors have found STR loci to provide a rapid, sensitive, and reliable method of DNA typing for parentage testing, forensic identification, and medical diagnostics. Valid statistical analysis is generally simpler than similar analysis of RFLP-VNTR results and provides powerful statistical evidence of the low frequency of random multilocus genotype matching. 54 refs., 4 figs., 6 tabs.

  14. The PDD-MRS : An instrument for identification of autism spectrum disorders in persons with mental retardation

    NARCIS (Netherlands)

    Kraijer, D; de Bildt, A

    The Scale of Pervasive Developmental Disorder in Mentally Retarded Persons (PDD-MRS) is described. The PDD-MRS is a simple classification and screening instrument devised for identification of autistic disorders (of the entire spectrum) in persons with mental retardation from mild to profound

  15. Personal value preferences, group identifications, and cultural practices of Palestinian Israelis working in close contact with Jewish Israelis.

    Science.gov (United States)

    Tartakovsky, Eugene; Abu Kheit, Ayat

    2017-01-01

    The present study investigates the connection between personal value preferences, group identifications, and cultural practices among Palestinian Israelis working in close contact with the Jewish population in Israel. One hundred twenty-two Palestinian Israelis participated in the study. The participants were employed in different professional positions in the Tel Aviv Metropolitan area and were recruited to the study using the snowball technique. A stronger national identification was associated with a higher preference for the security and conformity values, and a lower preference for the humility values. A stronger ethnic identification was associated with a lower preference for the security, power, and stimulation values. Group identifications mediated the connection between personal value preferences and cultural practices. A longer time working in close contact with the majority group and less frequent visits home were associated with a greater adherence to the majority group's cultural practices but not with adherence to the ethnic group's practices and not with the group identifications.

  16. Identification of a robust subpathway-based signature for acute myeloid leukemia prognosis using an miRNA integrated strategy.

    Science.gov (United States)

    Chang, Huijuan; Gao, Qiuying; Ding, Wei; Qing, Xueqin

    2018-01-01

    Acute myeloid leukemia (AML) is a heterogeneous disease, and survival signatures are urgently needed to better monitor treatment. MiRNAs displayed vital regulatory roles on target genes, which was necessary involved in the complex disease. We therefore examined the expression levels of miRNAs and genes to identify robust signatures for survival benefit analyses. First, we reconstructed subpathway graphs by embedding miRNA components that were derived from low-throughput miRNA-gene interactions. Then, we randomly divided the data sets from The Cancer Genome Atlas (TCGA) into training and testing sets, and further formed 100 subsets based on the training set. Using each subset, we identified survival-related miRNAs and genes, and identified survival subpathways based on the reconstructed subpathway graphs. After statistical analyses of these survival subpathways, the most robust subpathways with the top three ranks were identified, and risk scores were calculated based on these robust subpathways for AML patient prognoses. Among these robust subpathways, three representative subpathways, path: 05200_10 from Pathways in cancer, path: 04110_20 from Cell cycle, and path: 04510_8 from Focal adhesion, were significantly associated with patient survival in the TCGA training and testing sets based on subpathway risk scores. In conclusion, we performed integrated analyses of miRNAs and genes to identify robust prognostic subpathways, and calculated subpathway risk scores to characterize AML patient survival.

  17. Morphological Variations and Biometrics of Ear: An Aid to Personal Identification.

    Science.gov (United States)

    Verma, Pradhuman; Sandhu, Harpreet Kaur; Verma, Kanika Gupta; Goyal, Sharry; Sudan, Madhu; Ladgotra, Amit

    2016-05-01

    The morphological characteristics and dimensions of external ear vary in different human ethnic races which can be utilized in forensics for personal identification of living or deceased. To determine uniqueness of morphological and biometric variations of both ears for individualization among North East (NE) and North West (NW) subpopulation of India. The study was conducted on randomly selected 80 students, 40 from each subgroup. Nine ear parameters were recorded twice using digital Vernier's caliper by single investigator and two indices (Ear Index and Lobule Index) were calculated for both the ears. Morphological ear shapes and lobule attachment were also noted. Pearson's coefficient correlation test was performed on cross-tabulations to evaluate significant relationship between different variables. Of the total 35% free and 65% attached ear lobes were noted in both population groups. Oval ear shape was most commonly noted followed by triangular, rectangular and round in both populations. On comparing anthropometric measurements of ears in two populations it was found that except the tragus length and lobule index all other values were noted more in NW population. No statistical difference was found in ear and lobular indices of males and females although the left ear index and lobule index were found to be higher than right in both populations except in NW females where right lobule index was recorded more than left. The results obtained can be used in anthropological and forensic sciences for the inclusion and exclusion of persons for identification on the basis of ear variations.

  18. GOexpress: an R/Bioconductor package for the identification and visualisation of robust gene ontology signatures through supervised learning of gene expression data.

    Science.gov (United States)

    Rue-Albrecht, Kévin; McGettigan, Paul A; Hernández, Belinda; Nalpas, Nicolas C; Magee, David A; Parnell, Andrew C; Gordon, Stephen V; MacHugh, David E

    2016-03-11

    Identification of gene expression profiles that differentiate experimental groups is critical for discovery and analysis of key molecular pathways and also for selection of robust diagnostic or prognostic biomarkers. While integration of differential expression statistics has been used to refine gene set enrichment analyses, such approaches are typically limited to single gene lists resulting from simple two-group comparisons or time-series analyses. In contrast, functional class scoring and machine learning approaches provide powerful alternative methods to leverage molecular measurements for pathway analyses, and to compare continuous and multi-level categorical factors. We introduce GOexpress, a software package for scoring and summarising the capacity of gene ontology features to simultaneously classify samples from multiple experimental groups. GOexpress integrates normalised gene expression data (e.g., from microarray and RNA-seq experiments) and phenotypic information of individual samples with gene ontology annotations to derive a ranking of genes and gene ontology terms using a supervised learning approach. The default random forest algorithm allows interactions between all experimental factors, and competitive scoring of expressed genes to evaluate their relative importance in classifying predefined groups of samples. GOexpress enables rapid identification and visualisation of ontology-related gene panels that robustly classify groups of samples and supports both categorical (e.g., infection status, treatment) and continuous (e.g., time-series, drug concentrations) experimental factors. The use of standard Bioconductor extension packages and publicly available gene ontology annotations facilitates straightforward integration of GOexpress within existing computational biology pipelines.

  19. Proposal for internet-based Digital Dental Chart for personal dental identification in forensics.

    Science.gov (United States)

    Hanaoka, Yoichi; Ueno, Asao; Tsuzuki, Tamiyuki; Kajiwara, Masahiro; Minaguchi, Kiyoshi; Sato, Yoshinobu

    2007-05-03

    A dental chart is very useful as a standard source of evidence in the personal identification of bodies. However, the kind of dental chart available will often vary as a number of types of odontogram have been developed where the visual representation of dental conditions has relied on hand-drawn representation. We propose the Digital Dental Chart (DDC) as a new style of dental chart, especially for open investigations aimed at establishing the identity of unknown bodies. Each DDC is constructed using actual oral digital images and dental data, and is easy to upload onto an Internet website. The DDC is a more useful forensic resource than the standard types of dental chart in current use as it has several advantages, among which are its ability to carry a large volume of information and reproduce dental conditions clearly and in detail on a cost-effective basis.

  20. Enhancing the Security of Personal Identification Numbers with Three-Dimensional Displays

    Directory of Open Access Journals (Sweden)

    Mun-Kyu Lee

    2016-01-01

    Full Text Available Passwords and personal identification numbers (PINs are convenient and ubiquitous, but they are quite vulnerable to attackers who stand near the user (“shoulder-surfers”. This problem may be partially resolved by changing the user interface, but previous solutions of this kind still give shoulder-surfing attackers a significant advantage over brute force search. This paper provides a novel solution based on three dimensions, particularly suitable for glasses-free three-dimensional (3D displays found in many smartphones and handheld game consoles. A user at the “3D spot” may log in easily, while nearby shoulder-surfers gain no advantage. A detailed experimental usability analysis is performed to demonstrate the effectiveness of the proposed scheme in comparison to the existing methods.

  1. Combining metal oxide affinity chromatography (MOAC and selective mass spectrometry for robust identification of in vivo protein phosphorylation sites

    Directory of Open Access Journals (Sweden)

    Weckwerth Wolfram

    2005-11-01

    Full Text Available Abstract Background Protein phosphorylation is accepted as a major regulatory pathway in plants. More than 1000 protein kinases are predicted in the Arabidopsis proteome, however, only a few studies look systematically for in vivo protein phosphorylation sites. Owing to the low stoichiometry and low abundance of phosphorylated proteins, phosphorylation site identification using mass spectrometry imposes difficulties. Moreover, the often observed poor quality of mass spectra derived from phosphopeptides results frequently in uncertain database hits. Thus, several lines of evidence have to be combined for a precise phosphorylation site identification strategy. Results Here, a strategy is presented that combines enrichment of phosphoproteins using a technique termed metaloxide affinity chromatography (MOAC and selective ion trap mass spectrometry. The complete approach involves (i enrichment of proteins with low phosphorylation stoichiometry out of complex mixtures using MOAC, (ii gel separation and detection of phosphorylation using specific fluorescence staining (confirmation of enrichment, (iii identification of phosphoprotein candidates out of the SDS-PAGE using liquid chromatography coupled to mass spectrometry, and (iv identification of phosphorylation sites of these enriched proteins using automatic detection of H3PO4 neutral loss peaks and data-dependent MS3-fragmentation of the corresponding MS2-fragment. The utility of this approach is demonstrated by the identification of phosphorylation sites in Arabidopsis thaliana seed proteins. Regulatory importance of the identified sites is indicated by conservation of the detected sites in gene families such as ribosomal proteins and sterol dehydrogenases. To demonstrate further the wide applicability of MOAC, phosphoproteins were enriched from Chlamydomonas reinhardtii cell cultures. Conclusion A novel phosphoprotein enrichment procedure MOAC was applied to seed proteins of A. thaliana and to

  2. Feature Extraction with GMDH-Type Neural Networks for EEG-Based Person Identification.

    Science.gov (United States)

    Schetinin, Vitaly; Jakaite, Livija; Nyah, Ndifreke; Novakovic, Dusica; Krzanowski, Wojtek

    2018-08-01

    The brain activity observed on EEG electrodes is influenced by volume conduction and functional connectivity of a person performing a task. When the task is a biometric test the EEG signals represent the unique "brain print", which is defined by the functional connectivity that is represented by the interactions between electrodes, whilst the conduction components cause trivial correlations. Orthogonalization using autoregressive modeling minimizes the conduction components, and then the residuals are related to features correlated with the functional connectivity. However, the orthogonalization can be unreliable for high-dimensional EEG data. We have found that the dimensionality can be significantly reduced if the baselines required for estimating the residuals can be modeled by using relevant electrodes. In our approach, the required models are learnt by a Group Method of Data Handling (GMDH) algorithm which we have made capable of discovering reliable models from multidimensional EEG data. In our experiments on the EEG-MMI benchmark data which include 109 participants, the proposed method has correctly identified all the subjects and provided a statistically significant ([Formula: see text]) improvement of the identification accuracy. The experiments have shown that the proposed GMDH method can learn new features from multi-electrode EEG data, which are capable to improve the accuracy of biometric identification.

  3. Management of radiation sources and personal dosimeters based on the optical identification using two-dimensional barcode

    International Nuclear Information System (INIS)

    Takao, Hideaki; Yoshida, Masahiro; Kaneko, Mamoru; Miura, Miwa; Hayashida, Rika; Okumura, Yutaka; Matsuda, Naoki

    2006-01-01

    For accurate and efficient radiation safety management in facilities using radioisotopes, two-dimensional barcode (2-DC) was applied to the optical identification of radiation sources and personal dosimeters. The mobile personal computer (PC) equipped with a barcode reader, which has imported inventory records from the pre-existing radiation management system, enabled us to finish inventory procedures for 170 2-DC-labelled radiation sources in as short as 20min by one person. Identification of 270 personal dosimeters in their monthly replacement procedures also successfully completed within 20 min by incorporating pre-labeled 2-DC to PC installed with inventory records of dosimeters and radiation workers. As equipments and software required for 2-DC are affordable, easy to operate, and potentially expandable, the introduction of 2-DC system may help to establish practically higher level of radiation management. (author)

  4. Identification of selective inhibitors of RET and comparison with current clinical candidates through development and validation of a robust screening cascade [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Amanda J. Watson

    2016-05-01

    Full Text Available RET (REarranged during Transfection is a receptor tyrosine kinase, which plays pivotal roles in regulating cell survival, differentiation, proliferation, migration and chemotaxis. Activation of RET is a mechanism of oncogenesis in medullary thyroid carcinomas where both germline and sporadic activating somatic mutations are prevalent.   At present, there are no known specific RET inhibitors in clinical development, although many potent inhibitors of RET have been opportunistically identified through selectivity profiling of compounds initially designed to target other tyrosine kinases. Vandetanib and cabozantinib, both multi-kinase inhibitors with RET activity, are approved for use in medullary thyroid carcinoma, but additional pharmacological activities, most notably inhibition of vascular endothelial growth factor - VEGFR2 (KDR, lead to dose-limiting toxicity. The recent identification of RET fusions present in ~1% of lung adenocarcinoma patients has renewed interest in the identification and development of more selective RET inhibitors lacking the toxicities associated with the current treatments.   In an earlier publication [Newton et al, 2016; 1] we reported the discovery of a series of 2-substituted phenol quinazolines as potent and selective RET kinase inhibitors. Here we describe the development of the robust screening cascade which allowed the identification and advancement of this chemical series.  Furthermore we have profiled a panel of RET-active clinical compounds both to validate the cascade and to confirm that none display a RET-selective target profile.

  5. A more robust model of the biodiesel reaction, allowing identification of process conditions for significantly enhanced rate and water tolerance.

    Science.gov (United States)

    Eze, Valentine C; Phan, Anh N; Harvey, Adam P

    2014-03-01

    A more robust kinetic model of base-catalysed transesterification than the conventional reaction scheme has been developed. All the relevant reactions in the base-catalysed transesterification of rapeseed oil (RSO) to fatty acid methyl ester (FAME) were investigated experimentally, and validated numerically in a model implemented using MATLAB. It was found that including the saponification of RSO and FAME side reactions and hydroxide-methoxide equilibrium data explained various effects that are not captured by simpler conventional models. Both the experiment and modelling showed that the "biodiesel reaction" can reach the desired level of conversion (>95%) in less than 2min. Given the right set of conditions, the transesterification can reach over 95% conversion, before the saponification losses become significant. This means that the reaction must be performed in a reactor exhibiting good mixing and good control of residence time, and the reaction mixture must be quenched rapidly as it leaves the reactor. Copyright © 2014 Elsevier Ltd. All rights reserved.

  6. Identification of robust statistical downscaling methods based on a comprehensive suite of performance metrics for South Korea

    Science.gov (United States)

    Eum, H. I.; Cannon, A. J.

    2015-12-01

    Climate models are a key provider to investigate impacts of projected future climate conditions on regional hydrologic systems. However, there is a considerable mismatch of spatial resolution between GCMs and regional applications, in particular a region characterized by complex terrain such as Korean peninsula. Therefore, a downscaling procedure is an essential to assess regional impacts of climate change. Numerous statistical downscaling methods have been used mainly due to the computational efficiency and simplicity. In this study, four statistical downscaling methods [Bias-Correction/Spatial Disaggregation (BCSD), Bias-Correction/Constructed Analogue (BCCA), Multivariate Adaptive Constructed Analogs (MACA), and Bias-Correction/Climate Imprint (BCCI)] are applied to downscale the latest Climate Forecast System Reanalysis data to stations for precipitation, maximum temperature, and minimum temperature over South Korea. By split sampling scheme, all methods are calibrated with observational station data for 19 years from 1973 to 1991 are and tested for the recent 19 years from 1992 to 2010. To assess skill of the downscaling methods, we construct a comprehensive suite of performance metrics that measure an ability of reproducing temporal correlation, distribution, spatial correlation, and extreme events. In addition, we employ Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) to identify robust statistical downscaling methods based on the performance metrics for each season. The results show that downscaling skill is considerably affected by the skill of CFSR and all methods lead to large improvements in representing all performance metrics. According to seasonal performance metrics evaluated, when TOPSIS is applied, MACA is identified as the most reliable and robust method for all variables and seasons. Note that such result is derived from CFSR output which is recognized as near perfect climate data in climate studies. Therefore, the

  7. Identification of persons by means of the Fourier spectra of the optical transmission binary models of the human irises

    Czech Academy of Sciences Publication Activity Database

    Muroň, A.; Koiš, P.; Pospíšil, Jaroslav

    2001-01-01

    Roč. 192, - (2001), s. 161-167 ISSN 0030-4018 Institutional research plan: CEZ:AV0Z1010921 Keywords : human iris * coherent optical Fourier transform * identification of persons Subject RIV: BH - Optics, Masers, Lasers Impact factor: 1.354, year: 2001

  8. Identification of dust outbreaks on infrared MSG-SEVIRI data by using a Robust Satellite Technique (RST)

    Science.gov (United States)

    Sannazzaro, Filomena; Filizzola, Carolina; Marchese, Francesco; Corrado, Rosita; Paciello, Rossana; Mazzeo, Giuseppe; Pergola, Nicola; Tramutoli, Valerio

    2014-01-01

    Dust storms are meteorological phenomena of great interest for scientific community because of their potential impact on climate changes, for the risk that may pose to human health and due to other issues as desertification processes and reduction of the agricultural production. Satellite remote sensing, thanks to global coverage, high frequency of observation and low cost data, may highly contribute in monitoring these phenomena, provided that proper detection methods are used. In this work, the known Robust Satellite Techniques (RST) multitemporal approach, used for studying and monitoring several natural/environmental hazards, is tested on some important dust events affecting Mediterranean region in May 2004 and Arabian Peninsula in February 2008. To perform this study, data provided by the Spinning Enhanced Visible and Infrared Imager (SEVIRI) have been processed, comparing the generated dust maps to some independent satellite-based aerosol products. Outcomes of this work show that the RST technique can be profitably used for detecting dust outbreaks from space, providing information also about areas characterized by a different probability of dust presence. They encourage further improvements of this technique in view of its possible implementation in the framework of operational warning systems.

  9. Hardware-efficient robust biometric identification from 0.58 second template and 12 features of limb (Lead I) ECG signal using logistic regression classifier.

    Science.gov (United States)

    Sahadat, Md Nazmus; Jacobs, Eddie L; Morshed, Bashir I

    2014-01-01

    The electrocardiogram (ECG), widely known as a cardiac diagnostic signal, has recently been proposed for biometric identification of individuals; however reliability and reproducibility are of research interest. In this paper, we propose a template matching technique with 12 features using logistic regression classifier that achieved high reliability and identification accuracy. Non-invasive ECG signals were captured using our custom-built ambulatory EEG/ECG embedded device (NeuroMonitor). ECG data were collected from healthy subjects (10), between 25-35 years, for 10 seconds per trial. The number of trials from each subject was 10. From each trial, only 0.58 seconds of Lead I ECG data were used as template. Hardware-efficient fiducial point detection technique was implemented for feature extraction. To obtain repeated random sub-sampling validation, data were randomly separated into training and testing sets at a ratio of 80:20. Test data were used to find the classification accuracy. ECG template data with 12 extracted features provided the best performance in terms of accuracy (up to 100%) and processing complexity (computation time of 1.2ms). This work shows that a single limb (Lead I) ECG can robustly identify an individual quickly and reliably with minimal contact and data processing using the proposed algorithm.

  10. ROMANCE: A new software tool to improve data robustness and feature identification in CE-MS metabolomics.

    Science.gov (United States)

    González-Ruiz, Víctor; Gagnebin, Yoric; Drouin, Nicolas; Codesido, Santiago; Rudaz, Serge; Schappler, Julie

    2018-05-01

    The use of capillary electrophoresis coupled to mass spectrometry (CE-MS) in metabolomics remains an oddity compared to the widely adopted use of liquid chromatography. This technique is traditionally regarded as lacking the reproducibility to adequately identify metabolites by their migration times. The major reason is the variability of the velocity of the background electrolyte, mainly coming from shifts in the magnitude of the electroosmotic flow and from the suction caused by electrospray interfaces. The use of the effective electrophoretic mobility is one solution to overcome this issue as it is a characteristic feature of each compound. To date, such an approach has not been applied to metabolomics due to the complexity and size of CE-MS data obtained in such studies. In this paper, ROMANCE (RObust Metabolomic Analysis with Normalized CE) is introduced as a new software for CE-MS-based metabolomics. It allows the automated conversion of batches of CE-MS files with minimal user intervention. ROMANCE converts the x-axis of each MS file from the time into the effective mobility scale and the resulting files are already pseudo-aligned, present normalized peak areas and improved reproducibility, and can eventually follow existing metabolomic workflows. The software was developed in Scala, so it is multi-platform and computationally-efficient. It is available for download under a CC license. In this work, the versatility of ROMANCE was demonstrated by using data obtained in the same and in different laboratories, as well as its application to the analysis of human plasma samples. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. Assessment of lip print patterns and its use for personal identification among the populations of Rajnandgaon, Chhattisgarh, India.

    Science.gov (United States)

    Multani, Suraj; Thombre, Vivek; Thombre, Aparna; Surana, Pratik

    2014-09-01

    Personal identification plays an inevitable role in forensic investigation. Lip print is one of the evidences that can be left in the crime scene, which helps in identification purpose. Hence, the present study was undertaken to provide deeper inside view of use of cheiloscopy in personal identification, focusing on sex and age variability of lip print patterns in the population of Rajnandgaon city, Chhattisgarh, India. The cross-sectional study was conducted among 200 (100 males and 100 females) subjects of age 15-55 years, residing in different areas of Rajnandgaon city. The sex of the individual was determined as per the description given by Vahanwala et al. Frequency distribution and Chi-square test were used for data analysis by SPSS 16.0 V software. The most common lip print pattern in entire population was Type I (27.5%). Very highly significant difference was found in the distribution of lip print patterns among males and females in the entire population, group I, and group III, respectively (P prints can be used as one of the important forensic tools for personal identification on the basis of their age and gender variability among the populations.

  12. Constrained dictionary learning and probabilistic hypergraph ranking for person re-identification

    Science.gov (United States)

    He, You; Wu, Song; Pu, Nan; Qian, Li; Xiao, Guoqiang

    2018-04-01

    Person re-identification is a fundamental and inevitable task in public security. In this paper, we propose a novel framework to improve the performance of this task. First, two different types of descriptors are extracted to represent a pedestrian: (1) appearance-based superpixel features, which are constituted mainly by conventional color features and extracted from the supepixel rather than a whole picture and (2) due to the limitation of discrimination of appearance features, the deep features extracted by feature fusion Network are also used. Second, a view invariant subspace is learned by dictionary learning constrained by the minimum negative sample (termed as DL-cMN) to reduce the noise in appearance-based superpixel feature domain. Then, we use deep features and sparse codes transformed by appearancebased features to establish the hyperedges respectively by k-nearest neighbor, rather than jointing different features simply. Finally, a final ranking is performed by probabilistic hypergraph ranking algorithm. Extensive experiments on three challenging datasets (VIPeR, PRID450S and CUHK01) demonstrate the advantages and effectiveness of our proposed algorithm.

  13. Reliability of lip prints in personal identification: An inter-racial pilot study.

    Science.gov (United States)

    Kumar, Laliytha Bijai; Jayaraman, Venkatesh; Mathew, Philips; Ramasamy, S; Austin, Ravi David

    2016-01-01

    Forensic science is a branch of science that deals with the application of science and technology in solving a crime and this requires a multidisciplinary team effort. The word "Forensic" is derived from the Latin word, "Forensis" which means the study of public. Dental professionals should develop interests in contributing to legal issues. To study the lip prints among people of different races. Descriptive study. The present study comprised of ninety subjects of which Group A comprised of Africans, Group B comprised of Dravidian, and Group C of Mongoloid race. Each group was then further divided into 15 males and 15 females for whom the lip prints were recorded and evaluated. ANOVA test. ANOVA statistical analysis was used to compare three races of African, Dravidian, and Mongoloid races. The observed data among male and female were found to be significant with a P = 0.000492. The present study showed a significant difference in lip pattern among the three races. Perhaps future studies with a larger sample size and comparison between many other races may be done for better personal identification.

  14. The role of serotonin in personality inference: tryptophan depletion impairs the identification of neuroticism in the face.

    Science.gov (United States)

    Ward, Robert; Sreenivas, Shubha; Read, Judi; Saunders, Kate E A; Rogers, Robert D

    2017-07-01

    Serotonergic mechanisms mediate the expression of personality traits (such as impulsivity, aggression and anxiety) that are linked to vulnerability to psychological illnesses, and modulate the identification of emotional expressions in the face as well as learning about broader classes of appetitive and aversive signals. Faces with neutral expressions signal a variety of socially relevant information, such that inferences about the big five personality traits, including Neuroticism, Extraversion and Agreeableness, can be accurately made on the basis of emotionally neutral facial photographs. Given the close link between Neuroticism and psychological distress, we investigated the effects of diminished central serotonin activity (achieved by tryptophan depletion) upon the accuracy of 52 healthy (non-clinical) adults' discriminations of personality from facial characteristics. All participants were able to discriminate reliably four of the big five traits. However, the tryptophan-depleted participants were specifically less accurate in discriminating Neuroticism than the matched non-depleted participants. These data suggest that central serotonin activity modulates the identification of not only negative facial emotional expression but also a broader class of signals about personality characteristics linked to psychological distress.

  15. System Identification and Robust Control

    DEFF Research Database (Denmark)

    Tøffner-Clausen, S.

    a thorough introduction to the m framework. A central results is that if performance is measured in terms of the inifity-norm and model uncertainty is bounded in the same manner, then, using m it is possible to pose one necessary and sufficient condition for block-structured norm-bounded perturbations which...... permitted by m is definitely much more flexible than those used in H inifity. Unfortunately m synthesis is a very difficult mathematical problem which is only well developed for purely complex perturbation sets. In order to develop our main result we will unfortunately need to synthesize m controllers....... The given examples thus represent a major part of the work behind this thesis. They consequently serve not just as illustrations but introduce many new ideas and should be interesting in their own right....

  16. Finger nail plate shape and size for personal identification – a ...

    African Journals Online (AJOL)

    ... identification – a possible low technology method for the developing world ... The population included 496 consenting individuals, four family units and four sets of ... Examination showed variations within members of the families i.e. no two ...

  17. An investigation of player to player character identification via personal pronouns

    DEFF Research Database (Denmark)

    Hichens, Michael; Drachen, Anders; Richards, Deborah

    2012-01-01

    The player character is an important feature of many games, where it is through the character that the player interacts with game world. There has been considerable interest in the relationship between the player and the player character. Much of this work has examined the identification of players......, third) as an indication of the relationship between player and character. Results indicate that the presence of story and information about the player character had no effect on identification with the plater character. However, characteristics of the players, particularly gender and general experience...... in playing video games, did have a statistically significant affect, indicating that different levels of identification are more dependent on the player than on the game. This indicates that players are not a homogeneous group with respect to player character identification and is an important consideration...

  18. Methods for using a biometric parameter in the identification of persons

    Science.gov (United States)

    Hively, Lee M [Philadelphia, TN

    2011-11-22

    Brain waves are used as a biometric parameter to provide for authentication and identification of personnel. The brain waves are sampled using EEG equipment and are processed using phase-space distribution functions to compare digital signature data from enrollment of authorized individuals to data taken from a test subject to determine if the data from the test subject matches the signature data to a degree to support positive identification.

  19. Electronic palatal rugae impression: a potentially relevant technology in personal identification

    Directory of Open Access Journals (Sweden)

    Fabrizio Guerra

    2016-06-01

    Full Text Available Forensic medicine is now able to identify people through lots of different systems. Actually, fingerprints identification is the mostused identification method. To avoid identifying, many people alter or erase their fingerprints through chemical and / or abrasivesystems. The study of palatal rugae (palatoscopy is an identification technique today accepted by the international scientificcommunity as an alternative, safe and effective identification system, because of their characteristic feature of immutability andindividuality. Currently, the most used procedure is dental impression through plaster casts or photographs. The difficulties in therecording and cast’s storage limited the use of this identification system in comparison with others techniques. In order to improvethe palatal rugae analysis system, we designed a software, connected to a camera device that allows to acquire the palatal impression,to easily identify the salient palatal features and to store them in a database. This would permit a fast, simple and economicrecognition method that could be used without the need of specific staff training and that could easily be integrated with the existingfingerprint identification systems.

  20. Brute-Force Approach for Mass Spectrometry-Based Variant Peptide Identification in Proteogenomics without Personalized Genomic Data

    Science.gov (United States)

    Ivanov, Mark V.; Lobas, Anna A.; Levitsky, Lev I.; Moshkovskii, Sergei A.; Gorshkov, Mikhail V.

    2018-02-01

    In a proteogenomic approach based on tandem mass spectrometry analysis of proteolytic peptide mixtures, customized exome or RNA-seq databases are employed for identifying protein sequence variants. However, the problem of variant peptide identification without personalized genomic data is important for a variety of applications. Following the recent proposal by Chick et al. (Nat. Biotechnol. 33, 743-749, 2015) on the feasibility of such variant peptide search, we evaluated two available approaches based on the previously suggested "open" search and the "brute-force" strategy. To improve the efficiency of these approaches, we propose an algorithm for exclusion of false variant identifications from the search results involving analysis of modifications mimicking single amino acid substitutions. Also, we propose a de novo based scoring scheme for assessment of identified point mutations. In the scheme, the search engine analyzes y-type fragment ions in MS/MS spectra to confirm the location of the mutation in the variant peptide sequence.

  1. [Biometric method for the description of the head of an unrecognized corpse for the purpose of personality individualization and identification].

    Science.gov (United States)

    Zviagin, V N; Galitskaia, O I; Negasheva, M A

    2012-01-01

    We have determined absolute dimensions of the head and the relationship between the dimensions of its selected parts. The study enrolled adult subjects (mostly of Russian ethnicity) at the age from 17 to 22 years (1108 men and 1153 women). We calculated the normal values for the estimation of real dimensional characteristics and the frequency of their occurrence in the population. The proposed approach makes it possible to reliably identify the dimensional features of human appearance in terms of the quantitative verbal description (categories 1-5) and to reveal its most characteristic features. The results of this biometric study of the heads of unrecognized corpses obtained by the specially developed technology may be used in operational and search investigations, in the procedure of corpse identification, and forensic medical personality identification of a missing subject.

  2. Identification for Control

    DEFF Research Database (Denmark)

    Tøffner-Clausen, S.

    1995-01-01

    Identification of model error bounds for robust control design has recently achieved much attention.......Identification of model error bounds for robust control design has recently achieved much attention....

  3. Re-identification of persons in multi-camera surveillance under varying viewpoints and illumination

    NARCIS (Netherlands)

    Bouma, H.; Borsboom, A.S.; Hollander, R.J.M. den; Landsmeer, S.H.; Worring, M.

    2012-01-01

    The capability to track individuals in CCTV cameras is important for surveillance and forensics alike. However, it is laborious to do over multiple cameras. Therefore, an automated system is desirable. In literature several methods have been proposed, but their robustness against varying viewpoints

  4. 78 FR 57001 - Identification of Persons Pursuant to the Iranian Transactions and Sanctions Regulations and...

    Science.gov (United States)

    2013-09-16

    ... in property of the Government of Iran, including the Central Bank of Iran, that are in the United..., or instrumentality thereof, including the Central Bank of Iran, and any person owned or controlled by... instrumentality thereof, including the Central Bank of Iran; (b) Any person owned or controlled, directly or...

  5. Disarming the Threat to Feminist Identification: An Application of Personal Construct Theory to Measurement and Intervention

    Science.gov (United States)

    Moradi, Bonnie; Martin, Annelise; Brewster, Melanie E.

    2012-01-01

    Many individuals endorse feminist values but do not identify as feminist. The present set of studies tests the concept of threat, grounded in G. A. Kelly's personal construct theory of personality, as a potential factor in feminist nonidentification. Study 1 introduces the theoretically grounded "Feminist Threat Index" and evaluates its…

  6. The Influence of the Expression of Subtle and Blatant Sexual Prejudice on Personal Prejudice and Identification With the Expresser.

    Science.gov (United States)

    Krolikowski, Alex M; Rinella, Mark; Ratcliff, Jennifer J

    2016-01-01

    Although the negative consequences of subtle and blatant prejudice for the targets of prejudice are clear in the psychological literature, the impact of exposure to subtle and blatant prejudice on non-targets remains unclear. The current work examines how exposure to blatant and subtle sexual prejudice affects non-targets' personal endorsement of prejudice and their identification with the prejudice expresser. Results suggest that relative to exposure to blatant or neutral expressions of prejudice, exposure to subtle prejudice increased prejudice levels. Individuals were also more likely to distance from the prejudice expresser when exposed to blatant compared to subtle prejudice. The implications are discussed.

  7. Identification and Characterization of Unique Subgroups of Chronic Pain Individuals with Dispositional Personality Traits.

    Science.gov (United States)

    Mehta, S; Rice, D; McIntyre, A; Getty, H; Speechley, M; Sequeira, K; Shapiro, A P; Morley-Forster, P; Teasell, R W

    2016-01-01

    Objective. The current study attempted to identify and characterize distinct CP subgroups based on their level of dispositional personality traits. The secondary objective was to compare the difference among the subgroups in mood, coping, and disability. Methods. Individuals with chronic pain were assessed for demographic, psychosocial, and personality measures. A two-step cluster analysis was conducted in order to identify distinct subgroups of patients based on their level of personality traits. Differences in clinical outcomes were compared using the multivariate analysis of variance based on cluster membership. Results. In 229 participants, three clusters were formed. No significant difference was seen among the clusters on patient demographic factors including age, sex, relationship status, duration of pain, and pain intensity. Those with high levels of dispositional personality traits had greater levels of mood impairment compared to the other two groups (p personality traits significantly correlated with impaired mood and coping. Use of pharmacological treatment alone may not be successful in improving clinical outcomes among these individuals. Instead, a more comprehensive treatment involving psychological treatments may be important in managing the personality traits that interfere with recovery.

  8. Identification and Characterization of Unique Subgroups of Chronic Pain Individuals with Dispositional Personality Traits

    Directory of Open Access Journals (Sweden)

    S. Mehta

    2016-01-01

    Full Text Available Objective. The current study attempted to identify and characterize distinct CP subgroups based on their level of dispositional personality traits. The secondary objective was to compare the difference among the subgroups in mood, coping, and disability. Methods. Individuals with chronic pain were assessed for demographic, psychosocial, and personality measures. A two-step cluster analysis was conducted in order to identify distinct subgroups of patients based on their level of personality traits. Differences in clinical outcomes were compared using the multivariate analysis of variance based on cluster membership. Results. In 229 participants, three clusters were formed. No significant difference was seen among the clusters on patient demographic factors including age, sex, relationship status, duration of pain, and pain intensity. Those with high levels of dispositional personality traits had greater levels of mood impairment compared to the other two groups (p<0.05. Significant difference in disability was seen between the subgroups. Conclusions. The study identified a high risk group of CP individuals whose level of personality traits significantly correlated with impaired mood and coping. Use of pharmacological treatment alone may not be successful in improving clinical outcomes among these individuals. Instead, a more comprehensive treatment involving psychological treatments may be important in managing the personality traits that interfere with recovery.

  9. Identification of genetic loci shared between schizophrenia and the Big Five personality traits.

    Science.gov (United States)

    Smeland, Olav B; Wang, Yunpeng; Lo, Min-Tzu; Li, Wen; Frei, Oleksandr; Witoelar, Aree; Tesli, Martin; Hinds, David A; Tung, Joyce Y; Djurovic, Srdjan; Chen, Chi-Hua; Dale, Anders M; Andreassen, Ole A

    2017-05-22

    Schizophrenia is associated with differences in personality traits, and recent studies suggest that personality traits and schizophrenia share a genetic basis. Here we aimed to identify specific genetic loci shared between schizophrenia and the Big Five personality traits using a Bayesian statistical framework. Using summary statistics from genome-wide association studies (GWAS) on personality traits in the 23andMe cohort (n = 59,225) and schizophrenia in the Psychiatric Genomics Consortium cohort (n = 82,315), we evaluated overlap in common genetic variants. The Big Five personality traits neuroticism, extraversion, openness, agreeableness and conscientiousness were measured using a web implementation of the Big Five Inventory. Applying the conditional false discovery rate approach, we increased discovery of genetic loci and identified two loci shared between neuroticism and schizophrenia and six loci shared between openness and schizophrenia. The study provides new insights into the relationship between personality traits and schizophrenia by highlighting genetic loci involved in their common genetic etiology.

  10. Palatal Rugae Pattern as an Aid for Personal Identification: A Forensic Study

    Directory of Open Access Journals (Sweden)

    R Kamala

    2011-01-01

    Conclusion: No two palates are alike in their configuration and once formed, they do not undergo any changes except in length due to normal growth, remaining in the same position throughout a person′s entire life. Thus, palatal rugae appear to possess the features of an ideal forensic identification parameter, i.e. uniqueness, postmortem resistance and stability, provided antemortem record exists.

  11. Biometric identification of cardiosynchronous waveforms utilizing person specific continuous and discrete wavelet transform features.

    Science.gov (United States)

    Bhagavatula, Chandrasekhar; Venugopalan, Shreyas; Blue, Rebecca; Friedman, Robert; Griofa, Marc O; Savvides, Marios; Kumar, B V K Vijaya

    2012-01-01

    In this paper we explore how a Radio Frequency Impedance Interrogation (RFII) signal may be used as a biometric feature. This could allow the identification of subjects in operational and potentially hostile environments. Features extracted from the continuous and discrete wavelet decompositions of the signal are investigated for biometric identification. In the former case, the most discriminative features in the wavelet space were extracted using a Fisher ratio metric. Comparisons in the wavelet space were done using the Euclidean distance measure. In the latter case, the signal was decomposed at various levels using different wavelet bases, in order to extract both low frequency and high frequency components. Comparisons at each decomposition level were performed using the same distance measure as before. The data set used consists of four subjects, each with a 15 minute RFII recording. The various data samples for our experiments, corresponding to a single heart beat duration, were extracted from these recordings. We achieve identification rates of up to 99% using the CWT approach and rates of up to 100% using the DWT approach. While the small size of the dataset limits the interpretation of these results, further work with larger datasets is expected to develop better algorithms for subject identification.

  12. Acoustic Signals Processing at the Realization of Contact-Difference Method for Person Identification

    Directory of Open Access Journals (Sweden)

    A. N. Golubinskiy

    2011-09-01

    Full Text Available The questions of speech and acoustic (registered on a human body at pronouncing by him of sounds signals processing are examined. The measure of a distinguish ability for identification at parameterization of a biometric image by an amplitude-frequency response of a human body is developed.

  13. Forensic Medicine and the Military Population: International Dental Records and Personal Identification Concerns

    Directory of Open Access Journals (Sweden)

    Maria Inês Guimarães

    2017-02-01

    Conclusion: This article reinforces the need for mandatory quality dental records in all countries, which must be efficiently stored and easily accessible in case dental identification is necessary. For the military population, these requirements are especially important, due to the added risks to which this group is subject.

  14. Design and construction the identification of nitriding plasma process parameters using personal computer based on serial communication

    International Nuclear Information System (INIS)

    Frida Iswinning Diah; Slamet Santosa

    2012-01-01

    Design and construction the identification of process parameters using personal computer based on serial communication PLC M-series has been done. The function of this device is to identify the process parameters of a system (plan), to which then be analyzed and conducted a follow-up given to the plan by the user. The main component of this device is the M-Series T100MD1616 PLC and personal computer (PC). In this device the data plan parameters obtained from the corresponding sensor outputs in the form of voltage or current. While the analog parameter data is adjusted to the ADC analog input of the PLC using a signal conditioning system. Then, as the parameter is processed by the PLC then sent to a PC via RS232 to be displayed in the form of graphs or tables and stored in the database. Software to program the database is created using Visual Basic Programming V-6. The device operation test is performed for the measurement of temperature parameter and vacuum level on the plasma nitriding machine. The results indicate that the device has functioning as an identification device parameters process of plasma nitriding machine. (author)

  15. Exploring the effects of age and delay on children's person identifications: verbal descriptions, lineup performance, and the influence of wildcards.

