WorldWideScience

Sample records for rss signature recognition

  1. Event identification by acoustic signature recognition

    Energy Technology Data Exchange (ETDEWEB)

    Dress, W.B.; Kercel, S.W.

    1995-07-01

    Many events of interest to the security commnnity produce acoustic emissions that are, in principle, identifiable as to cause. Some obvious examples are gunshots, breaking glass, takeoffs and landings of small aircraft, vehicular engine noises, footsteps (high frequencies when on gravel, very low frequencies. when on soil), and voices (whispers to shouts). We are investigating wavelet-based methods to extract unique features of such events for classification and identification. We also discuss methods of classification and pattern recognition specifically tailored for acoustic signatures obtained by wavelet analysis. The paper is divided into three parts: completed work, work in progress, and future applications. The completed phase has led to the successful recognition of aircraft types on landing and takeoff. Both small aircraft (twin-engine turboprop) and large (commercial airliners) were included in the study. The project considered the design of a small, field-deployable, inexpensive device. The techniques developed during the aircraft identification phase were then adapted to a multispectral electromagnetic interference monitoring device now deployed in a nuclear power plant. This is a general-purpose wavelet analysis engine, spanning 14 octaves, and can be adapted for other specific tasks. Work in progress is focused on applying the methods previously developed to speaker identification. Some of the problems to be overcome include recognition of sounds as voice patterns and as distinct from possible background noises (e.g., music), as well as identification of the speaker from a short-duration voice sample. A generalization of the completed work and the work in progress is a device capable of classifying any number of acoustic events-particularly quasi-stationary events such as engine noises and voices and singular events such as gunshots and breaking glass. We will show examples of both kinds of events and discuss their recognition likelihood.

  2. Empirical Analysis of Signature-Based Sign Language Recognition

    Directory of Open Access Journals (Sweden)

    Sumaira Kausar

    2014-10-01

    Full Text Available The significance of automated SLR (Sign Language Recognition proved not only in the deaf community but in various other spheres of life. The automated SLR are mainly based on the machine learning methods.PSL (Pakistani Sign Languageis an emerging area in order to benefit a big community in this region of the world. This paper presents recognition of PSL using machine learning methods. We propose an efficient and invariant method of classification of signs of PSL. This paper also presents a thorough empirical analysis of signature-based classification methods. Six different signatures are analyzed for two distinct groups of signs having total of forty five signs. Signs of PSL are close enough in terms of inter-sign similarity distancetherefore, it is a challenge to make the classification. Methodical empirical analysis proves that proposed method deals with these challenges adequately and effectively

  3. Searchable Signatures: Context and the Struggle for Recognition

    Directory of Open Access Journals (Sweden)

    Gina Schlesselman-Tarango

    2013-09-01

    Full Text Available Social networking sites made possible through Web 2.0 allow for unique user-generated tags called “searchable signatures.”  These tags move beyond the descriptive and act as means for users to assert online individual and group identities.  A study of searchable signatures on the Instagram application demonstrates that these types of tags are valuable not only because they allow for both individuals and groups to engage in what social theorist Axel Honneth calls the struggle for recognition, but also because they provide contextual use data and sociohistorical information so important to the understanding of digital objects.  This article explores how searchable signatures might be used by both patrons and staff in library environments.

  4. Wireless Indoor Location Estimation Based on Neural Network RSS Signature Recognition (LENSR)

    Energy Technology Data Exchange (ETDEWEB)

    Kurt Derr; Milos Manic

    2008-06-01

    Location Based Services (LBS), context aware applications, and people and object tracking depend on the ability to locate mobile devices, also known as localization, in the wireless landscape. Localization enables a diverse set of applications that include, but are not limited to, vehicle guidance in an industrial environment, security monitoring, self-guided tours, personalized communications services, resource tracking, mobile commerce services, guiding emergency workers during fire emergencies, habitat monitoring, environmental surveillance, and receiving alerts. This paper presents a new neural network approach (LENSR) based on a competitive topological Counter Propagation Network (CPN) with k-nearest neighborhood vector mapping, for indoor location estimation based on received signal strength. The advantage of this approach is both speed and accuracy. The tested accuracy of the algorithm was 90.6% within 1 meter and 96.4% within 1.5 meters. Several approaches for location estimation using WLAN technology were reviewed for comparison of results.

  5. Searchable Signatures: Context and the Struggle for Recognition

    National Research Council Canada - National Science Library

    Gina Schlesselman-Tarango

    2013-01-01

    .... This paper presents a study of searchable signatures on the Instagram application, demonstrating that these types of tags are valuable not only because they allow for both individuals and groups...