    Science.gov (United States)

    Karageorge, Aspasia; Zajac, Rachel

    2011-05-01

    We explored the effects of age and retention interval on several measures of children's person identification ability: verbal descriptions, lineup performance, and the success of a 'wildcard'--a photo of a silhouetted figure with a large question mark superimposed--in reducing children's tendency to choose from target-absent lineups. Children aged 5-7 years (N= 101) and 8-11 years (N= 109) were briefly exposed to an experimental confederate during a staged event. Either 1-2 days or 2 weeks later, children described the confederate and were then presented with either a target-present or -absent lineup. Within each group, approximately half of the children were presented with a wildcard and half were not. Target-present lineup performance improved as age increased. Compared to control children, children in the wildcard condition were more likely to correctly reject the target-absent lineup, and less likely to identify the innocent suspect. The wildcard did not influence children's target-present lineup accuracy, nor did delay exert an influence on any of our measures of lineup performance. These findings extend our knowledge of children's person identifications, as well as providing further support for the use of wildcards in photographic lineups. ©2010 The British Psychological Society.

  16. The person in the mirror: using the enfacement illusion to investigate the experiential structure of self-identification.

    Science.gov (United States)

    Tajadura-Jiménez, Ana; Longo, Matthew R; Coleman, Rosie; Tsakiris, Manos

    2012-12-01

    How do we acquire a mental representation of our own face? Recently, synchronous, but not asynchronous, interpersonal multisensory stimulation (IMS) between one's own and another person's face has been used to evoke changes in self-identification (enfacement illusion). We investigated the conscious experience of these changes with principal component analyses (PCA) that revealed that while the conscious experience during synchronous IMS focused on resemblance and similarity with the other's face, during asynchronous IMS it focused on multisensory stimulation. Analyses of the identified common factor structure revealed significant quantitative differences between synchronous and asynchronous IMS on self-identification and perceived similarity with the other's face. Experiment 2 revealed that participants with lower interoceptive sensitivity experienced stronger enfacement illusion. Overall, self-identification and body-ownership rely on similar basic mechanisms of multisensory integration, but the effects of multisensory input on their experience are qualitatively different, possibly underlying the face's unique role as a marker of selfhood. Copyright © 2012 Elsevier Inc. All rights reserved.

  17. Human Identification by Cross-Correlation and Pattern Matching of Personalized Heartbeat: Influence of ECG Leads and Reference Database Size.

    Science.gov (United States)

    Jekova, Irena; Krasteva, Vessela; Schmid, Ramun

    2018-01-27

    Human identification (ID) is a biometric task, comparing single input sample to many stored templates to identify an individual in a reference database. This paper aims to present the perspectives of personalized heartbeat pattern for reliable ECG-based identification. The investigations are using a database with 460 pairs of 12-lead resting electrocardiograms (ECG) with 10-s durations recorded at time-instants T1 and T2 > T1 + 1 year. Intra-subject long-term ECG stability and inter-subject variability of personalized PQRST (500 ms) and QRS (100 ms) patterns is quantified via cross-correlation, amplitude ratio and pattern matching between T1 and T2 using 7 features × 12-leads. Single and multi-lead ID models are trained on the first 230 ECG pairs. Their validation on 10, 20, ... 230 reference subjects (RS) from the remaining 230 ECG pairs shows: (i) two best single-lead ID models using lead II for a small population RS = (10-140) with identification accuracy AccID = (89.4-67.2)% and aVF for a large population RS = (140-230) with AccID = (67.2-63.9)%; (ii) better performance of the 6-lead limb vs. the 6-lead chest ID model-(91.4-76.1)% vs. (90.9-70)% for RS = (10-230); (iii) best performance of the 12-lead ID model-(98.4-87.4)% for RS = (10-230). The tolerable reference database size, keeping AccID > 80%, is RS = 30 in the single-lead ID scenario (II); RS = 50 (6 chest leads); RS = 100 (6 limb leads), RS > 230-maximal population in this study (12-lead ECG).

  18. When and which employees feel obliged: A personality perspective of how organizational identification develops

    Directory of Open Access Journals (Sweden)

    Muhammad Ali Asadullah

    2017-07-01

    Full Text Available This paper examines the indirect effect of interpersonal and informational justice on organizational identification through psychological contract fulfillment across different levels of equity sensitivity. The data were collected using self-reported measures from 656 permanent employees working in five commercial banks in Pakistan. The statistical results of the study confirmed that the indirect effect of interpersonal and informational justice on organizational identification through psychological contract fulfillment is significant. However, the statistical results of the study also demonstrated that the indirect effect of interpersonal and informational justice does not differ across different levels of equity sensitivity. This study offers some implications for managers to maintain an effective employment relationship with the employees inside the organizations.

  19. Service workers' job performance: the roles of personality traits, organizational identification, and customer orientation

    OpenAIRE

    He, Hongwei; Wang, Weiyue; Zhu, Weichun; Harris, Lloyd

    2015-01-01

    Purpose– This paper aims to advance the literature by testing the boundary of this relationship with reference to a key construct in employee performance in the service domain: employee customer orientation. Organizational identification refers to employees’ perceived oneness and belongingness to their work organization, and has been argued to be associated with higher employee performance.Design/methodology/approach– Data were collected based on a sample of call center service workers. Emplo...

  20. Analisis heteroplasmy DNA mitokondria pulpa gigi pada identifikasi personal forensik (Heteroplasmy analysis of dental pulp mitochondrial DNA in forensic personal identification

    Directory of Open Access Journals (Sweden)

    Ardyni Febri K

    2013-09-01

    Full Text Available Background: Mitochondrial DNA (mtDNA sequence analysis of the hypervariable control region has been shown to be an effective tool for personal identification. The high copy and maternal mode of inheritance make mtDNA analysis particularly useful when old samples or degradation of biological samples prohibits the detection of nuclear DNA analysis. Dental pulp is covered with hard tissue such as dentin and enamel. It is highly capable of protecting the DNA and thus is extremely useful. One of the diasadvantages of mitochondrial DNA is heteroplasmy. Heteroplasmy is the presence of a mixture of more than one type of an organellar genome within a cell or individual. It can lead to ambiguity in forensic personal identification. Due to that, the evidence of heteroplasmy in dental pulp is needed. Purpose: The study was aimed to determine the heteroplasmy occurance of mitocondrial DNA in dental pulp. Methods: Blood and teeth samples were taken from 6 persons, each samples was extracted with DNAzol. DNA samples were amplified with PCR and sequencing to analyze the nucleotide sequences polymorphism of the hypervariable region 1 in mtDNA and compared with revised Cambridge Reference Sequence (rCRS. results: The dental pulp and blood nucleotide sequence of hypervariable region 1 mitochondrial DNA showed polymorphism when compared with rCRS and heteroplasmy when compared between dental pulp with blood. Conclusion: The study showed that heteroplasmy was found in mithocondrial DNA from dental pulp.latar belakang: Analisis sekuens DNA mitokondria (mtDNA regio kontrol hypervariable telah terbukti menjadi alat efektif untuk identifikasi personal. Kopi DNA yang banyak dan pewarisan maternal membuat analisis mtDNA sangat berguna ketika sampel lama atau sampel biologis yang terdegradasi menghambat deteksi analisis DNA inti. Pulpa gigi terlindung jaringan keras seperti dentin dan enamel. Hal ini membuat pulpa mampu melindungi DNA dan dengan demikian sangat berguna

  1. Solving Person Re-identification in Non-overlapping Camera using Efficient Gibbs Sampling

    NARCIS (Netherlands)

    John, V.; Englebienne, G.; Krose, B.; Burghardt, T.; Damen, D.; Mayol-Cuevas, W.; Mirmehdi, M.

    2013-01-01

    This paper proposes a novel probabilistic approach for appearance-based person reidentification in non-overlapping camera networks. It accounts for varying illumination, varying camera gain and has low computational complexity. More specifically, we present a graphical model where we model the

  2. E-Learning Personalization Based on Hybrid Recommendation Strategy and Learning Style Identification

    Science.gov (United States)

    Klasnja-Milicevic, Aleksandra; Vesin, Boban; Ivanovic, Mirjana; Budimac, Zoran

    2011-01-01

    Personalized learning occurs when e-learning systems make deliberate efforts to design educational experiences that fit the needs, goals, talents, and interests of their learners. Researchers had recently begun to investigate various techniques to help teachers improve e-learning systems. In this paper, we describe a recommendation module of a…

  3. Validating the Alcohol Use Disorders Identification Test with Persons Who Have a Serious Mental Illness

    Science.gov (United States)

    O'Hare, Thomas; Sherrer, Margaret V.; LaButti, Annamaria; Emrick, Kelly

    2004-01-01

    Objective/Method: The use of brief, reliable, valid, and practical measures of substance use is critical for conducting individual assessments and program evaluation for integrated mental health-substance abuse services for persons with serious mental illness. This investigation examines the internal consistency reliability, concurrent validity,…

  4. Identification of the Predictive Power of Five Factor Personality Traits for Individual Instrument Performance Anxiety

    Science.gov (United States)

    Özdemir, Gökhan; Dalkiran, Esra

    2017-01-01

    This study, with the aim of identifying the predictive power of the five-factor personality traits of music teacher candidates on individual instrument performance anxiety, was designed according to the relational screening model. The study population was students attending the Music Education branch of Fine Arts Education Departments in…

  5. Robust Scientists

    DEFF Research Database (Denmark)

    Gorm Hansen, Birgitte

    their core i nterests, 2) developing a selfsupply of industry interests by becoming entrepreneurs and thus creating their own compliant industry partner and 3) balancing resources within a larger collective of researchers, thus countering changes in the influx of funding caused by shifts in political...... knowledge", Danish research policy seems to have helped develop politically and economically "robust scientists". Scientific robustness is acquired by way of three strategies: 1) tasting and discriminating between resources so as to avoid funding that erodes academic profiles and push scientists away from...

  6. Cephalometric Analysis for Gender Determination Using Maxillary Sinus Index: A Novel Dimension in Personal Identification

    Directory of Open Access Journals (Sweden)

    Tanya Khaitan

    2017-01-01

    Full Text Available Purpose. Radiography is important in forensic odontology for the identification of humans. The maxillary sinus is the largest of the paranasal sinuses and first to develop. Sinus radiography has been used for identification of skeletal remains and determination of gender. Hence, the aim and objectives of the present study were to establish a new method for gender determination using maxillary sinus index from lateral cephalometric radiographs and to establish the reliability of maxillary sinus for gender determination. Methods. A total of 50 adult digital lateral cephalometric radiographs (25 males and 25 females were included in the study. The maxillary sinus analysis was performed on these radiographs using the height and width measurement tools of Sidexis XG software. Maxillary sinus index was calculated, discriminant function analysis performed, and discriminant equation derived for determination of gender. Results. The mean maxillary sinus height and width were found to be higher in males, whereas the maxillary sinus index was greater in females. The discriminant function analysis derived in the study was able to differentiate the sex groups with sensitivity of 68% and specificity of 76%. Conclusions. From the results of the present study, it may be concluded that morphometric analysis of maxillary sinus can be used as a reliable tool in gender determination.

  7. [Factors related to nurses' patient identification behavior and the moderating effect of person-organization value congruence climate within nursing units].

    Science.gov (United States)

    Kim, Young Mee; Kang, Seung Wan; Kim, Se Young

    2014-04-01

    This research was an empirical study designed to identify precursors and interaction effects related to nurses' patient identification behavior. A multilevel analysis methodology was used. A self-report survey was administered to registered nurses (RNs) of a university hospital in South Korea. Of the questionnaires, 1114 were analyzed. The individual-level factors that had a significantly positive association with patient identification behavior were person-organization value congruence, organizational commitment, occupational commitment, tenure at the hospital, and tenure at the unit. Significantly negative group-level precursors of patient identification behavior were burnout climate and the number of RNs. Two interaction effects of the person-organization value congruence climate were identified. The first was a group-level moderating effect in which the negative relationship between the number of RNs and patient identification behavior was weaker when the nursing unit's value congruence climate was high. The second was a cross-level moderating effect in which the positive relationship between tenure at the unit and patient identification behavior was weaker when value congruence climate was high. This study simultaneously tested both individual-level and group-level factors that potentially influence patient identification behavior and identified the moderating role of person-organization value congruence climate. Implications of these results are discussed.

  8. Pore sub-features reproducibility in direct microscopic and Livescan images--their reliability in personal identification.

    Science.gov (United States)

    Gupta, Abhishek; Sutton, Raul

    2010-07-01

    Third level features have been reported to have equal discriminatory power as second level details in establishing personal identification. Pore area, as an extended set third level sub-feature, has been studied by minimizing possible factors that could affect pore size. The reproducibility of pore surface area has been studied using direct microscopic and 500 ppi Livescan images. Direct microscopic pore area measurements indicated that the day on which the pore area was measured had a significant impact on the measured pore area. Pore area measurement was shown to be difficult to estimate in 500 ppi Livescan measurements owing to lack of resolution. It is not possible to reliably use pore area as an identifying feature in fingerprint examination.

  9. Realtime Observation, Identification and Tracking from dangerous persons in airports - a logistics system ROIT

    Directory of Open Access Journals (Sweden)

    Bernd Hentschel

    2013-09-01

    Full Text Available Background: The aim of this paper is to present and analyze a new method of the logistics disaster management and concentrates particularly on terrorist attacks of CBRN type (C - chemical attack/weapon, B - biological attack/weapon, R - radiological attack/weapon, N - nuclear attack/weapon at the airports. Each of the aforementioned is an issue of great importance and high priority for the airport communication.                                                                   Methods: The research of a ROIT project (Realtime Observation, Identification and Tracking from dangerous people in airports has been conducted in a way that enables the application of the three-step computer system. The program has been configured to identify, observe and protect from undesired actions of people suspected of involvement in CBRN. Results: The main results of applying the device in different scenarios are: enabling reliable automatic identification and classification of potentially hazardous materials and substances, association of the materials with their owners or distributors.                                                                            Conclusion: Simultaneous passing information to the airport security guards, police and expert team guarantees that further purposes involve the independent opportunity to observe in real time the CBRN suspects as well as to eliminate them secretly and quickly from the rest of airport passengers after thorough and credible identification.

  10. Hyper-realistic face masks: a new challenge in person identification.

    Science.gov (United States)

    Sanders, Jet Gabrielle; Ueda, Yoshiyuki; Minemoto, Kazusa; Noyes, Eilidh; Yoshikawa, Sakiko; Jenkins, Rob

    2017-01-01

    We often identify people using face images. This is true in occupational settings such as passport control as well as in everyday social environments. Mapping between images and identities assumes that facial appearance is stable within certain bounds. For example, a person's apparent age, gender and ethnicity change slowly, if at all. It also assumes that deliberate changes beyond these bounds (i.e., disguises) would be easy to spot. Hyper-realistic face masks overturn these assumptions by allowing the wearer to look like an entirely different person. If unnoticed, these masks break the link between facial appearance and personal identity, with clear implications for applied face recognition. However, to date, no one has assessed the realism of these masks, or specified conditions under which they may be accepted as real faces. Herein, we examined incidental detection of unexpected but attended hyper-realistic masks in both photographic and live presentations. Experiment 1 (UK; n = 60) revealed no evidence for overt detection of hyper-realistic masks among real face photos, and little evidence of covert detection. Experiment 2 (Japan; n = 60) extended these findings to different masks, mask-wearers and participant pools. In Experiment 3 (UK and Japan; n = 407), passers-by failed to notice that a live confederate was wearing a hyper-realistic mask and showed limited evidence of covert detection, even at close viewing distance (5 vs. 20 m). Across all of these studies, viewers accepted hyper-realistic masks as real faces. Specific countermeasures will be required if detection rates are to be improved.

  11. Realization of Personalized Services for Intelligent Residential Space based on User Identification Method using Sequential Walking Footprints

    Directory of Open Access Journals (Sweden)

    Jin-Woo Jung

    2005-04-01

    Full Text Available A new human-friendly assistive home environment, Intelligent Sweet Home (ISH, developed at KAIST, Korea for testing advanced concepts for independent living of the elderly/the physically handicapped. The concept of ISH is to consider the home itself as an intelligent robot. ISH always checks the intention or health status of the resident. Therefore, ISH can do actively the most proper services considering the resident's life-style by the detected intention or emergency information. But, when there are more than two residents, ISH cannot consider the residents' characteristics or tastes if ISH cannot identify who he/she is before. To realize a personalized service system in the intelligent residential space like ISH, we deal with a human-friendly user identification method for ubiquitous computing environment, specially focused on dynamic human footprint recognition. And then, we address some case studies of personalized services that have been experienced by Human-friendly Welfare Robot System research center, KAIST.

  12. Within-person changes in the structure of emotion: the role of cultural identification and language.

    Science.gov (United States)

    Perunovic, Wei Qi Elaine; Heller, Daniel; Rafaeli, Eshkol

    2007-07-01

    This study explored the within-person dynamic organization of emotion in East-Asian Canadian bicultural individuals as they function in two cultural worlds. Using a diary design, we examined under what conditions their emotional structure resembles that of Westerners or that of East Asians. As predicted, when these bicultural individuals identified with a Western culture or had recently spoken a non-Asian language, their positive and negative affect were inversely associated. When they identified with an Asian culture or interacted in an Asian language, this inverse association disappeared. This study shows that as bicultural individuals identify and communicate with members of one or the other cultural group, they may adopt a culturally congruent phenomenology, including a distinct affective pattern.

  13. SU-F-R-31: Identification of Robust Normal Lung CT Texture Features for the Prediction of Radiation-Induced Lung Disease

    Energy Technology Data Exchange (ETDEWEB)

    Choi, W; Riyahi, S; Lu, W [University of Maryland School of Medicine, Baltimore, MD (United States)

    2016-06-15

    Purpose: Normal lung CT texture features have been used for the prediction of radiation-induced lung disease (radiation pneumonitis and radiation fibrosis). For these features to be clinically useful, they need to be relatively invariant (robust) to tumor size and not correlated with normal lung volume. Methods: The free-breathing CTs of 14 lung SBRT patients were studied. Different sizes of GTVs were simulated with spheres placed at the upper lobe and lower lobe respectively in the normal lung (contralateral to tumor). 27 texture features (9 from intensity histogram, 8 from grey-level co-occurrence matrix [GLCM] and 10 from grey-level run-length matrix [GLRM]) were extracted from [normal lung-GTV]. To measure the variability of a feature F, the relative difference D=|Fref -Fsim|/Fref*100% was calculated, where Fref was for the entire normal lung and Fsim was for [normal lung-GTV]. A feature was considered as robust if the largest non-outlier (Q3+1.5*IQR) D was less than 5%, and considered as not correlated with normal lung volume when their Pearson correlation was lower than 0.50. Results: Only 11 features were robust. All first-order intensity-histogram features (mean, max, etc.) were robust, while most higher-order features (skewness, kurtosis, etc.) were unrobust. Only two of the GLCM and four of the GLRM features were robust. Larger GTV resulted greater feature variation, this was particularly true for unrobust features. All robust features were not correlated with normal lung volume while three unrobust features showed high correlation. Excessive variations were observed in two low grey-level run features and were later identified to be from one patient with local lung diseases (atelectasis) in the normal lung. There was no dependence on GTV location. Conclusion: We identified 11 robust normal lung CT texture features that can be further examined for the prediction of radiation-induced lung disease. Interestingly, low grey-level run features identified normal

  14. Disaggregating Within- and Between-Person Effects of Social Identification on Subjective and Endocrinological Stress Reactions in a Real-Life Stress Situation.

    Science.gov (United States)

    Ketturat, Charlene; Frisch, Johanna U; Ullrich, Johannes; Häusser, Jan A; van Dick, Rolf; Mojzisch, Andreas

    2016-02-01

    Several experimental and cross-sectional studies have established the stress-buffering effect of social identification, yet few longitudinal studies have been conducted within this area of research. This study is the first to make use of a multilevel approach to disaggregate between- and within-person effects of social identification on subjective and endocrinological stress reactions. Specifically, we conducted a study with 85 prospective students during their 1-day aptitude test for a university sports program. Ad hoc groups were formed, in which students completed several tests in various disciplines together. At four points in time, salivary cortisol, subjective strain, and identification with their group were measured. Results of multilevel analyses show a significant within-person effect of social identification: The more students identified with their group, the less stress they experienced and the lower their cortisol response was. Between-person effects were not significant. Advantages of using multilevel approaches within this field of research are discussed. © 2015 by the Society for Personality and Social Psychology, Inc.

  15. The performance of the Alcohol Use Disorder Identification Test (AUDIT) in detecting alcohol abuse and dependence in a population of depressed or anxious persons

    NARCIS (Netherlands)

    Boschloo, Lynn; Vogelzangs, Nicole; Smit, Johannes H.; van den Brink, Wim; Veltman, Dick J.; Beekman, Aartjan T. F.; Penninx, Brenda W. J. H.

    2010-01-01

    BACKGROUND: Alcohol use disorders are highly prevalent but often remain unrecognized among depressed and/or anxious persons. This study examines the performance of the Alcohol Use Disorder Identification Test (AUDIT) in detecting alcohol abuse and dependence in this high-risk group and compares it

  16. Individualizing characteristics of footprints in Malaysian Malays for person identification from a forensic perspective

    Directory of Open Access Journals (Sweden)

    T. Nataraja Moorthy

    2015-03-01

    Full Text Available One of the valuable physical evidence that a suspect leaves unintentionally at a crime scene is likely to include footprints. Physical evidence needs to be utilized to express individual characteristics. Very keen analysis of footprints can provide useful information to establish personal identity and ease the crime investigation. The present study aims to analyze and describe the individual characteristics of footprints of Malaysian Malays from a forensic perspective in a sample of 400 adult Malay participants consisting of 200 males and 200 females. The footprints were collected using an inkless shoe print kit (Carolina, USA. Various features of the toes, humps in the toe line, phalange marks, flatfoot condition, pits, cracks, corns, etc., were investigated. The frequency of these characteristics was recorded. The frequency of the fibularis-type foot is the highest, followed by the tibialis-type, the intermediate-type and the midularis-type is found to have the least frequency in both the sexes. This sequence is found to be different from the sequence observed in the north Indian population. Two humps have been found most often in male footprints followed by three humps and zero hump is found to be the least frequent. While in female footprints, three humps have been found, most often followed by two humps and zero hump is found to be the least frequent. Other identifying features are also highlighted using illustrations. This trait shows bilateral variation. The morphological length of toes and some other features in this study are found to be different from footprints of Indian Tamils, North Indian Gujjars and the Thai population.

  17. Family Members Identification with Brightness Distribution Sensors to Self-sustaining of Power as Personal Actions

    Directory of Open Access Journals (Sweden)

    Nobuaki Takaoka

    2015-11-01

    Full Text Available There are many attempts to recognize actions using sensors in homes. Some of them aim to keep watching on the elderly living alone, while others try to bring ecological life, scheduling domestic actions consuming energy. We need an inexpensive method to make it prevail in the society. In the meantime, recognition results threaten privacy, if outsiders obtain them. Almost all people mind whether they are used in malicious ways. The sensor should prevent the leak of the privacy of users. This work proposes a method to recognize various domestic actions with a single kind of sensors, which is not only inexpensive, but also safe enough to protect the privacy. The method uses brightness distribution sensors presenting a sequence of cells, each of which indicates the brightness of one direction in the view area of the sensor. The method gets local features along with the persons who conduct domestic actions. The method enables to recognize both of domestic actions and the period in which they are conducted. To evaluate the accuracy of the method, 10 men and women have participated in an experiment, where they take various domestic actions in their own ways with 4 brightness distribution sensors installed on the wall of an actual kitchen. As a result, the method has marked high performance on the recognition of “vacuuming”, “cooking”, and “taking a rest”, along with their periods. The method also identifies all examinees who conduct them in high accuracy. It is possible to recognize domestic actions in actual home spaces.

  18. Index case finding facilitates identification and linkage to care of children and young persons living with HIV/AIDS in Malawi.

    Science.gov (United States)

    Ahmed, Saeed; Sabelli, Rachael A; Simon, Katie; Rosenberg, Nora E; Kavuta, Elijah; Harawa, Mwelura; Dick, Spencer; Linzie, Frank; Kazembe, Peter N; Kim, Maria H

    2017-08-01

    Evaluation of a novel index case finding and linkage-to-care programme to identify and link HIV-infected children (1-15 years) and young persons (>15-24 years) to care. HIV-infected patients enrolled in HIV services were screened and those who reported untested household members (index cases) were offered home- or facility-based HIV testing and counselling (HTC) of their household by a community health worker (CHW). HIV-infected household members identified were enrolled in a follow-up programme offering home and facility-based follow-up by CHWs. Of the 1567 patients enrolled in HIV services, 1030 (65.7%) were screened and 461 (44.8%) identified as index cases; 93.5% consented to HIV testing of their households and of those, 279 (64.7%) reported an untested child or young person. CHWs tested 711 children and young persons, newly diagnosed 28 HIV-infected persons (yield 4.0%; 95% CI: 2.7-5.6), and identified an additional two HIV-infected persons not enrolled in care. Of the 30 HIV-infected persons identified, 23 (76.6%) were linked to HIV services; 18 of the 20 eligible for ART (90.0%) were initiated. Median time (IQR) from identification to enrolment into HIV services was 4 days (1-8) and from identification to ART start was 6 days (1-8). Almost half of HIV-infected patients enrolled in treatment services had untested household members, many of whom were children and young persons. Index case finding, coupled with home-based testing and tracked follow-up, is acceptable, feasible and facilitates the identification and timely linkage to care of HIV-infected children and young persons. © 2017 The Authors. Tropical Medicine & International Health Published by John Wiley & Sons Ltd.

  19. [Problems in organization of medical criminological registration and personality identification for subjects occupationally exposed to life risk].

    Science.gov (United States)

    Shcherbakov, V V

    2000-01-01

    The paper discusses problems in organization of identification studies under conditions of mass deaths as exemplified by forensic medical records of medical criminological identification studies of subjects killed during war conflict in Chechnya. The evolution of the organization model of identification studies is shown transformation of organization philosophy, formation of expert algorithms, formalization and technologic realization of expert solutions.

  20. The Crane Robust Control

    Directory of Open Access Journals (Sweden)

    Marek Hicar

    2004-01-01

    Full Text Available The article is about a control design for complete structure of the crane: crab, bridge and crane uplift.The most important unknown parameters for simulations are burden weight and length of hanging rope. We will use robustcontrol for crab and bridge control to ensure adaptivity for burden weight and rope length. Robust control will be designed for current control of the crab and bridge, necessary is to know the range of unknown parameters. Whole robust will be splitto subintervals and after correct identification of unknown parameters the most suitable robust controllers will be chosen.The most important condition at the crab and bridge motion is avoiding from burden swinging in the final position. Crab and bridge drive is designed by asynchronous motor fed from frequency converter. We will use crane uplift with burden weightobserver in combination for uplift, crab and bridge drive with cooperation of their parameters: burden weight, rope length and crab and bridge position. Controllers are designed by state control method. We will use preferably a disturbance observerwhich will identify burden weight as a disturbance. The system will be working in both modes at empty hook as well asat maximum load: burden uplifting and dropping down.

  1. Person-organization fit and organizational identification as predictors of positive and negative work-home interactions

    Directory of Open Access Journals (Sweden)

    Dorota Merecz

    2014-02-01

    Full Text Available Objectives: The aim of the presented research was to explore the links between complementary and supplementary dimensions of Person-Organization fit (P-O fit, organizational identification (OI and negative (WHI- versus positive (WHI+ work-home interactions. It was assumed that both complementary and supplementary P-O fit and OI were positively related to WHI+ and negatively to WHI-. Materials and Methods: The study was conducted on a large sample of Polish blue and white collar workers. The subjects were interviewed by means of questionnaires measuring: supplementary and complementary dimensions of P-O fit, OI and WHI. General work ability and demographic variables were also controlled in the study, and statistical analysis of ANOVA, pairwise comparison as well as regression were performed. Results: P-O fit and OI differentiated the subjects in terms of WHI. For women supplementary fit was a significant predictor of WHI- and explained 12% of its variance, for men it was complementary fit with the number of working days per week and the level of education, which explained 22% of variance. Supplementary fit and OI explained 16% of WHI+ variance in women; OI, tenure at the main place of employment and the level of education explained 8% of WHI+ variance in men. Conclusions: It has been proven that not only are the effects of P-O fit and OI limited to the work environment but they also permeate boundaries between work and home and influence private life - good level of P-O fit and good OI play facilitating role in the positive spillover between work and home. Gender differences in the significance and predictive values of P-O fit and OI for WHI were also found. The innovative aspect of the work is the inclusion of P-O fit and OI in the range of significant predictors of work-home interaction. The results can serve as rationale for employers that improvement of P-O fit and employees' organizational identification should be included in work

  2. Person-organization fit and organizational identification as predictors of positive and negative work-home interactions.

    Science.gov (United States)

    Merecz, Dorota; Andysz, Aleksandra

    2014-01-01

    The aim of the presented research was to explore the links between complementary and supplementary dimensions of Person-Organization fit (P-O fit), organizational identification (OI) and negative (WHI(-)) versus positive (WHI(+)) work-home interactions. It was assumed that both complementary and supplementary P-O fit and OI were positively related to WHI(+) and negatively to WHI(-). The study was conducted on a large sample of Polish blue and white collar workers. The subjects were interviewed by means of questionnaires measuring: supplementary and complementary dimensions of P-O fit, OI and WHI. General work ability and demographic variables were also controlled in the study, and statistical analysis of ANOVA, pairwise comparison as well as regression were performed. P-O fit and OI differentiated the subjects in terms of WHI. For women supplementary fit was a significant predictor of WHI(-) and explained 12% of its variance, for men it was complementary fit with the number of working days per week and the level of education, which explained 22% of variance. Supplementary fit and OI explained 16% of WHI(+) variance in women; OI, tenure at the main place of employment and the level of education explained 8% of WHI(+) variance in men. It has been proven that not only are the effects of P-O fit and OI limited to the work environment but they also permeate boundaries between work and home and influence private life - good level of P-O fit and good OI play facilitating role in the positive spillover between work and home. Gender differences in the significance and predictive values of P-O fit and OI for WHI were also found. The innovative aspect of the work is the inclusion of P-O fit and OI in the range of significant predictors of work-home interaction. The results can serve as rationale for employers that improvement of P-O fit and employees' organizational identification should be included in work-life balance programs.

  3. The Personality Assessment Inventory as a proxy for the Psychopathy Checklist Revised: testing the incremental validity and cross-sample robustness of the Antisocial Features Scale.

    Science.gov (United States)

    Douglas, Kevin S; Guy, Laura S; Edens, John F; Boer, Douglas P; Hamilton, Jennine

    2007-09-01

    The Personality Assessment Inventory's (PAI's) ability to predict psychopathic personality features, as assessed by the Psychopathy Checklist-Revised (PCL-R), was examined. To investigate whether the PAI Antisocial Features (ANT) Scale and subscales possessed incremental validity beyond other theoretically relevant PAI scales, optimized regression equations were derived in a sample of 281 Canadian federal offenders. ANT, or ANT-Antisocial Behavior (ANT-A), demonstrated unique variance in regression analyses predicting PCL-R total and Factor 2 (Lifestyle Impulsivity and Social Deviance) scores, but only the Dominance (DOM) Scale was retained in models predicting Factor 1 (Interpersonal and Affective Deficits). Attempts to cross-validate the regression equations derived from the first sample on a sample of 85 U.S. sex offenders resulted in considerable validity shrinkage, with the ANT Scale in isolation performing comparably to or better than the statistical models for PCL-R total and Factor 2 scores. Results offer limited evidence of convergent validity between the PAI and the PCL-R.

  4. DNA typing for personal identification of urine after long-term preservation for testing in doping control.

    Science.gov (United States)

    Aoki, Kimiko; Tanaka, Hiroyuki; Ueki, Makoto

    2017-08-01

    When the tampering of a urine sample is suspected in doping control, personal identification of the sample needs to be determined by short tandem repeat (STR) analysis using DNA. We established a method for extracting DNA from urine samples stored at -20 °C without using any additives or procedures, which is consistent with how samples are required to be managed for doping control. The method, using the Puregene® Blood Core kit followed by NucleoSpin® gDNA Clean-up or NucleoSpin® gDNA Clean-up XS kit, does not need any special instrument and can provide a purified extract with high-quality DNA from up to 40 mL of urine suitable for STR analysis using an AmpFlSTR® Identifiler® PCR amplification kit. Storing urine at -20 °C is detrimental to the stability of DNA. The DNA concentration of preserved urine could not be predicted by specific gravity or creatinine level at the time of urine collection. The DNA concentration of a purified extract (10 μL) was required to be >0.06 ng/μL to ensure a successful STR analysis. Thus, the required extraction volumes of urine preserved for 3-7 years at -20 °C were estimated to be 30 mL and 20 mL to succeed in at least 86% of men and 91% of women, respectively. Considering the long half-life of DNA during long-term preservation, our extraction method is applicable to urine samples stored even for 10 years, which is currently the storage duration allowed (increased from 8 years) before re-examination in doping control. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  5. Use of Frontal Sinus and Nasal Septum Pattern as an Aid in Personal Identification and Determination of Gender: A Radiographic Study.

    Science.gov (United States)

    Verma, Kavita; Nahar, Prashant; Singh, Mohit Pal; Mathur, Hemant; Bhuvaneshwari, S

    2017-01-01

    Personal identification and gender determination of unknown person has a vital importance in forensic investigation. Human skull radiography is a useful tool in human identification in natural disaster, in any accidents such as fire accident and road traffic accident where body remains become degraded or severely destroyed. Present study was performed to evaluate the measurement of frontal sinus, uniqueness of various pattern of nasal septum when combined with frontal sinus observed on posterio anterior cephalogram for sex determination as well as personal identification. A total of 80 individuals, 40 males and 40 females, between the age ranges of 18-30 years were selected. The selected individuals had their Posterio Anterior (PA) cephalogram performed after taking their informed consent. Right and left areas and the maximum height and width of the frontal sinus were determined and septum patterns were evaluated and both patterns were also combined and compared. The radiographs were taken on Xtropan 2000 OPG X-ray machine with cephalography attachment and KODAK CR 7400 digital radiography system. Mean and SD values of the greatest height and width of frontal sinus in male and female patients were thus evaluated. The mean values of the frontal sinus were greater in males and the left area was larger than the right area, based on student's t-test at the 5% level of significance. The combination of Frontal Sinus Patterns and Nasal Septum Patterns (FP+NSP) were assessed and found that there were nine classifiable patterns in 26 (32.5%) individuals (12 males and 14 females), each of which had common representations in more than one individual. Besides these patterns, there were unique unclassifiable patterns in 54 (67.5%) individuals. The present study supports the use of radiographic evaluation of frontal sinus dimensions, frontal sinus patterns, nasal septum deviations and the combination FP+NSP patterns for personal identification and gender determination in

  6. [On the use of the spectral speech characteristics for the determination of biometric parameters of the vocal tract in forensic medical identification of the speaker's personality].

    Science.gov (United States)

    Kaganov, A Sh

    2014-01-01

    The objective of the present study was to elucidate the relationship between the spectral speech characteristics and the biometric parameters of the speaker's vocal tract. The secondary objective was to consider the theoretical basis behind the medico-criminalistic personality identification from the biometric parameters of the speaker's vocal tract. The article is based on the results of real forensic medical investigations and the literature data.

  7. [The coordination of the forensic medical service with the medical criminology subdivisions of internal affairs organs in the personal identification of unidentified corpses].

    Science.gov (United States)

    Pashinian, G A; Tuchik, E S

    1997-01-01

    In order to improve the cooperation between medical criminology departments of the organs of home affairs and forensic medical service in personality identification of unidentified corpses, the authors propose amendments to the routine procedure regulated by documents of the Ministry of Home Affairs of the Russian Federation, for these documents are in need of serious correction and revision, so that they conform to the judicial legislation and other documents.

  8. Identification of myogenic regulatory genes in the muscle transcriptome of beltfish (Trichiurus lepturus: A major commercial marine fish species with robust swimming ability

    Directory of Open Access Journals (Sweden)

    Hui Zhang

    2016-06-01

    Full Text Available The beltfish (Trichiurus lepturus is considered as one of the most economically important marine fish in East Asia. It is a top predator with a robust swimming ability that is a good model to study muscle physiology in fish. In the present study, we used Illumina sequencing technology (NextSeq500 to sequence, assemble and annotate the muscle transcriptome of juvenile beltfish. A total of 57,509,280 clean reads (deposited in NCBI SRA database with accession number of SRX1674471 were obtained from RNA sequencing and 26,811 unigenes (with N50 of 1033 bp were obtained after de novo assembling with Trinity software. BLASTX against NR, GO, KEGG and eggNOG databases show 100%, 49%, 31% and 96% annotation rate, respectively. By mining beltfish muscle transcriptome, several key genes which play essential role on regulating myogenesis, including pax3, pax7, myf5, myoD, mrf4/myf6, myogenin and myostatin were identified with a low expression level. The muscle transcriptome of beltfish can provide some insight into the understanding of genome-wide transcriptome profile of teleost muscle tissue and give useful information to study myogenesis in juvenile/adult fish.

  9. IDENTIFICATION OF A ROBUST LICHEN INDEX FOR THE DECONVOLUTION OF LICHEN AND ROCK MIXTURES USING PATTERN SEARCH ALGORITHM (CASE STUDY: GREENLAND

    Directory of Open Access Journals (Sweden)

    S. Salehi

    2016-06-01

    Full Text Available Lichens are the dominant autotrophs of polar and subpolar ecosystems commonly encrust the rock outcrops. Spectral mixing of lichens and bare rock can shift diagnostic spectral features of materials of interest thus leading to misinterpretation and false positives if mapping is done based on perfect spectral matching methodologies. Therefore, the ability to distinguish the lichen coverage from rock and decomposing a mixed pixel into a collection of pure reflectance spectra, can improve the applicability of hyperspectral methods for mineral exploration. The objective of this study is to propose a robust lichen index that can be used to estimate lichen coverage, regardless of the mineral composition of the underlying rocks. The performance of three index structures of ratio, normalized ratio and subtraction have been investigated using synthetic linear mixtures of pure rock and lichen spectra with prescribed mixing ratios. Laboratory spectroscopic data are obtained from lichen covered samples collected from Karrat, Liverpool Land, and Sisimiut regions in Greenland. The spectra are then resampled to Hyperspectral Mapper (HyMAP resolution, in order to further investigate the functionality of the indices for the airborne platform. In both resolutions, a Pattern Search (PS algorithm is used to identify the optimal band wavelengths and bandwidths for the lichen index. The results of our band optimization procedure revealed that the ratio between R894-1246 and R1110 explains most of the variability in the hyperspectral data at the original laboratory resolution (R2=0.769. However, the normalized index incorporating R1106-1121 and R904-1251 yields the best results for the HyMAP resolution (R2=0.765.

  10. Robust Multimodal Dictionary Learning

    Science.gov (United States)

    Cao, Tian; Jojic, Vladimir; Modla, Shannon; Powell, Debbie; Czymmek, Kirk; Niethammer, Marc

    2014-01-01

    We propose a robust multimodal dictionary learning method for multimodal images. Joint dictionary learning for both modalities may be impaired by lack of correspondence between image modalities in training data, for example due to areas of low quality in one of the modalities. Dictionaries learned with such non-corresponding data will induce uncertainty about image representation. In this paper, we propose a probabilistic model that accounts for image areas that are poorly corresponding between the image modalities. We cast the problem of learning a dictionary in presence of problematic image patches as a likelihood maximization problem and solve it with a variant of the EM algorithm. Our algorithm iterates identification of poorly corresponding patches and re-finements of the dictionary. We tested our method on synthetic and real data. We show improvements in image prediction quality and alignment accuracy when using the method for multimodal image registration. PMID:24505674

  11. Robust finger vein ROI localization based on flexible segmentation.

    Science.gov (United States)

    Lu, Yu; Xie, Shan Juan; Yoon, Sook; Yang, Jucheng; Park, Dong Sun

    2013-10-24

    Finger veins have been proved to be an effective biometric for personal identification in the recent years. However, finger vein images are easily affected by influences such as image translation, orientation, scale, scattering, finger structure, complicated background, uneven illumination, and collection posture. All these factors may contribute to inaccurate region of interest (ROI) definition, and so degrade the performance of finger vein identification system. To improve this problem, in this paper, we propose a finger vein ROI localization method that has high effectiveness and robustness against the above factors. The proposed method consists of a set of steps to localize ROIs accurately, namely segmentation, orientation correction, and ROI detection. Accurate finger region segmentation and correct calculated orientation can support each other to produce higher accuracy in localizing ROIs. Extensive experiments have been performed on the finger vein image database, MMCBNU_6000, to verify the robustness of the proposed method. The proposed method shows the segmentation accuracy of 100%. Furthermore, the average processing time of the proposed method is 22 ms for an acquired image, which satisfies the criterion of a real-time finger vein identification system.

  12. Robust Finger Vein ROI Localization Based on Flexible Segmentation

    Directory of Open Access Journals (Sweden)

    Dong Sun Park

    2013-10-01

    Full Text Available Finger veins have been proved to be an effective biometric for personal identification in the recent years. However, finger vein images are easily affected by influences such as image translation, orientation, scale, scattering, finger structure, complicated background, uneven illumination, and collection posture. All these factors may contribute to inaccurate region of interest (ROI definition, and so degrade the performance of finger vein identification system. To improve this problem, in this paper, we propose a finger vein ROI localization method that has high effectiveness and robustness against the above factors. The proposed method consists of a set of steps to localize ROIs accurately, namely segmentation, orientation correction, and ROI detection. Accurate finger region segmentation and correct calculated orientation can support each other to produce higher accuracy in localizing ROIs. Extensive experiments have been performed on the finger vein image database, MMCBNU_6000, to verify the robustness of the proposed method. The proposed method shows the segmentation accuracy of 100%. Furthermore, the average processing time of the proposed method is 22 ms for an acquired image, which satisfies the criterion of a real-time finger vein identification system.

  13. Robust Finger Vein ROI Localization Based on Flexible Segmentation

    Science.gov (United States)

    Lu, Yu; Xie, Shan Juan; Yoon, Sook; Yang, Jucheng; Park, Dong Sun

    2013-01-01

    Finger veins have been proved to be an effective biometric for personal identification in the recent years. However, finger vein images are easily affected by influences such as image translation, orientation, scale, scattering, finger structure, complicated background, uneven illumination, and collection posture. All these factors may contribute to inaccurate region of interest (ROI) definition, and so degrade the performance of finger vein identification system. To improve this problem, in this paper, we propose a finger vein ROI localization method that has high effectiveness and robustness against the above factors. The proposed method consists of a set of steps to localize ROIs accurately, namely segmentation, orientation correction, and ROI detection. Accurate finger region segmentation and correct calculated orientation can support each other to produce higher accuracy in localizing ROIs. Extensive experiments have been performed on the finger vein image database, MMCBNU_6000, to verify the robustness of the proposed method. The proposed method shows the segmentation accuracy of 100%. Furthermore, the average processing time of the proposed method is 22 ms for an acquired image, which satisfies the criterion of a real-time finger vein identification system. PMID:24284769

  14. The verbal facilitation effect: re-reading person descriptions as a system variable to improve identification performance.

    Science.gov (United States)

    Sporer, Siegfried L; Kaminski, Kristina S; Davids, Maike C; McQuiston, Dawn

    2016-11-01

    When witnesses report a crime, police usually ask for a description of the perpetrator. Several studies suggested that verbalising faces leads to a detriment in identification performance (verbal overshadowing effect [VOE]) but the effect has been difficult to replicate. Here, we sought to reverse the VOE by inducing context reinstatement as a system variable through re-reading one's own description before an identification task. Participants (N = 208) watched a video film and were then dismissed (control group), only described the perpetrator, or described and later re-read their own descriptions before identification in either target-present or target-absent lineups after a 2-day or a 5-week delay. Identification accuracy was significantly higher after re-reading (85.0%) than in the no description control group (62.5%) irrespective of target presence. Data were internally replicated using a second target and corroborated by several small meta-analyses. Identification accuracy was related to description quality. Moreover, there was a tendency towards a verbal facilitation effect (VFE) rather than a VOE. Receiver operating characteristic (ROC) curve analyses confirm that our findings are not due to a shift in response bias but truly reflect improvement of recognition performance. Differences in the ecological validity of study paradigms are discussed.

  15. THE RELATIONSHIP OF PERSONAL MATURITY OF THE ADOPTIVE PARENTS AND THE PROCESS OF SOCIALIZATIONAND IDENTIFICATION OF PRESCHOOL CHILDREN

    Directory of Open Access Journals (Sweden)

    A N Pronina

    2015-12-01

    Full Text Available The article is devoted to the topic of the development of children from orphanage in a foster home, showing the importance of personal maturity of the adoptive parents. The authors present the results of a study showing that there is a relationship between the individual criteria of personal maturity of the adoptive parents and the process of socialization and individualization of the children from orphanage.

  16. Methods for robustness programming

    NARCIS (Netherlands)

    Olieman, N.J.

    2008-01-01

    Robustness of an object is defined as the probability that an object will have properties as required. Robustness Programming (RP) is a mathematical approach for Robustness estimation and Robustness optimisation. An example in the context of designing a food product, is finding the best composition

  17. Robustness in laying hens

    NARCIS (Netherlands)

    Star, L.

    2008-01-01

    The aim of the project ‘The genetics of robustness in laying hens’ was to investigate nature and regulation of robustness in laying hens under sub-optimal conditions and the possibility to increase robustness by using animal breeding without loss of production. At the start of the project, a robust

  18. How the human brain goes virtual: distinct cortical regions of the person-processing network are involved in self-identification with virtual agents.

    Science.gov (United States)

    Ganesh, Shanti; van Schie, Hein T; de Lange, Floris P; Thompson, Evan; Wigboldus, Daniël H J

    2012-07-01

    Millions of people worldwide engage in online role-playing with their avatar, a virtual agent that represents the self. Previous behavioral studies have indicated that many gamers identify more strongly with their avatar than with their biological self. Through their avatar, gamers develop social networks and learn new social-cognitive skills. The cognitive neurosciences have yet to identify the neural processes that underlie self-identification with these virtual agents. We applied functional neuroimaging to 22 long-term online gamers and 21 nongaming controls, while they rated personality traits of self, avatar, and familiar others. Strikingly, neuroimaging data revealed greater avatar-referential cortical activity in the left inferior parietal lobe, a region associated with self-identification from a third-person perspective. The magnitude of this brain activity correlated positively with the propensity to incorporate external body enhancements into one's bodily identity. Avatar-referencing furthermore recruited greater activity in the rostral anterior cingulate gyrus, suggesting relatively greater emotional self-involvement with one's avatar. Post-scanning behavioral data revealed superior recognition memory for avatar relative to others. Interestingly, memory for avatar positively covaried with play duration. These findings significantly advance our knowledge about the brain's plasticity to self-identify with virtual agents and the human cognitive-affective potential to live and learn in virtual worlds.

  19. Robust System Identification and Control Design

    National Research Council Canada - National Science Library

    Zhou, Kemin

    2001-01-01

    ..., some advanced nonlinear control techniques including bifurcation stabilization and compressor stabilization techniques, model reduction techniques, fault detection and fault tolerant control methods...

  20. Identification of Individuals with Serious Emotional Disturbance Using the Draw a Person: Screening Procedure for Emotional Disturbance.

    Science.gov (United States)

    McNeish, Timothy J.; Naglieri, Jack A.

    1993-01-01

    Regular education students (n=81) and students with serious emotional disturbance (n=81,) were matched on age (7-13), gender, race, and intelligence. They completed drawings which were scored using the "Draw a Person: Screening Procedure for Emotional Disturbance." Students with emotional disturbance scored significantly higher than did…

  1. Performance of radiant cooling ceiling combined with personalized ventilation in an office room: identification of thermal conditions

    DEFF Research Database (Denmark)

    Lipczynska, Aleksandra; Kaczmarczyk, Jan; Melikov, Arsen Krikor

    2014-01-01

    were performed in a test room arranged as an office with 2 workstations and 2 seating occupants resembled by thermal manikins. Heat gain of 66-72 W/m2 was simulated in the room (occupants, computers, lighting, solar gain). The air temperature in the chamber was maintained at 26°C and 28°C. Personalized...

  2. VOC source identification from personal and residential indoor, outdoor and workplace microenvironment samples in EXPOLIS-Helsinki, Finland

    Energy Technology Data Exchange (ETDEWEB)

    Edwards, Rufus D. [KTL-Finnish National Inst. of Public Health, Dept. of Environmental Hygiene, Kuopio (Finland); California Univ., School of Public Health, Berkeley, CA (United States); Jurvelin, J. [KTL-Finnish National Inst. of Public Health, Dept. of Environmental Hygiene, Kuopio (Finland); Jyvaeskylae Polytechnic, School of Engineering and Technology, Jyvaeskylae (Finland); Koistinen, K. [KTL-Finnish National Inst. of Public Health, Dept. of Environmental Hygiene, Kuopio (Finland); Saarela, K. [VTT, Chemical Technology, Espoo (Finland); Jantunen, M. [EC JRC, Inst. of the Environment, Ispra (Italy)

    2001-07-01

    Principal component analyses (varimax rotation) were used to identify common sources of 30 target volatile organic compounds (VOCs) in residential outdoor, residential indoor and workplace microenvironment and personal 48-h exposure samples, as a component of the EXPOLIS-Helsinki study. Variability in VOC concentrations in residential outdoor microenvironments was dominated by compounds associated with long-range transport of pollutants, followed by traffic emissions, emissions from trees and product emissions. Variability in VOC concentrations in environmental tobacco smoke (ETS) free residential indoor environments was dominated by compounds associated with indoor cleaning products, followed by compounds associated with traffic emissions, long-range transport of pollutants and product emissions. Median indoor/outdoor ratios for compounds typically associated with traffic emissions and long-range transport of pollutants exceeded 1, in some cases quite considerably, indicating substantial indoor source contributions. Changes in the median indoor/outdoor ratios during different seasons reflected different seasonal ventilation patterns as increased ventilation led to dilution of those VOC compounds in the indoor environment that had indoor sources. Variability in workplace VOC concentrations was dominated by compounds associated with traffic emissions followed by product emissions, long-range transport and air fresheners. Variability in VOC concentrations in ETS free personal exposure samples was dominated by compounds associated with traffic emissions, followed by long-range transport, cleaning products and product emissions. VOC sources in personal exposure samples reflected the times spent in different microenvironments, and personal exposure samples were not adequately represented by any one microenvironment, demonstrating the need for personal exposure sampling. (Author)

  3. Perceptual Robust Design

    DEFF Research Database (Denmark)

    Pedersen, Søren Nygaard

    The research presented in this PhD thesis has focused on a perceptual approach to robust design. The results of the research and the original contribution to knowledge is a preliminary framework for understanding, positioning, and applying perceptual robust design. Product quality is a topic...... been presented. Therefore, this study set out to contribute to the understanding and application of perceptual robust design. To achieve this, a state-of-the-art and current practice review was performed. From the review two main research problems were identified. Firstly, a lack of tools...... for perceptual robustness was found to overlap with the optimum for functional robustness and at most approximately 2.2% out of the 14.74% could be ascribed solely to the perceptual robustness optimisation. In conclusion, the thesis have offered a new perspective on robust design by merging robust design...

  4. [The application of cybernetic modeling methods for the forensic medical personality identification based on the voice and sounding speech characteristics].

    Science.gov (United States)

    Kaganov, A Sh; Kir'yanov, P A

    2015-01-01

    The objective of the present publication was to discuss the possibility of application of cybernetic modeling methods to overcome the apparent discrepancy between two kinds of the speech records, viz. initial ones (e.g. obtained in the course of special investigation activities) and the voice prints obtained from the persons subjected to the criminalistic examination. The paper is based on the literature sources and the materials of original criminalistics expertises performed by the authors.

  5. Robustness Evaluation of Timber Structures

    DEFF Research Database (Denmark)

    Kirkegaard, Poul Henning; Sørensen, John Dalsgaard; čizmar, D.

    2010-01-01

    The present paper outlines results from working group 3 (WG3) in the EU COST Action E55 – ‘Modelling of the performance of timber structures’. The objectives of the project are related to the three main research activities: the identification and modelling of relevant load and environmental...... exposure scenarios, the improvement of knowledge concerning the behaviour of timber structural elements and the development of a generic framework for the assessment of the life-cycle vulnerability and robustness of timber structures....

  6. Self-identification with another person's face: the time relevant role of multimodal brain areas in the enfacement illusion.

    Science.gov (United States)

    Bufalari, Ilaria; Porciello, Giuseppina; Sperduti, Marco; Minio-Paluello, Ilaria

    2015-04-01

    The illusory subjective experience of looking at one's own face while in fact looking at another person's face can surprisingly be induced by simple synchronized visuotactile stimulation of the two faces. A recent study (Apps MA, Tajadura-Jiménez A, Sereno M, Blanke O, Tsakiris M. Cereb Cortex. First published August 20, 2013; doi:10.1093/cercor/bht199) investigated for the first time the role of visual unimodal and temporoparietal multimodal brain areas in the enfacement illusion and suggested a model in which multisensory mechanisms are crucial to construct and update self-face representation. Copyright © 2015 the American Physiological Society.

  7. Defining robustness protocols: a method to include and evaluate robustness in clinical plans

    International Nuclear Information System (INIS)

    McGowan, S E; Albertini, F; Lomax, A J; Thomas, S J

    2015-01-01

    We aim to define a site-specific robustness protocol to be used during the clinical plan evaluation process. Plan robustness of 16 skull base IMPT plans to systematic range and random set-up errors have been retrospectively and systematically analysed. This was determined by calculating the error-bar dose distribution (ebDD) for all the plans and by defining some metrics used to define protocols aiding the plan assessment. Additionally, an example of how to clinically use the defined robustness database is given whereby a plan with sub-optimal brainstem robustness was identified. The advantage of using different beam arrangements to improve the plan robustness was analysed. Using the ebDD it was found range errors had a smaller effect on dose distribution than the corresponding set-up error in a single fraction, and that organs at risk were most robust to the range errors, whereas the target was more robust to set-up errors. A database was created to aid planners in terms of plan robustness aims in these volumes. This resulted in the definition of site-specific robustness protocols. The use of robustness constraints allowed for the identification of a specific patient that may have benefited from a treatment of greater individuality. A new beam arrangement showed to be preferential when balancing conformality and robustness for this case. The ebDD and error-bar volume histogram proved effective in analysing plan robustness. The process of retrospective analysis could be used to establish site-specific robustness planning protocols in proton therapy. These protocols allow the planner to determine plans that, although delivering a dosimetrically adequate dose distribution, have resulted in sub-optimal robustness to these uncertainties. For these cases the use of different beam start conditions may improve the plan robustness to set-up and range uncertainties. (paper)

  8. Defining robustness protocols: a method to include and evaluate robustness in clinical plans

    Science.gov (United States)

    McGowan, S. E.; Albertini, F.; Thomas, S. J.; Lomax, A. J.

    2015-04-01

    We aim to define a site-specific robustness protocol to be used during the clinical plan evaluation process. Plan robustness of 16 skull base IMPT plans to systematic range and random set-up errors have been retrospectively and systematically analysed. This was determined by calculating the error-bar dose distribution (ebDD) for all the plans and by defining some metrics used to define protocols aiding the plan assessment. Additionally, an example of how to clinically use the defined robustness database is given whereby a plan with sub-optimal brainstem robustness was identified. The advantage of using different beam arrangements to improve the plan robustness was analysed. Using the ebDD it was found range errors had a smaller effect on dose distribution than the corresponding set-up error in a single fraction, and that organs at risk were most robust to the range errors, whereas the target was more robust to set-up errors. A database was created to aid planners in terms of plan robustness aims in these volumes. This resulted in the definition of site-specific robustness protocols. The use of robustness constraints allowed for the identification of a specific patient that may have benefited from a treatment of greater individuality. A new beam arrangement showed to be preferential when balancing conformality and robustness for this case. The ebDD and error-bar volume histogram proved effective in analysing plan robustness. The process of retrospective analysis could be used to establish site-specific robustness planning protocols in proton therapy. These protocols allow the planner to determine plans that, although delivering a dosimetrically adequate dose distribution, have resulted in sub-optimal robustness to these uncertainties. For these cases the use of different beam start conditions may improve the plan robustness to set-up and range uncertainties.

  9. A fully robust PARAFAC method for analyzing fluorescence data

    DEFF Research Database (Denmark)

    Engelen, Sanne; Frosch, Stina; Jørgensen, Bo

    2009-01-01

    and Rayleigh scatter. Recently, a robust PARAFAC method that circumvents the harmful effects of outlying samples has been developed. For removing the scatter effects on the final PARAFAC model, different techniques exist. Newly, an automated scatter identification tool has been constructed. However......, there still exists no robust method for handling fluorescence data encountering both outlying EEM landscapes and scatter. In this paper, we present an iterative algorithm where the robust PARAFAC method and the scatter identification tool are alternately performed. A fully automated robust PARAFAC method...

  10. Robustness of Structural Systems

    DEFF Research Database (Denmark)

    Canisius, T.D.G.; Sørensen, John Dalsgaard; Baker, J.W.

    2007-01-01

    The importance of robustness as a property of structural systems has been recognised following several structural failures, such as that at Ronan Point in 1968,where the consequenceswere deemed unacceptable relative to the initiating damage. A variety of research efforts in the past decades have...... attempted to quantify aspects of robustness such as redundancy and identify design principles that can improve robustness. This paper outlines the progress of recent work by the Joint Committee on Structural Safety (JCSS) to develop comprehensive guidance on assessing and providing robustness in structural...... systems. Guidance is provided regarding the assessment of robustness in a framework that considers potential hazards to the system, vulnerability of system components, and failure consequences. Several proposed methods for quantifying robustness are reviewed, and guidelines for robust design...

  11. Robust multivariate analysis

    CERN Document Server

    J Olive, David

    2017-01-01

    This text presents methods that are robust to the assumption of a multivariate normal distribution or methods that are robust to certain types of outliers. Instead of using exact theory based on the multivariate normal distribution, the simpler and more applicable large sample theory is given.  The text develops among the first practical robust regression and robust multivariate location and dispersion estimators backed by theory.   The robust techniques  are illustrated for methods such as principal component analysis, canonical correlation analysis, and factor analysis.  A simple way to bootstrap confidence regions is also provided. Much of the research on robust multivariate analysis in this book is being published for the first time. The text is suitable for a first course in Multivariate Statistical Analysis or a first course in Robust Statistics. This graduate text is also useful for people who are familiar with the traditional multivariate topics, but want to know more about handling data sets with...

  12. Evaluation of dose equivalent and identification of energy rangeby the electronic personal dosemeter for neutron 'Saphydose-N' at different workplaces of nuclear facilities

    International Nuclear Information System (INIS)

    Chau, Q.; Lahaye, T.; Lacoste, V.; Muller, H.; Luszik-Bhadra, M.; Reginatto, M.

    2005-01-01

    Full text: According to the transposition of the Directive 96/29/EURATOM into the French legislation, any worker operating in a controlled area has to be monitored by 'passive' and 'active' dosemeters. Electronic personal dosemeters are especially needed for optimization of workplaces. In nuclear facilities, some of the workers are likely to be exposed to mixed neutron-photon fields. If the dosimetry of the photons is relatively well controlled, the neutron dosimetry raises more difficulties. In this context, the Institute for Radiological Protection and Nuclear Safety (IRSN) has developed an electronic device based on a silicon detector: the 'Saphydose-N' dosemeter. It is composed of several detectors and covers more than eight energy decades. The Saphydose-N device complies with recommendations of standard IEC 1323. As the radiation fields produced in laboratory are not strictly representative to those encountered at workplaces, IRSN evaluated the response of Saphydose-N at various workplaces from nuclear industry. Several campaigns were performed in the framework of the European contract EVIDOS ('Evaluation of Individual Dosimetry in Mixed Neutron and Photon Radiation Fields'). Saphydose-N was carried out at a fuel processing plant, at the Nuclear Power Plant close to the boiling water reactor, near the transport and storage cask and at the Research Reactor. This paper mainly aims at presenting the measurements, the identification of the energy range and the results obtained with the electronic personal neutron Saphydose-N at different facilities. The results are compared with reference values, defined by other partners in EVIDOS project, for ambient and personal dose equivalent. (author)

  13. Robust Watermarking of Video Streams

    Directory of Open Access Journals (Sweden)

    T. Polyák

    2006-01-01

    Full Text Available In the past few years there has been an explosion in the use of digital video data. Many people have personal computers at home, and with the help of the Internet users can easily share video files on their computer. This makes possible the unauthorized use of digital media, and without adequate protection systems the authors and distributors have no means to prevent it.Digital watermarking techniques can help these systems to be more effective by embedding secret data right into the video stream. This makes minor changes in the frames of the video, but these changes are almost imperceptible to the human visual system. The embedded information can involve copyright data, access control etc. A robust watermark is resistant to various distortions of the video, so it cannot be removed without affecting the quality of the host medium. In this paper I propose a video watermarking scheme that fulfills the requirements of a robust watermark. 

  14. Identification of Personalized Chemoresistance Genes in Subtypes of Basal-Like Breast Cancer Based on Functional Differences Using Pathway Analysis.

    Directory of Open Access Journals (Sweden)

    Tong Wu

    Full Text Available Breast cancer is a highly heterogeneous disease that is clinically classified into several subtypes. Among these subtypes, basal-like breast cancer largely overlaps with triple-negative breast cancer (TNBC, and these two groups are generally studied together as a single entity. Differences in the molecular makeup of breast cancers can result in different treatment strategies and prognoses for patients with different breast cancer subtypes. Compared with other subtypes, basal-like and other ER+ breast cancer subtypes exhibit marked differences in etiologic factors, clinical characteristics and therapeutic potential. Anthracycline drugs are typically used as the first-line clinical treatment for basal-like breast cancer subtypes. However, certain patients develop drug resistance following chemotherapy, which can lead to disease relapse and death. Even among patients with basal-like breast cancer, there can be significant molecular differences, and it is difficult to identify specific drug resistance proteins in any given patient using conventional variance testing methods. Therefore, we designed a new method for identifying drug resistance genes. Subgroups, personalized biomarkers, and therapy targets were identified using cluster analysis of differentially expressed genes. We found that basal-like breast cancer could be further divided into at least four distinct subgroups, including two groups at risk for drug resistance and two groups characterized by sensitivity to pharmacotherapy. Based on functional differences among these subgroups, we identified nine biomarkers related to drug resistance: SYK, LCK, GAB2, PAWR, PPARG, MDFI, ZAP70, CIITA and ACTA1. Finally, based on the deviation scores of the examined pathways, 16 pathways were shown to exhibit varying degrees of abnormality in the various subgroups, indicating that patients with different subtypes of basal-like breast cancer can be characterized by differences in the functional status of

  15. The effects of gender and age on forensic personal identification from frontal sinus in a Turkish population.

    Science.gov (United States)

    Tatlisumak, Ertugrul; Asirdizer, Mahmut; Bora, Aydin; Hekimoglu, Yavuz; Etli, Yasin; Gumus, Orhan; Keskin, Siddik

    2017-01-01

    To define the dimensions of the frontal sinus in groups standardized for age and gender and to discuss the reasons and the effects of the variations. Methods: Frontal sinus measurements were obtained from paranasal CTscans of 180 males and 180 females in the Radiology Department of Dursun Odabas Medical Center of Yuzuncu Yil University, Van, which is located in Eastern Turkey, between February and March 2016. The width and height of sinuses were measured on a coronal plane, and the anteroposterior length was measured on an axial plane. Volumes were calculated using the Hospital Information Management Systems and Image Archiving and Management Systemprogram. The Statistical Package of the Social Science version 13 was used for statistical analyses.  Results: We determined differences in the frontal sinus measurements of different age groups in a Turkish adult population. Frontal sinus dimensions were usually higher in females and lower in males after 40-49 years of age than their younger counterparts, but the measurements were lower in females and higher in males in 70≤ years of age group than 60-69 years of age. Left frontal sinus was dominant in young age groups but right frontal sinus was dominant in groups 40-49 years of age or older.  Conclusion: We observed crossing of the measurements between the different age groups, which we could not find clear explanations. The results of such studies may affect forensic identification from frontal sinus measurements.

  16. A Study of Correlations within the Dimensions of Lower Limb Parts for Personal Identification in a Sudanese Population

    Directory of Open Access Journals (Sweden)

    Altayeb Abdalla Ahmed

    2014-01-01

    Full Text Available The presence of an isolated limb or limb parts from different individuals presents a major challenge for medicolegal investigators in establishing identification in cases of wars, mass disasters, and criminal assaults because different populations have different sizes and proportions. The measurement of lower limb dimensions showed a high success rate in establishing individual identity in terms of sex and stature in various populations. However, there is a paucity of data concerning the correlation within the lower limb parts. This study aims to assess the existence of relationships within lower limb parts and to develop regression formulae to reconstruct limb parts from one another. The tibial length, bimalleolar breadth, foot length, and foot breadth of 376 right-handed Sudanese adults were measured. The results showed that all variables were significantly larger in males than in females. A significant positive correlation (P<0.001 was found within the lower limb parts. Sex-specific linear equations and multiple regression equations were developed to reconstruct the lower limb parts in the presence of single dimension or multiple dimensions from the same limb. The use of multiple regression equations provided a better reconstruction than simple regression equations. These results are significant in forensics and orthopedic reconstructive surgery.

  17. Robustness of Structures

    DEFF Research Database (Denmark)

    Faber, Michael Havbro; Vrouwenvelder, A.C.W.M.; Sørensen, John Dalsgaard

    2011-01-01

    In 2005, the Joint Committee on Structural Safety (JCSS) together with Working Commission (WC) 1 of the International Association of Bridge and Structural Engineering (IABSE) organized a workshop on robustness of structures. Two important decisions resulted from this workshop, namely...... ‘COST TU0601: Robustness of Structures’ was initiated in February 2007, aiming to provide a platform for exchanging and promoting research in the area of structural robustness and to provide a basic framework, together with methods, strategies and guidelines enhancing robustness of structures...... the development of a joint European project on structural robustness under the COST (European Cooperation in Science and Technology) programme and the decision to develop a more elaborate document on structural robustness in collaboration between experts from the JCSS and the IABSE. Accordingly, a project titled...

  18. Robust Growth Determinants

    OpenAIRE

    Doppelhofer, Gernot; Weeks, Melvyn

    2011-01-01

    This paper investigates the robustness of determinants of economic growth in the presence of model uncertainty, parameter heterogeneity and outliers. The robust model averaging approach introduced in the paper uses a flexible and parsi- monious mixture modeling that allows for fat-tailed errors compared to the normal benchmark case. Applying robust model averaging to growth determinants, the paper finds that eight out of eighteen variables found to be significantly related to economic growth ...

  19. Robust Programming by Example

    OpenAIRE

    Bishop , Matt; Elliott , Chip

    2011-01-01

    Part 2: WISE 7; International audience; Robust programming lies at the heart of the type of coding called “secure programming”. Yet it is rarely taught in academia. More commonly, the focus is on how to avoid creating well-known vulnerabilities. While important, that misses the point: a well-structured, robust program should anticipate where problems might arise and compensate for them. This paper discusses one view of robust programming and gives an example of how it may be taught.

  20. Wavelet packet transform-based robust video watermarking technique

    Indian Academy of Sciences (India)

    If any conflict happens to the copyright identification and authentication, ... the present work is concentrated on the robust digital video watermarking. .... the wavelet decomposition, resulting in a new family of orthonormal bases for function ...

  1. Robust procedures in chemometrics

    DEFF Research Database (Denmark)

    Kotwa, Ewelina

    properties of the analysed data. The broad theoretical background of robust procedures was given as a very useful supplement to the classical methods, and a new tool, based on robust PCA, aiming at identifying Rayleigh and Raman scatters in excitation-mission (EEM) data was developed. The results show...

  2. Robustness Beamforming Algorithms

    Directory of Open Access Journals (Sweden)

    Sajad Dehghani

    2014-04-01

    Full Text Available Adaptive beamforming methods are known to degrade in the presence of steering vector and covariance matrix uncertinity. In this paper, a new approach is presented to robust adaptive minimum variance distortionless response beamforming make robust against both uncertainties in steering vector and covariance matrix. This method minimize a optimization problem that contains a quadratic objective function and a quadratic constraint. The optimization problem is nonconvex but is converted to a convex optimization problem in this paper. It is solved by the interior-point method and optimum weight vector to robust beamforming is achieved.

  3. Robustness Metrics: Consolidating the multiple approaches to quantify Robustness

    DEFF Research Database (Denmark)

    Göhler, Simon Moritz; Eifler, Tobias; Howard, Thomas J.

    2016-01-01

    robustness metrics; 3) Functional expectancy and dispersion robustness metrics; and 4) Probability of conformance robustness metrics. The goal was to give a comprehensive overview of robustness metrics and guidance to scholars and practitioners to understand the different types of robustness metrics...

  4. Robustness of Structures

    DEFF Research Database (Denmark)

    Sørensen, John Dalsgaard

    2008-01-01

    This paper describes the background of the robustness requirements implemented in the Danish Code of Practice for Safety of Structures and in the Danish National Annex to the Eurocode 0, see (DS-INF 146, 2003), (DS 409, 2006), (EN 1990 DK NA, 2007) and (Sørensen and Christensen, 2006). More...... frequent use of advanced types of structures with limited redundancy and serious consequences in case of failure combined with increased requirements to efficiency in design and execution followed by increased risk of human errors has made the need of requirements to robustness of new structures essential....... According to Danish design rules robustness shall be documented for all structures in high consequence class. The design procedure to document sufficient robustness consists of: 1) Review of loads and possible failure modes / scenarios and determination of acceptable collapse extent; 2) Review...

  5. Robustness of structures

    DEFF Research Database (Denmark)

    Vrouwenvelder, T.; Sørensen, John Dalsgaard

    2009-01-01

    After the collapse of the World Trade Centre towers in 2001 and a number of collapses of structural systems in the beginning of the century, robustness of structural systems has gained renewed interest. Despite many significant theoretical, methodical and technological advances, structural...... of robustness for structural design such requirements are not substantiated in more detail, nor have the engineering profession been able to agree on an interpretation of robustness which facilitates for its uantification. A European COST action TU 601 on ‘Robustness of structures' has started in 2007...... by a group of members of the CSS. This paper describes the ongoing work in this action, with emphasis on the development of a theoretical and risk based quantification and optimization procedure on the one side and a practical pre-normative guideline on the other....

  6. Robust Approaches to Forecasting

    OpenAIRE

    Jennifer Castle; David Hendry; Michael P. Clements

    2014-01-01

    We investigate alternative robust approaches to forecasting, using a new class of robust devices, contrasted with equilibrium correction models. Their forecasting properties are derived facing a range of likely empirical problems at the forecast origin, including measurement errors, implulses, omitted variables, unanticipated location shifts and incorrectly included variables that experience a shift. We derive the resulting forecast biases and error variances, and indicate when the methods ar...

  7. Robustness - theoretical framework

    DEFF Research Database (Denmark)

    Sørensen, John Dalsgaard; Rizzuto, Enrico; Faber, Michael H.

    2010-01-01

    More frequent use of advanced types of structures with limited redundancy and serious consequences in case of failure combined with increased requirements to efficiency in design and execution followed by increased risk of human errors has made the need of requirements to robustness of new struct...... of this fact sheet is to describe a theoretical and risk based framework to form the basis for quantification of robustness and for pre-normative guidelines....

  8. Qualitative Robustness in Estimation

    Directory of Open Access Journals (Sweden)

    Mohammed Nasser

    2012-07-01

    Full Text Available Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Times New Roman","serif";} Qualitative robustness, influence function, and breakdown point are three main concepts to judge an estimator from the viewpoint of robust estimation. It is important as well as interesting to study relation among them. This article attempts to present the concept of qualitative robustness as forwarded by first proponents and its later development. It illustrates intricacies of qualitative robustness and its relation with consistency, and also tries to remove commonly believed misunderstandings about relation between influence function and qualitative robustness citing some examples from literature and providing a new counter-example. At the end it places a useful finite and a simulated version of   qualitative robustness index (QRI. In order to assess the performance of the proposed measures, we have compared fifteen estimators of correlation coefficient using simulated as well as real data sets.

  9. Robust hybrid name disambiguation framework for large databases

    KAUST Repository

    Zhu, Jia

    2013-10-26

    In many databases, science bibliography database for example, name attribute is the most commonly chosen identifier to identify entities. However, names are often ambiguous and not always unique which cause problems in many fields. Name disambiguation is a non-trivial task in data management that aims to properly distinguish different entities which share the same name, particularly for large databases like digital libraries, as only limited information can be used to identify authors\\' name. In digital libraries, ambiguous author names occur due to the existence of multiple authors with the same name or different name variations for the same person. Also known as name disambiguation, most of the previous works to solve this issue often employ hierarchical clustering approaches based on information inside the citation records, e.g. co-authors and publication titles. In this paper, we focus on proposing a robust hybrid name disambiguation framework that is not only applicable for digital libraries but also can be easily extended to other application based on different data sources. We propose a web pages genre identification component to identify the genre of a web page, e.g. whether the page is a personal homepage. In addition, we propose a re-clustering model based on multidimensional scaling that can further improve the performance of name disambiguation. We evaluated our approach on known corpora, and the favorable experiment results indicated that our proposed framework is feasible. © 2013 Akadémiai Kiadó, Budapest, Hungary.

  10. Robust hybrid name disambiguation framework for large databases

    KAUST Repository

    Zhu, Jia; Yang, Yi; Xie, Qing; Wang, Liwei; Hassan, Saeed-Ul

    2013-01-01

    In many databases, science bibliography database for example, name attribute is the most commonly chosen identifier to identify entities. However, names are often ambiguous and not always unique which cause problems in many fields. Name disambiguation is a non-trivial task in data management that aims to properly distinguish different entities which share the same name, particularly for large databases like digital libraries, as only limited information can be used to identify authors' name. In digital libraries, ambiguous author names occur due to the existence of multiple authors with the same name or different name variations for the same person. Also known as name disambiguation, most of the previous works to solve this issue often employ hierarchical clustering approaches based on information inside the citation records, e.g. co-authors and publication titles. In this paper, we focus on proposing a robust hybrid name disambiguation framework that is not only applicable for digital libraries but also can be easily extended to other application based on different data sources. We propose a web pages genre identification component to identify the genre of a web page, e.g. whether the page is a personal homepage. In addition, we propose a re-clustering model based on multidimensional scaling that can further improve the performance of name disambiguation. We evaluated our approach on known corpora, and the favorable experiment results indicated that our proposed framework is feasible. © 2013 Akadémiai Kiadó, Budapest, Hungary.

  11. Robustness in econometrics

    CERN Document Server

    Sriboonchitta, Songsak; Huynh, Van-Nam

    2017-01-01

    This book presents recent research on robustness in econometrics. Robust data processing techniques – i.e., techniques that yield results minimally affected by outliers – and their applications to real-life economic and financial situations are the main focus of this book. The book also discusses applications of more traditional statistical techniques to econometric problems. Econometrics is a branch of economics that uses mathematical (especially statistical) methods to analyze economic systems, to forecast economic and financial dynamics, and to develop strategies for achieving desirable economic performance. In day-by-day data, we often encounter outliers that do not reflect the long-term economic trends, e.g., unexpected and abrupt fluctuations. As such, it is important to develop robust data processing techniques that can accommodate these fluctuations.

  12. Robust Manufacturing Control

    CERN Document Server

    2013-01-01

    This contributed volume collects research papers, presented at the CIRP Sponsored Conference Robust Manufacturing Control: Innovative and Interdisciplinary Approaches for Global Networks (RoMaC 2012, Jacobs University, Bremen, Germany, June 18th-20th 2012). These research papers present the latest developments and new ideas focusing on robust manufacturing control for global networks. Today, Global Production Networks (i.e. the nexus of interconnected material and information flows through which products and services are manufactured, assembled and distributed) are confronted with and expected to adapt to: sudden and unpredictable large-scale changes of important parameters which are occurring more and more frequently, event propagation in networks with high degree of interconnectivity which leads to unforeseen fluctuations, and non-equilibrium states which increasingly characterize daily business. These multi-scale changes deeply influence logistic target achievement and call for robust planning and control ...

  13. Robust plasmonic substrates

    DEFF Research Database (Denmark)

    Kostiučenko, Oksana; Fiutowski, Jacek; Tamulevicius, Tomas

    2014-01-01

    Robustness is a key issue for the applications of plasmonic substrates such as tip-enhanced Raman spectroscopy, surface-enhanced spectroscopies, enhanced optical biosensing, optical and optoelectronic plasmonic nanosensors and others. A novel approach for the fabrication of robust plasmonic...... substrates is presented, which relies on the coverage of gold nanostructures with diamond-like carbon (DLC) thin films of thicknesses 25, 55 and 105 nm. DLC thin films were grown by direct hydrocarbon ion beam deposition. In order to find the optimum balance between optical and mechanical properties...

  14. Robust Self Tuning Controllers

    DEFF Research Database (Denmark)

    Poulsen, Niels Kjølstad

    1985-01-01

    The present thesis concerns robustness properties of adaptive controllers. It is addressed to methods for robustifying self tuning controllers with respect to abrupt changes in the plant parameters. In the thesis an algorithm for estimating abruptly changing parameters is presented. The estimator...... has several operation modes and a detector for controlling the mode. A special self tuning controller has been developed to regulate plant with changing time delay.......The present thesis concerns robustness properties of adaptive controllers. It is addressed to methods for robustifying self tuning controllers with respect to abrupt changes in the plant parameters. In the thesis an algorithm for estimating abruptly changing parameters is presented. The estimator...

  15. Robust surgery loading

    NARCIS (Netherlands)

    Hans, Elias W.; Wullink, Gerhard; van Houdenhoven, Mark; Kazemier, Geert

    2008-01-01

    We consider the robust surgery loading problem for a hospital’s operating theatre department, which concerns assigning surgeries and sufficient planned slack to operating room days. The objective is to maximize capacity utilization and minimize the risk of overtime, and thus cancelled patients. This

  16. Robustness Envelopes of Networks

    NARCIS (Netherlands)

    Trajanovski, S.; Martín-Hernández, J.; Winterbach, W.; Van Mieghem, P.