  6. RSS: A Brief Introduction.

    Science.gov (United States)

    Doree, Jim

    2007-01-01

    The JMMT website has recently added an RSS feed. This technology allows users to keep track of changes to websites of interest without having to regularly visit those sites. This article briefly discusses the history of RSS, explains how to access RSS feeds, and provides step-by-step information on using this new feature on the JMMT website.

  7. Signatures of molecular recognition from the topography of ...

    Indian Academy of Sciences (India)

    Administrator

    between the H…π and the π…π interactions has been a primary object of their study. Similar to the case of pyridine dimer, here a T-shaped geometry and face to face approach is considered here in order to study the recognition phenomenon. The isolated benzene dimer topography is described by [12, 13,. 14, 12], where ...

  8. Off-Line Handwritten Signature Recognition by Wavelet Entropy and Neural Network

    Directory of Open Access Journals (Sweden)

    Khaled Daqrouq

    2017-05-01

    Full Text Available Handwritten signatures are widely utilized as a form of personal recognition. However, they have the unfortunate shortcoming of being easily abused by those who would fake the identification or intent of an individual which might be very harmful. Therefore, the need for an automatic signature recognition system is crucial. In this paper, a signature recognition approach based on a probabilistic neural network (PNN and wavelet transform average framing entropy (AFE is proposed. The system was tested with a wavelet packet (WP entropy denoted as a WP entropy neural network system (WPENN and with a discrete wavelet transform (DWT entropy denoted as a DWT entropy neural network system (DWENN. Our investigation was conducted over several wavelet families and different entropy types. Identification tasks, as well as verification tasks, were investigated for a comprehensive signature system study. Several other methods used in the literature were considered for comparison. Two databases were used for algorithm testing. The best recognition rate result was achieved by WPENN whereby the threshold entropy reached 92%.

  9. Combining one- and two-dimensional signal recognition approaches to off-line signature verification

    Science.gov (United States)

    Chen, Siyuan; Srihari, Sargur

    2006-01-01

    A signature verification method that combines recognition methods of one-dimensional signals, e.g., speech and on-line handwriting, and two-dimensional images, e.g., holistic word recognition in OCR and off-line handwriting is described. In the one-dimensional approach, a sequence of data is obtained by tracing the exterior contour of the signature which allows the application of string-matching algorithms. The upper and lower contours of the signature are first determined by ignoring small gaps between signature components. The contours are combined into a single sequence so as to define a pseudo-writing path. To match two signatures a non-linear normalization method, viz., dynamic time warping, is applied to segment them into curves. Shape descriptors based on Zernike moments are extracted as features from each segment. A harmonic distance is used for measuring signature similarity. The two-dimensional approach is based on using features describing the word-shape. When the two methods are combined, the overall performance is significantly better than either method alone. With a database of 1320 genuines and 1320 forgeries the combination method has an accuracy of 90%.

  10. uBioRSS: tracking taxonomic literature using RSS.

    Science.gov (United States)

    Leary, Patrick R; Remsen, David P; Norton, Catherine N; Patterson, David J; Sarkar, Indra Neil

    2007-06-01

    Web content syndication through standard formats such as RSS and ATOM has become an increasingly popular mechanism for publishers, news sources and blogs to disseminate regularly updated content. These standardized syndication formats deliver content directly to the subscriber, allowing them to locally aggregate content from a variety of sources instead of having to find the information on multiple websites. The uBioRSS application is a 'taxonomically intelligent' service customized for the biological sciences. It aggregates syndicated content from academic publishers and science news feeds, and then uses a taxonomic Named Entity Recognition algorithm to identify and index taxonomic names within those data streams. The resulting name index is cross-referenced to current global taxonomic datasets to provide context for browsing the publications by taxonomic group. This process, called taxonomic indexing, draws upon services developed specifically for biological sciences, collectively referred to as 'taxonomic intelligence'. Such value-added enhancements can provide biologists with accelerated and improved access to current biological content. http://names.ubio.org/rss/

  11. Dynamic Gesture Recognition with a Terahertz Radar Based on Range Profile Sequences and Doppler Signatures

    Directory of Open Access Journals (Sweden)

    Zhi Zhou

    2017-12-01

    Full Text Available The frequency of terahertz radar ranges from 0.1 THz to 10 THz, which is higher than that of microwaves. Multi-modal signals, including high-resolution range profile (HRRP and Doppler signatures, can be acquired by the terahertz radar system. These two kinds of information are commonly used in automatic target recognition; however, dynamic gesture recognition is rarely discussed in the terahertz regime. In this paper, a dynamic gesture recognition system using a terahertz radar is proposed, based on multi-modal signals. The HRRP sequences and Doppler signatures were first achieved from the radar echoes. Considering the electromagnetic scattering characteristics, a feature extraction model is designed using location parameter estimation of scattering centers. Dynamic Time Warping (DTW extended to multi-modal signals is used to accomplish the classifications. Ten types of gesture signals, collected from a terahertz radar, are applied to validate the analysis and the recognition system. The results of the experiment indicate that the recognition rate reaches more than 91%. This research verifies the potential applications of dynamic gesture recognition using a terahertz radar.