    2013-01-01

    We study the robustness of networks under node removal, considering random node failure, as well as targeted node attacks based on network centrality measures. Whilst both of these have been studied in the literature, existing approaches tend to study random failure in terms of average-case

  17. Determining the Most Robust Dimensional Structure of Categories from the International Classification of Functioning, Disability and Health Across Subgroups of Persons With Spinal Cord Injury to Build the Basis for Future Clinical Measures

    DEFF Research Database (Denmark)

    Ballert, Carolina S; Stucki, Gerold; Biering-Sørensen, Fin

    2014-01-01

    OBJECTIVE: To determine the most robust dimensional structure of the International Classification of Functioning, Disability and Health (ICF) categories relevant to spinal cord injury (SCI) across subgroups of lesion level, health care context, sex, age, and resources of the country. DESIGN......: A multidimensional between-item response Rasch model was used. The choice of the dimensions was conceptually driven using the ICF components from the functioning chapters and splits of the activity and participation component described in the ICF. SETTING: Secondary analysis of data from an international, cross....... The model fit improvement from the unidimensional to the 2-dimensional and from the 2-dimensional to the 3-dimensional model was significant in all groups (P

  18. A robust classic.

    Science.gov (United States)

    Kutzner, Florian; Vogel, Tobias; Freytag, Peter; Fiedler, Klaus

    2011-01-01

    In the present research, we argue for the robustness of illusory correlations (ICs, Hamilton & Gifford, 1976) regarding two boundary conditions suggested in previous research. First, we argue that ICs are maintained under extended experience. Using simulations, we derive conflicting predictions. Whereas noise-based accounts predict ICs to be maintained (Fielder, 2000; Smith, 1991), a prominent account based on discrepancy-reducing feedback learning predicts ICs to disappear (Van Rooy et al., 2003). An experiment involving 320 observations with majority and minority members supports the claim that ICs are maintained. Second, we show that actively using the stereotype to make predictions that are met with reward and punishment does not eliminate the bias. In addition, participants' operant reactions afford a novel online measure of ICs. In sum, our findings highlight the robustness of ICs that can be explained as a result of unbiased but noisy learning.

  19. Robust Airline Schedules

    OpenAIRE

    Eggenberg, Niklaus; Salani, Matteo; Bierlaire, Michel

    2010-01-01

    Due to economic pressure industries, when planning, tend to focus on optimizing the expected profit or the yield. The consequence of highly optimized solutions is an increased sensitivity to uncertainty. This generates additional "operational" costs, incurred by possible modifications of the original plan to be performed when reality does not reflect what was expected in the planning phase. The modern research trend focuses on "robustness" of solutions instead of yield or profit. Although ro...

  20. Robust efficient video fingerprinting

    Science.gov (United States)

    Puri, Manika; Lubin, Jeffrey

    2009-02-01

    We have developed a video fingerprinting system with robustness and efficiency as the primary and secondary design criteria. In extensive testing, the system has shown robustness to cropping, letter-boxing, sub-titling, blur, drastic compression, frame rate changes, size changes and color changes, as well as to the geometric distortions often associated with camcorder capture in cinema settings. Efficiency is afforded by a novel two-stage detection process in which a fast matching process first computes a number of likely candidates, which are then passed to a second slower process that computes the overall best match with minimal false alarm probability. One key component of the algorithm is a maximally stable volume computation - a three-dimensional generalization of maximally stable extremal regions - that provides a content-centric coordinate system for subsequent hash function computation, independent of any affine transformation or extensive cropping. Other key features include an efficient bin-based polling strategy for initial candidate selection, and a final SIFT feature-based computation for final verification. We describe the algorithm and its performance, and then discuss additional modifications that can provide further improvement to efficiency and accuracy.

  1. Robust automated knowledge capture.

    Energy Technology Data Exchange (ETDEWEB)

    Stevens-Adams, Susan Marie; Abbott, Robert G.; Forsythe, James Chris; Trumbo, Michael Christopher Stefan; Haass, Michael Joseph; Hendrickson, Stacey M. Langfitt

    2011-10-01

    This report summarizes research conducted through the Sandia National Laboratories Robust Automated Knowledge Capture Laboratory Directed Research and Development project. The objective of this project was to advance scientific understanding of the influence of individual cognitive attributes on decision making. The project has developed a quantitative model known as RumRunner that has proven effective in predicting the propensity of an individual to shift strategies on the basis of task and experience related parameters. Three separate studies are described which have validated the basic RumRunner model. This work provides a basis for better understanding human decision making in high consequent national security applications, and in particular, the individual characteristics that underlie adaptive thinking.

  2. Passion, Robustness and Perseverance

    DEFF Research Database (Denmark)

    Lim, Miguel Antonio; Lund, Rebecca

    2016-01-01

    Evaluation and merit in the measured university are increasingly based on taken-for-granted assumptions about the “ideal academic”. We suggest that the scholar now needs to show that she is passionate about her work and that she gains pleasure from pursuing her craft. We suggest that passion...... and pleasure achieve an exalted status as something compulsory. The scholar ought to feel passionate about her work and signal that she takes pleasure also in the difficult moments. Passion has become a signal of robustness and perseverance in a job market characterised by funding shortages, increased pressure...... way to demonstrate their potential and, crucially, their passion for their work. Drawing on the literature on technologies of governance, we reflect on what is captured and what is left out by these two evaluation instruments. We suggest that bibliometric analysis at the individual level is deeply...

  3. Robust Optical Flow Estimation

    Directory of Open Access Journals (Sweden)

    Javier Sánchez Pérez

    2013-10-01

    Full Text Available n this work, we describe an implementation of the variational method proposed by Brox etal. in 2004, which yields accurate optical flows with low running times. It has several benefitswith respect to the method of Horn and Schunck: it is more robust to the presence of outliers,produces piecewise-smooth flow fields and can cope with constant brightness changes. Thismethod relies on the brightness and gradient constancy assumptions, using the information ofthe image intensities and the image gradients to find correspondences. It also generalizes theuse of continuous L1 functionals, which help mitigate the effect of outliers and create a TotalVariation (TV regularization. Additionally, it introduces a simple temporal regularizationscheme that enforces a continuous temporal coherence of the flow fields.

  4. Robust snapshot interferometric spectropolarimetry.

    Science.gov (United States)

    Kim, Daesuk; Seo, Yoonho; Yoon, Yonghee; Dembele, Vamara; Yoon, Jae Woong; Lee, Kyu Jin; Magnusson, Robert

    2016-05-15

    This Letter describes a Stokes vector measurement method based on a snapshot interferometric common-path spectropolarimeter. The proposed scheme, which employs an interferometric polarization-modulation module, can extract the spectral polarimetric parameters Ψ(k) and Δ(k) of a transmissive anisotropic object by which an accurate Stokes vector can be calculated in the spectral domain. It is inherently strongly robust to the object 3D pose variation, since it is designed distinctly so that the measured object can be placed outside of the interferometric module. Experiments are conducted to verify the feasibility of the proposed system. The proposed snapshot scheme enables us to extract the spectral Stokes vector of a transmissive anisotropic object within tens of msec with high accuracy.

  5. International Conference on Robust Statistics

    CERN Document Server

    Filzmoser, Peter; Gather, Ursula; Rousseeuw, Peter

    2003-01-01

    Aspects of Robust Statistics are important in many areas. Based on the International Conference on Robust Statistics 2001 (ICORS 2001) in Vorau, Austria, this volume discusses future directions of the discipline, bringing together leading scientists, experienced researchers and practitioners, as well as younger researchers. The papers cover a multitude of different aspects of Robust Statistics. For instance, the fundamental problem of data summary (weights of evidence) is considered and its robustness properties are studied. Further theoretical subjects include e.g.: robust methods for skewness, time series, longitudinal data, multivariate methods, and tests. Some papers deal with computational aspects and algorithms. Finally, the aspects of application and programming tools complete the volume.

  6. Robustness Analyses of Timber Structures

    DEFF Research Database (Denmark)

    Kirkegaard, Poul Henning; Sørensen, John Dalsgaard; Hald, Frederik

    2013-01-01

    The robustness of structural systems has obtained a renewed interest arising from a much more frequent use of advanced types of structures with limited redundancy and serious consequences in case of failure. In order to minimise the likelihood of such disproportionate structural failures, many mo...... with respect to robustness of timber structures and will discuss the consequences of such robustness issues related to the future development of timber structures.......The robustness of structural systems has obtained a renewed interest arising from a much more frequent use of advanced types of structures with limited redundancy and serious consequences in case of failure. In order to minimise the likelihood of such disproportionate structural failures, many...... modern building codes consider the need for the robustness of structures and provide strategies and methods to obtain robustness. Therefore, a structural engineer may take necessary steps to design robust structures that are insensitive to accidental circumstances. The present paper summaries issues...

  7. Person-Centered Transition Planning.

    Science.gov (United States)

    Miner, Craig A.; Bates, Paul E.

    1997-01-01

    Describes a person-centered planning approach for involving students with disabilities and their families in the transition planning process. Components of person-centered planning are discussed, including development of a personal profile, identification of future lifestyle preferences, action steps and responsible parties, and necessary changes…

  8. Denture identification using unique identification authority of India barcode

    OpenAIRE

    Sudhindra Mahoorkar; Anoop Jain

    2013-01-01

    Over the years, various denture marking systems have been reported in the literature for personal identification. They have been broadly divided into surface marking and inclusion methods. In this technique, patient's unique identification number and barcode printed in the patient's Aadhaar card issued by Unique Identification Authority of India (UIDAI) are used as denture markers. This article describes a simple, quick, and economical method for identification of individual.

  9. Denture identification using unique identification authority of India barcode.

    Science.gov (United States)

    Mahoorkar, Sudhindra; Jain, Anoop

    2013-01-01

    Over the years, various denture marking systems have been reported in the literature for personal identification. They have been broadly divided into surface marking and inclusion methods. In this technique, patient's unique identification number and barcode printed in the patient's Aadhaar card issued by Unique Identification Authority of India (UIDAI) are used as denture markers. This article describes a simple, quick, and economical method for identification of individual.

  10. Outlier robustness for wind turbine extrapolated extreme loads

    DEFF Research Database (Denmark)

    Natarajan, Anand; Verelst, David Robert

    2012-01-01

    . Stochastic identification of numerical artifacts in simulated loads is demonstrated using the method of principal component analysis. The extrapolation methodology is made robust to outliers through a weighted loads approach, whereby the eigenvalues of the correlation matrix obtained using the loads with its...

  11. Robust blood-glucose control using Mathematica.

    Science.gov (United States)

    Kovács, Levente; Paláncz, Béla; Benyó, Balázs; Török, László; Benyó, Zoltán

    2006-01-01

    A robust control design on frequency domain using Mathematica is presented for regularization of glucose level in type I diabetes persons under intensive care. The method originally proposed under Mathematica by Helton and Merino, --now with an improved disturbance rejection constraint inequality--is employed, using a three-state minimal patient model. The robustness of the resulted high-order linear controller is demonstrated by nonlinear closed loop simulation in state-space, in case of standard meal disturbances and is compared with H infinity design implemented with the mu-toolbox of Matlab. The controller designed with model parameters represented the most favorable plant dynamics from the point of view of control purposes, can operate properly even in case of parameter values of the worst-case scenario.

  12. Identification and documentation of persons being in palliative phase regardless of age, diagnosis and places of care, and their use of a sitting service at the end of life.

    Science.gov (United States)

    Wallerstedt, Birgitta; Sahlberg-Blom, Eva; Benzein, Eva; Andershed, Birgitta

    2012-09-01

    Older persons and persons with diseases other than cancer are often discriminated against when applying for palliative care despite growing numbers of both older persons and individuals with chronic diseases. An intention for palliative care in Sweden is that all persons in the final stage of life, irrespective of age, domicile, diagnosis, and care place shall have access to palliative care on equal terms. One way to support these persons in final stage of life and their relatives is to offer sitting service. To describe individuals who were identified and documented as being in a palliative phase in a Swedish municipality, with respect to demographics, use of a sitting service, continuity of care in the last month of life and the place of death. A second aim was to describe and compare the groups who received/did not receive sitting services related to the aforementioned variables. Retrospective data from nursing records and palliative care identification forms were analyzed with descriptive and analytic statistical methods. Among individuals deceased during 2007, 51% were identified and documented as being in palliative phase. The majority was older people (mean 83 years) with a noncancer diagnosis (58%). Twenty-eight individuals (16%) had received a sitting service between 8 and 249 hours (one extreme value = 2211). It is indicated that sitting service significantly increased the possibility of dying at home (p = 0.00004), but did not affect how often the place of care changed during the last month of life. A small sample from a Swedish context must be considered. These results can be related to an awareness in the municipality that led to adopting the concept of palliative care as not only for those with a cancer diagnosis. 2012 The Authors. Scandinavian Journal of Caring Sciences © 2012 Nordic College of Caring Science.

  13. Identification of Hypertension Management-related Errors in a Personal Digital Assistant-based Clinical Log for Nurses in Advanced Practice Nurse Training

    Directory of Open Access Journals (Sweden)

    Nam-Ju Lee, DNSc, RN

    2010-03-01

    Conclusion: The Hypertension Diagnosis and Management Error Taxonomy was useful for identifying errors based on documentation in a clinical log. The results provide an initial understanding of the nature of errors associated with hypertension diagnosis and management of nurses in APN training. The information gained from this study can contribute to educational interventions that promote APN competencies in identification and management of hypertension as well as overall patient safety and informatics competencies.

  14. Dynamics robustness of cascading systems.

    Directory of Open Access Journals (Sweden)

    Jonathan T Young

    2017-03-01

    Full Text Available A most important property of biochemical systems is robustness. Static robustness, e.g., homeostasis, is the insensitivity of a state against perturbations, whereas dynamics robustness, e.g., homeorhesis, is the insensitivity of a dynamic process. In contrast to the extensively studied static robustness, dynamics robustness, i.e., how a system creates an invariant temporal profile against perturbations, is little explored despite transient dynamics being crucial for cellular fates and are reported to be robust experimentally. For example, the duration of a stimulus elicits different phenotypic responses, and signaling networks process and encode temporal information. Hence, robustness in time courses will be necessary for functional biochemical networks. Based on dynamical systems theory, we uncovered a general mechanism to achieve dynamics robustness. Using a three-stage linear signaling cascade as an example, we found that the temporal profiles and response duration post-stimulus is robust to perturbations against certain parameters. Then analyzing the linearized model, we elucidated the criteria of when signaling cascades will display dynamics robustness. We found that changes in the upstream modules are masked in the cascade, and that the response duration is mainly controlled by the rate-limiting module and organization of the cascade's kinetics. Specifically, we found two necessary conditions for dynamics robustness in signaling cascades: 1 Constraint on the rate-limiting process: The phosphatase activity in the perturbed module is not the slowest. 2 Constraints on the initial conditions: The kinase activity needs to be fast enough such that each module is saturated even with fast phosphatase activity and upstream changes are attenuated. We discussed the relevance of such robustness to several biological examples and the validity of the above conditions therein. Given the applicability of dynamics robustness to a variety of systems, it

  15. Robust continuous clustering.

    Science.gov (United States)

    Shah, Sohil Atul; Koltun, Vladlen

    2017-09-12

    Clustering is a fundamental procedure in the analysis of scientific data. It is used ubiquitously across the sciences. Despite decades of research, existing clustering algorithms have limited effectiveness in high dimensions and often require tuning parameters for different domains and datasets. We present a clustering algorithm that achieves high accuracy across multiple domains and scales efficiently to high dimensions and large datasets. The presented algorithm optimizes a smooth continuous objective, which is based on robust statistics and allows heavily mixed clusters to be untangled. The continuous nature of the objective also allows clustering to be integrated as a module in end-to-end feature learning pipelines. We demonstrate this by extending the algorithm to perform joint clustering and dimensionality reduction by efficiently optimizing a continuous global objective. The presented approach is evaluated on large datasets of faces, hand-written digits, objects, newswire articles, sensor readings from the Space Shuttle, and protein expression levels. Our method achieves high accuracy across all datasets, outperforming the best prior algorithm by a factor of 3 in average rank.

  16. Biometric and Emotion Identification: An ECG Compression Based Method

    Directory of Open Access Journals (Sweden)

    Susana Brás

    2018-04-01

    Full Text Available We present an innovative and robust solution to both biometric and emotion identification using the electrocardiogram (ECG. The ECG represents the electrical signal that comes from the contraction of the heart muscles, indirectly representing the flow of blood inside the heart, it is known to convey a key that allows biometric identification. Moreover, due to its relationship with the nervous system, it also varies as a function of the emotional state. The use of information-theoretic data models, associated with data compression algorithms, allowed to effectively compare ECG records and infer the person identity, as well as emotional state at the time of data collection. The proposed method does not require ECG wave delineation or alignment, which reduces preprocessing error. The method is divided into three steps: (1 conversion of the real-valued ECG record into a symbolic time-series, using a quantization process; (2 conditional compression of the symbolic representation of the ECG, using the symbolic ECG records stored in the database as reference; (3 identification of the ECG record class, using a 1-NN (nearest neighbor classifier. We obtained over 98% of accuracy in biometric identification, whereas in emotion recognition we attained over 90%. Therefore, the method adequately identify the person, and his/her emotion. Also, the proposed method is flexible and may be adapted to different problems, by the alteration of the templates for training the model.

  17. Biometric and Emotion Identification: An ECG Compression Based Method.

    Science.gov (United States)

    Brás, Susana; Ferreira, Jacqueline H T; Soares, Sandra C; Pinho, Armando J

    2018-01-01

    We present an innovative and robust solution to both biometric and emotion identification using the electrocardiogram (ECG). The ECG represents the electrical signal that comes from the contraction of the heart muscles, indirectly representing the flow of blood inside the heart, it is known to convey a key that allows biometric identification. Moreover, due to its relationship with the nervous system, it also varies as a function of the emotional state. The use of information-theoretic data models, associated with data compression algorithms, allowed to effectively compare ECG records and infer the person identity, as well as emotional state at the time of data collection. The proposed method does not require ECG wave delineation or alignment, which reduces preprocessing error. The method is divided into three steps: (1) conversion of the real-valued ECG record into a symbolic time-series, using a quantization process; (2) conditional compression of the symbolic representation of the ECG, using the symbolic ECG records stored in the database as reference; (3) identification of the ECG record class, using a 1-NN (nearest neighbor) classifier. We obtained over 98% of accuracy in biometric identification, whereas in emotion recognition we attained over 90%. Therefore, the method adequately identify the person, and his/her emotion. Also, the proposed method is flexible and may be adapted to different problems, by the alteration of the templates for training the model.

  18. Biometric and Emotion Identification: An ECG Compression Based Method

    Science.gov (United States)

    Brás, Susana; Ferreira, Jacqueline H. T.; Soares, Sandra C.; Pinho, Armando J.

    2018-01-01

    We present an innovative and robust solution to both biometric and emotion identification using the electrocardiogram (ECG). The ECG represents the electrical signal that comes from the contraction of the heart muscles, indirectly representing the flow of blood inside the heart, it is known to convey a key that allows biometric identification. Moreover, due to its relationship with the nervous system, it also varies as a function of the emotional state. The use of information-theoretic data models, associated with data compression algorithms, allowed to effectively compare ECG records and infer the person identity, as well as emotional state at the time of data collection. The proposed method does not require ECG wave delineation or alignment, which reduces preprocessing error. The method is divided into three steps: (1) conversion of the real-valued ECG record into a symbolic time-series, using a quantization process; (2) conditional compression of the symbolic representation of the ECG, using the symbolic ECG records stored in the database as reference; (3) identification of the ECG record class, using a 1-NN (nearest neighbor) classifier. We obtained over 98% of accuracy in biometric identification, whereas in emotion recognition we attained over 90%. Therefore, the method adequately identify the person, and his/her emotion. Also, the proposed method is flexible and may be adapted to different problems, by the alteration of the templates for training the model. PMID:29670564

  19. An Identification and Evaluation of the Various Types and Forms of Personal Relationships within a Sino Foreign University Strategic Alliance Context

    Science.gov (United States)

    Willis, Mike

    2008-01-01

    This article identifies a range of personal relationships observable in Sino foreign strategic alliances. Guanxi relationships remained the key to a successful alliance; and encompassed various levels, stages, and dimensions--making them complex and changeable forms of human behavior. Other types of relationships identified included "basic…

  20. Robust Trust in Expert Testimony

    Directory of Open Access Journals (Sweden)

    Christian Dahlman

    2015-05-01

    Full Text Available The standard of proof in criminal trials should require that the evidence presented by the prosecution is robust. This requirement of robustness says that it must be unlikely that additional information would change the probability that the defendant is guilty. Robustness is difficult for a judge to estimate, as it requires the judge to assess the possible effect of information that the he or she does not have. This article is concerned with expert witnesses and proposes a method for reviewing the robustness of expert testimony. According to the proposed method, the robustness of expert testimony is estimated with regard to competence, motivation, external strength, internal strength and relevance. The danger of trusting non-robust expert testimony is illustrated with an analysis of the Thomas Quick Case, a Swedish legal scandal where a patient at a mental institution was wrongfully convicted for eight murders.

  1. Cattle identification based in biometric features of the muzzle

    OpenAIRE

    Monteiro, Marta; Cadavez, Vasco; Monteiro, Fernando C.

    2015-01-01

    Cattle identification has been a serious problem for breeding association. Muzzle pattern or nose print has the same characteristic with the human fingerprint which is the most popular biometric marker. The identification accuracy and the processing time are two key challenges of any cattle identification methodology. This paper presents a robust and fast cattle identification scheme from muzzle images using Speed-up Robust Features matching. The matching refinement technique based on the mat...

  2. Design and implementation of robust controllers for a gait trainer.

    Science.gov (United States)

    Wang, F C; Yu, C H; Chou, T Y

    2009-08-01

    This paper applies robust algorithms to control an active gait trainer for children with walking disabilities. Compared with traditional rehabilitation procedures, in which two or three trainers are required to assist the patient, a motor-driven mechanism was constructed to improve the efficiency of the procedures. First, a six-bar mechanism was designed and constructed to mimic the trajectory of children's ankles in walking. Second, system identification techniques were applied to obtain system transfer functions at different operating points by experiments. Third, robust control algorithms were used to design Hinfinity robust controllers for the system. Finally, the designed controllers were implemented to verify experimentally the system performance. From the results, the proposed robust control strategies are shown to be effective.

  3. Biometric identification based on novel frequency domain facial asymmetry measures

    Science.gov (United States)

    Mitra, Sinjini; Savvides, Marios; Vijaya Kumar, B. V. K.

    2005-03-01

    In the modern world, the ever-growing need to ensure a system's security has spurred the growth of the newly emerging technology of biometric identification. The present paper introduces a novel set of facial biometrics based on quantified facial asymmetry measures in the frequency domain. In particular, we show that these biometrics work well for face images showing expression variations and have the potential to do so in presence of illumination variations as well. A comparison of the recognition rates with those obtained from spatial domain asymmetry measures based on raw intensity values suggests that the frequency domain representation is more robust to intra-personal distortions and is a novel approach for performing biometric identification. In addition, some feature analysis based on statistical methods comparing the asymmetry measures across different individuals and across different expressions is presented.

  4. Robust and distributed hypothesis testing

    CERN Document Server

    Gül, Gökhan

    2017-01-01

    This book generalizes and extends the available theory in robust and decentralized hypothesis testing. In particular, it presents a robust test for modeling errors which is independent from the assumptions that a sufficiently large number of samples is available, and that the distance is the KL-divergence. Here, the distance can be chosen from a much general model, which includes the KL-divergence as a very special case. This is then extended by various means. A minimax robust test that is robust against both outliers as well as modeling errors is presented. Minimax robustness properties of the given tests are also explicitly proven for fixed sample size and sequential probability ratio tests. The theory of robust detection is extended to robust estimation and the theory of robust distributed detection is extended to classes of distributions, which are not necessarily stochastically bounded. It is shown that the quantization functions for the decision rules can also be chosen as non-monotone. Finally, the boo...

  5. Robustness of IPTV business models

    NARCIS (Netherlands)

    Bouwman, H.; Zhengjia, M.; Duin, P. van der; Limonard, S.

    2008-01-01

    The final stage in the STOF method is an evaluation of the robustness of the design, for which the method provides some guidelines. For many innovative services, the future holds numerous uncertainties, which makes evaluating the robustness of a business model a difficult task. In this chapter, we

  6. Robustness Evaluation of Timber Structures

    DEFF Research Database (Denmark)

    Kirkegaard, Poul Henning; Sørensen, John Dalsgaard

    2009-01-01

    Robustness of structural systems has obtained a renewed interest due to a much more frequent use of advanced types of structures with limited redundancy and serious consequences in case of failure.......Robustness of structural systems has obtained a renewed interest due to a much more frequent use of advanced types of structures with limited redundancy and serious consequences in case of failure....

  7. Robust statistical methods with R

    CERN Document Server

    Jureckova, Jana

    2005-01-01

    Robust statistical methods were developed to supplement the classical procedures when the data violate classical assumptions. They are ideally suited to applied research across a broad spectrum of study, yet most books on the subject are narrowly focused, overly theoretical, or simply outdated. Robust Statistical Methods with R provides a systematic treatment of robust procedures with an emphasis on practical application.The authors work from underlying mathematical tools to implementation, paying special attention to the computational aspects. They cover the whole range of robust methods, including differentiable statistical functions, distance of measures, influence functions, and asymptotic distributions, in a rigorous yet approachable manner. Highlighting hands-on problem solving, many examples and computational algorithms using the R software supplement the discussion. The book examines the characteristics of robustness, estimators of real parameter, large sample properties, and goodness-of-fit tests. It...

  8. SU-E-I-74: Image-Matching Technique of Computed Tomography Images for Personal Identification: A Preliminary Study Using Anthropomorphic Chest Phantoms

    Energy Technology Data Exchange (ETDEWEB)

    Matsunobu, Y; Shiotsuki, K [Department of Health Sciences, Graduate School of Medical Sciences, Kyushu University, Fukuoka (Japan); Morishita, J [Department of Health Sciences, Faculty of Medical Sciences, Kyushu University, Fukuoka, JP (Japan)

    2015-06-15

    Purpose: Fingerprints, dental impressions, and DNA are used to identify unidentified bodies in forensic medicine. Cranial Computed tomography (CT) images and/or dental radiographs are also used for identification. Radiological identification is important, particularly in the absence of comparative fingerprints, dental impressions, and DNA samples. The development of an automated radiological identification system for unidentified bodies is desirable. We investigated the potential usefulness of bone structure for matching chest CT images. Methods: CT images of three anthropomorphic chest phantoms were obtained on different days in various settings. One of the phantoms was assumed to be an unidentified body. The bone image and the bone image with soft tissue (BST image) were extracted from the CT images. To examine the usefulness of the bone image and/or the BST image, the similarities between the two-dimensional (2D) or threedimensional (3D) images of the same and different phantoms were evaluated in terms of the normalized cross-correlation value (NCC). Results: For the 2D and 3D BST images, the NCCs obtained from the same phantom assumed to be an unidentified body (2D, 0.99; 3D, 0.93) were higher than those for the different phantoms (2D, 0.95 and 0.91; 3D, 0.89 and 0.80). The NCCs for the same phantom (2D, 0.95; 3D, 0.88) were greater compared to those of the different phantoms (2D, 0.61 and 0.25; 3D, 0.23 and 0.10) for the bone image. The difference in the NCCs between the same and different phantoms tended to be larger for the bone images than for the BST images. These findings suggest that the image-matching technique is more useful when utilizing the bone image than when utilizing the BST image to identify different people. Conclusion: This preliminary study indicated that evaluating the similarity of bone structure in 2D and 3D images is potentially useful for identifying of an unidentified body.

  9. SU-E-I-74: Image-Matching Technique of Computed Tomography Images for Personal Identification: A Preliminary Study Using Anthropomorphic Chest Phantoms

    International Nuclear Information System (INIS)

    Matsunobu, Y; Shiotsuki, K; Morishita, J

    2015-01-01

    Purpose: Fingerprints, dental impressions, and DNA are used to identify unidentified bodies in forensic medicine. Cranial Computed tomography (CT) images and/or dental radiographs are also used for identification. Radiological identification is important, particularly in the absence of comparative fingerprints, dental impressions, and DNA samples. The development of an automated radiological identification system for unidentified bodies is desirable. We investigated the potential usefulness of bone structure for matching chest CT images. Methods: CT images of three anthropomorphic chest phantoms were obtained on different days in various settings. One of the phantoms was assumed to be an unidentified body. The bone image and the bone image with soft tissue (BST image) were extracted from the CT images. To examine the usefulness of the bone image and/or the BST image, the similarities between the two-dimensional (2D) or threedimensional (3D) images of the same and different phantoms were evaluated in terms of the normalized cross-correlation value (NCC). Results: For the 2D and 3D BST images, the NCCs obtained from the same phantom assumed to be an unidentified body (2D, 0.99; 3D, 0.93) were higher than those for the different phantoms (2D, 0.95 and 0.91; 3D, 0.89 and 0.80). The NCCs for the same phantom (2D, 0.95; 3D, 0.88) were greater compared to those of the different phantoms (2D, 0.61 and 0.25; 3D, 0.23 and 0.10) for the bone image. The difference in the NCCs between the same and different phantoms tended to be larger for the bone images than for the BST images. These findings suggest that the image-matching technique is more useful when utilizing the bone image than when utilizing the BST image to identify different people. Conclusion: This preliminary study indicated that evaluating the similarity of bone structure in 2D and 3D images is potentially useful for identifying of an unidentified body

  10. A sensitivity analysis of a personalized pulse wave propagation model for arteriovenous fistula surgery. Part B: Identification of possible generic model parameters.

    Science.gov (United States)

    Huberts, W; de Jonge, C; van der Linden, W P M; Inda, M A; Passera, K; Tordoir, J H M; van de Vosse, F N; Bosboom, E M H

    2013-06-01

    Decision-making in vascular access surgery for hemodialysis can be supported by a pulse wave propagation model that is able to simulate pressure and flow changes induced by the creation of a vascular access. To personalize such a model, patient-specific input parameters should be chosen. However, the number of input parameters that can be measured in clinical routine is limited. Besides, patient data are compromised with uncertainty. Incomplete and uncertain input data will result in uncertainties in model predictions. In part A, we analyzed how the measurement uncertainty in the input propagates to the model output by means of a sensitivity analysis. Of all 73 input parameters, 16 parameters were identified to be worthwhile to measure more accurately and 51 could be fixed within their measurement uncertainty range, but these latter parameters still needed to be measured. Here, we present a methodology for assessing the model input parameters that can be taken constant and therefore do not need to be measured. In addition, a method to determine the value of this parameter is presented. For the pulse wave propagation model applied to vascular access surgery, six patient-specific datasets were analyzed and it was found that 47 out of 73 parameters can be fixed on a generic value. These model parameters are not important for personalization of the wave propagation model. Furthermore, we were able to determine a generic value for 37 of the 47 fixable model parameters. Copyright © 2012 IPEM. Published by Elsevier Ltd. All rights reserved.

  11. Mandatory Submission to The Identification of Genetic Profile for Criminal Purpose: A Broach Pursuant to the Right to Privacy and Dignity of the Human Person

    Directory of Open Access Journals (Sweden)

    George Maia Santos

    2015-12-01

    Full Text Available This article aims to demonstrate that the mandatory submission convicted of a crime committed, intentionally, with serious violence against person or heinous crime, to identify the genetic profile by DNA extraction - deoxyribonucleic acid, although by proper and painless technique is offensive to fundamental rights. For this purpose, it is part of the overall concept of the right to privacy, which is configured as a negative right or protection against unlawful state mismanagement, in order to protect a need or a basic right to the free individual self-determination. Then genetic intimacy is defined as an asset able to reveal the physical, psychological, behavioral and disease features, which, if disclosed or accessed without the consent of the accused, may generate stigmatization and discrimination of the subject involved, violating in this way, therefore, the right to privacy. In conclusion, we move towards emphasizing besides the right to privacy, compulsory provision of biological material to identify the genetic profile is offensive to fundamental rights to physical liberty or outpatient; physical integrity; to the freedom of religion or conscience; non-discrimination; the silence and non-production of evidences against himself, and in last instance, the biggest vector of all fundamental rights: the dignity of the human person.

  12. Robust loss functions for boosting.

    Science.gov (United States)

    Kanamori, Takafumi; Takenouchi, Takashi; Eguchi, Shinto; Murata, Noboru

    2007-08-01

    Boosting is known as a gradient descent algorithm over loss functions. It is often pointed out that the typical boosting algorithm, Adaboost, is highly affected by outliers. In this letter, loss functions for robust boosting are studied. Based on the concept of robust statistics, we propose a transformation of loss functions that makes boosting algorithms robust against extreme outliers. Next, the truncation of loss functions is applied to contamination models that describe the occurrence of mislabels near decision boundaries. Numerical experiments illustrate that the proposed loss functions derived from the contamination models are useful for handling highly noisy data in comparison with other loss functions.

  13. Theoretical Framework for Robustness Evaluation

    DEFF Research Database (Denmark)

    Sørensen, John Dalsgaard

    2011-01-01

    This paper presents a theoretical framework for evaluation of robustness of structural systems, incl. bridges and buildings. Typically modern structural design codes require that ‘the consequence of damages to structures should not be disproportional to the causes of the damages’. However, although...... the importance of robustness for structural design is widely recognized the code requirements are not specified in detail, which makes the practical use difficult. This paper describes a theoretical and risk based framework to form the basis for quantification of robustness and for pre-normative guidelines...

  14. Robustness of airline route networks

    Science.gov (United States)

    Lordan, Oriol; Sallan, Jose M.; Escorihuela, Nuria; Gonzalez-Prieto, David

    2016-03-01

    Airlines shape their route network by defining their routes through supply and demand considerations, paying little attention to network performance indicators, such as network robustness. However, the collapse of an airline network can produce high financial costs for the airline and all its geographical area of influence. The aim of this study is to analyze the topology and robustness of the network route of airlines following Low Cost Carriers (LCCs) and Full Service Carriers (FSCs) business models. Results show that FSC hubs are more central than LCC bases in their route network. As a result, LCC route networks are more robust than FSC networks.

  15. Drunk identification using far infrared imagery based on DCT features in DWT domain

    Science.gov (United States)

    Xie, Zhihua; Jiang, Peng; Xiong, Ying; Li, Ke

    2016-10-01

    Drunk driving problem is a serious threat to traffic safety. Automatic drunk driver identification is vital to improve the traffic safety. This paper copes with automatic drunk driver detection using far infrared thermal images by the holistic features. To improve the robustness of drunk driver detection, instead of traditional local pixels, a holistic feature extraction method is proposed to attain compact and discriminative features for infrared face drunk identification. Discrete cosine transform (DCT) in discrete wavelet transform (DWT) domain is used to extract the useful features in infrared face images for its high speed. Then, the first six DCT coefficients are retained for drunk classification by means of "Z" scanning. Finally, SVM is applied to classify the drunk person. Experimental results illustrate that the accuracy rate of proposed infrared face drunk identification can reach 98.5% with high computation efficiency, which can be applied in real drunk driver detection system.

  16. Expression robust 3D face recognition via mesh-based histograms of multiple order surface differential quantities

    KAUST Repository

    Li, Huibin; Huang, Di; Lemaire, Pierre; Morvan, Jean-Marie; Chen, Liming

    2011-01-01

    same person than the ones of different persons. Experimental results on the Bosphorus dataset highlight the effectiveness of the proposed method and its robustness to facial expression variations. © 2011 IEEE.

  17. Improved Palmprint Identification System

    Directory of Open Access Journals (Sweden)

    Harshala C. Salave

    2015-03-01

    Full Text Available Abstract Generally private information is provided by using passwords or Personal Identification Numbers which is easy to implement but it is very easily stolen or forgotten or hack. In Biometrics for individuals identification uses human physiological which are constant throughout life like palm face DNA iris etc. or behavioral characteristicswhich is not constant in life like voice signature keystroke etc.. But mostly gain more attention to palmprint identification and is becoming more popular technique using for identification and promising alternatives to the traditional password or PIN based authentication techniques. In this paper propose palmprint identification using veins on the palm and fingers. Here use fusion of techniques such as Discrete Wavelet transformDWT Canny Edge Detector Gaussian Filter Principle Component AnalysisPCA.

  18. New software for computer-assisted dental-data matching in Disaster Victim Identification and long-term missing persons investigations: "DAVID Web".

    Science.gov (United States)

    Clement, J G; Winship, V; Ceddia, J; Al-Amad, S; Morales, A; Hill, A J

    2006-05-15

    In 1997 an internally supported but unfunded pilot project at the Victorian Institute of Forensic Medicine (VIFM) Australia led to the development of a computer system which closely mimicked Interpol paperwork for the storage, later retrieval and tentative matching of the many AM and PM dental records that are often needed for rapid Disaster Victim Identification. The program was called "DAVID" (Disaster And Victim IDentification). It combined the skills of the VIFM Information Technology systems manager (VW), an experienced odontologist (JGC) and an expert database designer (JC); all current authors on this paper. Students did much of the writing of software to prescription from Monash University. The student group involved won an Australian Information Industry Award in recognition of the contribution the new software could have made to the DVI process. Unfortunately, the potential of the software was never realized because paradoxically the federal nature of Australia frequently thwarts uniformity of systems across the entire country. As a consequence, the final development of DAVID never took place. Given the recent problems encountered post-tsunami by the odontologists who were obliged to use the Plass Data system (Plass Data Software, Holbaek, Denmark) and with the impending risks imposed upon Victoria by the decision to host the Commonwealth Games in Melbourne during March 2006, funding was sought and obtained from the state government to update counter disaster preparedness at the VIFM. Some of these funds have been made available to upgrade and complete the DAVID project. In the wake of discussions between leading expert odontologists from around the world held in Geneva during July 2003 at the invitation of the International Committee of the Red Cross significant alterations to the initial design parameters of DAVID were proposed. This was part of broader discussions directed towards developing instruments which could be used by the ICRC's "The Missing

  19. Modulation of Lactobacillus plantarum gastrointestinal robustness by fermentation conditions enables identification of bacterial robustness markers

    NARCIS (Netherlands)

    Bokhorst-van de Veen, van H.; Lee, I.; Marco, M.L.; Bron, P.A.; Kleerebezem, M.

    2012-01-01

    Background - Lactic acid bacteria (LAB) are applied worldwide in the production of a variety of fermented food products. Additionally, specific Lactobacillus species are nowadays recognized for their health-promoting effects on the consumer. To optimally exert such beneficial effects, it is

  20. Robust identification of polyethylene terephthalate (PET plastics through Bayesian decision.

    Directory of Open Access Journals (Sweden)

    Mohd Asyraf Zulkifley

    Full Text Available Recycling is one of the most efficient methods for environmental friendly waste management. Among municipal wastes, plastics are the most common material that can be easily recycled and polyethylene terephthalate (PET is one of its major types. PET material is used in consumer goods packaging such as drinking bottles, toiletry containers, food packaging and many more. Usually, a recycling process is tailored to a specific material for optimal purification and decontamination to obtain high grade recyclable material. The quantity and quality of the sorting process are limited by the capacity of human workers that suffer from fatigue and boredom. Several automated sorting systems have been proposed in the literature that include using chemical, proximity and vision sensors. The main advantages of vision based sensors are its environmentally friendly approach, non-intrusive detection and capability of high throughput. However, the existing methods rely heavily on deterministic approaches that make them less accurate as the variations in PET plastic waste appearance are too high. We proposed a probabilistic approach of modeling the PET material by analyzing the reflection region and its surrounding. Three parameters are modeled by Gaussian and exponential distributions: color, size and distance of the reflection region. The final classification is made through a supervised training method of likelihood ratio test. The main novelty of the proposed method is the probabilistic approach in integrating various PET material signatures that are contaminated by stains under constant lighting changes. The system is evaluated by using four performance metrics: precision, recall, accuracy and error. Our system performed the best in all evaluation metrics compared to the benchmark methods. The system can be further improved by fusing all neighborhood information in decision making and by implementing the system in a graphics processing unit for faster processing speed.

  1. Integrated Robust Open-Set Speaker Identification System (IROSIS)

    Science.gov (United States)

    2012-05-01

    the exact joint estimation, but the deviation is small enough. The references [16] and [18] introduce a “ Gauss - Seidel -like iterative algorithm... iteration for a given number of times or until convergence . The Baum-Welch statistics are re-calculated in every iteration . 3.3.1.2 MAP adaptation of GMMs...have almost converged , and in the subsequent iterations it is mostly the magnitude that gets adjusted. When the initial values are two small, it would

  2. Robust identification of polyethylene terephthalate (PET) plastics through Bayesian decision.

    Science.gov (United States)

    Zulkifley, Mohd Asyraf; Mustafa, Mohd Marzuki; Hussain, Aini; Mustapha, Aouache; Ramli, Suzaimah

    2014-01-01

    Recycling is one of the most efficient methods for environmental friendly waste management. Among municipal wastes, plastics are the most common material that can be easily recycled and polyethylene terephthalate (PET) is one of its major types. PET material is used in consumer goods packaging such as drinking bottles, toiletry containers, food packaging and many more. Usually, a recycling process is tailored to a specific material for optimal purification and decontamination to obtain high grade recyclable material. The quantity and quality of the sorting process are limited by the capacity of human workers that suffer from fatigue and boredom. Several automated sorting systems have been proposed in the literature that include using chemical, proximity and vision sensors. The main advantages of vision based sensors are its environmentally friendly approach, non-intrusive detection and capability of high throughput. However, the existing methods rely heavily on deterministic approaches that make them less accurate as the variations in PET plastic waste appearance are too high. We proposed a probabilistic approach of modeling the PET material by analyzing the reflection region and its surrounding. Three parameters are modeled by Gaussian and exponential distributions: color, size and distance of the reflection region. The final classification is made through a supervised training method of likelihood ratio test. The main novelty of the proposed method is the probabilistic approach in integrating various PET material signatures that are contaminated by stains under constant lighting changes. The system is evaluated by using four performance metrics: precision, recall, accuracy and error. Our system performed the best in all evaluation metrics compared to the benchmark methods. The system can be further improved by fusing all neighborhood information in decision making and by implementing the system in a graphics processing unit for faster processing speed.

  3. Robust Identification of Polyethylene Terephthalate (PET) Plastics through Bayesian Decision

    Science.gov (United States)

    Zulkifley, Mohd Asyraf; Mustafa, Mohd Marzuki; Hussain, Aini; Mustapha, Aouache; Ramli, Suzaimah

    2014-01-01

    Recycling is one of the most efficient methods for environmental friendly waste management. Among municipal wastes, plastics are the most common material that can be easily recycled and polyethylene terephthalate (PET) is one of its major types. PET material is used in consumer goods packaging such as drinking bottles, toiletry containers, food packaging and many more. Usually, a recycling process is tailored to a specific material for optimal purification and decontamination to obtain high grade recyclable material. The quantity and quality of the sorting process are limited by the capacity of human workers that suffer from fatigue and boredom. Several automated sorting systems have been proposed in the literature that include using chemical, proximity and vision sensors. The main advantages of vision based sensors are its environmentally friendly approach, non-intrusive detection and capability of high throughput. However, the existing methods rely heavily on deterministic approaches that make them less accurate as the variations in PET plastic waste appearance are too high. We proposed a probabilistic approach of modeling the PET material by analyzing the reflection region and its surrounding. Three parameters are modeled by Gaussian and exponential distributions: color, size and distance of the reflection region. The final classification is made through a supervised training method of likelihood ratio test. The main novelty of the proposed method is the probabilistic approach in integrating various PET material signatures that are contaminated by stains under constant lighting changes. The system is evaluated by using four performance metrics: precision, recall, accuracy and error. Our system performed the best in all evaluation metrics compared to the benchmark methods. The system can be further improved by fusing all neighborhood information in decision making and by implementing the system in a graphics processing unit for faster processing speed. PMID:25485630

  4. Identification of Robust Terminal-Area Routes in Convective Weather

    Science.gov (United States)

    Pfeil, Diana Michalek; Balakrishnan, Hamsa

    2012-01-01

    Convective weather is responsible for large delays and widespread disruptions in the U.S. National Airspace System, especially during summer. Traffic flow management algorithms require reliable forecasts of route blockage to schedule and route traffic. This paper demonstrates how raw convective weather forecasts, which provide deterministic predictions of the vertically integrated liquid (the precipitation content in a column of airspace) can be translated into probabilistic forecasts of whether or not a terminal area route will be blocked. Given a flight route through the terminal area, we apply techniques from machine learning to determine the likelihood that the route will be open in actual weather. The likelihood is then used to optimize terminalarea operations by dynamically moving arrival and departure routes to maximize the expected capacity of the terminal area. Experiments using real weather scenarios on stormy days show that our algorithms recommend that a terminal-area route be modified 30% of the time, opening up 13% more available routes that were forecast to be blocked during these scenarios. The error rate is low, with only 5% of cases corresponding to a modified route being blocked in reality, whereas the original route is in fact open. In addition, for routes predicted to be open with probability 0.95 or greater by our method, 96% of these routes (on average over time horizon) are indeed open in the weather that materializes

  5. Identification of robust synthon in the molecular salts of 2 ...

    Indian Academy of Sciences (India)

    Crystal engineering has drawn the attention of the sci- entific community ... organic synthesis,2 host-guest chemistry,3 photographic film formulation,4 ... 2.1 Materials and general methods ... absorption correction was applied to the collected.

  6. Robust Portfolio Optimization Using Pseudodistances.

    Science.gov (United States)

    Toma, Aida; Leoni-Aubin, Samuela

    2015-01-01

    The presence of outliers in financial asset returns is a frequently occurring phenomenon which may lead to unreliable mean-variance optimized portfolios. This fact is due to the unbounded influence that outliers can have on the mean returns and covariance estimators that are inputs in the optimization procedure. In this paper we present robust estimators of mean and covariance matrix obtained by minimizing an empirical version of a pseudodistance between the assumed model and the true model underlying the data. We prove and discuss theoretical properties of these estimators, such as affine equivariance, B-robustness, asymptotic normality and asymptotic relative efficiency. These estimators can be easily used in place of the classical estimators, thereby providing robust optimized portfolios. A Monte Carlo simulation study and applications to real data show the advantages of the proposed approach. We study both in-sample and out-of-sample performance of the proposed robust portfolios comparing them with some other portfolios known in literature.

  7. Robust methods for data reduction

    CERN Document Server

    Farcomeni, Alessio

    2015-01-01

    Robust Methods for Data Reduction gives a non-technical overview of robust data reduction techniques, encouraging the use of these important and useful methods in practical applications. The main areas covered include principal components analysis, sparse principal component analysis, canonical correlation analysis, factor analysis, clustering, double clustering, and discriminant analysis.The first part of the book illustrates how dimension reduction techniques synthesize available information by reducing the dimensionality of the data. The second part focuses on cluster and discriminant analy

  8. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  9. Robust hashing for 3D models

    Science.gov (United States)

    Berchtold, Waldemar; Schäfer, Marcel; Rettig, Michael; Steinebach, Martin

    2014-02-01

    3D models and applications are of utmost interest in both science and industry. With the increment of their usage, their number and thereby the challenge to correctly identify them increases. Content identification is commonly done by cryptographic hashes. However, they fail as a solution in application scenarios such as computer aided design (CAD), scientific visualization or video games, because even the smallest alteration of the 3D model, e.g. conversion or compression operations, massively changes the cryptographic hash as well. Therefore, this work presents a robust hashing algorithm for 3D mesh data. The algorithm applies several different bit extraction methods. They are built to resist desired alterations of the model as well as malicious attacks intending to prevent correct allocation. The different bit extraction methods are tested against each other and, as far as possible, the hashing algorithm is compared to the state of the art. The parameters tested are robustness, security and runtime performance as well as False Acceptance Rate (FAR) and False Rejection Rate (FRR), also the probability calculation of hash collision is included. The introduced hashing algorithm is kept adaptive e.g. in hash length, to serve as a proper tool for all applications in practice.

  10. Identificación de nombres personales por medio de sistemas de codificación fonética Personal name identification through phonetic codification systems

    Directory of Open Access Journals (Sweden)

    Carmen Gálvez

    2006-01-01

    Full Text Available La necesidad de identificar las variantes de los nombres personales es un problema muy conocido en diversas aplicaciones, tales como los sistemas de recuperación de información (SRI, las bibliotecas digitales, las bases de datos de pacientes en un hospital, los sistemas de reservas aéreas, o los sistemas de censo. Los métodos de codificación fonética constituyen uno de los procedimientos para la solución de este problema, permitiendo obtener cadenas canónicas o normalizadas. Estos sistemas se engloban dentro de las técnicas generales de equiparación aproximada de cadenas. En este trabajo se realiza una revisión de los procesos que utilizan los sistemas Soundex, Daitch-Mokotoff Soundex, Phonix, Metaphone y NYSIIS para la asignación de claves fonéticas. La codificación fonética permite reducir a una forma común aquellos nombres personales que son similares en cuanto a su pronunciación, haciendo más sencilla la comparación de una cadena con otra, debido a que se almacena el código generado en lugar del nombre completo. Sin embargo, la principal limitación de estos sistemas es que son dependientes del lenguaje utilizado, lo que hace necesario la realización de modificaciones de acuerdo al idioma que se va a emplear.The need to identify the variants of personal names is a well-known problem in applications such as information retrieval systems (IRS, digital libraries, databases of patients in a hospital, the electronic systems of air reserves, or the systems of census. The phonetic codification methods constitute one of the procedures for the solution of this problem, permitting to obtain canonical or normalized names. These systems are included inside the general techniques of approximate string matching. In this work a revision of the processes is carried out that utilize the Soundex, Daitch-Mokotoff Soundex, Phonix, Metaphone and NYSIIS systems for the assignment of phonetic keys. The phonetic codification permits reduce to a

  11. EDUCATIONAl. RESOURCE IDENTIFICATION IN THE ...

    African Journals Online (AJOL)

    RESOURCE IDENTIFICATION. IN THE ... Identification of educational resources in the local environ- ment is of ... The environment to which a person is exposed and in which, or .... this respect on the re-use of resources - each ele- ment or ...

  12. Robust design optimization using the price of robustness, robust least squares and regularization methods

    Science.gov (United States)

    Bukhari, Hassan J.

    2017-12-01

    In this paper a framework for robust optimization of mechanical design problems and process systems that have parametric uncertainty is presented using three different approaches. Robust optimization problems are formulated so that the optimal solution is robust which means it is minimally sensitive to any perturbations in parameters. The first method uses the price of robustness approach which assumes the uncertain parameters to be symmetric and bounded. The robustness for the design can be controlled by limiting the parameters that can perturb.The second method uses the robust least squares method to determine the optimal parameters when data itself is subjected to perturbations instead of the parameters. The last method manages uncertainty by restricting the perturbation on parameters to improve sensitivity similar to Tikhonov regularization. The methods are implemented on two sets of problems; one linear and the other non-linear. This methodology will be compared with a prior method using multiple Monte Carlo simulation runs which shows that the approach being presented in this paper results in better performance.

  13. A sensitivity analysis of a personalized pulse wave propagation model for arteriovenous fistula surgery. Part A: Identification of most influential model parameters.

    Science.gov (United States)

    Huberts, W; de Jonge, C; van der Linden, W P M; Inda, M A; Tordoir, J H M; van de Vosse, F N; Bosboom, E M H

    2013-06-01

    Previously, a pulse wave propagation model was developed that has potential in supporting decision-making in arteriovenous fistula (AVF) surgery for hemodialysis. To adapt the wave propagation model to personalized conditions, patient-specific input parameters should be available. In clinics, the number of measurable input parameters is limited which results in sparse datasets. In addition, patient data are compromised with uncertainty. These uncertain and incomplete input datasets will result in model output uncertainties. By means of a sensitivity analysis the propagation of input uncertainties into output uncertainty can be studied which can give directions for input measurement improvement. In this study, a computational framework has been developed to perform such a sensitivity analysis with a variance-based method and Monte Carlo simulations. The framework was used to determine the influential parameters of our pulse wave propagation model applied to AVF surgery, with respect to parameter prioritization and parameter fixing. With this we were able to determine the model parameters that have the largest influence on the predicted mean brachial flow and systolic radial artery pressure after AVF surgery. Of all 73 parameters 51 could be fixed within their measurement uncertainty interval without significantly influencing the output, while 16 parameters importantly influence the output uncertainty. Measurement accuracy improvement should thus focus on these 16 influential parameters. The most rewarding are measurement improvements of the following parameters: the mean aortic flow, the aortic windkessel resistance, the parameters associated with the smallest arterial or venous diameters of the AVF in- and outflow tract and the radial artery windkessel compliance. Copyright © 2012 IPEM. Published by Elsevier Ltd. All rights reserved.

  14. Wavelet Filtering to Reduce Conservatism in Aeroservoelastic Robust Stability Margins

    Science.gov (United States)

    Brenner, Marty; Lind, Rick

    1998-01-01

    Wavelet analysis for filtering and system identification was used to improve the estimation of aeroservoelastic stability margins. The conservatism of the robust stability margins was reduced with parametric and nonparametric time-frequency analysis of flight data in the model validation process. Nonparametric wavelet processing of data was used to reduce the effects of external desirableness and unmodeled dynamics. Parametric estimates of modal stability were also extracted using the wavelet transform. Computation of robust stability margins for stability boundary prediction depends on uncertainty descriptions derived from the data for model validation. F-18 high Alpha Research Vehicle aeroservoelastic flight test data demonstrated improved robust stability prediction by extension of the stability boundary beyond the flight regime.

  15. Advances in robust fractional control

    CERN Document Server

    Padula, Fabrizio

    2015-01-01

    This monograph presents design methodologies for (robust) fractional control systems. It shows the reader how to take advantage of the superior flexibility of fractional control systems compared with integer-order systems in achieving more challenging control requirements. There is a high degree of current interest in fractional systems and fractional control arising from both academia and industry and readers from both milieux are catered to in the text. Different design approaches having in common a trade-off between robustness and performance of the control system are considered explicitly. The text generalizes methodologies, techniques and theoretical results that have been successfully applied in classical (integer) control to the fractional case. The first part of Advances in Robust Fractional Control is the more industrially-oriented. It focuses on the design of fractional controllers for integer processes. In particular, it considers fractional-order proportional-integral-derivative controllers, becau...

  16. Robustness of digital artist authentication

    DEFF Research Database (Denmark)

    Jacobsen, Robert; Nielsen, Morten

    In many cases it is possible to determine the authenticity of a painting from digital reproductions of the paintings; this has been demonstrated for a variety of artists and with different approaches. Common to all these methods in digital artist authentication is that the potential of the method...... is in focus, while the robustness has not been considered, i.e. the degree to which the data collection process influences the decision of the method. However, in order for an authentication method to be successful in practice, it needs to be robust to plausible error sources from the data collection....... In this paper we investigate the robustness of the newly proposed authenticity method introduced by the authors based on second generation multiresolution analysis. This is done by modelling a number of realistic factors that can occur in the data collection....

  17. Attractive ellipsoids in robust control

    CERN Document Server

    Poznyak, Alexander; Azhmyakov, Vadim

    2014-01-01

    This monograph introduces a newly developed robust-control design technique for a wide class of continuous-time dynamical systems called the “attractive ellipsoid method.” Along with a coherent introduction to the proposed control design and related topics, the monograph studies nonlinear affine control systems in the presence of uncertainty and presents a constructive and easily implementable control strategy that guarantees certain stability properties. The authors discuss linear-style feedback control synthesis in the context of the above-mentioned systems. The development and physical implementation of high-performance robust-feedback controllers that work in the absence of complete information is addressed, with numerous examples to illustrate how to apply the attractive ellipsoid method to mechanical and electromechanical systems. While theorems are proved systematically, the emphasis is on understanding and applying the theory to real-world situations. Attractive Ellipsoids in Robust Control will a...

  18. Robustness of holonomic quantum gates

    International Nuclear Information System (INIS)

    Solinas, P.; Zanardi, P.; Zanghi, N.

    2005-01-01

    Full text: If the driving field fluctuates during the quantum evolution this produces errors in the applied operator. The holonomic (and geometrical) quantum gates are believed to be robust against some kind of noise. Because of the geometrical dependence of the holonomic operators can be robust against this kind of noise; in fact if the fluctuations are fast enough they cancel out leaving the final operator unchanged. I present the numerical studies of holonomic quantum gates subject to this parametric noise, the fidelity of the noise and ideal evolution is calculated for different noise correlation times. The holonomic quantum gates seem robust not only for fast fluctuating fields but also for slow fluctuating fields. These results can be explained as due to the geometrical feature of the holonomic operator: for fast fluctuating fields the fluctuations are canceled out, for slow fluctuating fields the fluctuations do not perturb the loop in the parameter space. (author)

  19. Robust estimation and hypothesis testing

    CERN Document Server

    Tiku, Moti L

    2004-01-01

    In statistical theory and practice, a certain distribution is usually assumed and then optimal solutions sought. Since deviations from an assumed distribution are very common, one cannot feel comfortable with assuming a particular distribution and believing it to be exactly correct. That brings the robustness issue in focus. In this book, we have given statistical procedures which are robust to plausible deviations from an assumed mode. The method of modified maximum likelihood estimation is used in formulating these procedures. The modified maximum likelihood estimators are explicit functions of sample observations and are easy to compute. They are asymptotically fully efficient and are as efficient as the maximum likelihood estimators for small sample sizes. The maximum likelihood estimators have computational problems and are, therefore, elusive. A broad range of topics are covered in this book. Solutions are given which are easy to implement and are efficient. The solutions are also robust to data anomali...

  20. Robustness in Railway Operations (RobustRailS)

    DEFF Research Database (Denmark)

    Jensen, Jens Parbo; Nielsen, Otto Anker

    This study considers the problem of enhancing railway timetable robustness without adding slack time, hence increasing the travel time. The approach integrates a transit assignment model to assess how passengers adapt their behaviour whenever operations are changed. First, the approach considers...

  1. A Robust Design Applicability Model

    DEFF Research Database (Denmark)

    Ebro, Martin; Lars, Krogstie; Howard, Thomas J.

    2015-01-01

    to be applicable in organisations assigning a high importance to one or more factors that are known to be impacted by RD, while also experiencing a high level of occurrence of this factor. The RDAM supplements existing maturity models and metrics to provide a comprehensive set of data to support management......This paper introduces a model for assessing the applicability of Robust Design (RD) in a project or organisation. The intention of the Robust Design Applicability Model (RDAM) is to provide support for decisions by engineering management considering the relevant level of RD activities...

  2. Ins-Robust Primitive Words

    OpenAIRE

    Srivastava, Amit Kumar; Kapoor, Kalpesh

    2017-01-01

    Let Q be the set of primitive words over a finite alphabet with at least two symbols. We characterize a class of primitive words, Q_I, referred to as ins-robust primitive words, which remain primitive on insertion of any letter from the alphabet and present some properties that characterizes words in the set Q_I. It is shown that the language Q_I is dense. We prove that the language of primitive words that are not ins-robust is not context-free. We also present a linear time algorithm to reco...

  3. Person Recognition in Social Media Photos

    OpenAIRE

    Oh, Seong Joon; Benenson, Rodrigo; Fritz, Mario; Schiele, Bernt

    2017-01-01

    People nowadays share large parts of their personal lives through social media. Being able to automatically recognise people in personal photos may greatly enhance user convenience by easing photo album organisation. For human identification task, however, traditional focus of computer vision has been face recognition and pedestrian re-identification. Person recognition in social media photos sets new challenges for computer vision, including non-cooperative subjects (e.g. backward viewpoints...

  4. Improved autonomous star identification algorithm

    International Nuclear Information System (INIS)

    Luo Li-Yan; Xu Lu-Ping; Zhang Hua; Sun Jing-Rong

    2015-01-01

    The log–polar transform (LPT) is introduced into the star identification because of its rotation invariance. An improved autonomous star identification algorithm is proposed in this paper to avoid the circular shift of the feature vector and to reduce the time consumed in the star identification algorithm using LPT. In the proposed algorithm, the star pattern of the same navigation star remains unchanged when the stellar image is rotated, which makes it able to reduce the star identification time. The logarithmic values of the plane distances between the navigation and its neighbor stars are adopted to structure the feature vector of the navigation star, which enhances the robustness of star identification. In addition, some efforts are made to make it able to find the identification result with fewer comparisons, instead of searching the whole feature database. The simulation results demonstrate that the proposed algorithm can effectively accelerate the star identification. Moreover, the recognition rate and robustness by the proposed algorithm are better than those by the LPT algorithm and the modified grid algorithm. (paper)

  5. Essays on robust asset pricing

    NARCIS (Netherlands)

    Horváth, Ferenc

    2017-01-01

    The central concept of this doctoral dissertation is robustness. I analyze how model and parameter uncertainty affect financial decisions of investors and fund managers, and what their equilibrium consequences are. Chapter 1 gives an overview of the most important concepts and methodologies used in

  6. Robust visual hashing via ICA

    International Nuclear Information System (INIS)

    Fournel, Thierry; Coltuc, Daniela

    2010-01-01

    Designed to maximize information transmission in the presence of noise, independent component analysis (ICA) could appear in certain circumstances as a statistics-based tool for robust visual hashing. Several ICA-based scenarios can attempt to reach this goal. A first one is here considered.

  7. Robustness of raw quantum tomography

    Science.gov (United States)

    Asorey, M.; Facchi, P.; Florio, G.; Man'ko, V. I.; Marmo, G.; Pascazio, S.; Sudarshan, E. C. G.

    2011-01-01

    We scrutinize the effects of non-ideal data acquisition on the tomograms of quantum states. The presence of a weight function, schematizing the effects of a finite window or equivalently noise, only affects the state reconstruction procedure by a normalization constant. The results are extended to a discrete mesh and show that quantum tomography is robust under incomplete and approximate knowledge of tomograms.

  8. Robustness of raw quantum tomography

    Energy Technology Data Exchange (ETDEWEB)

    Asorey, M. [Departamento de Fisica Teorica, Facultad de Ciencias, Universidad de Zaragoza, 50009 Zaragoza (Spain); Facchi, P. [Dipartimento di Matematica, Universita di Bari, I-70125 Bari (Italy); INFN, Sezione di Bari, I-70126 Bari (Italy); MECENAS, Universita Federico II di Napoli and Universita di Bari (Italy); Florio, G. [Dipartimento di Fisica, Universita di Bari, I-70126 Bari (Italy); INFN, Sezione di Bari, I-70126 Bari (Italy); MECENAS, Universita Federico II di Napoli and Universita di Bari (Italy); Man' ko, V.I., E-mail: manko@lebedev.r [P.N. Lebedev Physical Institute, Leninskii Prospect 53, Moscow 119991 (Russian Federation); Marmo, G. [Dipartimento di Scienze Fisiche, Universita di Napoli ' Federico II' , I-80126 Napoli (Italy); INFN, Sezione di Napoli, I-80126 Napoli (Italy); MECENAS, Universita Federico II di Napoli and Universita di Bari (Italy); Pascazio, S. [Dipartimento di Fisica, Universita di Bari, I-70126 Bari (Italy); INFN, Sezione di Bari, I-70126 Bari (Italy); MECENAS, Universita Federico II di Napoli and Universita di Bari (Italy); Sudarshan, E.C.G. [Department of Physics, University of Texas, Austin, TX 78712 (United States)

    2011-01-31

    We scrutinize the effects of non-ideal data acquisition on the tomograms of quantum states. The presence of a weight function, schematizing the effects of a finite window or equivalently noise, only affects the state reconstruction procedure by a normalization constant. The results are extended to a discrete mesh and show that quantum tomography is robust under incomplete and approximate knowledge of tomograms.

  9. Aspects of robust linear regression

    NARCIS (Netherlands)

    Davies, P.L.

    1993-01-01

    Section 1 of the paper contains a general discussion of robustness. In Section 2 the influence function of the Hampel-Rousseeuw least median of squares estimator is derived. Linearly invariant weak metrics are constructed in Section 3. It is shown in Section 4 that $S$-estimators satisfy an exact

  10. Manipulation Robustness of Collaborative Filtering

    OpenAIRE

    Benjamin Van Roy; Xiang Yan

    2010-01-01

    A collaborative filtering system recommends to users products that similar users like. Collaborative filtering systems influence purchase decisions and hence have become targets of manipulation by unscrupulous vendors. We demonstrate that nearest neighbors algorithms, which are widely used in commercial systems, are highly susceptible to manipulation and introduce new collaborative filtering algorithms that are relatively robust.

  11. Robustness Regions for Dichotomous Decisions.

    Science.gov (United States)

    Vijn, Pieter; Molenaar, Ivo W.

    1981-01-01

    In the case of dichotomous decisions, the total set of all assumptions/specifications for which the decision would have been the same is the robustness region. Inspection of this (data-dependent) region is a form of sensitivity analysis which may lead to improved decision making. (Author/BW)

  12. Theoretical Framework for Robustness Evaluation

    DEFF Research Database (Denmark)

    Sørensen, John Dalsgaard

    2011-01-01

    This paper presents a theoretical framework for evaluation of robustness of structural systems, incl. bridges and buildings. Typically modern structural design codes require that ‘the consequence of damages to structures should not be disproportional to the causes of the damages’. However, althou...

  13. Robust control design with MATLAB

    CERN Document Server

    Gu, Da-Wei; Konstantinov, Mihail M

    2013-01-01

    Robust Control Design with MATLAB® (second edition) helps the student to learn how to use well-developed advanced robust control design methods in practical cases. To this end, several realistic control design examples from teaching-laboratory experiments, such as a two-wheeled, self-balancing robot, to complex systems like a flexible-link manipulator are given detailed presentation. All of these exercises are conducted using MATLAB® Robust Control Toolbox 3, Control System Toolbox and Simulink®. By sharing their experiences in industrial cases with minimum recourse to complicated theories and formulae, the authors convey essential ideas and useful insights into robust industrial control systems design using major H-infinity optimization and related methods allowing readers quickly to move on with their own challenges. The hands-on tutorial style of this text rests on an abundance of examples and features for the second edition: ·        rewritten and simplified presentation of theoretical and meth...

  14. Robust Portfolio Optimization Using Pseudodistances

    Science.gov (United States)

    2015-01-01

    The presence of outliers in financial asset returns is a frequently occurring phenomenon which may lead to unreliable mean-variance optimized portfolios. This fact is due to the unbounded influence that outliers can have on the mean returns and covariance estimators that are inputs in the optimization procedure. In this paper we present robust estimators of mean and covariance matrix obtained by minimizing an empirical version of a pseudodistance between the assumed model and the true model underlying the data. We prove and discuss theoretical properties of these estimators, such as affine equivariance, B-robustness, asymptotic normality and asymptotic relative efficiency. These estimators can be easily used in place of the classical estimators, thereby providing robust optimized portfolios. A Monte Carlo simulation study and applications to real data show the advantages of the proposed approach. We study both in-sample and out-of-sample performance of the proposed robust portfolios comparing them with some other portfolios known in literature. PMID:26468948

  15. Facial Symmetry in Robust Anthropometrics

    Czech Academy of Sciences Publication Activity Database

    Kalina, Jan

    2012-01-01

    Roč. 57, č. 3 (2012), s. 691-698 ISSN 0022-1198 R&D Projects: GA MŠk(CZ) 1M06014 Institutional research plan: CEZ:AV0Z10300504 Keywords : forensic science * anthropology * robust image analysis * correlation analysis * multivariate data * classification Subject RIV: BB - Applied Statistics, Operational Research Impact factor: 1.244, year: 2012

  16. Sparse and Robust Factor Modelling

    NARCIS (Netherlands)

    C. Croux (Christophe); P. Exterkate (Peter)

    2011-01-01

    textabstractFactor construction methods are widely used to summarize a large panel of variables by means of a relatively small number of representative factors. We propose a novel factor construction procedure that enjoys the properties of robustness to outliers and of sparsity; that is, having

  17. Robust distributed cognitive relay beamforming

    KAUST Repository

    Pandarakkottilil, Ubaidulla; Aissa, Sonia

    2012-01-01

    design takes into account a parameter of the error in the channel state information (CSI) to render the performance of the beamformer robust in the presence of imperfect CSI. Though the original problem is non-convex, we show that the proposed design can

  18. Approximability of Robust Network Design

    NARCIS (Netherlands)

    Olver, N.K.; Shepherd, F.B.

    2014-01-01

    We consider robust (undirected) network design (RND) problems where the set of feasible demands may be given by an arbitrary convex body. This model, introduced by Ben-Ameur and Kerivin [Ben-Ameur W, Kerivin H (2003) New economical virtual private networks. Comm. ACM 46(6):69-73], generalizes the

  19. Hazardous alcohol users during pregnancy: psychiatric health and personality traits.

    Science.gov (United States)

    Magnusson, Asa; Göransson, Mona; Heilig, Markus

    2007-07-10

    We examined alcohol use disorders, psychiatric symptoms and personality traits in women reporting alcohol use during pregnancy. In a pilot cohort (n=139), subjects were screened for alcohol use disorders, and assessed for psychopathology, personality traits, and alcohol use during the first trimester. Those reporting consumption exceeding a conservative threshold for harmful use were offered a diagnostic psychiatric interview. The main findings of the pilot study were replicated using a large sample of women in the third trimester (n=715), who were screened for alcohol use disorders, had their consumption during pregnancy assessed, and were assessed for personality traits. In the pilot cohort, only a minority of women who consumed significant amounts of alcohol during pregnancy fulfilled alcohol dependence criteria, or had scores on the Alcohol Use Disorder Identification Test typically associated with such a diagnosis. Psychiatric morbidity was also unremarkable as assessed by self-reported symptom intensity. The distinguishing feature was high novelty seeking. The results were robustly confirmed in the replication study. Most women with significant alcohol consumption during pregnancy do not seem to be alcohol dependent. Instead, use during pregnancy may reflect impulsive personality traits, and be correlated with additional risk behaviors.

  20. Robust input design for nonlinear dynamic modeling of AUV.

    Science.gov (United States)

    Nouri, Nowrouz Mohammad; Valadi, Mehrdad

    2017-09-01

    Input design has a dominant role in developing the dynamic model of autonomous underwater vehicles (AUVs) through system identification. Optimal input design is the process of generating informative inputs that can be used to generate the good quality dynamic model of AUVs. In a problem with optimal input design, the desired input signal depends on the unknown system which is intended to be identified. In this paper, the input design approach which is robust to uncertainties in model parameters is used. The Bayesian robust design strategy is applied to design input signals for dynamic modeling of AUVs. The employed approach can design multiple inputs and apply constraints on an AUV system's inputs and outputs. Particle swarm optimization (PSO) is employed to solve the constraint robust optimization problem. The presented algorithm is used for designing the input signals for an AUV, and the estimate obtained by robust input design is compared with that of the optimal input design. According to the results, proposed input design can satisfy both robustness of constraints and optimality. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  1. Levels of Personality Functioning Scale Self-Report Validation Journal of Personality Assessment

    OpenAIRE

    Good, Evan; Hopwood, Christopher; Morey, Leslie

    2017-01-01

    Validation of the Levels of Personality Functioning Scale - Self-Report. Results suggest that the measure has a robust single dimension and that it correlates in a very general manner with a wide range of maladaptive personality variables, consistent with its purpose as a measure of non-specific personality pathology.

  2. Robust Reliability or reliable robustness? - Integrated consideration of robustness and reliability aspects

    DEFF Research Database (Denmark)

    Kemmler, S.; Eifler, Tobias; Bertsche, B.

    2015-01-01

    products are and vice versa. For a comprehensive understanding and to use existing synergies between both domains, this paper discusses the basic principles of Reliability- and Robust Design theory. The development of a comprehensive model will enable an integrated consideration of both domains...

  3. Eliminating barriers to personalized medicine: learning from neurofibromatosis type 1.

    Science.gov (United States)

    Gutmann, David H

    2014-07-29

    With the emergence of high-throughput discovery platforms, robust preclinical small-animal models, and efficient clinical trial pipelines, it is becoming possible to envision a time when the treatment of human neurologic diseases will become personalized. The emergence of precision medicine will require the identification of subgroups of patients most likely to respond to specific biologically based therapies. This stratification only becomes possible when the determinants that contribute to disease heterogeneity become more fully elucidated. This review discusses the defining factors that underlie disease heterogeneity relevant to the potential for individualized brain tumor (optic pathway glioma) treatments arising in the common single-gene cancer predisposition syndrome, neurofibromatosis type 1 (NF1). In this regard, NF1 is posited as a model genetic condition to establish a workable paradigm for actualizing precision therapeutics for other neurologic disorders. © 2014 American Academy of Neurology.

  4. Robust Decentralized Formation Flight Control

    Directory of Open Access Journals (Sweden)

    Zhao Weihua

    2011-01-01

    Full Text Available Motivated by the idea of multiplexed model predictive control (MMPC, this paper introduces a new framework for unmanned aerial vehicles (UAVs formation flight and coordination. Formulated using MMPC approach, the whole centralized formation flight system is considered as a linear periodic system with control inputs of each UAV subsystem as its periodic inputs. Divided into decentralized subsystems, the whole formation flight system is guaranteed stable if proper terminal cost and terminal constraints are added to each decentralized MPC formulation of the UAV subsystem. The decentralized robust MPC formulation for each UAV subsystem with bounded input disturbances and model uncertainties is also presented. Furthermore, an obstacle avoidance control scheme for any shape and size of obstacles, including the nonapriorily known ones, is integrated under the unified MPC framework. The results from simulations demonstrate that the proposed framework can successfully achieve robust collision-free formation flights.

  5. Simplified Multimodal Biometric Identification

    Directory of Open Access Journals (Sweden)

    Abhijit Shete

    2014-03-01

    Full Text Available Multibiometric systems are expected to be more reliable than unimodal biometric systems for personal identification due to the presence of multiple, fairly independent pieces of evidence e.g. Unique Identification Project "Aadhaar" of Government of India. In this paper, we present a novel wavelet based technique to perform fusion at the feature level and score level by considering two biometric modalities, face and fingerprint. The results indicate that the proposed technique can lead to substantial improvement in multimodal matching performance. The proposed technique is simple because of no preprocessing of raw biometric traits as well as no feature and score normalization.

  6. Inefficient but robust public leadership.

    OpenAIRE

    Matsumura, Toshihiro; Ogawa, Akira

    2014-01-01

    We investigate endogenous timing in a mixed duopoly in a differentiated product market. We find that private leadership is better than public leadership from a social welfare perspective if the private firm is domestic, regardless of the degree of product differentiation. Nevertheless, the public leadership equilibrium is risk-dominant, and it is thus robust if the degree of product differentiation is high. We also find that regardless of the degree of product differentiation, the public lead...

  7. Testing Heteroscedasticity in Robust Regression

    Czech Academy of Sciences Publication Activity Database

    Kalina, Jan

    2011-01-01

    Roč. 1, č. 4 (2011), s. 25-28 ISSN 2045-3345 Grant - others:GA ČR(CZ) GA402/09/0557 Institutional research plan: CEZ:AV0Z10300504 Keywords : robust regression * heteroscedasticity * regression quantiles * diagnostics Subject RIV: BB - Applied Statistics , Operational Research http://www.researchjournals.co.uk/documents/Vol4/06%20Kalina.pdf

  8. Robust power system frequency control

    CERN Document Server

    Bevrani, Hassan

    2014-01-01

    This updated edition of the industry standard reference on power system frequency control provides practical, systematic and flexible algorithms for regulating load frequency, offering new solutions to the technical challenges introduced by the escalating role of distributed generation and renewable energy sources in smart electric grids. The author emphasizes the physical constraints and practical engineering issues related to frequency in a deregulated environment, while fostering a conceptual understanding of frequency regulation and robust control techniques. The resulting control strategi

  9. A personnel TLD system with person identification

    International Nuclear Information System (INIS)

    Widell, C.O.

    1974-01-01

    The TLD system uses Li 2 B 4 O 7 :Mn, Si sintered tablets which are heated by hot nitrogen. The slide which holds the tablets is coded by a self adhesive polyester-aluminium tape. This tape is BCD coded in an ordinary tape punch. The information on the punched tape includes a ten digit social-security number and a two digit information on location and type of dosimetry. By this system dosimetric data is directly transfered into a central dose register for Sweden. All personnel doses are there stored on social-security numbers. (author)

  10. Person identification by gait analysis and photogrammetry

    DEFF Research Database (Denmark)

    Lynnerup, Niels; Vedel, Jens

    2005-01-01

    Surveillance images from a bank robbery were analyzed and compared with images of a suspect. Based on general bodily features, gait and anthropometric measurements, we were able to conclude that one of the perpetrators showed strong resemblance to the suspect. Both exhibited a gait characterized...... by hyperextension of the leg joints, and bodily measurements did not differ by more than 6 mm on average. The latter was quantified by photogrammetry: i.e., measuring by using images of the perpetrator as captured by surveillance cameras. Using the computer software Photomodeler Pro, synchronous images from...

  11. Personality Disorders

    Science.gov (United States)

    Personality disorders are a group of mental illnesses. They involve long-term patterns of thoughts and behaviors ... serious problems with relationships and work. People with personality disorders have trouble dealing with everyday stresses and ...

  12. Personality Disorders

    Science.gov (United States)

    ... Disorders in Adults Data Sources Share Personality Disorders Definitions Personality disorders represent “an enduring pattern of inner ... MSC 9663 Bethesda, MD 20892-9663 Follow Us Facebook Twitter YouTube Google Plus NIMH Newsletter NIMH RSS ...

  13. Robustness Analysis of Timber Truss Structure

    DEFF Research Database (Denmark)

    Rajčić, Vlatka; Čizmar, Dean; Kirkegaard, Poul Henning

    2010-01-01

    The present paper discusses robustness of structures in general and the robustness requirements given in the codes. Robustness of timber structures is also an issues as this is closely related to Working group 3 (Robustness of systems) of the COST E55 project. Finally, an example of a robustness...... evaluation of a widespan timber truss structure is presented. This structure was built few years ago near Zagreb and has a span of 45m. Reliability analysis of the main members and the system is conducted and based on this a robustness analysis is preformed....

  14. Biometric Authentication System on Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information

  15. Soliton robustness in optical fibers

    International Nuclear Information System (INIS)

    Menyuk, C.R.

    1993-01-01

    Simulations and experiments indicate that solitons in optical fibers are robust in the presence of Hamiltonian deformations such as higher-order dispersion and birefringence but are destroyed in the presence of non-Hamiltonian deformations such as attenuation and the Raman effect. Two hypotheses are introduced that generalize these observations and give a recipe for when deformations will be Hamiltonian. Concepts from nonlinear dynamics are used to make these two hypotheses plausible. Soliton stabilization with frequency filtering is also briefly discussed from this point of view

  16. Robust and Sparse Factor Modelling

    DEFF Research Database (Denmark)

    Croux, Christophe; Exterkate, Peter

    Factor construction methods are widely used to summarize a large panel of variables by means of a relatively small number of representative factors. We propose a novel factor construction procedure that enjoys the properties of robustness to outliers and of sparsity; that is, having relatively few...... nonzero factor loadings. Compared to the traditional factor construction method, we find that this procedure leads to a favorable forecasting performance in the presence of outliers and to better interpretable factors. We investigate the performance of the method in a Monte Carlo experiment...

  17. Sustainable Resilient, Robust & Resplendent Enterprises

    DEFF Research Database (Denmark)

    Edgeman, Rick

    to their impact. Resplendent enterprises are introduced with resplendence referring not to some sort of public or private façade, but instead refers to organizations marked by dual brilliance and nobility of strategy, governance and comportment that yields superior and sustainable triple bottom line performance....... Herein resilience, robustness, and resplendence (R3) are integrated with sustainable enterprise excellence (Edgeman and Eskildsen, 2013) or SEE and social-ecological innovation (Eskildsen and Edgeman, 2012) to aid progress of a firm toward producing continuously relevant performance that proceed from...

  18. Personal Branding

    OpenAIRE

    Climent i Martí, Jordi

    2017-01-01

    Proyecto Fin de Grado leído en la Universidad Rey Juan Carlos en el curso académico 2013/2014. Director: Cristina Ayala del Pino Con este Trabajo Fin de Grado he querido aproximar el concepto del Personal Branding y de marca personal como la herramienta para diferenciarse en el entorno profesional. Partiendo con la definición del concepto, su construcción, el panorama actual, compaginar empleo con marca personal y acabando con la visión personal de un gurú de la Marca Person...