  12. Het RSS-protocol

    NARCIS (Netherlands)

    G.J.M. Bierens

    2004-01-01

    RSS staat voor Rich Site Summary. Maar ook voor Real Simple Syndication en voor RDF Site Summary. De deskundigen zijn het er dus duidelijk nog niet over eens. De verschillende benamingen hebben wel dezelfde inhoudelijke betekenis: RSS wordt gebruikt door content-providers om digitale

  13. EPA OIG's RSS Feed

    Science.gov (United States)

    EPA OIG's RSS Feed - The EPA OIG offers an XML news feed (RSS) covering all of our publications and news. To use our pre-made feed, click on the link below, copy the URL, then paste it into your prefferred feed reader.

  14. Individual MHCI-Restricted T-Cell Receptors are Characterized by a Unique Peptide Recognition Signature.

    Science.gov (United States)

    Wooldridge, Linda

    2013-01-01

    Effective immunity requires that a limited TCR repertoire is able to recognize a vast number of foreign peptide-MHCI (peptide-major histocompatibility complex class I) molecules. This challenge is overcome by the ability of individual TCRs to recognize large numbers of peptides. Recently, it was demonstrated that MHCI-restricted TCRs can recognize up to 10(6) peptides of a defined length. Astonishingly, this remarkable level of promiscuity does not extend to peptides of different lengths, a fundamental observation that has broad implications for CD8(+) T-cell immunity. In particular, the findings suggest that effective immunity can only be achieved by mobilization of "length-matched" CD8(+) T-cell clonotypes. Overall, recent findings suggest that every TCR is specific for a unique set of peptides, which can be described as a unique "peptide recognition signature" (PRS) and consists of three components: (1) peptide length preference, (2) number of peptides recognized; and, (3) sequence identity (e.g., self versus pathogen derived). In future, the ability to de-convolute peptide recognition signatures across the normal and pathogenic repertoire will be essential for understanding the system requirements for effective CD8(+) T-cell immunity and elucidating mechanisms which underlie CD8(+) T-cell mediated disease.

  15. Individual MHCI-Restricted T-Cell Receptors are Characterized by a Unique Peptide Recognition Signature

    Science.gov (United States)

    Wooldridge, Linda

    2013-01-01

    Effective immunity requires that a limited TCR repertoire is able to recognize a vast number of foreign peptide-MHCI (peptide-major histocompatibility complex class I) molecules. This challenge is overcome by the ability of individual TCRs to recognize large numbers of peptides. Recently, it was demonstrated that MHCI-restricted TCRs can recognize up to 106 peptides of a defined length. Astonishingly, this remarkable level of promiscuity does not extend to peptides of different lengths, a fundamental observation that has broad implications for CD8+ T-cell immunity. In particular, the findings suggest that effective immunity can only be achieved by mobilization of “length-matched” CD8+ T-cell clonotypes. Overall, recent findings suggest that every TCR is specific for a unique set of peptides, which can be described as a unique “peptide recognition signature” (PRS) and consists of three components: (1) peptide length preference, (2) number of peptides recognized; and, (3) sequence identity (e.g., self versus pathogen derived). In future, the ability to de-convolute peptide recognition signatures across the normal and pathogenic repertoire will be essential for understanding the system requirements for effective CD8+ T-cell immunity and elucidating mechanisms which underlie CD8+ T-cell mediated disease. PMID:23888160

  16. Food Safety Information RSS feed

    Data.gov (United States)

    U.S. Department of Health & Human Services — This is an RSS Feed of Food Safety information that’s produced in real-time by the CDC. This RSS feed is the integration of two other XML feeds, one from the USDA's...