  19. Robust and efficient walking with spring-like legs

    Energy Technology Data Exchange (ETDEWEB)

    Rummel, J; Blum, Y; Seyfarth, A, E-mail: juergen.rummel@uni-jena.d, E-mail: andre.seyfarth@uni-jena.d [Lauflabor Locomotion Laboratory, University of Jena, Dornburger Strasse 23, 07743 Jena (Germany)

    2010-12-15

    The development of bipedal walking robots is inspired by human walking. A way of implementing walking could be performed by mimicking human leg dynamics. A fundamental model, representing human leg dynamics during walking and running, is the bipedal spring-mass model which is the basis for this paper. The aim of this study is the identification of leg parameters leading to a compromise between robustness and energy efficiency in walking. It is found that, compared to asymmetric walking, symmetric walking with flatter angles of attack reveals such a compromise. With increasing leg stiffness, energy efficiency increases continuously. However, robustness is the maximum at moderate leg stiffness and decreases slightly with increasing stiffness. Hence, an adjustable leg compliance would be preferred, which is adaptable to the environment. If the ground is even, a high leg stiffness leads to energy efficient walking. However, if external perturbations are expected, e.g. when the robot walks on uneven terrain, the leg should be softer and the angle of attack flatter. In the case of underactuated robots with constant physical springs, the leg stiffness should be larger than k-tilde = 14 in order to use the most robust gait. Soft legs, however, lack in both robustness and efficiency.

  20. Robust and efficient walking with spring-like legs

    International Nuclear Information System (INIS)

    Rummel, J; Blum, Y; Seyfarth, A

    2010-01-01

    The development of bipedal walking robots is inspired by human walking. A way of implementing walking could be performed by mimicking human leg dynamics. A fundamental model, representing human leg dynamics during walking and running, is the bipedal spring-mass model which is the basis for this paper. The aim of this study is the identification of leg parameters leading to a compromise between robustness and energy efficiency in walking. It is found that, compared to asymmetric walking, symmetric walking with flatter angles of attack reveals such a compromise. With increasing leg stiffness, energy efficiency increases continuously. However, robustness is the maximum at moderate leg stiffness and decreases slightly with increasing stiffness. Hence, an adjustable leg compliance would be preferred, which is adaptable to the environment. If the ground is even, a high leg stiffness leads to energy efficient walking. However, if external perturbations are expected, e.g. when the robot walks on uneven terrain, the leg should be softer and the angle of attack flatter. In the case of underactuated robots with constant physical springs, the leg stiffness should be larger than k-tilde = 14 in order to use the most robust gait. Soft legs, however, lack in both robustness and efficiency.

  1. Noise-robust speech triage.

    Science.gov (United States)

    Bartos, Anthony L; Cipr, Tomas; Nelson, Douglas J; Schwarz, Petr; Banowetz, John; Jerabek, Ladislav

    2018-04-01

    A method is presented in which conventional speech algorithms are applied, with no modifications, to improve their performance in extremely noisy environments. It has been demonstrated that, for eigen-channel algorithms, pre-training multiple speaker identification (SID) models at a lattice of signal-to-noise-ratio (SNR) levels and then performing SID using the appropriate SNR dependent model was successful in mitigating noise at all SNR levels. In those tests, it was found that SID performance was optimized when the SNR of the testing and training data were close or identical. In this current effort multiple i-vector algorithms were used, greatly improving both processing throughput and equal error rate classification accuracy. Using identical approaches in the same noisy environment, performance of SID, language identification, gender identification, and diarization were significantly improved. A critical factor in this improvement is speech activity detection (SAD) that performs reliably in extremely noisy environments, where the speech itself is barely audible. To optimize SAD operation at all SNR levels, two algorithms were employed. The first maximized detection probability at low levels (-10 dB ≤ SNR < +10 dB) using just the voiced speech envelope, and the second exploited features extracted from the original speech to improve overall accuracy at higher quality levels (SNR ≥ +10 dB).

  2. A game theoretic framework for analyzing re-identification risk.

    Directory of Open Access Journals (Sweden)

    Zhiyu Wan

    Full Text Available Given the potential wealth of insights in personal data the big databases can provide, many organizations aim to share data while protecting privacy by sharing de-identified data, but are concerned because various demonstrations show such data can be re-identified. Yet these investigations focus on how attacks can be perpetrated, not the likelihood they will be realized. This paper introduces a game theoretic framework that enables a publisher to balance re-identification risk with the value of sharing data, leveraging a natural assumption that a recipient only attempts re-identification if its potential gains outweigh the costs. We apply the framework to a real case study, where the value of the data to the publisher is the actual grant funding dollar amounts from a national sponsor and the re-identification gain of the recipient is the fine paid to a regulator for violation of federal privacy rules. There are three notable findings: 1 it is possible to achieve zero risk, in that the recipient never gains from re-identification, while sharing almost as much data as the optimal solution that allows for a small amount of risk; 2 the zero-risk solution enables sharing much more data than a commonly invoked de-identification policy of the U.S. Health Insurance Portability and Accountability Act (HIPAA; and 3 a sensitivity analysis demonstrates these findings are robust to order-of-magnitude changes in player losses and gains. In combination, these findings provide support that such a framework can enable pragmatic policy decisions about de-identified data sharing.

  3. Robust facial landmark detection based on initializing multiple poses

    Directory of Open Access Journals (Sweden)

    Xin Chai

    2016-10-01

    Full Text Available For robot systems, robust facial landmark detection is the first and critical step for face-based human identification and facial expression recognition. In recent years, the cascaded-regression-based method has achieved excellent performance in facial landmark detection. Nevertheless, it still has certain weakness, such as high sensitivity to the initialization. To address this problem, regression based on multiple initializations is established in a unified model; face shapes are then estimated independently according to these initializations. With a ranking strategy, the best estimate is selected as the final output. Moreover, a face shape model based on restricted Boltzmann machines is built as a constraint to improve the robustness of ranking. Experiments on three challenging datasets demonstrate the effectiveness of the proposed facial landmark detection method against state-of-the-art methods.

  4. Robust Digital Speech Watermarking For Online Speaker Recognition

    Directory of Open Access Journals (Sweden)

    Mohammad Ali Nematollahi

    2015-01-01

    Full Text Available A robust and blind digital speech watermarking technique has been proposed for online speaker recognition systems based on Discrete Wavelet Packet Transform (DWPT and multiplication to embed the watermark in the amplitudes of the wavelet’s subbands. In order to minimize the degradation effect of the watermark, these subbands are selected where less speaker-specific information was available (500 Hz–3500 Hz and 6000 Hz–7000 Hz. Experimental results on Texas Instruments Massachusetts Institute of Technology (TIMIT, Massachusetts Institute of Technology (MIT, and Mobile Biometry (MOBIO show that the degradation for speaker verification and identification is 1.16% and 2.52%, respectively. Furthermore, the proposed watermark technique can provide enough robustness against different signal processing attacks.

  5. Robust Adaptive Speed Control of Induction Motor Drives

    DEFF Research Database (Denmark)

    Bidstrup, N.

    This thesis concerns speed control of current vector controlled induction motor drives (CVC drives). The CVC drive is an existing prototype drive developed by Danfoss A/S, Transmission Division. Practical tests have revealed that the open loop dynamical properties of the CVC drive are highly......, (LS) identification and generalized predictive control (GPC) has been implemented and tested on the CVC drive. Allthough GPC is a robust control method, it was not possible to maintain specified controller performance in the entire operating range. This was the main reason for investigating truly...... and measurement noise in general, were the major reasons for the drifting parameters. Two approaches was proposed to robustify MASTR2 against the output noise. The first approach consists of filtering the output. Output filtering had a significant effect in simulations, but the robustness against the output noise...

  6. Robust Adaptive Speed Control of Induction Motor Drives

    DEFF Research Database (Denmark)

    Bidstrup, N.

    , (LS) identification and generalized predictive control (GPC) has been implemented and tested on the CVC drive. Allthough GPC is a robust control method, it was not possible to maintain specified controller performance in the entire operating range. This was the main reason for investigating truly...... adaptive speed control of the CVC drive. A direct truly adaptive speed controller has been implemented. The adaptive controller is a moving Average Self-Tuning Regulator which is abbreviated MASTR throughout the thesis. Two practical implementations of this controller were proposed. They were denoted MASTR...... and measurement noise in general, were the major reasons for the drifting parameters. Two approaches was proposed to robustify MASTR2 against the output noise. The first approach consists of filtering the output. Output filtering had a significant effect in simulations, but the robustness against the output noise...

  7. Robust Instrumentation[Water treatment for power plant]; Robust Instrumentering

    Energy Technology Data Exchange (ETDEWEB)

    Wik, Anders [Vattenfall Utveckling AB, Stockholm (Sweden)

    2003-08-01

    Cementa Slite Power Station is a heat recovery steam generator (HRSG) with moderate steam data; 3.0 MPa and 420 deg C. The heat is recovered from Cementa, a cement industry, without any usage of auxiliary fuel. The Power station commenced operation in 2001. The layout of the plant is unusual, there are no similar in Sweden and very few world-wide, so the operational experiences are limited. In connection with the commissioning of the power plant a R and D project was identified with the objective to minimise the manpower needed for chemistry management of the plant. The lean chemistry management is based on robust instrumentation and chemical-free water treatment plant. The concept with robust instrumentation consists of the following components; choice of on-line instrumentation with a minimum of O and M and a chemical-free water treatment. The parameters are specific conductivity, cation conductivity, oxygen and pH. In addition to that, two fairly new on-line instruments were included; corrosion monitors and differential pH calculated from specific and cation conductivity. The chemical-free water treatment plant consists of softening, reverse osmosis and electro-deionisation. The operational experience shows that the cycle chemistry is not within the guidelines due to major problems with the operation of the power plant. These problems have made it impossible to reach steady state and thereby not viable to fully verify and validate the concept with robust instrumentation. From readings on the panel of the online analysers some conclusions may be drawn, e.g. the differential pH measurements have fulfilled the expectations. The other on-line analysers have been working satisfactorily apart from contamination with turbine oil, which has been noticed at least twice. The corrosion monitors seem to be working but the lack of trend curves from the mainframe computer system makes it hard to draw any clear conclusions. The chemical-free water treatment has met all

  8. Robustness of Visual Place Cells in Dynamic Indoor and Outdoor Environment

    Directory of Open Access Journals (Sweden)

    C. Giovannangeli

    2006-06-01

    Full Text Available In this paper, a model of visual place cells (PCs based on precise neurobiological data is presented. The robustness of the model in real indoor and outdoor environments is tested. Results show that the interplay between neurobiological modelling and robotic experiments can promote the understanding of the neural structures and the achievement of robust robot navigation algorithms. Short Term Memory (STM, soft competition and sparse coding are important for both landmark identification and computation of PC activities. The extension of the paradigm to outdoor environments has confirmed the robustness of the vision-based model and pointed to improvements in order to further foster its performance.

  9. Personality and personal network type

    NARCIS (Netherlands)

    Doeven-Eggens, Lilian; De Fruyt, Filip; Hendriks, A. A. Jolijn; Bosker, Roel J.; Van der Werf, Margaretha P. C.

    2008-01-01

    The association between personality and personal relationships is mostly studied within dyadic relationships. We examined these variables within the context of personal network types. We used Latent Class Analysis to identify groups Of Students with similar role relationships with three focal

  10. Perspective: Evolution and detection of genetic robustness

    NARCIS (Netherlands)

    Visser, de J.A.G.M.; Hermisson, J.; Wagner, G.P.; Ancel Meyers, L.; Bagheri-Chaichian, H.; Blanchard, J.L.; Chao, L.; Cheverud, J.M.; Elena, S.F.; Fontana, W.; Gibson, G.; Hansen, T.F.; Krakauer, D.; Lewontin, R.C.; Ofria, C.; Rice, S.H.; Dassow, von G.; Wagner, A.; Whitlock, M.C.

    2003-01-01

    Robustness is the invariance of phenotypes in the face of perturbation. The robustness of phenotypes appears at various levels of biological organization, including gene expression, protein folding, metabolic flux, physiological homeostasis, development, and even organismal fitness. The mechanisms

  11. Robust lyapunov controller for uncertain systems

    KAUST Repository

    Laleg-Kirati, Taous-Meriem; Elmetennani, Shahrazed

    2017-01-01

    Various examples of systems and methods are provided for Lyapunov control for uncertain systems. In one example, a system includes a process plant and a robust Lyapunov controller configured to control an input of the process plant. The robust

  12. Robust distributed cognitive relay beamforming

    KAUST Repository

    Pandarakkottilil, Ubaidulla

    2012-05-01

    In this paper, we present a distributed relay beamformer design for a cognitive radio network in which a cognitive (or secondary) transmit node communicates with a secondary receive node assisted by a set of cognitive non-regenerative relays. The secondary nodes share the spectrum with a licensed primary user (PU) node, and each node is assumed to be equipped with a single transmit/receive antenna. The interference to the PU resulting from the transmission from the cognitive nodes is kept below a specified limit. The proposed robust cognitive relay beamformer design seeks to minimize the total relay transmit power while ensuring that the transceiver signal-to-interference- plus-noise ratio and PU interference constraints are satisfied. The proposed design takes into account a parameter of the error in the channel state information (CSI) to render the performance of the beamformer robust in the presence of imperfect CSI. Though the original problem is non-convex, we show that the proposed design can be reformulated as a tractable convex optimization problem that can be solved efficiently. Numerical results are provided and illustrate the performance of the proposed designs for different network operating conditions and parameters. © 2012 IEEE.

  13. Robust canonical correlations: A comparative study

    OpenAIRE

    Branco, JA; Croux, Christophe; Filzmoser, P; Oliveira, MR

    2005-01-01

    Several approaches for robust canonical correlation analysis will be presented and discussed. A first method is based on the definition of canonical correlation analysis as looking for linear combinations of two sets of variables having maximal (robust) correlation. A second method is based on alternating robust regressions. These methods axe discussed in detail and compared with the more traditional approach to robust canonical correlation via covariance matrix estimates. A simulation study ...

  14. Robust Control with Enlaeged Interval of Uncertain Parameters

    Directory of Open Access Journals (Sweden)

    Marek Keresturi

    2002-01-01

    Full Text Available Robust control is advantageous for systems with defined interval of uncertain parameters. This can be substantially enlarged dividing it into a few sub-intervals. Corresponding controllers for each of them may be set after approximate identification of some uncertain plant parameters. The paper deals with application of the pole region assignment method for position control of the crane crab. The same track form is required for uncertain burden mass and approximate value of rope length. Measurement of crab position and speed is supposed, burden deviation angle is observed. Simulation results have verified feasibility of this design procedure.

  15. Robust adaptive synchronization of general dynamical networks ...

    Indian Academy of Sciences (India)

    Home; Journals; Pramana – Journal of Physics; Volume 86; Issue 6. Robust ... A robust adaptive synchronization scheme for these general complex networks with multiple delays and uncertainties is established and raised by employing the robust adaptive control principle and the Lyapunov stability theory. We choose ...

  16. Robust portfolio selection under norm uncertainty

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2016-06-01

    Full Text Available Abstract In this paper, we consider the robust portfolio selection problem which has a data uncertainty described by the ( p , w $(p,w$ -norm in the objective function. We show that the robust formulation of this problem is equivalent to a linear optimization problem. Moreover, we present some numerical results concerning our robust portfolio selection problem.

  17. A robust standard deviation control chart

    NARCIS (Netherlands)

    Schoonhoven, M.; Does, R.J.M.M.

    2012-01-01

    This article studies the robustness of Phase I estimators for the standard deviation control chart. A Phase I estimator should be efficient in the absence of contaminations and resistant to disturbances. Most of the robust estimators proposed in the literature are robust against either diffuse

  18. Methodology in robust and nonparametric statistics

    CERN Document Server

    Jurecková, Jana; Picek, Jan

    2012-01-01

    Introduction and SynopsisIntroductionSynopsisPreliminariesIntroductionInference in Linear ModelsRobustness ConceptsRobust and Minimax Estimation of LocationClippings from Probability and Asymptotic TheoryProblemsRobust Estimation of Location and RegressionIntroductionM-EstimatorsL-EstimatorsR-EstimatorsMinimum Distance and Pitman EstimatorsDifferentiable Statistical FunctionsProblemsAsymptotic Representations for L-Estimators

  19. Personality Development

    Directory of Open Access Journals (Sweden)

    Osman Ozdemir

    2012-12-01

    Full Text Available Personality is the integration of characteristics acquired or brought by birth which separate the individual from others. Personality involves aspects of the individual's mental, emotional, social, and physical features in continuum. Several theories were suggested to explain developmental processes of personality. Each theory concentrates on one feature of human development as the focal point, then integrates with other areas of development in general. Most theories assume that childhood, especially up to 5-6 years, has essential influence on development of personality. The interaction between genetic and environmental factors reveals a unique personality along growth and developmental process. It could be said that individual who does not have any conflict between his/her basic needs and society's, has well-developed and psychologically healthy personality.

  20. Personal authentication through dorsal hand vein patterns

    Science.gov (United States)

    Hsu, Chih-Bin; Hao, Shu-Sheng; Lee, Jen-Chun

    2011-08-01

    Biometric identification is an emerging technology that can solve security problems in our networked society. A reliable and robust personal verification approach using dorsal hand vein patterns is proposed in this paper. The characteristic of the approach needs less computational and memory requirements and has a higher recognition accuracy. In our work, the near-infrared charge-coupled device (CCD) camera is adopted as an input device for capturing dorsal hand vein images, it has the advantages of the low-cost and noncontact imaging. In the proposed approach, two finger-peaks are automatically selected as the datum points to define the region of interest (ROI) in the dorsal hand vein images. The modified two-directional two-dimensional principal component analysis, which performs an alternate two-dimensional PCA (2DPCA) in the column direction of images in the 2DPCA subspace, is proposed to exploit the correlation of vein features inside the ROI between images. The major advantage of the proposed method is that it requires fewer coefficients for efficient dorsal hand vein image representation and recognition. The experimental results on our large dorsal hand vein database show that the presented schema achieves promising performance (false reject rate: 0.97% and false acceptance rate: 0.05%) and is feasible for dorsal hand vein recognition.

  1. Perceived Personality Traits of Individuals with Anorexia Nervosa

    Science.gov (United States)

    Watters, Jessica E.; Malouff, John M.

    2012-01-01

    Background: Prior research has found evidence of a general negative personality stereotype for individuals who have anorexia nervosa (AN). Methods: This study examined the expected personality characteristics of individuals with AN using the Five-Factor Model of personality to allow identification of specific personality traits that are part of…

  2. Container Materials, Fabrication And Robustness

    International Nuclear Information System (INIS)

    Dunn, K.; Louthan, M.; Rawls, G.; Sindelar, R.; Zapp, P.; Mcclard, J.

    2009-01-01

    The multi-barrier 3013 container used to package plutonium-bearing materials is robust and thereby highly resistant to identified degradation modes that might cause failure. The only viable degradation mechanisms identified by a panel of technical experts were pressurization within and corrosion of the containers. Evaluations of the container materials and the fabrication processes and resulting residual stresses suggest that the multi-layered containers will mitigate the potential for degradation of the outer container and prevent the release of the container contents to the environment. Additionally, the ongoing surveillance programs and laboratory studies should detect any incipient degradation of containers in the 3013 storage inventory before an outer container is compromised.

  3. Robust matching for voice recognition

    Science.gov (United States)

    Higgins, Alan; Bahler, L.; Porter, J.; Blais, P.

    1994-10-01

    This paper describes an automated method of comparing a voice sample of an unknown individual with samples from known speakers in order to establish or verify the individual's identity. The method is based on a statistical pattern matching approach that employs a simple training procedure, requires no human intervention (transcription, work or phonetic marketing, etc.), and makes no assumptions regarding the expected form of the statistical distributions of the observations. The content of the speech material (vocabulary, grammar, etc.) is not assumed to be constrained in any way. An algorithm is described which incorporates frame pruning and channel equalization processes designed to achieve robust performance with reasonable computational resources. An experimental implementation demonstrating the feasibility of the concept is described.

  4. Robustness Assessment of Spatial Timber Structures

    DEFF Research Database (Denmark)

    Kirkegaard, Poul Henning

    2012-01-01

    Robustness of structural systems has obtained a renewed interest due to a much more frequent use of advanced types of structures with limited redundancy and serious consequences in case of failure. In order to minimise the likelihood of such disproportionate structural failures many modern buildi...... to robustness of spatial timber structures and will discuss the consequences of such robustness issues related to the future development of timber structures.......Robustness of structural systems has obtained a renewed interest due to a much more frequent use of advanced types of structures with limited redundancy and serious consequences in case of failure. In order to minimise the likelihood of such disproportionate structural failures many modern building...... codes consider the need for robustness of structures and provide strategies and methods to obtain robustness. Therefore a structural engineer may take necessary steps to design robust structures that are insensitive to accidental circumstances. The present paper summaries issues with respect...

  5. Personal Reflections

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education. Personal Reflections. Articles in Resonance – Journal of Science Education. Volume 6 Issue 3 March 2001 pp 90-93 Personal Reflections. Why did I opt for Career in Science? Jayant V Narlikar · More Details Fulltext PDF. Volume 9 Issue 8 August 2004 pp 89-89 ...

  6. Identification of Intellectually Able Disadvantaged Filipino Children.

    Science.gov (United States)

    Naval-Severino, Teresita

    1992-01-01

    Preschool Filipino children from disadvantaged urban communities were assessed for giftedness. This article describes the identification procedures and tools used and presents a profile of the children in terms of socioeconomic, intellectual, and personality variables. (Author/JDD)

  7. 25 CFR 249.3 - Identification cards.

    Science.gov (United States)

    2010-04-01

    ... the issuance of an appropriate identification card to any Indian entitled thereto as prima facie... any Federal, State, or tribal enforcement officer shall be prima facie evidence that the person is not...

  8. Robust data reconciliation with TEMPO

    International Nuclear Information System (INIS)

    Sunde, Svein; Banati, Jozsef

    2004-03-01

    The Halden Project's TEMPO system is devised to meet the increasing challenges facing utilities in performance monitoring and optimisation, among other things due to deregulation and market liberalisation. The data reconciliation mode is an important one in the TEMPO system. Data reconciliation is a method to provide reliable estimates of process states, parameters, the state of equipment and instruments, and efficiency. Data reconciliation follows maximum likelihood principles, and is usually based on a Gaussian error model for the data. Data reconciliation thus estimates the most likely state of the process, given the heat and mass balance and the current instrument readings. If the assumption of normally (Gaussian) distributed errors in the measurements break down, as it will in the case of gross errors (outliers) in the data set, this needs to be detected by the monitoring system. TEMPO does this by computing an overall test statistic subjected to a hypothesis test, resulting in the so-called goodness-of-fit. If the goodness-of-fit takes a too low value, a fault is probably present in the process. Identifying the location of the fault is more difficult, however. With the Gaussian error model this is still possible employing a so-called serial elimination method. The serial elimination method is, however, cumbersome to use and leads to quite lengthy calculations. The present report describes the application of alternative distributions in the maximum likelihood estimation in an attempt to directly identify the location of faulty sensors. For direct identification of sensor faults significant improvements over the method based on a Gaussian error model has been achieved. However, serial elimination still leads to the highest success rate for fault identification. All results were based on Monte Carlo simulations. (Author)

  9. Robust holographic storage system design.

    Science.gov (United States)

    Watanabe, Takahiro; Watanabe, Minoru

    2011-11-21

    Demand is increasing daily for large data storage systems that are useful for applications in spacecraft, space satellites, and space robots, which are all exposed to radiation-rich space environment. As candidates for use in space embedded systems, holographic storage systems are promising because they can easily provided the demanded large-storage capability. Particularly, holographic storage systems, which have no rotation mechanism, are demanded because they are virtually maintenance-free. Although a holographic memory itself is an extremely robust device even in a space radiation environment, its associated lasers and drive circuit devices are vulnerable. Such vulnerabilities sometimes engendered severe problems that prevent reading of all contents of the holographic memory, which is a turn-off failure mode of a laser array. This paper therefore presents a proposal for a recovery method for the turn-off failure mode of a laser array on a holographic storage system, and describes results of an experimental demonstration. © 2011 Optical Society of America

  10. Efficient robust conditional random fields.

    Science.gov (United States)

    Song, Dongjin; Liu, Wei; Zhou, Tianyi; Tao, Dacheng; Meyer, David A

    2015-10-01

    Conditional random fields (CRFs) are a flexible yet powerful probabilistic approach and have shown advantages for popular applications in various areas, including text analysis, bioinformatics, and computer vision. Traditional CRF models, however, are incapable of selecting relevant features as well as suppressing noise from noisy original features. Moreover, conventional optimization methods often converge slowly in solving the training procedure of CRFs, and will degrade significantly for tasks with a large number of samples and features. In this paper, we propose robust CRFs (RCRFs) to simultaneously select relevant features. An optimal gradient method (OGM) is further designed to train RCRFs efficiently. Specifically, the proposed RCRFs employ the l1 norm of the model parameters to regularize the objective used by traditional CRFs, therefore enabling discovery of the relevant unary features and pairwise features of CRFs. In each iteration of OGM, the gradient direction is determined jointly by the current gradient together with the historical gradients, and the Lipschitz constant is leveraged to specify the proper step size. We show that an OGM can tackle the RCRF model training very efficiently, achieving the optimal convergence rate [Formula: see text] (where k is the number of iterations). This convergence rate is theoretically superior to the convergence rate O(1/k) of previous first-order optimization methods. Extensive experiments performed on three practical image segmentation tasks demonstrate the efficacy of OGM in training our proposed RCRFs.

  11. Robust boosting via convex optimization

    Science.gov (United States)

    Rätsch, Gunnar

    2001-12-01

    In this work we consider statistical learning problems. A learning machine aims to extract information from a set of training examples such that it is able to predict the associated label on unseen examples. We consider the case where the resulting classification or regression rule is a combination of simple rules - also called base hypotheses. The so-called boosting algorithms iteratively find a weighted linear combination of base hypotheses that predict well on unseen data. We address the following issues: o The statistical learning theory framework for analyzing boosting methods. We study learning theoretic guarantees on the prediction performance on unseen examples. Recently, large margin classification techniques emerged as a practical result of the theory of generalization, in particular Boosting and Support Vector Machines. A large margin implies a good generalization performance. Hence, we analyze how large the margins in boosting are and find an improved algorithm that is able to generate the maximum margin solution. o How can boosting methods be related to mathematical optimization techniques? To analyze the properties of the resulting classification or regression rule, it is of high importance to understand whether and under which conditions boosting converges. We show that boosting can be used to solve large scale constrained optimization problems, whose solutions are well characterizable. To show this, we relate boosting methods to methods known from mathematical optimization, and derive convergence guarantees for a quite general family of boosting algorithms. o How to make Boosting noise robust? One of the problems of current boosting techniques is that they are sensitive to noise in the training sample. In order to make boosting robust, we transfer the soft margin idea from support vector learning to boosting. We develop theoretically motivated regularized algorithms that exhibit a high noise robustness. o How to adapt boosting to regression problems

  12. Antisocial personalities: Measuring prevalence among offenders in ...

    African Journals Online (AJOL)

    The identification of offenders who meet the criteria for psychopathy, antisocial personality disorder or dissocial personality disorder could be of significant value to help address the violent crime crisis in South Africa. A sample of 500 male maximum security offenders was selected to determine the prevalence of these ...

  13. Cortical mechanisms of person representation: recognition of famous and personally familiar names.

    Science.gov (United States)

    Sugiura, Motoaki; Sassa, Yuko; Watanabe, Jobu; Akitsuki, Yuko; Maeda, Yasuhiro; Matsue, Yoshihiko; Fukuda, Hiroshi; Kawashima, Ryuta

    2006-06-01

    Personally familiar people are likely to be represented more richly in episodic, emotional, and behavioral contexts than famous people, who are usually represented predominantly in semantic context. To reveal cortical mechanisms supporting this differential person representation, we compared cortical activation during name recognition tasks between personally familiar and famous names, using an event-related functional magnetic resonance imaging (fMRI). Normal subjects performed familiar- or unfamiliar-name detection tasks during visual presentation of personally familiar (Personal), famous (Famous), and unfamiliar (Unfamiliar) names. The bilateral temporal poles and anterolateral temporal cortices, as well as the left temporoparietal junction, were activated in the contrasts Personal-Unfamiliar and Famous-Unfamiliar to a similar extent. The bilateral occipitotemporoparietal junctions, precuneus, and posterior cingulate cortex showed activation in the contrasts Personal-Unfamiliar and Personal-Famous. Together with previous findings, differential activation in the occipitotemporoparietal junction, precuneus, and posterior cingulate cortex between personally familiar and famous names is considered to reflect differential person representation. The similar extent of activation for personally familiar and famous names in the temporal pole and anterolateral temporal cortex is consistent with the associative role of the anterior temporal cortex in person identification, which has been conceptualized as a person identity node in many models of person identification. The left temporoparietal junction was considered to process familiar written names. The results illustrated the neural correlates of the person representation as a network of discrete regions in the bilateral posterior cortices, with the anterior temporal cortices having a unique associative role.

  14. Robust pattern decoding in shape-coded structured light

    Science.gov (United States)

    Tang, Suming; Zhang, Xu; Song, Zhan; Song, Lifang; Zeng, Hai

    2017-09-01

    Decoding is a challenging and complex problem in a coded structured light system. In this paper, a robust pattern decoding method is proposed for the shape-coded structured light in which the pattern is designed as grid shape with embedded geometrical shapes. In our decoding method, advancements are made at three steps. First, a multi-template feature detection algorithm is introduced to detect the feature point which is the intersection of each two orthogonal grid-lines. Second, pattern element identification is modelled as a supervised classification problem and the deep neural network technique is applied for the accurate classification of pattern elements. Before that, a training dataset is established, which contains a mass of pattern elements with various blurring and distortions. Third, an error correction mechanism based on epipolar constraint, coplanarity constraint and topological constraint is presented to reduce the false matches. In the experiments, several complex objects including human hand are chosen to test the accuracy and robustness of the proposed method. The experimental results show that our decoding method not only has high decoding accuracy, but also owns strong robustness to surface color and complex textures.

  15. Robust AIC with High Breakdown Scale Estimate

    Directory of Open Access Journals (Sweden)

    Shokrya Saleh

    2014-01-01

    Full Text Available Akaike Information Criterion (AIC based on least squares (LS regression minimizes the sum of the squared residuals; LS is sensitive to outlier observations. Alternative criterion, which is less sensitive to outlying observation, has been proposed; examples are robust AIC (RAIC, robust Mallows Cp (RCp, and robust Bayesian information criterion (RBIC. In this paper, we propose a robust AIC by replacing the scale estimate with a high breakdown point estimate of scale. The robustness of the proposed methods is studied through its influence function. We show that, the proposed robust AIC is effective in selecting accurate models in the presence of outliers and high leverage points, through simulated and real data examples.

  16. Multimodel Robust Control for Hydraulic Turbine

    OpenAIRE

    Osuský, Jakub; Števo, Stanislav

    2014-01-01

    The paper deals with the multimodel and robust control system design and their combination based on M-Δ structure. Controller design will be done in the frequency domain with nominal performance specified by phase margin. Hydraulic turbine model is analyzed as system with unstructured uncertainty, and robust stability condition is included in controller design. Multimodel and robust control approaches are presented in detail on hydraulic turbine model. Control design approaches are compared a...

  17. Forecasting exchange rates: a robust regression approach

    OpenAIRE

    Preminger, Arie; Franck, Raphael

    2005-01-01

    The least squares estimation method as well as other ordinary estimation method for regression models can be severely affected by a small number of outliers, thus providing poor out-of-sample forecasts. This paper suggests a robust regression approach, based on the S-estimation method, to construct forecasting models that are less sensitive to data contamination by outliers. A robust linear autoregressive (RAR) and a robust neural network (RNN) models are estimated to study the predictabil...

  18. Personal Computers.

    Science.gov (United States)

    Toong, Hoo-min D.; Gupta, Amar

    1982-01-01

    Describes the hardware, software, applications, and current proliferation of personal computers (microcomputers). Includes discussions of microprocessors, memory, output (including printers), application programs, the microcomputer industry, and major microcomputer manufacturers (Apple, Radio Shack, Commodore, and IBM). (JN)

  19. A robust cloud access scheme with mutual authentication

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2016-01-01

    Full Text Available Due to the progress of network technology, we can access some information through remote servers, and we also can save and access lots of personal data in remote servers. Therefore, to protect these data and resist unauthorized access is an important issue. Some researchers proposed authentication scheme, but there still exist some security weaknesses. This article is based on the concept of HDFS (Hadoop Distributed File System, and offers a robust authentication scheme. The proposed scheme achieves mutual authentication, prevents re-play attack, solves asynchronous issue, and prevents offline password guessing attack.

  20. Robustness: confronting lessons from physics and biology.

    Science.gov (United States)

    Lesne, Annick

    2008-11-01

    The term robustness is encountered in very different scientific fields, from engineering and control theory to dynamical systems to biology. The main question addressed herein is whether the notion of robustness and its correlates (stability, resilience, self-organisation) developed in physics are relevant to biology, or whether specific extensions and novel frameworks are required to account for the robustness properties of living systems. To clarify this issue, the different meanings covered by this unique term are discussed; it is argued that they crucially depend on the kind of perturbations that a robust system should by definition withstand. Possible mechanisms underlying robust behaviours are examined, either encountered in all natural systems (symmetries, conservation laws, dynamic stability) or specific to biological systems (feedbacks and regulatory networks). Special attention is devoted to the (sometimes counterintuitive) interrelations between robustness and noise. A distinction between dynamic selection and natural selection in the establishment of a robust behaviour is underlined. It is finally argued that nested notions of robustness, relevant to different time scales and different levels of organisation, allow one to reconcile the seemingly contradictory requirements for robustness and adaptability in living systems.

  1. Robustness of Long Span Reciprocal Timber Structures

    DEFF Research Database (Denmark)

    Balfroid, Nathalie; Kirkegaard, Poul Henning

    2011-01-01

    engineer may take necessary steps to design robust structures that are insensitive to accidental circumstances. The present paper makes a discussion of such robustness issues related to the future development of reciprocal timber structures. The paper concludes that these kind of structures can have...... a potential as long span timber structures in real projects if they are carefully designed with respect to the overall robustness strategies.......Robustness of structural systems has obtained a renewed interest due to a much more frequent use of advanced types of structures with limited redundancy and serious consequences in case of failure. The interest has also been facilitated due to recently severe structural failures...

  2. Isotope Identification

    Energy Technology Data Exchange (ETDEWEB)

    Karpius, Peter Joseph [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-18

    The objective of this training modules is to examine the process of using gamma spectroscopy for radionuclide identification; apply pattern recognition to gamma spectra; identify methods of verifying energy calibration; and discuss potential causes of isotope misidentification.

  3. Advanced neural network-based computational schemes for robust fault diagnosis

    CERN Document Server

    Mrugalski, Marcin

    2014-01-01

    The present book is devoted to problems of adaptation of artificial neural networks to robust fault diagnosis schemes. It presents neural networks-based modelling and estimation techniques used for designing robust fault diagnosis schemes for non-linear dynamic systems. A part of the book focuses on fundamental issues such as architectures of dynamic neural networks, methods for designing of neural networks and fault diagnosis schemes as well as the importance of robustness. The book is of a tutorial value and can be perceived as a good starting point for the new-comers to this field. The book is also devoted to advanced schemes of description of neural model uncertainty. In particular, the methods of computation of neural networks uncertainty with robust parameter estimation are presented. Moreover, a novel approach for system identification with the state-space GMDH neural network is delivered. All the concepts described in this book are illustrated by both simple academic illustrative examples and practica...

  4. Plug and Play Robust Distributed Control with Ellipsoidal Parametric Uncertainty System

    Directory of Open Access Journals (Sweden)

    Hong Wang-jian

    2016-01-01

    Full Text Available We consider a continuous linear time invariant system with ellipsoidal parametric uncertainty structured into subsystems. Since the design of a local controller uses only information on a subsystem and its neighbours, we combine the plug and play idea and robust distributed control to propose one distributed control strategy for linear system with ellipsoidal parametric uncertainty. Firstly for linear system with ellipsoidal parametric uncertainty, a necessary and sufficient condition for robust state feedback control is proposed by means of linear matrix inequality. If this necessary and sufficient condition is satisfied, this robust state feedback gain matrix can be easily derived to guarantee robust stability and prescribed closed loop performance. Secondly the plug and play idea is introduced in the design process. Finally by one example of aircraft flutter model parameter identification, the efficiency of the proposed control strategy can be easily realized.

  5. Integrating personality structure, personality process, and personality development

    NARCIS (Netherlands)

    Baumert, Anna; Schmitt, Manfred; Perugini, Marco; Johnson, Wendy; Blum, Gabriela; Borkenau, Peter; Costantini, Giulio; Denissen, J.J.A.; Fleeson, William; Grafton, Ben; Jayawickreme, Eranda; Kurzius, Elena; MacLeod, Colin; Miller, Lynn C.; Read, Stephen J.; Robinson, Michael D.; Wood, Dustin; Wrzus, Cornelia

    2017-01-01

    In this target article, we argue that personality processes, personality structure, and personality development have to be understood and investigated in integrated ways in order to provide comprehensive responses to the key questions of personality psychology. The psychological processes and

  6. Implicitly Weighted Methods in Robust Image Analysis

    Czech Academy of Sciences Publication Activity Database

    Kalina, Jan

    2012-01-01

    Roč. 44, č. 3 (2012), s. 449-462 ISSN 0924-9907 R&D Projects: GA MŠk(CZ) 1M06014 Institutional research plan: CEZ:AV0Z10300504 Keywords : robustness * high breakdown point * outlier detection * robust correlation analysis * template matching * face recognition Subject RIV: BB - Applied Statistics, Operational Research Impact factor: 1.767, year: 2012

  7. What is it to be sturdy (robust)?

    DEFF Research Database (Denmark)

    Nielsen, Niss Skov; Zwisler, Lars Pagter; Bojsen, Ann Kristina Mikkelsen

    Purpose: This paper intends to give a first insight into the concept of being "sturdy/robust"; To develop and test a Danish model of how to measure sturdi-ness/robustness; To test the scale's ability to identify people in emergency situa-tions who have high risk of developing psychological illness....

  8. Structural Robustness Evaluation of Offshore Wind Turbines

    DEFF Research Database (Denmark)

    Giuliani, Luisa; Bontempi, Franco

    2010-01-01

    in the framework of a safe design: it depends on different factors, like exposure, vulnerability and robustness. Particularly, the requirement of structural vulnerability and robustness are discussed in this paper and a numerical application is presented, in order to evaluate the effects of a ship collision...

  9. In Silico Design of Robust Bolalipid Membranes

    NARCIS (Netherlands)

    Bulacu, Monica; Periole, Xavier; Marrink, Siewert J.; Périole, Xavier

    The robustness of microorganisms used in industrial fermentations is essential for the efficiency and yield of the production process. A viable tool to increase the robustness is through engineering of the cell membrane and especially by incorporating lipids from species that survive under harsh

  10. Assessment of Process Robustness for Mass Customization

    DEFF Research Database (Denmark)

    Nielsen, Kjeld; Brunø, Thomas Ditlev

    2013-01-01

    robustness and their capability to develop it. Through literature study and analysis of robust process design characteristics a number of metrics are described which can be used for assessment. The metrics are evaluated and analyzed to be applied as KPI’s to help MC companies prioritize efforts in business...

  11. Applying Robust Design in an Industrial Context

    DEFF Research Database (Denmark)

    Christensen, Martin Ebro

    mechanical architectures. Furthermore a set of 15 robust design principles for reducing the variation in functional performance is compiled in a format directly supporting the work of the design engineer. With these foundational methods in place, the existing tools, methods and KPIs of Robust Design...

  12. The importance of robust design methodology

    DEFF Research Database (Denmark)

    Eifler, Tobias; Howard, Thomas J.

    2018-01-01

    infamous recalls in automotive history, that of the GM ignition switch, from the perspective of Robust Design. It is investigated if available Robust Design methods such as sensitivity analysis, tolerance stack-ups, design clarity, etc. would have been suitable to account for the performance variation...

  13. Robust Control Charts for Time Series Data

    NARCIS (Netherlands)

    Croux, C.; Gelper, S.; Mahieu, K.

    2010-01-01

    This article presents a control chart for time series data, based on the one-step- ahead forecast errors of the Holt-Winters forecasting method. We use robust techniques to prevent that outliers affect the estimation of the control limits of the chart. Moreover, robustness is important to maintain

  14. Efficient reanalysis techniques for robust topology optimization

    DEFF Research Database (Denmark)

    Amir, Oded; Sigmund, Ole; Lazarov, Boyan Stefanov

    2012-01-01

    efficient robust topology optimization procedures based on reanalysis techniques. The approach is demonstrated on two compliant mechanism design problems where robust design is achieved by employing either a worst case formulation or a stochastic formulation. It is shown that the time spent on finite...

  15. Extending the Scope of Robust Quadratic Optimization

    NARCIS (Netherlands)

    Marandi, Ahmadreza; Ben-Tal, A.; den Hertog, Dick; Melenberg, Bertrand

    In this paper, we derive tractable reformulations of the robust counterparts of convex quadratic and conic quadratic constraints with concave uncertainties for a broad range of uncertainty sets. For quadratic constraints with convex uncertainty, it is well-known that the robust counterpart is, in

  16. Security and robustness for collaborative monitors

    NARCIS (Netherlands)

    Testerink, Bas; Bulling, Nils; Dastani, Mehdi

    2016-01-01

    Decentralized monitors can be subject to robustness and security risks. Robustness risks include attacks on the monitor’s infrastructure in order to disable parts of its functionality. Security risks include attacks that try to extract information from the monitor and thereby possibly leak sensitive

  17. How Robust is Your System Resilience?

    Science.gov (United States)

    Homayounfar, M.; Muneepeerakul, R.

    2017-12-01

    Robustness and resilience are concepts in system thinking that have grown in importance and popularity. For many complex social-ecological systems, however, robustness and resilience are difficult to quantify and the connections and trade-offs between them difficult to study. Most studies have either focused on qualitative approaches to discuss their connections or considered only one of them under particular classes of disturbances. In this study, we present an analytical framework to address the linkage between robustness and resilience more systematically. Our analysis is based on a stylized dynamical model that operationalizes a widely used concept framework for social-ecological systems. The model enables us to rigorously define robustness and resilience and consequently investigate their connections. The results reveal the tradeoffs among performance, robustness, and resilience. They also show how the nature of the such tradeoffs varies with the choices of certain policies (e.g., taxation and investment in public infrastructure), internal stresses and external disturbances.

  18. A Survey on Robustness in Railway Planning

    DEFF Research Database (Denmark)

    Lusby, Richard Martin; Larsen, Jesper; Bull, Simon Henry

    2018-01-01

    Planning problems in passenger railway range from long term strategic decision making to the detailed planning of operations.Operations research methods have played an increasing role in this planning process. However, recently more attention has been given to considerations of robustness...... in the quality of solutions to individual planning problems, and of operations in general. Robustness in general is the capacity for some system to absorb or resist changes. In the context of railway robustness it is often taken to be the capacity for operations to continue at some level when faced...... with a disruption such as delay or failure. This has resulted in more attention given to the inclusion of robustness measures and objectives in individual planning problems, and to the providing of tools to ensure operations continue under disrupted situations. In this paper we survey the literature on robustness...

  19. International Conference on Robust Statistics 2015

    CERN Document Server

    Basu, Ayanendranath; Filzmoser, Peter; Mukherjee, Diganta

    2016-01-01

    This book offers a collection of recent contributions and emerging ideas in the areas of robust statistics presented at the International Conference on Robust Statistics 2015 (ICORS 2015) held in Kolkata during 12–16 January, 2015. The book explores the applicability of robust methods in other non-traditional areas which includes the use of new techniques such as skew and mixture of skew distributions, scaled Bregman divergences, and multilevel functional data methods; application areas being circular data models and prediction of mortality and life expectancy. The contributions are of both theoretical as well as applied in nature. Robust statistics is a relatively young branch of statistical sciences that is rapidly emerging as the bedrock of statistical analysis in the 21st century due to its flexible nature and wide scope. Robust statistics supports the application of parametric and other inference techniques over a broader domain than the strictly interpreted model scenarios employed in classical statis...

  20. Personality disorder

    DEFF Research Database (Denmark)

    Tyrer, Peter; Mulder, Roger; Crawford, Mike

    2010-01-01

    and to society, and interferes, usually negatively, with progress in the treatment of other mental disorders. We now have evidence that personality disorder, as currently classified, affects around 6% of the world population, and the differences between countries show no consistent variation. We are also getting......Personality disorder is now being accepted as an important condition in mainstream psychiatry across the world. Although it often remains unrecognized in ordinary practice, research studies have shown it is common, creates considerable morbidity, is associated with high costs to services...... increasing evidence that some treatments, mainly psychological, are of value in this group of disorders. What is now needed is a new classification that is of greater value to clinicians, and the WPA Section on Personality Disorders is currently undertaking this task....

  1. Personality disorders

    DEFF Research Database (Denmark)

    Simonsen, Sebastian; Heinskou, Torben; Sørensen, Per

    2017-01-01

    BACKGROUND: In this naturalistic study, patients with personality disorders (N = 388) treated at Stolpegaard Psychotherapy Center, Mental Health Services, Capital Region of Denmark were allocated to two different kinds of treatment: a standardized treatment package with a preset number of treatment...... characteristics associated with clinicians' allocation of patients to the two different personality disorder services. METHODS: Patient characteristics across eight domains were collected in order to study whether there were systematic differences between patients allocated to the two different treatments....... Patient characteristics included measures of symptom severity, personality pathology, trauma and socio-demographic characteristics. Significance testing and binary regression analysis were applied to identify important predictors. RESULTS: Patient characteristics on fifteen variables differed...

  2. Determining robust impacts of land-use induced land-cover changes on surface climate over North America and Eurasia; Results from the first set of LUCID experiments

    NARCIS (Netherlands)

    Noblet-Ducoudré, de N.; Boisier, J.P.; Pitman, A.; Bonan, G.B.; Brovkin, V.; Cruz, F.; Delire, C.; Gayler, V.; Hurk, van den B.J.J.M.; Lawrence, P.J.; Molen, van der M.K.; Müller, C.; Reick, C.H.; Strengers, B.J.; Voldoire, A.

    2012-01-01

    The project Land-Use and Climate, Identification of Robust Impacts (LUCID) was conceived to address the robustness of biogeophysical impacts of historical land use–land cover change (LULCC). LUCID used seven atmosphere–land models with a common experimental design to explore those impacts of LULCC

  3. Tumor Slice Culture: A New Avatar in Personalized Oncology

    Science.gov (United States)

    2017-08-01

    Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden...Achilles heel of personalized oncology. The objective of this proposal is to establish a robust, efficient, reproducible platform to interrogate drug...establish a robust, efficient, reproducible platform to interrogate the response of a given tumor to drugs (cytotoxics, kinase inhibitors, immune

  4. Personalized ventilation

    DEFF Research Database (Denmark)

    Melikov, Arsen Krikor

    2004-01-01

    microenvironment. Furthermore, HVAC systems should be designed to protect occupants from airborne transmission of infectious agents that may be present in exhaled air. Personalized ventilation is a new development in the field of HVAC and has the potential to fulfill the above requirements. This paper reviews...... existing knowledge on performance of personalized ventilation (PV) and on human response to it. The airflow interaction in the vicinity of the human body is analyzed and its impact on thermal comfort and inhaled air quality is discussed together with control strategies and the application of PV in practice...

  5. Personality disorders

    NARCIS (Netherlands)

    van den Bosch, L.M.C.; Verheul, R.; Verster, J.C.; Brady, K.; Galanter, M.; Conrod, P.

    2012-01-01

    Subject of this chapter is the often found combination of personality disorders and ­substance abuse disorders. The serious nature of this comorbidity is shown through the discussion of prevalence and epidemiological data. Literature shows that the comorbidity, hampering the diagnostic process, is

  6. Personalized nanomedicine

    NARCIS (Netherlands)

    Lammers, Twan Gerardus Gertudis Maria; Rizzo, L.Y.; Storm, Gerrit; Kiessling, F.

    2012-01-01

    Abstract Personalized medicine aims to individualize chemotherapeutic interventions on the basis of ex vivo and in vivo information on patient- and disease-specific characteristics. By noninvasively visualizing how well image-guided nanomedicines-that is, submicrometer-sized drug delivery systems

  7. Robust recognition via information theoretic learning

    CERN Document Server

    He, Ran; Yuan, Xiaotong; Wang, Liang

    2014-01-01

    This Springer Brief represents a comprehensive review of information theoretic methods for robust recognition. A variety of information theoretic methods have been proffered in the past decade, in a large variety of computer vision applications; this work brings them together, attempts to impart the theory, optimization and usage of information entropy.The?authors?resort to a new information theoretic concept, correntropy, as a robust measure and apply it to solve robust face recognition and object recognition problems. For computational efficiency,?the brief?introduces the additive and multip

  8. Robust statistics and geochemical data analysis

    International Nuclear Information System (INIS)

    Di, Z.

    1987-01-01

    Advantages of robust procedures over ordinary least-squares procedures in geochemical data analysis is demonstrated using NURE data from the Hot Springs Quadrangle, South Dakota, USA. Robust principal components analysis with 5% multivariate trimming successfully guarded the analysis against perturbations by outliers and increased the number of interpretable factors. Regression with SINE estimates significantly increased the goodness-of-fit of the regression and improved the correspondence of delineated anomalies with known uranium prospects. Because of the ubiquitous existence of outliers in geochemical data, robust statistical procedures are suggested as routine procedures to replace ordinary least-squares procedures

  9. Design Robust Controller for Rotary Kiln

    Directory of Open Access Journals (Sweden)

    Omar D. Hernández-Arboleda

    2013-11-01

    Full Text Available This paper presents the design of a robust controller for a rotary kiln. The designed controller is a combination of a fractional PID and linear quadratic regulator (LQR, these are not used to control the kiln until now, in addition robustness criteria are evaluated (gain margin, phase margin, strength gain, rejecting high frequency noise and sensitivity applied to the entire model (controller-plant, obtaining good results with a frequency range of 0.020 to 90 rad/s, which contributes to the robustness of the system.

  10. Towards distortion-free robust image authentication

    International Nuclear Information System (INIS)

    Coltuc, D

    2007-01-01

    This paper investigates a general framework for distortion-free robust image authentication by multiple marking. First, by robust watermarking a subsampled version of image edges is embedded. Then, by reversible watermarking the information needed to recover the original image is inserted, too. The hiding capacity of the reversible watermarking is the essential requirement for this approach. Thus in case of no attacks not only image is authenticated but also the original is exactly recovered. In case of attacks, reversibility is lost, but image can still be authenticated. Preliminary results providing very good robustness against JPEG compression are presented

  11. An Overview of the Adaptive Robust DFT

    Directory of Open Access Journals (Sweden)

    Djurović Igor

    2010-01-01

    Full Text Available Abstract This paper overviews basic principles and applications of the robust DFT (RDFT approach, which is used for robust processing of frequency-modulated (FM signals embedded in non-Gaussian heavy-tailed noise. In particular, we concentrate on the spectral analysis and filtering of signals corrupted by impulsive distortions using adaptive and nonadaptive robust estimators. Several adaptive estimators of location parameter are considered, and it is shown that their application is preferable with respect to non-adaptive counterparts. This fact is demonstrated by efficiency comparison of adaptive and nonadaptive RDFT methods for different noise environments.

  12. A robust interpretation of duration calculus

    DEFF Research Database (Denmark)

    Franzle, M.; Hansen, Michael Reichhardt

    2005-01-01

    We transfer the concept of robust interpretation from arithmetic first-order theories to metric-time temporal logics. The idea is that the interpretation of a formula is robust iff its truth value does not change under small variation of the constants in the formula. Exemplifying this on Duration...... Calculus (DC), our findings are that the robust interpretation of DC is equivalent to a multi-valued interpretation that uses the real numbers as semantic domain and assigns Lipschitz-continuous interpretations to all operators of DC. Furthermore, this continuity permits approximation between discrete...

  13. REINA at CLEF 2007 Robust Task

    OpenAIRE

    Zazo Rodríguez, Ángel Francisco; Figuerola, Carlos G.; Alonso Berrocal, José Luis

    2007-01-01

    This paper describes our work at CLEF 2007 Robust Task. We have participated in the monolingual (English, French and Portuguese) and the bilingual (English to French) subtask. At CLEF 2006 our research group obtained very good results applying local query expansion using windows of terms in the robust task. This year we have used the same expansion technique, but taking into account some criteria of robustness: MAP, GMAP, MMR, GS@10, P@10, number of failed topics, number of topics bellow 0.1 ...

  14. REINA at CLEF 2007 Robust Track (2007)

    OpenAIRE

    Zazo, Ángel F.; G.-Figuerola, Carlos; Alonso-Berrocal, José-Luis

    2007-01-01

    This paper describes our work at CLEF 2007 Robust Task. We have participated in the monolingual (English, French and Portuguese) and the bilingual (English to French) subtask. At CLEF 2006 our research group obtained very good results applying local query expansion using windows of terms in the robust task. This year we have used the same expansion technique, but taking into account some criteria of robustness: MAP, GMAP, MMR, GS@10, P@10, number of failed topics, number of topics bellow 0.1 ...

  15. Danish Requirements for Robustness of Structures

    DEFF Research Database (Denmark)

    Sørensen, John Dalsgaard; Christensen, H. H.

    2006-01-01

    . This paper describes the background of the revised robustness requirements implemented in the Danish Code of Practice for Safety of Structures in 2003 [1, 2, 3]. According to the Danish design rules robustness shall be documented for all structures where consequences of failure are serious. This paper...... describes the background of the design procedure in the Danish codes, which shall be followed in order to document sufficient robustness in the following steps: Step 1: review of loads and possible failure modes/scenarios and determination of acceptable collapse extent. Step 2: review of the structural...

  16. Robustness-related issues in speaker recognition

    CERN Document Server

    Zheng, Thomas Fang

    2017-01-01

    This book presents an overview of speaker recognition technologies with an emphasis on dealing with robustness issues. Firstly, the book gives an overview of speaker recognition, such as the basic system framework, categories under different criteria, performance evaluation and its development history. Secondly, with regard to robustness issues, the book presents three categories, including environment-related issues, speaker-related issues and application-oriented issues. For each category, the book describes the current hot topics, existing technologies, and potential research focuses in the future. The book is a useful reference book and self-learning guide for early researchers working in the field of robust speech recognition.

  17. Robustness and structure of complex networks

    Science.gov (United States)

    Shao, Shuai

    This dissertation covers the two major parts of my PhD research on statistical physics and complex networks: i) modeling a new type of attack -- localized attack, and investigating robustness of complex networks under this type of attack; ii) discovering the clustering structure in complex networks and its influence on the robustness of coupled networks. Complex networks appear in every aspect of our daily life and are widely studied in Physics, Mathematics, Biology, and Computer Science. One important property of complex networks is their robustness under attacks, which depends crucially on the nature of attacks and the structure of the networks themselves. Previous studies have focused on two types of attack: random attack and targeted attack, which, however, are insufficient to describe many real-world damages. Here we propose a new type of attack -- localized attack, and study the robustness of complex networks under this type of attack, both analytically and via simulation. On the other hand, we also study the clustering structure in the network, and its influence on the robustness of a complex network system. In the first part, we propose a theoretical framework to study the robustness of complex networks under localized attack based on percolation theory and generating function method. We investigate the percolation properties, including the critical threshold of the phase transition pc and the size of the giant component Pinfinity. We compare localized attack with random attack and find that while random regular (RR) networks are more robust against localized attack, Erdoḧs-Renyi (ER) networks are equally robust under both types of attacks. As for scale-free (SF) networks, their robustness depends crucially on the degree exponent lambda. The simulation results show perfect agreement with theoretical predictions. We also test our model on two real-world networks: a peer-to-peer computer network and an airline network, and find that the real-world networks

  18. Robust Structured Control Design via LMI Optimization

    DEFF Research Database (Denmark)

    Adegas, Fabiano Daher; Stoustrup, Jakob

    2011-01-01

    This paper presents a new procedure for discrete-time robust structured control design. Parameter-dependent nonconvex conditions for stabilizable and induced L2-norm performance controllers are solved by an iterative linear matrix inequalities (LMI) optimization. A wide class of controller...... structures including decentralized of any order, fixed-order dynamic output feedback, static output feedback can be designed robust to polytopic uncertainties. Stability is proven by a parameter-dependent Lyapunov function. Numerical examples on robust stability margins shows that the proposed procedure can...

  19. Information about robustness, reliability and safety in early design phases

    DEFF Research Database (Denmark)

    Marini, Vinicius Kaster

    methods, and an industrial case to assess how the use of information about robustness, reliability and safety as practised by current methods influences concept development. Current methods cannot be used in early design phases due to their dependence on detailed design information for the identification...... alternatives. This prompts designers to reuse working principles that are inherently flawed, as they are liable to disturbances, failures and hazards. To address this issue, an approach based upon individual records of early design issues consists of comparing failures and benefits from prior working...... principles, before making a decision, and improving the more suitable alternatives through this feedback. Workshops were conducted with design practitioners to evaluate the potential of the approach and to simulate decision-making and gain feedback on a proof-of-concept basis. The evaluation has demonstrated...

  20. Cost-Sensitive Learning for Emotion Robust Speaker Recognition

    Directory of Open Access Journals (Sweden)

    Dongdong Li

    2014-01-01

    Full Text Available In the field of information security, voice is one of the most important parts in biometrics. Especially, with the development of voice communication through the Internet or telephone system, huge voice data resources are accessed. In speaker recognition, voiceprint can be applied as the unique password for the user to prove his/her identity. However, speech with various emotions can cause an unacceptably high error rate and aggravate the performance of speaker recognition system. This paper deals with this problem by introducing a cost-sensitive learning technology to reweight the probability of test affective utterances in the pitch envelop level, which can enhance the robustness in emotion-dependent speaker recognition effectively. Based on that technology, a new architecture of recognition system as well as its components is proposed in this paper. The experiment conducted on the Mandarin Affective Speech Corpus shows that an improvement of 8% identification rate over the traditional speaker recognition is achieved.

  1. Cost-sensitive learning for emotion robust speaker recognition.

    Science.gov (United States)

    Li, Dongdong; Yang, Yingchun; Dai, Weihui

    2014-01-01

    In the field of information security, voice is one of the most important parts in biometrics. Especially, with the development of voice communication through the Internet or telephone system, huge voice data resources are accessed. In speaker recognition, voiceprint can be applied as the unique password for the user to prove his/her identity. However, speech with various emotions can cause an unacceptably high error rate and aggravate the performance of speaker recognition system. This paper deals with this problem by introducing a cost-sensitive learning technology to reweight the probability of test affective utterances in the pitch envelop level, which can enhance the robustness in emotion-dependent speaker recognition effectively. Based on that technology, a new architecture of recognition system as well as its components is proposed in this paper. The experiment conducted on the Mandarin Affective Speech Corpus shows that an improvement of 8% identification rate over the traditional speaker recognition is achieved.

  2. Information fusion in personal biometric authentication based on the iris pattern

    International Nuclear Information System (INIS)

    Wang, Fenghua; Han, Jiuqiang

    2009-01-01

    Information fusion in biometrics has received considerable attention. This paper focuses on the application of information fusion techniques in iris recognition. To improve the reliability and accuracy of personal identification based on the iris pattern, this paper proposes the schemes of multialgorithmic fusion and multiinstance fusion. Multialgorithmic fusion integrates the improved phase algorithm and the DCT-based algorithm, and multiinstance fusion combines information from the left iris and the right iris of an individual. Both multialgorithmic fusion and multiinstance fusion are carried out at the matching score level and the support vector machine (SVM)-based fusion rule is utilized to generate fused scores for final decision. The experimental results on the noisy iris database UBIRIS demonstrate that the proposed fusion schemes can perform better than the single recognition systems, and further prove that information fusion techniques are feasible and effective to improve the accuracy and robustness of iris recognition especially under noisy conditions

  3. Robust synthesis for real-time systems

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand; Legay, Axel; Traonouez, Luois-Marie

    2014-01-01

    Specification theories for real-time systems allow reasoning about interfaces and their implementation models, using a set of operators that includes satisfaction, refinement, logical and parallel composition. To make such theories applicable throughout the entire design process from an abstract...... of introducing small perturbations into formal models. We address this problem of robust implementations in timed specification theories. We first consider a fixed perturbation and study the robustness of timed specifications with respect to the operators of the theory. To this end we synthesize robust...... specification to an implementation, we need to reason about the possibility to effectively implement the theoretical specifications on physical systems, despite their limited precision. In the literature, this implementation problem has been linked to the robustness problem that analyzes the consequences...

  4. Robust adaptive synchronization of general dynamical networks ...

    Indian Academy of Sciences (India)

    Robust adaptive synchronization; dynamical network; multiple delays; multiple uncertainties. ... Networks such as neural networks, communication transmission networks, social rela- tionship networks etc. ..... a very good effect. Pramana – J.

  5. Technical Challenges Hindering Development of Robust Wireless ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2015-12-01

    Dec 1, 2015 ... challenges remain to be resolved, in designing robust wireless networks that can deliver the performance ... demonstrated the first radio transmission from the Isle of ... distances with better quality, less power, and smaller ...

  6. Multifidelity Robust Aeroelastic Design, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Nielsen Engineering & Research (NEAR) proposes a new method to generate mathematical models of wind-tunnel models and flight vehicles for robust aeroelastic...

  7. The structural robustness of multiprocessor computing system

    Directory of Open Access Journals (Sweden)

    N. Andronaty

    1996-03-01

    Full Text Available The model of the multiprocessor computing system on the base of transputers which permits to resolve the question of valuation of a structural robustness (viability, survivability is described.

  8. Design principles for robust oscillatory behavior.

    Science.gov (United States)

    Castillo-Hair, Sebastian M; Villota, Elizabeth R; Coronado, Alberto M

    2015-09-01

    Oscillatory responses are ubiquitous in regulatory networks of living organisms, a fact that has led to extensive efforts to study and replicate the circuits involved. However, to date, design principles that underlie the robustness of natural oscillators are not completely known. Here we study a three-component enzymatic network model in order to determine the topological requirements for robust oscillation. First, by simulating every possible topological arrangement and varying their parameter values, we demonstrate that robust oscillators can be obtained by augmenting the number of both negative feedback loops and positive autoregulations while maintaining an appropriate balance of positive and negative interactions. We then identify network motifs, whose presence in more complex topologies is a necessary condition for obtaining oscillatory responses. Finally, we pinpoint a series of simple architectural patterns that progressively render more robust oscillators. Together, these findings can help in the design of more reliable synthetic biomolecular networks and may also have implications in the understanding of other oscillatory systems.

  9. Robust and Efficient Parametric Face Alignment

    NARCIS (Netherlands)

    Tzimiropoulos, Georgios; Zafeiriou, Stefanos; Pantic, Maja

    2011-01-01

    We propose a correlation-based approach to parametric object alignment particularly suitable for face analysis applications which require efficiency and robustness against occlusions and illumination changes. Our algorithm registers two images by iteratively maximizing their correlation coefficient

  10. Framework for Robustness Assessment of Timber Structures

    DEFF Research Database (Denmark)

    Sørensen, John Dalsgaard

    2011-01-01

    This paper presents a theoretical framework for the design and analysis of robustness of timber structures. This is actualized by a more4 frequent use of advanced types of timber structures with limited redundancy and serious consequences in the case of failure. Combined with increased requirements...... to efficiency in design and execution followed by increased risk of human errors has made the need of requirements to robustness of new structures essential. Further, the collapse of the Ballerup Super Arena, the bad Reichenhall Ice-Arena and a number of other structural systems during the last 10 years has...... increased the interest in robustness. Typically, modern structural design codes require that ‘the consequence of damages to structures should not be disproportional to the causes of the damages’. However, although the importance of robustness for structural design is widely recognized, the code requirements...

  11. Robust Analysis and Design of Multivariable Systems

    National Research Council Canada - National Science Library

    Tannenbaum, Allen

    1998-01-01

    In this Final Report, we will describe the work we have performed in robust control theory and nonlinear control, and the utilization of techniques in image processing and computer vision for problems in visual tracking...

  12. Robust Tracking Control for a Piezoelectric Actuator

    National Research Council Canada - National Science Library

    Salah, M; McIntyre, M; Dawson, D; Wagner, J

    2006-01-01

    In this paper, a hysteresis model-based nonlinear robust controller is developed for a piezoelectric actuator, utilizing a Lyapunov-based stability analysis, which ensures that a desired displacement...

  13. Robustness studies on coal gasification process variables

    African Journals Online (AJOL)

    coal before feeding to the gasification process [1]. .... to-control variables will make up the terms in the response surface model for the ... Montgomery (1999) explained that all the Taguchi engineering objectives for a robust ..... software [3].

  14. Personal Beacon

    Science.gov (United States)

    2000-01-01

    The MicroPLB (personal locator beacon) is a search and rescue satellite-aided tracking (SARSAT) transmitter. When activated it emits a distress signal to a constellation of internationally operated satellites. The endangered person's identity and location anywhere on Earth is automatically forwarded to central monitoring stations around the world. It is accurate to within just a few meters. The user uses the device to download navigation data from a global positioning satellite receiver. After the download is complete, the MicroPLB functions as a self-locating beacon. Also, it is the only PLB to use a safe battery. In the past, other PLB devices have used batteries that have enough volatility to explode with extreme force. It was developed by Microwave Monolithic, Inc. through SBIR funding from Glenn Research Center and Goddard Space Flight Center.

  15. Personalized Search

    CERN Document Server

    AUTHOR|(SzGeCERN)749939

    2015-01-01

    As the volume of electronically available information grows, relevant items become harder to find. This work presents an approach to personalizing search results in scientific publication databases. This work focuses on re-ranking search results from existing search engines like Solr or ElasticSearch. This work also includes the development of Obelix, a new recommendation system used to re-rank search results. The project was proposed and performed at CERN, using the scientific publications available on the CERN Document Server (CDS). This work experiments with re-ranking using offline and online evaluation of users and documents in CDS. The experiments conclude that the personalized search result outperform both latest first and word similarity in terms of click position in the search result for global search in CDS.

  16. Antecedents and Dimensions of Supply Chain Robustness

    OpenAIRE

    Durach, Christian F.; Wieland, Andreas; Machuca, Jose A.D.

    2015-01-01

    Purpose – The purpose of this paper is to provide groundwork for an emerging theory of supply chain robustness – which has been conceptualized as a dimension of supply chain resilience – through reviewing and synthesizing related yet disconnected studies. The paper develops a formal definition of supply chain robustness to build a framework that captures the dimensions, antecedents and moderators of the construct as discussed in the literature. Design/methodology/approach – The...

  17. A Unifying Mathematical Framework for Genetic Robustness, Environmental Robustness, Network Robustness and their Trade-offs on Phenotype Robustness in Biological Networks. Part III: Synthetic Gene Networks in Synthetic Biology

    Science.gov (United States)

    Chen, Bor-Sen; Lin, Ying-Po

    2013-01-01

    Robust stabilization and environmental disturbance attenuation are ubiquitous systematic properties that are observed in biological systems at many different levels. The underlying principles for robust stabilization and environmental disturbance attenuation are universal to both complex biological systems and sophisticated engineering systems. In many biological networks, network robustness should be large enough to confer: intrinsic robustness for tolerating intrinsic parameter fluctuations; genetic robustness for buffering genetic variations; and environmental robustness for resisting environmental disturbances. Network robustness is needed so phenotype stability of biological network can be maintained, guaranteeing phenotype robustness. Synthetic biology is foreseen to have important applications in biotechnology and medicine; it is expected to contribute significantly to a better understanding of functioning of complex biological systems. This paper presents a unifying mathematical framework for investigating the principles of both robust stabilization and environmental disturbance attenuation for synthetic gene networks in synthetic biology. Further, from the unifying mathematical framework, we found that the phenotype robustness criterion for synthetic gene networks is the following: if intrinsic robustness + genetic robustness + environmental robustness ≦ network robustness, then the phenotype robustness can be maintained in spite of intrinsic parameter fluctuations, genetic variations, and environmental disturbances. Therefore, the trade-offs between intrinsic robustness, genetic robustness, environmental robustness, and network robustness in synthetic biology can also be investigated through corresponding phenotype robustness criteria from the systematic point of view. Finally, a robust synthetic design that involves network evolution algorithms with desired behavior under intrinsic parameter fluctuations, genetic variations, and environmental

  18. Adaptive Critic Nonlinear Robust Control: A Survey.

    Science.gov (United States)

    Wang, Ding; He, Haibo; Liu, Derong

    2017-10-01

    Adaptive dynamic programming (ADP) and reinforcement learning are quite relevant to each other when performing intelligent optimization. They are both regarded as promising methods involving important components of evaluation and improvement, at the background of information technology, such as artificial intelligence, big data, and deep learning. Although great progresses have been achieved and surveyed when addressing nonlinear optimal control problems, the research on robustness of ADP-based control strategies under uncertain environment has not been fully summarized. Hence, this survey reviews the recent main results of adaptive-critic-based robust control design of continuous-time nonlinear systems. The ADP-based nonlinear optimal regulation is reviewed, followed by robust stabilization of nonlinear systems with matched uncertainties, guaranteed cost control design of unmatched plants, and decentralized stabilization of interconnected systems. Additionally, further comprehensive discussions are presented, including event-based robust control design, improvement of the critic learning rule, nonlinear H ∞ control design, and several notes on future perspectives. By applying the ADP-based optimal and robust control methods to a practical power system and an overhead crane plant, two typical examples are provided to verify the effectiveness of theoretical results. Overall, this survey is beneficial to promote the development of adaptive critic control methods with robustness guarantee and the construction of higher level intelligent systems.

  19. A robust methodology for modal parameters estimation applied to SHM

    Science.gov (United States)

    Cardoso, Rharã; Cury, Alexandre; Barbosa, Flávio

    2017-10-01

    The subject of structural health monitoring is drawing more and more attention over the last years. Many vibration-based techniques aiming at detecting small structural changes or even damage have been developed or enhanced through successive researches. Lately, several studies have focused on the use of raw dynamic data to assess information about structural condition. Despite this trend and much skepticism, many methods still rely on the use of modal parameters as fundamental data for damage detection. Therefore, it is of utmost importance that modal identification procedures are performed with a sufficient level of precision and automation. To fulfill these requirements, this paper presents a novel automated time-domain methodology to identify modal parameters based on a two-step clustering analysis. The first step consists in clustering modes estimates from parametric models of different orders, usually presented in stabilization diagrams. In an automated manner, the first clustering analysis indicates which estimates correspond to physical modes. To circumvent the detection of spurious modes or the loss of physical ones, a second clustering step is then performed. The second step consists in the data mining of information gathered from the first step. To attest the robustness and efficiency of the proposed methodology, numerically generated signals as well as experimental data obtained from a simply supported beam tested in laboratory and from a railway bridge are utilized. The results appeared to be more robust and accurate comparing to those obtained from methods based on one-step clustering analysis.

  20. Studies of stability and robustness for artificial neural networks and boosted decision trees

    International Nuclear Information System (INIS)

    Yang, H.-J.; Roe, Byron P.; Zhu Ji

    2007-01-01

    In this paper, we compare the performance, stability and robustness of Artificial Neural Networks (ANN) and Boosted Decision Trees (BDT) using MiniBooNE Monte Carlo samples. These methods attempt to classify events given a number of identification variables. The BDT algorithm has been discussed by us in previous publications. Testing is done in this paper by smearing and shifting the input variables of testing samples. Based on these studies, BDT has better particle identification performance than ANN. The degradation of the classifications obtained by shifting or smearing variables of testing results is smaller for BDT than for ANN

  1. [Circulating tumor cells: cornerstone of personalized medicine].

    Science.gov (United States)

    Rafii, A; Vidal, F; Rathat, G; Alix-Panabières, C

    2014-11-01

    Cancer treatment has evolved toward personalized medicine. It is mandatory for clinicians to ascertain tumor biological features in order to optimize patients' treatment. Identification and characterization of circulating tumor cells demonstrated a prognostic value in many solid tumors. Here, we describe the main technologies for identification and characterization of circulating tumor cells and their clinical application in gynecologic and breast cancers. Copyright © 2014. Published by Elsevier Masson SAS.

  2. High-accuracy and robust face recognition system based on optical parallel correlator using a temporal image sequence

    Science.gov (United States)

    Watanabe, Eriko; Ishikawa, Mami; Ohta, Maiko; Kodate, Kashiko

    2005-09-01

    Face recognition is used in a wide range of security systems, such as monitoring credit card use, searching for individuals with street cameras via Internet and maintaining immigration control. There are still many technical subjects under study. For instance, the number of images that can be stored is limited under the current system, and the rate of recognition must be improved to account for photo shots taken at different angles under various conditions. We implemented a fully automatic Fast Face Recognition Optical Correlator (FARCO) system by using a 1000 frame/s optical parallel correlator designed and assembled by us. Operational speed for the 1: N (i.e. matching a pair of images among N, where N refers to the number of images in the database) identification experiment (4000 face images) amounts to less than 1.5 seconds, including the pre/post processing. From trial 1: N identification experiments using FARCO, we acquired low error rates of 2.6% False Reject Rate and 1.3% False Accept Rate. By making the most of the high-speed data-processing capability of this system, much more robustness can be achieved for various recognition conditions when large-category data are registered for a single person. We propose a face recognition algorithm for the FARCO while employing a temporal image sequence of moving images. Applying this algorithm to a natural posture, a two times higher recognition rate scored compared with our conventional system. The system has high potential for future use in a variety of purposes such as search for criminal suspects by use of street and airport video cameras, registration of babies at hospitals or handling of an immeasurable number of images in a database.

  3. Measure of robustness for complex networks

    Science.gov (United States)

    Youssef, Mina Nabil

    Critical infrastructures are repeatedly attacked by external triggers causing tremendous amount of damages. Any infrastructure can be studied using the powerful theory of complex networks. A complex network is composed of extremely large number of different elements that exchange commodities providing significant services. The main functions of complex networks can be damaged by different types of attacks and failures that degrade the network performance. These attacks and failures are considered as disturbing dynamics, such as the spread of viruses in computer networks, the spread of epidemics in social networks, and the cascading failures in power grids. Depending on the network structure and the attack strength, every network differently suffers damages and performance degradation. Hence, quantifying the robustness of complex networks becomes an essential task. In this dissertation, new metrics are introduced to measure the robustness of technological and social networks with respect to the spread of epidemics, and the robustness of power grids with respect to cascading failures. First, we introduce a new metric called the Viral Conductance (VCSIS ) to assess the robustness of networks with respect to the spread of epidemics that are modeled through the susceptible/infected/susceptible (SIS) epidemic approach. In contrast to assessing the robustness of networks based on a classical metric, the epidemic threshold, the new metric integrates the fraction of infected nodes at steady state for all possible effective infection strengths. Through examples, VCSIS provides more insights about the robustness of networks than the epidemic threshold. In addition, both the paradoxical robustness of Barabasi-Albert preferential attachment networks and the effect of the topology on the steady state infection are studied, to show the importance of quantifying the robustness of networks. Second, a new metric VCSIR is introduced to assess the robustness of networks with respect

  4. Short assessment of the Big Five: robust across survey methods except telephone interviewing.

    Science.gov (United States)

    Lang, Frieder R; John, Dennis; Lüdtke, Oliver; Schupp, Jürgen; Wagner, Gert G

    2011-06-01

    We examined measurement invariance and age-related robustness of a short 15-item Big Five Inventory (BFI-S) of personality dimensions, which is well suited for applications in large-scale multidisciplinary surveys. The BFI-S was assessed in three different interviewing conditions: computer-assisted or paper-assisted face-to-face interviewing, computer-assisted telephone interviewing, and a self-administered questionnaire. Randomized probability samples from a large-scale German panel survey and a related probability telephone study were used in order to test method effects on self-report measures of personality characteristics across early, middle, and late adulthood. Exploratory structural equation modeling was used in order to test for measurement invariance of the five-factor model of personality trait domains across different assessment methods. For the short inventory, findings suggest strong robustness of self-report measures of personality dimensions among young and middle-aged adults. In old age, telephone interviewing was associated with greater distortions in reliable personality assessment. It is concluded that the greater mental workload of telephone interviewing limits the reliability of self-report personality assessment. Face-to-face surveys and self-administrated questionnaire completion are clearly better suited than phone surveys when personality traits in age-heterogeneous samples are assessed.

  5. A Comparative Theoretical and Computational Study on Robust Counterpart Optimization: I. Robust Linear Optimization and Robust Mixed Integer Linear Optimization

    Science.gov (United States)

    Li, Zukui; Ding, Ran; Floudas, Christodoulos A.

    2011-01-01

    Robust counterpart optimization techniques for linear optimization and mixed integer linear optimization problems are studied in this paper. Different uncertainty sets, including those studied in literature (i.e., interval set; combined interval and ellipsoidal set; combined interval and polyhedral set) and new ones (i.e., adjustable box; pure ellipsoidal; pure polyhedral; combined interval, ellipsoidal, and polyhedral set) are studied in this work and their geometric relationship is discussed. For uncertainty in the left hand side, right hand side, and objective function of the optimization problems, robust counterpart optimization formulations induced by those different uncertainty sets are derived. Numerical studies are performed to compare the solutions of the robust counterpart optimization models and applications in refinery production planning and batch process scheduling problem are presented. PMID:21935263

  6. A bimodal biometric identification system

    Science.gov (United States)

    Laghari, Mohammad S.; Khuwaja, Gulzar A.

    2013-03-01

    Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Physicals are related to the shape of the body. Behavioral are related to the behavior of a person. However, biometric authentication systems suffer from imprecision and difficulty in person recognition due to a number of reasons and no single biometrics is expected to effectively satisfy the requirements of all verification and/or identification applications. Bimodal biometric systems are expected to be more reliable due to the presence of two pieces of evidence and also be able to meet the severe performance requirements imposed by various applications. This paper presents a neural network based bimodal biometric identification system by using human face and handwritten signature features.

  7. A Robust Color Image Watermarking Scheme Using Entropy and QR Decomposition

    Directory of Open Access Journals (Sweden)

    L. Laur

    2015-12-01

    Full Text Available Internet has affected our everyday life drastically. Expansive volumes of information are exchanged over the Internet consistently which causes numerous security concerns. Issues like content identification, document and image security, audience measurement, ownership, copyrights and others can be settled by using digital watermarking. In this work, robust and imperceptible non-blind color image watermarking algorithm is proposed, which benefit from the fact that watermark can be hidden in different color channel which results into further robustness of the proposed technique to attacks. Given method uses some algorithms such as entropy, discrete wavelet transform, Chirp z-transform, orthogonal-triangular decomposition and Singular value decomposition in order to embed the watermark in a color image. Many experiments are performed using well-known signal processing attacks such as histogram equalization, adding noise and compression. Experimental results show that proposed scheme is imperceptible and robust against common signal processing attacks.

  8. Robust prediction of anti-cancer drug sensitivity and sensitivity-specific biomarker.

    Directory of Open Access Journals (Sweden)

    Heewon Park

    Full Text Available The personal genomics era has attracted a large amount of attention for anti-cancer therapy by patient-specific analysis. Patient-specific analysis enables discovery of individual genomic characteristics for each patient, and thus we can effectively predict individual genetic risk of disease and perform personalized anti-cancer therapy. Although the existing methods for patient-specific analysis have successfully uncovered crucial biomarkers, their performance takes a sudden turn for the worst in the presence of outliers, since the methods are based on non-robust manners. In practice, clinical and genomic alterations datasets usually contain outliers from various sources (e.g., experiment error, coding error, etc. and the outliers may significantly affect the result of patient-specific analysis. We propose a robust methodology for patient-specific analysis in line with the NetwrokProfiler. In the proposed method, outliers in high dimensional gene expression levels and drug response datasets are simultaneously controlled by robust Mahalanobis distance in robust principal component space. Thus, we can effectively perform for predicting anti-cancer drug sensitivity and identifying sensitivity-specific biomarkers for individual patients. We observe through Monte Carlo simulations that the proposed robust method produces outstanding performances for predicting response variable in the presence of outliers. We also apply the proposed methodology to the Sanger dataset in order to uncover cancer biomarkers and predict anti-cancer drug sensitivity, and show the effectiveness of our method.