  17. Association of the Matrix Attachment Region Recognition Signature with coding regions in Caenorhabditis elegans

    Directory of Open Access Journals (Sweden)

    Blaxter Mark

    2007-11-01

    Full Text Available Abstract Background Matrix attachment regions (MAR are the sites on genomic DNA that interact with the nuclear matrix. There is increasing evidence for the involvement of MAR in regulation of gene expression. The unsuitability of experimental detection of MAR for genome-wide analyses has led to the development of computational methods of detecting MAR. The MAR recognition signature (MRS has been reported to be associated with a significant fraction of MAR in C. elegans and has also been found in MAR from a wide range of other eukaryotes. However the effectiveness of the MRS in specifically and sensitively identifying MAR remains unresolved. Results Using custom software, we have mapped the occurrence of MRS across the entire C. elegans genome. We find that MRS have a distinctive chromosomal distribution, in which they appear more frequently in the gene-rich chromosome centres than in arms. Comparison to distributions of MRS estimated from chromosomal sequences randomised using mono-, di- tri- and tetra-nucleotide frequency patterns showed that, while MRS are less common in real sequence than would be expected from nucleotide content alone, they are more frequent than would be predicted from short-range nucleotide structure. In comparison to the rest of the genome, MRS frequency was elevated in 5' and 3' UTRs, and striking peaks of average MRS frequency flanked C. elegans coding sequence (CDS. Genes associated with MRS were significantly enriched for receptor activity annotations, but not for expression level or other features. Conclusion Through a genome-wide analysis of the distribution of MRS in C. elegans we have shown that they have a distinctive distribution, particularly in relation to genes. Due to their association with untranslated regions, it is possible that MRS could have a post-transcriptional role in the control of gene expression. A role for MRS in nuclear scaffold attachment is not supported by these analyses.

  18. A PEF/Y substrate recognition and signature motif plays a critical role in DAPK-related kinase activity.

    Science.gov (United States)

    Temmerman, Koen; de Diego, Iñaki; Pogenberg, Vivian; Simon, Bertrand; Jonko, Weronika; Li, Xun; Wilmanns, Matthias

    2014-02-20

    Knowledge about protein kinase substrate preferences is biased toward residues immediately adjacent to the site of phosphorylation. By a combined structural, biochemical, and cellular approach, we have discovered an unexpected substrate recognition element with the consensus sequence PEF/Y in the tumor suppressor death-associated protein kinase 1. This motif can be effectively blocked by a specific pseudosubstrate-type interaction with an autoregulatory domain of this kinase. In this arrangement, the central PEF/Y glutamate interacts with a conserved arginine distant to the phosphorylation site in sequence and structure. We also demonstrate that the element is crucial for kinase activity regulation and substrate recognition. The PEF/Y motif distinguishes close death-associated protein kinase relatives from canonical calcium/calmodulin-dependent protein kinases. Insight into this signature and mode of action offers new opportunities to identify specific small molecule inhibitors in PEF/Y-containing protein kinases. Copyright © 2014 Elsevier Ltd. All rights reserved.

  19. MedlinePlus FAQ: RSS Service

    Science.gov (United States)

    ... Question: Do you have a Really Simple Syndication (RSS) feed for MedlinePlus? To use the sharing features ... enable JavaScript. Answer: MedlinePlus offers a variety of RSS feeds to suit your particular interests. You can ...

  20. 58. RSS Windows Editors: First Impressions

    Science.gov (United States)

    Swettenham, Steve

    2006-01-01

    An RSS feed is a list of topics made available from a webpage via a standard XML file format known as RSS, an abbreviation of either Really Simple Syndication or Rich Site Summary (Wikipedia, 2006). The end-user subscribes to their favorite Internet content site via RSS-aware software. Once subscribed, announcements with appropriate links are…

  1. Individual vocal signatures in barn owl nestlings: does individual recognition have an adaptive role in sibling vocal competition?

    Science.gov (United States)

    Dreiss, A N; Ruppli, C A; Roulin, A

    2014-01-01

    To compete over limited parental resources, young animals communicate with their parents and siblings by producing honest vocal signals of need. Components of begging calls that are sensitive to food deprivation may honestly signal need, whereas other components may be associated with individual-specific attributes that do not change with time such as identity, sex, absolute age and hierarchy. In a sib-sib communication system where barn owl (Tyto alba) nestlings vocally negotiate priority access to food resources, we show that calls have individual signatures that are used by nestlings to recognize which siblings are motivated to compete, even if most vocalization features vary with hunger level. Nestlings were more identifiable when food-deprived than food-satiated, suggesting that vocal identity is emphasized when the benefit of winning a vocal contest is higher. In broods where siblings interact iteratively, we speculate that individual-specific signature permits siblings to verify that the most vocal individual in the absence of parents is the one that indeed perceived the food brought by parents. Individual recognition may also allow nestlings to associate identity with individual-specific characteristics such as position in the within-brood dominance hierarchy. Calls indeed revealed age hierarchy and to a lower extent sex and absolute age. Using a cross-fostering experimental design, we show that most acoustic features were related to the nest of origin (but not the nest of rearing), suggesting a genetic or an early developmental effect on the ontogeny of vocal signatures. To conclude, our study suggests that sibling competition has promoted the evolution of vocal behaviours that signal not only hunger level but also intrinsic individual characteristics such as identity, family, sex and age. © 2013 The Authors. Journal of Evolutionary Biology © 2013 European Society For Evolutionary Biology.

  2. Comparative analyses of the thermodynamic RNA binding signatures of different types of RNA recognition motifs.

    Science.gov (United States)

    Samatanga, Brighton; Cléry, Antoine; Barraud, Pierre; Allain, Frédéric H-T; Jelesarov, Ilian

    2017-06-02

    RNA recognition motifs (RRMs) are structurally versatile domains important in regulation of alternative splicing. Structural mechanisms of sequence-specific recognition of single-stranded RNAs (ssRNAs) by RRMs are well understood. The thermodynamic strategies are however unclear. Therefore, we utilized microcalorimetry and semi-empirical analyses to comparatively analyze the cognate ssRNA binding thermodynamics of four different RRM domains, each with a different RNA binding mode. The different binding modes are: canonical binding to the β-sheet surface; canonical binding with involvement of N- and C-termini; binding to conserved loops; and binding to an α-helix. Our results identify enthalpy as the sole and general force driving association at physiological temperatures. Also, networks of weak interactions are a general feature regulating stability of the different RRM-ssRNA complexes. In agreement, non-polyelectrolyte effects contributed between ∼75 and 90% of the overall free energy of binding in the considered complexes. The various RNA binding modes also displayed enormous heat capacity differences, that upon dissection revealed large differential changes in hydration, conformations and dynamics upon binding RNA. Altogether, different modes employed by RRMs to bind cognate ssRNAs utilize various thermodynamics strategies during the association process. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  3. Structural and Thermodynamic Signatures of DNA Recognition by Mycobacterium tuberculosis DnaA

    Energy Technology Data Exchange (ETDEWEB)

    Tsodikov, Oleg V.; Biswas, Tapan (Michigan)

    2011-09-06

    An essential protein, DnaA, binds to 9-bp DNA sites within the origin of replication oriC. These binding events are prerequisite to forming an enigmatic nucleoprotein scaffold that initiates replication. The number, sequences, positions, and orientations of these short DNA sites, or DnaA boxes, within the oriCs of different bacteria vary considerably. To investigate features of DnaA boxes that are important for binding Mycobacterium tuberculosis DnaA (MtDnaA), we have determined the crystal structures of the DNA binding domain (DBD) of MtDnaA bound to a cognate MtDnaA-box (at 2.0 {angstrom} resolution) and to a consensus Escherichia coli DnaA-box (at 2.3 {angstrom}). These structures, complemented by calorimetric equilibrium binding studies of MtDnaA DBD in a series of DnaA-box variants, reveal the main determinants of DNA recognition and establish the [T/C][T/A][G/A]TCCACA sequence as a high-affinity MtDnaA-box. Bioinformatic and calorimetric analyses indicate that DnaA-box sequences in mycobacterial oriCs generally differ from the optimal binding sequence. This sequence variation occurs commonly at the first 2 bp, making an in vivo mycobacterial DnaA-box effectively a 7-mer and not a 9-mer. We demonstrate that the decrease in the affinity of these MtDnaA-box variants for MtDnaA DBD relative to that of the highest-affinity box TTGTCCACA is less than 10-fold. The understanding of DnaA-box recognition by MtDnaA and E. coli DnaA enables one to map DnaA-box sequences in the genomes of M. tuberculosis and other eubacteria.

  4. RSS-based Localization in Dynamic Environments

    NARCIS (Netherlands)

    Dil, B.J.; Havinga, Paul J.M.

    2012-01-01

    This paper focuses on optimal and automatic calibration of the propagation model of Received Signal Strength (RSS) based localization algorithms. Conventional RSS-based localization algorithms assume that optimal calibration is static and identical for all nodes, which limits its use to static

  5. Amplify Your Professional Knowledge through RSS

    Science.gov (United States)

    Stephens, Wendy

    2012-01-01

    In the championship playoffs of professional learning tools, this author contends that there is a clear-cut victor. Customizable, platform-agnostic, able to circumvent filters--both browser and network-imposed--RSS is the best professional learning tool. Reading sites via RSS has appeal for those who want the raw information. With a well-honed…

  6. Current awareness in the new millennium: RSS.

    Science.gov (United States)

    Cooke, Carol A

    2006-01-01

    Keeping current is essential for both patrons and librarians in the health sciences. We receive electronic and photocopied tables of contents. We subscribe to relevant mailing lists, newspapers and magazines. We review Web sites, books and journals. Our desks are littered with current awareness items that more often get old than read. RSS or "Really Simple Syndication' is a means of organizing and simplifying current awareness efforts. Using RSS feeds from a variety of sources along with aggregator software, librarians can keep up-to-date without the clutter. This article will provide a starting point from which to take advantage of RSS and continue the process of active learning.