  9. Robustness analysis of chiller sequencing control

    International Nuclear Information System (INIS)

    Liao, Yundan; Sun, Yongjun; Huang, Gongsheng

    2015-01-01

    Highlights: • Uncertainties with chiller sequencing control were systematically quantified. • Robustness of chiller sequencing control was systematically analyzed. • Different sequencing control strategies were sensitive to different uncertainties. • A numerical method was developed for easy selection of chiller sequencing control. - Abstract: Multiple-chiller plant is commonly employed in the heating, ventilating and air-conditioning system to increase operational feasibility and energy-efficiency under part load condition. In a multiple-chiller plant, chiller sequencing control plays a key role in achieving overall energy efficiency while not sacrifices the cooling sufficiency for indoor thermal comfort. Various sequencing control strategies have been developed and implemented in practice. Based on the observation that (i) uncertainty, which cannot be avoided in chiller sequencing control, has a significant impact on the control performance and may cause the control fail to achieve the expected control and/or energy performance; and (ii) in current literature few studies have systematically addressed this issue, this paper therefore presents a study on robustness analysis of chiller sequencing control in order to understand the robustness of various chiller sequencing control strategies under different types of uncertainty. Based on the robustness analysis, a simple and applicable method is developed to select the most robust control strategy for a given chiller plant in the presence of uncertainties, which will be verified using case studies

  10. Information theory perspective on network robustness

    International Nuclear Information System (INIS)

    Schieber, Tiago A.; Carpi, Laura; Frery, Alejandro C.; Rosso, Osvaldo A.; Pardalos, Panos M.; Ravetti, Martín G.

    2016-01-01

    A crucial challenge in network theory is the study of the robustness of a network when facing a sequence of failures. In this work, we propose a dynamical definition of network robustness based on Information Theory, that considers measurements of the structural changes caused by failures of the network's components. Failures are defined here as a temporal process defined in a sequence. Robustness is then evaluated by measuring dissimilarities between topologies after each time step of the sequence, providing a dynamical information about the topological damage. We thoroughly analyze the efficiency of the method in capturing small perturbations by considering different probability distributions on networks. In particular, we find that distributions based on distances are more consistent in capturing network structural deviations, as better reflect the consequences of the failures. Theoretical examples and real networks are used to study the performance of this methodology. - Highlights: • A novel methodology to measure the robustness of a network to component failure or targeted attacks is proposed. • The use of the network's distance PDF allows a precise analysis. • The method provides a dynamic robustness profile showing the response of the topology to each failure event. • The measure is capable to detect network's critical elements.

  11. On the robustness of Herlihy's hierarchy

    Science.gov (United States)

    Jayanti, Prasad

    1993-01-01

    A wait-free hierarchy maps object types to levels in Z(+) U (infinity) and has the following property: if a type T is at level N, and T' is an arbitrary type, then there is a wait-free implementation of an object of type T', for N processes, using only registers and objects of type T. The infinite hierarchy defined by Herlihy is an example of a wait-free hierarchy. A wait-free hierarchy is robust if it has the following property: if T is at level N, and S is a finite set of types belonging to levels N - 1 or lower, then there is no wait-free implementation of an object of type T, for N processes, using any number and any combination of objects belonging to the types in S. Robustness implies that there are no clever ways of combining weak shared objects to obtain stronger ones. Contrary to what many researchers believe, we prove that Herlihy's hierarchy is not robust. We then define some natural variants of Herlihy's hierarchy, which are also infinite wait-free hierarchies. With the exception of one, which is still open, these are not robust either. We conclude with the open question of whether non-trivial robust wait-free hierarchies exist.

  12. Replication and robustness in developmental research.

    Science.gov (United States)

    Duncan, Greg J; Engel, Mimi; Claessens, Amy; Dowsett, Chantelle J

    2014-11-01

    Replications and robustness checks are key elements of the scientific method and a staple in many disciplines. However, leading journals in developmental psychology rarely include explicit replications of prior research conducted by different investigators, and few require authors to establish in their articles or online appendices that their key results are robust across estimation methods, data sets, and demographic subgroups. This article makes the case for prioritizing both explicit replications and, especially, within-study robustness checks in developmental psychology. It provides evidence on variation in effect sizes in developmental studies and documents strikingly different replication and robustness-checking practices in a sample of journals in developmental psychology and a sister behavioral science-applied economics. Our goal is not to show that any one behavioral science has a monopoly on best practices, but rather to show how journals from a related discipline address vital concerns of replication and generalizability shared by all social and behavioral sciences. We provide recommendations for promoting graduate training in replication and robustness-checking methods and for editorial policies that encourage these practices. Although some of our recommendations may shift the form and substance of developmental research articles, we argue that they would generate considerable scientific benefits for the field. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  13. Emergence of robustness in networks of networks

    Science.gov (United States)

    Roth, Kevin; Morone, Flaviano; Min, Byungjoon; Makse, Hernán A.

    2017-06-01

    A model of interdependent networks of networks (NONs) was introduced recently [Proc. Natl. Acad. Sci. (USA) 114, 3849 (2017), 10.1073/pnas.1620808114] in the context of brain activation to identify the neural collective influencers in the brain NON. Here we investigate the emergence of robustness in such a model, and we develop an approach to derive an exact expression for the random percolation transition in Erdös-Rényi NONs of this kind. Analytical calculations are in agreement with numerical simulations, and highlight the robustness of the NON against random node failures, which thus presents a new robust universality class of NONs. The key aspect of this robust NON model is that a node can be activated even if it does not belong to the giant mutually connected component, thus allowing the NON to be built from below the percolation threshold, which is not possible in previous models of interdependent networks. Interestingly, the phase diagram of the model unveils particular patterns of interconnectivity for which the NON is most vulnerable, thereby marking the boundary above which the robustness of the system improves with increasing dependency connections.

  14. Analysing the Effectiveness of the Personality Symbols/Icons

    OpenAIRE

    Halim, İpek

    2012-01-01

    Personality symbol can cover all the identifications of the brand. It can be the face or the soul of the company. Their effect on the brand image is huge. The research focuses on calculating the roles and effectives of the personality symbols. It aims to bring in suggestions for developing a successful personality symbols and lists advantages and disadvantages of different types of personality symbols. It does a detailed copy testing. Apart from conducting focus groups to analyse how the targ...

  15. Characteristic Model-Based Robust Model Predictive Control for Hypersonic Vehicles with Constraints

    Directory of Open Access Journals (Sweden)

    Jun Zhang

    2017-06-01

    Full Text Available Designing robust control for hypersonic vehicles in reentry is difficult, due to the features of the vehicles including strong coupling, non-linearity, and multiple constraints. This paper proposed a characteristic model-based robust model predictive control (MPC for hypersonic vehicles with reentry constraints. First, the hypersonic vehicle is modeled by a characteristic model composed of a linear time-varying system and a lumped disturbance. Then, the identification data are regenerated by the accumulative sum idea in the gray theory, which weakens effects of the random noises and strengthens regularity of the identification data. Based on the regenerated data, the time-varying parameters and the disturbance are online estimated according to the gray identification. At last, the mixed H2/H∞ robust predictive control law is proposed based on linear matrix inequalities (LMIs and receding horizon optimization techniques. Using active tackling system constraints of MPC, the input and state constraints are satisfied in the closed-loop control system. The validity of the proposed control is verified theoretically according to Lyapunov theory and illustrated by simulation results.

  16. Primal and dual approaches to adjustable robust optimization

    NARCIS (Netherlands)

    de Ruiter, Frans

    2018-01-01

    Robust optimization has become an important paradigm to deal with optimization under uncertainty. Adjustable robust optimization is an extension that deals with multistage problems. This thesis starts with a short but comprehensive introduction to adjustable robust optimization. Then the two

  17. Forensic radiology: An emerging tool in identification

    Directory of Open Access Journals (Sweden)

    Raghav Kumar

    2015-01-01

    Full Text Available In any mass disaster condition, identification of the person is most important. For this purpose, the forensic investigators use different methods for identifying the dead. They consider skeletal remains of the dead as the initial step in identification. Radiographs carry great evidence to act as antemortem records and also assist in identifying the person, age, gender, race, etc. Forensic dentistry is also emerging as a new branch in forensics. So, the forensic dentist must be aware of different techniques, developments, and resources to incorporate the technology in order to achieve success in human identification. So, our aim of the present review is to focus on different radiological techniques and new developments available for successful identification of the dead.

  18. Robust Object Tracking Using Valid Fragments Selection.

    Science.gov (United States)

    Zheng, Jin; Li, Bo; Tian, Peng; Luo, Gang

    Local features are widely used in visual tracking to improve robustness in cases of partial occlusion, deformation and rotation. This paper proposes a local fragment-based object tracking algorithm. Unlike many existing fragment-based algorithms that allocate the weights to each fragment, this method firstly defines discrimination and uniqueness for local fragment, and builds an automatic pre-selection of useful fragments for tracking. Then, a Harris-SIFT filter is used to choose the current valid fragments, excluding occluded or highly deformed fragments. Based on those valid fragments, fragment-based color histogram provides a structured and effective description for the object. Finally, the object is tracked using a valid fragment template combining the displacement constraint and similarity of each valid fragment. The object template is updated by fusing feature similarity and valid fragments, which is scale-adaptive and robust to partial occlusion. The experimental results show that the proposed algorithm is accurate and robust in challenging scenarios.

  19. Occupant behaviour and robustness of building design

    DEFF Research Database (Denmark)

    Buso, Tiziana; Fabi, Valentina; Andersen, Rune Korsholm

    2015-01-01

    in a dynamic building energy simulation tool (IDA ICE). The analysis was carried out by simulating 15 building envelope designs in different thermal zones of an Office Reference Building in 3 climates: Stockholm, Frankfurt and Athens.In general, robustness towards changes in occupants' behaviour increased......Occupant behaviour can cause major discrepancies between the designed and the real total energy use in buildings. A possible solution to reduce the differences between predictions and actual performances is designing robust buildings, i.e. buildings whose performances show little variations...... with alternating occupant behaviour patterns. The aim of this work was to investigate how alternating occupant behaviour patterns impact the performance of different envelope design solutions in terms of building robustness. Probabilistic models of occupants' window opening and use of shading were implemented...

  20. Robust Mediation Analysis Based on Median Regression

    Science.gov (United States)

    Yuan, Ying; MacKinnon, David P.

    2014-01-01

    Mediation analysis has many applications in psychology and the social sciences. The most prevalent methods typically assume that the error distribution is normal and homoscedastic. However, this assumption may rarely be met in practice, which can affect the validity of the mediation analysis. To address this problem, we propose robust mediation analysis based on median regression. Our approach is robust to various departures from the assumption of homoscedasticity and normality, including heavy-tailed, skewed, contaminated, and heteroscedastic distributions. Simulation studies show that under these circumstances, the proposed method is more efficient and powerful than standard mediation analysis. We further extend the proposed robust method to multilevel mediation analysis, and demonstrate through simulation studies that the new approach outperforms the standard multilevel mediation analysis. We illustrate the proposed method using data from a program designed to increase reemployment and enhance mental health of job seekers. PMID:24079925

  1. Robustness of Distance-to-Default

    DEFF Research Database (Denmark)

    Jessen, Cathrine; Lando, David

    2013-01-01

    Distance-to-default is a remarkably robust measure for ranking firms according to their risk of default. The ranking seems to work despite the fact that the Merton model from which the measure is derived produces default probabilities that are far too small when applied to real data. We use...... simulations to investigate the robustness of the distance-to-default measure to different model specifications. Overall we find distance-to-default to be robust to a number of deviations from the simple Merton model that involve different asset value dynamics and different default triggering mechanisms....... A notable exception is a model with stochastic volatility of assets. In this case both the ranking of firms and the estimated default probabilities using distance-to-default perform significantly worse. We therefore propose a volatility adjustment of the distance-to-default measure, that significantly...

  2. Handling Occlusions for Robust Augmented Reality Systems

    Directory of Open Access Journals (Sweden)

    Maidi Madjid

    2010-01-01

    Full Text Available Abstract In Augmented Reality applications, the human perception is enhanced with computer-generated graphics. These graphics must be exactly registered to real objects in the scene and this requires an effective Augmented Reality system to track the user's viewpoint. In this paper, a robust tracking algorithm based on coded fiducials is presented. Square targets are identified and pose parameters are computed using a hybrid approach based on a direct method combined with the Kalman filter. An important factor for providing a robust Augmented Reality system is the correct handling of targets occlusions by real scene elements. To overcome tracking failure due to occlusions, we extend our method using an optical flow approach to track visible points and maintain virtual graphics overlaying when targets are not identified. Our proposed real-time algorithm is tested with different camera viewpoints under various image conditions and shows to be accurate and robust.

  3. Robust Portfolio Optimization using CAPM Approach

    Directory of Open Access Journals (Sweden)

    mohsen gharakhani

    2013-08-01

    Full Text Available In this paper, a new robust model of multi-period portfolio problem has been developed. One of the key concerns in any asset allocation problem is how to cope with uncertainty about future returns. There are some approaches in the literature for this purpose including stochastic programming and robust optimization. Applying these techniques to multi-period portfolio problem may increase the problem size in a way that the resulting model is intractable. In this paper, a novel approach has been proposed to formulate multi-period portfolio problem as an uncertain linear program assuming that asset return follows the single-index factor model. Robust optimization technique has been also used to solve the problem. In order to evaluate the performance of the proposed model, a numerical example has been applied using simulated data.

  4. Robustness of quantum correlations against linear noise

    International Nuclear Information System (INIS)

    Guo, Zhihua; Cao, Huaixin; Qu, Shixian

    2016-01-01

    Relative robustness of quantum correlations (RRoQC) of a bipartite state is firstly introduced relative to a classically correlated state. Robustness of quantum correlations (RoQC) of a bipartite state is then defined as the minimum of RRoQC of the state relative to all classically correlated ones. It is proved that as a function on quantum states, RoQC is nonnegative, lower semi-continuous and neither convex nor concave; especially, it is zero if and only if the state is classically correlated. Thus, RoQC not only quantifies the endurance of quantum correlations of a state against linear noise, but also can be used to distinguish between quantum and classically correlated states. Furthermore, the effects of local quantum channels on the robustness are explored and characterized. (paper)

  5. Parametric uncertainty modeling for robust control

    DEFF Research Database (Denmark)

    Rasmussen, K.H.; Jørgensen, Sten Bay

    1999-01-01

    The dynamic behaviour of a non-linear process can often be approximated with a time-varying linear model. In the presented methodology the dynamics is modeled non-conservatively as parametric uncertainty in linear lime invariant models. The obtained uncertainty description makes it possible...... to perform robustness analysis on a control system using the structured singular value. The idea behind the proposed method is to fit a rational function to the parameter variation. The parameter variation can then be expressed as a linear fractional transformation (LFT), It is discussed how the proposed...... point changes. It is shown that a diagonal PI control structure provides robust performance towards variations in feed flow rate or feed concentrations. However including both liquid and vapor flow delays robust performance specifications cannot be satisfied with this simple diagonal control structure...

  6. Incentive-Compatible Robust Line Planning

    Science.gov (United States)

    Bessas, Apostolos; Kontogiannis, Spyros; Zaroliagis, Christos

    The problem of robust line planning requests for a set of origin-destination paths (lines) along with their frequencies in an underlying railway network infrastructure, which are robust to fluctuations of real-time parameters of the solution. In this work, we investigate a variant of robust line planning stemming from recent regulations in the railway sector that introduce competition and free railway markets, and set up a new application scenario: there is a (potentially large) number of line operators that have their lines fixed and operate as competing entities issuing frequency requests, while the management of the infrastructure itself remains the responsibility of a single entity, the network operator. The line operators are typically unwilling to reveal their true incentives, while the network operator strives to ensure a fair (or socially optimal) usage of the infrastructure, e.g., by maximizing the (unknown to him) aggregate incentives of the line operators.

  7. Competition improves robustness against loss of information

    Directory of Open Access Journals (Sweden)

    Arash eKermani Kolankeh

    2015-03-01

    Full Text Available A substantial number of works aimed at modeling the receptive field properties of the primary visual cortex (V1. Their evaluation criterion is usually the similarity of the model response properties to the recorded responses from biological organisms. However, as several algorithms were able to demonstrate some degree of similarity to biological data based on the existing criteria, we focus on the robustness against loss of information in the form of occlusions as an additional constraint for better understanding the algorithmic level of early vision in the brain. We try to investigate the influence of competition mechanisms on the robustness. Therefore, we compared four methods employing different competition mechanisms, namely, independent component analysis, non-negative matrix factorization with sparseness constraint, predictive coding/biased competition, and a Hebbian neural network with lateral inhibitory connections. Each of those methods is known to be capable of developing receptive fields comparable to those of V1 simple-cells. Since measuring the robustness of methods having simple-cell like receptive fields against occlusion is difficult, we measure the robustness using the classification accuracy on the MNIST hand written digit dataset. For this we trained all methods on the training set of the MNIST hand written digits dataset and tested them on a MNIST test set with different levels of occlusions. We observe that methods which employ competitive mechanisms have higher robustness against loss of information. Also the kind of the competition mechanisms plays an important role in robustness. Global feedback inhibition as employed in predictive coding/biased competition has an advantage compared to local lateral inhibition learned by an anti-Hebb rule.

  8. Culturomics: A New Kid on the Block of OMICS to Enable Personalized Medicine.

    Science.gov (United States)

    Kambouris, Manousos E; Pavlidis, Cristiana; Skoufas, Efthymios; Arabatzis, Michael; Kantzanou, Maria; Velegraki, Aristea; Patrinos, George P

    2018-02-01

    This innovation analysis highlights the underestimated and versatile potential of the new field of culturomics and examines its relation to other OMICS system sciences such as infectiomics, metabolomics, phenomics, and pharmacomicrobiomics. The advent of molecular biology, followed by the emergence of various disciplines of the genomics, and most importantly metagenomics, brought about the sharp decline of conventional microbiology methods. Emergence of culturomics has a natural synergy with therapeutic and clinical genomic approaches so as to realize personalized medicine. Notably, the concept of culturomics expands on that of phenomics and allows a reintroduction of the culture-based phenotypic characterization into the 21st century research repertoire, bolstered by robust technology for automated and massive execution, but its potential is largely unappreciated at present; the few available references show unenthusiastic pursuit and in narrow applications. This has not to be so: depending on the specific brand of culturomics, the scope of applications may extend to medicine, agriculture, environmental sciences, pharmacomicrobiomics, and biotechnology innovation. Moreover, culturomics may produce Big Data. This calls for a new generation of data scientists and innovative ways of harnessing and valorizing Big Data beyond classical genomics. Much more detailed and objective classification and identification of microbiota may soon be at hand through culturomics, thus enabling precision diagnosis toward truly personalized medicine. Culturomics may both widen the scope of microbiology and improve its contributions to diagnostics and personalized medicine, characterizing microbes and determining their associations with health and disease dynamics.

  9. Personal reputation

    DEFF Research Database (Denmark)

    Foste, Elizabeth; Botero, Isabel C.

    2012-01-01

    the importance of supervisor perceptions for the future of employees in the organization, this study uses principles of language expectancy theory (LET) to explore how message content (benefit organization vs. no benefit) and delivery style (aggressive vs. nonaggressive) in upward communication situations affect......One of the pitfalls of past research in upward influence communication is that messages are often categorized using more than one characteristic. This categorization has made it difficult to understand how different message characteristics affect supervisors’ perceptions about employees. Given...... perceptions of personal reputation and work competence. Participants, acting in the role of supervisors, read one of four scenarios and evaluated a new employee. Results suggest that delivery style and message content independently influence the supervisor’s willingness to grant a request as well as influence...

  10. Personal monitoring

    International Nuclear Information System (INIS)

    1995-01-01

    Sources of ionizing radiation have innumerable applications in the workplace. The potential exposures of the individual workers involved may need to be routinely monitored and records kept of their cumulative radiation doses. There are also occasions when it is necessary to retrospectively determine a dose which may have been received by a worker. This Module explains the basic terminology associated with personal monitoring and describes the principal types of dosimeters and other related techniques and their application in the workplace. The Manual will be of most benefit if it forms part of more comprehensive training or is supplemented by the advice of a qualified expert in radiation protection. Most of the dosimeters and techniques described in this Module can only be provided by qualified experts

  11. Return Predictability, Model Uncertainty, and Robust Investment

    DEFF Research Database (Denmark)

    Lukas, Manuel

    Stock return predictability is subject to great uncertainty. In this paper we use the model confidence set approach to quantify uncertainty about expected utility from investment, accounting for potential return predictability. For monthly US data and six representative return prediction models, we...... find that confidence sets are very wide, change significantly with the predictor variables, and frequently include expected utilities for which the investor prefers not to invest. The latter motivates a robust investment strategy maximizing the minimal element of the confidence set. The robust investor...... allocates a much lower share of wealth to stocks compared to a standard investor....

  12. Three Contributions to Robust Regression Diagnostics

    Czech Academy of Sciences Publication Activity Database

    Kalina, Jan

    2015-01-01

    Roč. 11, č. 2 (2015), s. 69-78 ISSN 1336-9180 Grant - others:GA ČR(CZ) GA13-01930S; Nadační fond na podporu vědy(CZ) Neuron Institutional support: RVO:67985807 Keywords : robust regression * robust econometrics * hypothesis test ing Subject RIV: BA - General Mathematics http://www.degruyter.com/view/j/jamsi.2015.11.issue-2/jamsi-2015-0013/jamsi-2015-0013.xml?format=INT

  13. Robust Inference with Multi-way Clustering

    OpenAIRE

    A. Colin Cameron; Jonah B. Gelbach; Douglas L. Miller; Doug Miller

    2009-01-01

    In this paper we propose a variance estimator for the OLS estimator as well as for nonlinear estimators such as logit, probit and GMM. This variance estimator enables cluster-robust inference when there is two-way or multi-way clustering that is non-nested. The variance estimator extends the standard cluster-robust variance estimator or sandwich estimator for one-way clustering (e.g. Liang and Zeger (1986), Arellano (1987)) and relies on similar relatively weak distributional assumptions. Our...

  14. Robust control synthesis for uncertain dynamical systems

    Science.gov (United States)

    Byun, Kuk-Whan; Wie, Bong; Sunkel, John

    1989-01-01

    This paper presents robust control synthesis techniques for uncertain dynamical systems subject to structured parameter perturbation. Both QFT (quantitative feedback theory) and H-infinity control synthesis techniques are investigated. Although most H-infinity-related control techniques are not concerned with the structured parameter perturbation, a new way of incorporating the parameter uncertainty in the robust H-infinity control design is presented. A generic model of uncertain dynamical systems is used to illustrate the design methodologies investigated in this paper. It is shown that, for a certain noncolocated structural control problem, use of both techniques results in nonminimum phase compensation.

  15. Robustness of multiparty nonlocality to local decoherence

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Cheong, Yong Wook; Kim, Jaewan; Lee, Hai-Woong

    2006-01-01

    We investigate the robustness of multiparty nonlocality under local decoherence, acting independently and equally on each subsystem. To be specific, we consider an N-qubit Greenberger-Horne-Zeilinger (GHZ) state under a depolarization, dephasing, or dissipation channel, and examine nonlocality by testing violation of the Mermin-Klyshko inequality, which is one of Bell's inequalities for multiqubit systems. The results show that the robustness of nonlocality increases with the number of qubits, and that the nonlocality of an N-qubit GHZ state with even N is extremely persistent against dephasing

  16. Robust speaker recognition in noisy environments

    CERN Document Server

    Rao, K Sreenivasa

    2014-01-01

    This book discusses speaker recognition methods to deal with realistic variable noisy environments. The text covers authentication systems for; robust noisy background environments, functions in real time and incorporated in mobile devices. The book focuses on different approaches to enhance the accuracy of speaker recognition in presence of varying background environments. The authors examine: (a) Feature compensation using multiple background models, (b) Feature mapping using data-driven stochastic models, (c) Design of super vector- based GMM-SVM framework for robust speaker recognition, (d) Total variability modeling (i-vectors) in a discriminative framework and (e) Boosting method to fuse evidences from multiple SVM models.

  17. Robust Parametric Control of Spacecraft Rendezvous

    Directory of Open Access Journals (Sweden)

    Dake Gu

    2014-01-01

    Full Text Available This paper proposes a method to design the robust parametric control for autonomous rendezvous of spacecrafts with the inertial information with uncertainty. We consider model uncertainty of traditional C-W equation to formulate the dynamic model of the relative motion. Based on eigenstructure assignment and model reference theory, a concise control law for spacecraft rendezvous is proposed which could be fixed through solving an optimization problem. The cost function considers the stabilization of the system and other performances. Simulation results illustrate the robustness and effectiveness of the proposed control.

  18. Robust cluster analysis and variable selection

    CERN Document Server

    Ritter, Gunter

    2014-01-01

    Clustering remains a vibrant area of research in statistics. Although there are many books on this topic, there are relatively few that are well founded in the theoretical aspects. In Robust Cluster Analysis and Variable Selection, Gunter Ritter presents an overview of the theory and applications of probabilistic clustering and variable selection, synthesizing the key research results of the last 50 years. The author focuses on the robust clustering methods he found to be the most useful on simulated data and real-time applications. The book provides clear guidance for the varying needs of bot

  19. Robust median estimator in logisitc regression

    Czech Academy of Sciences Publication Activity Database

    Hobza, T.; Pardo, L.; Vajda, Igor

    2008-01-01

    Roč. 138, č. 12 (2008), s. 3822-3840 ISSN 0378-3758 R&D Projects: GA MŠk 1M0572 Grant - others:Instituto Nacional de Estadistica (ES) MPO FI - IM3/136; GA MŠk(CZ) MTM 2006-06872 Institutional research plan: CEZ:AV0Z10750506 Keywords : Logistic regression * Median * Robustness * Consistency and asymptotic normality * Morgenthaler * Bianco and Yohai * Croux and Hasellbroeck Subject RIV: BB - Applied Statistics, Operational Research Impact factor: 0.679, year: 2008 http://library.utia.cas.cz/separaty/2008/SI/vajda-robust%20median%20estimator%20in%20logistic%20regression.pdf

  20. Introduction to Robust Estimation and Hypothesis Testing

    CERN Document Server

    Wilcox, Rand R

    2012-01-01

    This revised book provides a thorough explanation of the foundation of robust methods, incorporating the latest updates on R and S-Plus, robust ANOVA (Analysis of Variance) and regression. It guides advanced students and other professionals through the basic strategies used for developing practical solutions to problems, and provides a brief background on the foundations of modern methods, placing the new methods in historical context. Author Rand Wilcox includes chapter exercises and many real-world examples that illustrate how various methods perform in different situations.Introduction to R

  1. Robust-mode analysis of hydrodynamic flows

    Science.gov (United States)

    Roy, Sukesh; Gord, James R.; Hua, Jia-Chen; Gunaratne, Gemunu H.

    2017-04-01

    The emergence of techniques to extract high-frequency high-resolution data introduces a new avenue for modal decomposition to assess the underlying dynamics, especially of complex flows. However, this task requires the differentiation of robust, repeatable flow constituents from noise and other irregular features of a flow. Traditional approaches involving low-pass filtering and principle components analysis have shortcomings. The approach outlined here, referred to as robust-mode analysis, is based on Koopman decomposition. Three applications to (a) a counter-rotating cellular flame state, (b) variations in financial markets, and (c) turbulent injector flows are provided.

  2. Twin Research and the Arts: Interconnections / Twin Research: Twin Studies of Sexual Orientation; A Historical Biological Twin Gem; GWAS Approach to Who Has Twins / Newsworthy: Twins on College Campuses; 'Brainprint': Personal Identification by Brain Waves.

    Science.gov (United States)

    Segal, Nancy L

    2016-08-01

    The interrelatedness between twin research and the arts is explored via a new play about a famous case. In the 1960s, identical twin David Bruce Reimer was accidentally castrated as an infant during circumcision to correct a urinary problem. The decision to raise him as a girl, and the consequences of that decision, are explored in the new theatrical production of Boy. Other examples of the arts mirroring science, and vice versa, are described. Next, brief reviews and summaries of twin research on sexual orientation, 1860s' knowledge of placental arrangements and twinning mechanisms, and genes underlying multiple birth conception and fertility related measures are provided. This article concludes with a look at twins on college campuses and the identification of individuals by their brain waves. A correction and clarification regarding my article on the Brazilian Twin Registry in the last issue of THG (Segal, 2016) is also provided.

  3. Whale Identification

    Science.gov (United States)

    1991-01-01

    R:BASE for DOS, a computer program developed under NASA contract, has been adapted by the National Marine Mammal Laboratory and the College of the Atlantic to provide and advanced computerized photo matching technique for identification of humpback whales. The program compares photos with stored digitized descriptions, enabling researchers to track and determine distribution and migration patterns. R:BASE is a spinoff of RIM (Relational Information Manager), which was used to store data for analyzing heat shielding tiles on the Space Shuttle Orbiter. It is now the world's second largest selling line of microcomputer database management software.

  4. On-line signal trend identification

    International Nuclear Information System (INIS)

    Tambouratzis, T.; Antonopoulos-Domis, M.

    2004-01-01

    An artificial neural network, based on the self-organizing map, is proposed for on-line signal trend identification. Trends are categorized at each incoming signal as steady-state, increasing and decreasing, while they are further classified according to characteristics such signal shape and rate of change. Tests with model-generated signals illustrate the ability of the self-organizing map to accurately and reliably perform on-line trend identification in terms of both detection and classification. The proposed methodology has been found robust to the presence of white noise

  5. Identification of Influential Points in a Linear Regression Model

    Directory of Open Access Journals (Sweden)

    Jan Grosz

    2011-03-01

    Full Text Available The article deals with the detection and identification of influential points in the linear regression model. Three methods of detection of outliers and leverage points are described. These procedures can also be used for one-sample (independentdatasets. This paper briefly describes theoretical aspects of several robust methods as well. Robust statistics is a powerful tool to increase the reliability and accuracy of statistical modelling and data analysis. A simulation model of the simple linear regression is presented.

  6. [Projective identification in human relations].

    Science.gov (United States)

    Göka, Erol; Yüksel, Fatih Volkan; Göral, F Sevinç

    2006-01-01

    Melanie Klein, one of the pioneers of Object Relations Theory, first defined "projective identification", which is regarded as one of the most efficacious psychoanalytic concepts after the discovery of the "unconscious". Examination of the literature on "projective identification" shows that there are various perspectives and theories suggesting different uses of this concept. Some clinicians argue that projective identification is a primitive defense mechanism observed in severe psychopathologies like psychotic disorder and borderline personality disorder, where the intra-psychic structure has been damaged severely. Others suggest it to be an indispensable part of the transference and counter-transference between the therapist and the patient during psychotherapy and it can be used as a treatment material in the therapy by a skillful therapist. The latter group expands the use of the concept through normal daily relationships by stating that projective identification is one type of communication and part of the main human relation mechanism operating in all close relationships. Therefore, they suggest that projective identification has benign forms experienced in human relations as well as malign forms seen in psychopathologies. Thus, discussions about the definition of the concept appear complex. In order to clarify and overcome the complexity of the concept, Melanie Klein's and other most important subsequent approaches are discussed in this review article. Thereby, the article aims to explain its important function in understanding the psychopathologies, psychotherapeutic relationships and different areas of normal human relations.

  7. Robust giant magnetoresistive effect type multilayer sensor

    NARCIS (Netherlands)

    Lenssen, K.M.H.; Kuiper, A.E.T.; Roozeboom, F.

    2002-01-01

    A robust Giant Magneto Resistive effect type multilayer sensor comprising a free and a pinned ferromagnetic layer, which can withstand high temperatures and strong magnetic fields as required in automotive applications. The GMR multi-layer has an asymmetric magneto-resistive curve and enables

  8. New solutions for NPP robustness improvement

    International Nuclear Information System (INIS)

    Wolski, Alexander

    2013-01-01

    Fukushima accident has triggered a major re-assessment of robustness of nuclear stations. First round of evaluations has been Finished. Improvement areas and strategies have been identified. Implementation of upgrades has started world-wide. New solutions can provide substantial benefits

  9. Robust inference in sample selection models

    KAUST Repository

    Zhelonkin, Mikhail; Genton, Marc G.; Ronchetti, Elvezio

    2015-01-01

    The problem of non-random sample selectivity often occurs in practice in many fields. The classical estimators introduced by Heckman are the backbone of the standard statistical analysis of these models. However, these estimators are very sensitive to small deviations from the distributional assumptions which are often not satisfied in practice. We develop a general framework to study the robustness properties of estimators and tests in sample selection models. We derive the influence function and the change-of-variance function of Heckman's two-stage estimator, and we demonstrate the non-robustness of this estimator and its estimated variance to small deviations from the model assumed. We propose a procedure for robustifying the estimator, prove its asymptotic normality and give its asymptotic variance. Both cases with and without an exclusion restriction are covered. This allows us to construct a simple robust alternative to the sample selection bias test. We illustrate the use of our new methodology in an analysis of ambulatory expenditures and we compare the performance of the classical and robust methods in a Monte Carlo simulation study.

  10. Robust inference in sample selection models

    KAUST Repository

    Zhelonkin, Mikhail

    2015-11-20

    The problem of non-random sample selectivity often occurs in practice in many fields. The classical estimators introduced by Heckman are the backbone of the standard statistical analysis of these models. However, these estimators are very sensitive to small deviations from the distributional assumptions which are often not satisfied in practice. We develop a general framework to study the robustness properties of estimators and tests in sample selection models. We derive the influence function and the change-of-variance function of Heckman\\'s two-stage estimator, and we demonstrate the non-robustness of this estimator and its estimated variance to small deviations from the model assumed. We propose a procedure for robustifying the estimator, prove its asymptotic normality and give its asymptotic variance. Both cases with and without an exclusion restriction are covered. This allows us to construct a simple robust alternative to the sample selection bias test. We illustrate the use of our new methodology in an analysis of ambulatory expenditures and we compare the performance of the classical and robust methods in a Monte Carlo simulation study.

  11. Highly Robust Methods in Data Mining

    Czech Academy of Sciences Publication Activity Database

    Kalina, Jan

    2013-01-01

    Roč. 8, č. 1 (2013), s. 9-24 ISSN 1452-4864 Institutional support: RVO:67985807 Keywords : data mining * robust statistics * high-dimensional data * cluster analysis * logistic regression * neural networks Subject RIV: BB - Applied Statistics, Operational Research

  12. Robust Utility Maximization Under Convex Portfolio Constraints

    International Nuclear Information System (INIS)

    Matoussi, Anis; Mezghani, Hanen; Mnif, Mohamed

    2015-01-01

    We study a robust maximization problem from terminal wealth and consumption under a convex constraints on the portfolio. We state the existence and the uniqueness of the consumption–investment strategy by studying the associated quadratic backward stochastic differential equation. We characterize the optimal control by using the duality method and deriving a dynamic maximum principle

  13. Robust diamond meshes with unique wettability properties.

    Science.gov (United States)

    Yang, Yizhou; Li, Hongdong; Cheng, Shaoheng; Zou, Guangtian; Wang, Chuanxi; Lin, Quan

    2014-03-18

    Robust diamond meshes with excellent superhydrophobic and superoleophilic properties have been fabricated. Superhydrophobicity is observed for water with varying pH from 1 to 14 with good recyclability. Reversible superhydrophobicity and hydrophilicity can be easily controlled. The diamond meshes show highly efficient water-oil separation and water pH droplet transference.

  14. Robustness of dynamic systems with parameter uncertainties

    CERN Document Server

    Balemi, S; Truöl, W

    1992-01-01

    Robust Control is one of the fastest growing and promising areas of research today. In many practical systems there exist uncertainties which have to be considered in the analysis and design of control systems. In the last decade methods were developed for dealing with dynamic systems with unstructured uncertainties such as HOO_ and £I-optimal control. For systems with parameter uncertainties, the seminal paper of V. L. Kharitonov has triggered a large amount of very promising research. An international workshop dealing with all aspects of robust control was successfully organized by S. P. Bhattacharyya and L. H. Keel in San Antonio, Texas, USA in March 1991. We organized the second international workshop in this area in Ascona, Switzer­ land in April 1992. However, this second workshop was restricted to robust control of dynamic systems with parameter uncertainties with the objective to concentrate on some aspects of robust control. This book contains a collection of papers presented at the International W...

  15. Robust predictions of the interacting boson model

    International Nuclear Information System (INIS)

    Casten, R.F.; Koeln Univ.

    1994-01-01

    While most recognized for its symmetries and algebraic structure, the IBA model has other less-well-known but equally intrinsic properties which give unavoidable, parameter-free predictions. These predictions concern central aspects of low-energy nuclear collective structure. This paper outlines these ''robust'' predictions and compares them with the data

  16. Robust keyword retrieval method for OCRed text

    Science.gov (United States)

    Fujii, Yusaku; Takebe, Hiroaki; Tanaka, Hiroshi; Hotta, Yoshinobu

    2011-01-01

    Document management systems have become important because of the growing popularity of electronic filing of documents and scanning of books, magazines, manuals, etc., through a scanner or a digital camera, for storage or reading on a PC or an electronic book. Text information acquired by optical character recognition (OCR) is usually added to the electronic documents for document retrieval. Since texts generated by OCR generally include character recognition errors, robust retrieval methods have been introduced to overcome this problem. In this paper, we propose a retrieval method that is robust against both character segmentation and recognition errors. In the proposed method, the insertion of noise characters and dropping of characters in the keyword retrieval enables robustness against character segmentation errors, and character substitution in the keyword of the recognition candidate for each character in OCR or any other character enables robustness against character recognition errors. The recall rate of the proposed method was 15% higher than that of the conventional method. However, the precision rate was 64% lower.

  17. Robust Algebraic Multilevel Methods and Algorithms

    CERN Document Server

    Kraus, Johannes

    2009-01-01

    This book deals with algorithms for the solution of linear systems of algebraic equations with large-scale sparse matrices, with a focus on problems that are obtained after discretization of partial differential equations using finite element methods. Provides a systematic presentation of the recent advances in robust algebraic multilevel methods. Can be used for advanced courses on the topic.

  18. Replication and Robustness in Developmental Research

    Science.gov (United States)

    Duncan, Greg J.; Engel, Mimi; Claessens, Amy; Dowsett, Chantelle J.

    2014-01-01

    Replications and robustness checks are key elements of the scientific method and a staple in many disciplines. However, leading journals in developmental psychology rarely include explicit replications of prior research conducted by different investigators, and few require authors to establish in their articles or online appendices that their key…

  19. A Robust Alternative to the Normal Distribution.

    Science.gov (United States)

    1982-07-07

    for any Purpose of the United States Governuent DEPARTMENT OF STATISTICS t -, STANFORD UIVERSITY I STANFORD, CALIFORNIA A Robust Alternative to the...Stanford University Technical Report No. 3. [5] Bhattacharya, S. K. (1966). A Modified Bessel Function lodel in Life Testing. Metrika 10, 133-144

  20. Robust bayesian inference of generalized Pareto distribution ...

    African Journals Online (AJOL)

    En utilisant une etude exhaustive de Monte Carlo, nous prouvons que, moyennant une fonction perte generalisee adequate, on peut construire un estimateur Bayesien robuste du modele. Key words: Bayesian estimation; Extreme value; Generalized Fisher information; Gener- alized Pareto distribution; Monte Carlo; ...