  7. RSS (http://www.iaees.org/publications/journals/ces/rss.xml

    Directory of Open Access Journals (Sweden)

    Computational Ecology and Software (ISSN 2220-721X

    Full Text Available Computational Ecology and Software ISSN 2220-721X URL: http://www.iaees.org/publications/journals/ces/online-version.asp RSS: http://www.iaees.org/publications/journals/ces/rss.xml E-mail: ces@iaees.org Editor-in-Chief: WenJun Zhang Aims and Scope COMPUTATIONAL ECOLOGY AND SOFTWARE (ISSN 2220-721X is an open access, peer-reviewed online journal that considers scientific articles in all different areas of computational ecology. It is the transactions of the International Society of Computational Ecology. The journal is concerned with the ecological researches, constructions and applications of theories and methods of computational sciences including computational mathematics, computational statistics and computer science. It features the simulation, approximation, prediction, recognition, and classification of ecological issues. Intensive computation is one of the major stresses of the journal. The journal welcomes research articles, short communications, review articles, perspectives, and book reviews. The journal also supports the activities of the International Society of Computational Ecology. The topics to be covered by CES include, but are not limited to: •Computation intensive methods, numerical and optimization methods, differential and difference equation modeling and simulation, prediction, recognition, classification, statistical computation (Bayesian computing, randomization, bootstrapping, Monte Carlo techniques, stochastic process, etc., agent-based modeling, individual-based modeling, artificial neural networks, knowledge based systems, machine learning, genetic algorithms, data exploration, network analysis and computation, databases, ecological modeling and computation using Geographical Information Systems, satellite imagery, and other computation intensive theories and methods. •Artificial ecosystems, artificial life, complexity of ecosystems and virtual reality. •The development, evaluation and validation of software and

  8. Application of RSS in Special Libraries

    Directory of Open Access Journals (Sweden)

    Shima Moradi

    2007-07-01

    Full Text Available Despite of ever increasing scope and volume of online information content and the constant need for easy accessibility to these contents, experts in various subject matters always face time constraints when searching for information or looking up their intended resource. Meanwhile, special libraries are faced with diminishing resources, time and human resource needed for providing services and meeting the information need of the said experts. Nowadays Push Technologies, in form of RSS could be used to speed up on-time information dissemination. RSS feeds could spontaneously deliver information to the users. These could be posted on webpages or read by RSS readers. RSS has numerous applications such as web page content update, reading lists, table of contents, current awareness, guides etc. The present paper while outlining RSS as one of the next generation web tools, would point out its various advantages and applications in the new generation of libraries (Lib 2.0,particularly the special libraries. It would also offer pointers to its application in meeting the information needs of experts and users in such libraries.

  9. The biology of reactive sulfur species (RSS).

    Science.gov (United States)

    Gruhlke, Martin C H; Slusarenko, Alan J

    2012-10-01

    Sulfur is an essential and quantitatively important element for living organisms. Plants contain on average approximately 1 g S kg⁻¹ dry weight (for comparison plants contain approximately 15 g N kg⁻¹ dry weight). Sulfur is a constituent of many organic molecules, for example amino acids such as cysteine and methionine and the small tripeptide glutathione, but sulfur is also essential in the form of Fe-S clusters for the activity of many enzymes, particularly those involved in redox reactions. Sulfur chemistry is therefore important. In particular, sulfur in the form of thiol groups is central to manifold aspects of metabolism. Because thiol groups are oxidized and reduced easily and reversibly, the redox control of cellular metabolism has become an increasing focus of research. In the same way that oxygen and nitrogen have reactive species (ROS and RNS), sulfur too can form reactive molecular species (RSS), for example when a -SH group is oxidized. Indeed, several redox reactions occur via RSS intermediates. Several naturally occurring S-containing molecules are themselves RSS and because they are physiologically active they make up part of the intrinsic plant defence repertoire against herbivore and pathogen attack. Furthermore, RSS can also be used as redox-active pharmacological tools to study cell metabolism. The aim of this review is to familiarize the general reader with some of the chemical concepts, terminology and biology of selected RSS. Copyright © 2012 Elsevier Masson SAS. All rights reserved.

  10. How to Build an RSS 20 Feed

    CERN Document Server

    Woodman, Mark

    2006-01-01

    The little orange feed icons are everywhere on the web. From search engines to shopping sites to blogs, Really Simple Syndication (RSS 2.0) has become one of the hottest web technologies going. RSS 2.0 is a powerful - yet surprisingly easy - way to distributing timely content to a web-based audience. This Short Cut will give you the hands-on knowledge you need to build an RSS 2.0 feed. Along the way you'll learn not only the mechanics of building a feed, but industry-accepted best practices for creating feeds that perform well in various situations. Are you ready? Roll up your sleeves, c

  11. RSS made easy: a basic guide for librarians.

    Science.gov (United States)

    Wu, Wendy G; Li, Jie

    2007-01-01

    Really Simple Syndication (RSS) uses extensive markup language (XML) to constantly scan the content of Web sites for updates, which will then be delivered to subscribers' desktops or mobile devices through an RSS feed. RSS helps professionals stay current while reducing workloads. Librarians need to get familiar with RSS to educate their users, to stay current in information technology, and to generate and disseminate selected information to target user groups. doi:10.1300/J115v26n01_04.

  12. Syndicating Rich Bibliographic Metadata Using MODS and RSS

    Science.gov (United States)

    Ashton, Andrew

    2008-01-01

    Many libraries use RSS to syndicate information about their collections to users. A survey of 65 academic libraries revealed their most common use for RSS is to disseminate information about library holdings, such as lists of new acquisitions. Even though typical RSS feeds are ill suited to the task of carrying rich bibliographic metadata, great…

  13. Syndicated RSS Feeds for Course Information Distribution

    Science.gov (United States)

    Glotzbach, Ronald J.; Mordkovich, Dorina A.; Radwan, Jaime E.

    2008-01-01

    Students in higher education today are technologically savvy and expect faculty to use myriad web technologies for course delivery. This includes taking advantage of email, course web sites, and online learning communities. However, expectations now also include RSS, blogs, web-, pod-, and vod-casting, extending the classroom experience to provide…

  14. RSS: Lo-Fi Content Syndication.

    Science.gov (United States)

    Bannan, Karen J.

    2002-01-01

    Rich Site Summary (RSS) is an XML format designed to let content providers share news headlines and content with other sites without having to create a completely new Web page. Discusses three issues to consider before creating a newsfeed: content integrity, bandwidth issues, and spellcheck. Identifies resources for getting started and the two…

  15. Really Simple Syndication (RSS): An Educational Approach

    Science.gov (United States)

    Glotzbach, Ronald J.; Mohler, James L.; Radwan, Jaime E.

    2009-01-01

    Today's post-secondary students are technologically savvy and they expect faculty to use myriad web technologies for course delivery. This includes taking advantage of email, course web sites, and online learning communities. However, expectations now also include RSS, blogs, web- and pod-casting, extending the classroom experience to provide…

  16. BOREAS RSS-19 1994 Seasonal Understory Reflectance Data

    Science.gov (United States)

    Miller, John R.; Hall, Forrest G. (Editor); Nickerson, Jaime (Editor); White, H. Peter; Peddle, Derek; Freemantle, Jim; Smith, David E. (Technical Monitor)

    2000-01-01

    The BOREAS RSS-19 team collected airborne remotely sensed images and ground reflectance data for characterizing the radiometric properties of the boreal forest landscape. One objective of BOREAS is to further the understanding of the spectral bidirectional reflectance of typical boreal ecosystem stands in the visible/near-infrared regime. An essential input for any canopy BRDF model is an accurate estimate of the average understory reflectance, both for sunlit and shaded conditions. These variables can be expected to vary seasonally because of species-dependent differences in the phenological cycle of foliar display. In response to these requirements, the average understory reflectance for the flux tower sites of both the NSA (Thompson, Manitoba) and the SSA (Candle Lake, Saskatchewan) was observed throughout the year during five field campaigns. This was done by measuring the nadir reflectance (400 to 850 nm) of sunlit and shaded understory (vegetation and snow cover) along a surveyed LAI transect line (Chen, RSS-07) at each site near solar noon and documenting an average site reflectance. Comparisons between sites reveal differences in the green and infrared regions of the spectra, because of the differing species in the understory for each site. Temporal (seasonal) variation for each site was also observed (06-Feb-1994 to 16-Sep-1994), indicating the changing flora mixtures and changing spectral signatures as the understory matures during the growing season. The data are stored in tabular ASCII files. The data files are available on a CD-ROM (see document number 20010000884) or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  17. Intra-syllabic acoustic signatures used by the king penguin in parent-chick recognition: an experimental approach.

    Science.gov (United States)

    Lengagne, T; Lauga, J; Aubin, T

    2001-02-01

    In king penguin colonies, several studies have shown that both parent-chick recognition and mate-pair recognition are achieved by acoustic signals. The call of king penguins consists of strong frequency modulations with added beats of varying amplitude induced by the two-voice generating process. Both the frequency modulation pattern and the two-voice system could play a role in the identification of the calling bird. We investigated the potential role of these features in individual discrimination. Experiments were conducted by playing back altered or reconstructed parental signals to the corresponding chick. The results proved that the king penguin performs a complex analysis of the call, using both frequency modulation and the two-voice system. Reversed or frequency-modulation-suppressed signals do not elicit any responses. Modifying the shape of the frequency modulation by 30 % also impairs the recognition process. Moreover, we have demonstrated for the first time that birds perform an analysis of the beat amplitude induced by the two-voice system to assess individual identity. These two features, which are well preserved during the propagation of the signal, seem to be a reliable strategy to ensure the accurate transmission of individual information in a noisy colonial environment.

  18. Moving Day: Making the Most of Your Message with RSS and Syndicated Content

    OpenAIRE

    Pival, Paul R.

    2006-01-01

    This article discusses the advantages of Really Simple Syndication (RSS) feeds. With RSS, content can be released and resyndicated and accessed by many in the most convenient way, on web pages, via email, or an RSS aggregator. Two free services that resyndicate RSS feeds are Alan Levine's Feed2JS and RSS to JavaScript.

  19. Different importance of the volatile and non-volatile fractions of an olfactory signature for individual social recognition in rats versus mice and short-term versus long-term memory.

    Science.gov (United States)

    Noack, Julia; Richter, Karin; Laube, Gregor; Haghgoo, Hojjat Allah; Veh, Rüdiger W; Engelmann, Mario

    2010-11-01

    When tested in the olfactory cued social recognition/discrimination test, rats and mice differ in their retention of a recognition memory for a previously encountered conspecific juvenile: Rats are able to recognize a given juvenile for approximately 45 min only whereas mice show not only short-term, but also long-term recognition memory (≥ 24 h). Here we modified the social recognition/social discrimination procedure to investigate the neurobiological mechanism(s) underlying the species differences. We presented a conspecific juvenile repeatedly to the experimental subjects and monitored the investigation duration as a measure for recognition. Presentation of only the volatile fraction of the juvenile olfactory signature was sufficient for both short- and long-term recognition in mice but not rats. Applying additional volatile, mono-molecular odours to the "to be recognized" juveniles failed to affect short-term memory in both species, but interfered with long-term recognition in mice. Finally immunocytochemical analysis of c-Fos as a marker for cellular activation, revealed that juvenile exposure stimulated areas involved in the processing of olfactory signals in both the main and the accessory olfactory bulb in mice. In rats, we measured an increased c-Fos synthesis almost exclusively in cells of the accessory olfactory bulb. Our data suggest that the species difference in the retention of social recognition memory is based on differences in the processing of the volatile versus non-volatile fraction of the individuals' olfactory signature. The non-volatile fraction is sufficient for retaining a short-term social memory only. Long-term social memory - as observed in mice - requires a processing of both the volatile and non-volatile fractions of the olfactory signature. Copyright © 2010 Elsevier Inc. All rights reserved.

  20. Zone-based RSS Reporting for Location Fingerprinting

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun; Treu, Georg; Linnhoff–Popien, Claudia

    2007-01-01

    In typical location fingerprinting systems a tracked terminal reports sampled Received Signal Strength (RSS) values to a location server, which estimates its position based on a database of pre-recorded RSS fingerprints. So far, poll-based and periodic RSS reporting has been proposed. However......, for supporting proactive Location-based Services (LBSs), triggered by pre-defined spatial events, the periodic protocol is inefficient. Hence, this paper introduces zone-based RSS reporting: the location server translates geographical zones defined by the LBS into RSS-based representations, which are dynamically...... configured with the terminal. The terminal, in turn, reports its measurements only when they match with the configured RSS patterns. As a result, the number of messages exchanged between terminal and server is strongly reduced, saving battery power, bandwidth and also monetary costs spent for mobile bearer...

  1. Cleaning and Processing RSS measurements for Location Fingerprinting

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun

    2007-01-01

    Handling variations in sampled Received Signal Strength (RSS) is neassary for achieving robust location fingerprinting (LF). Current research has only proposed limited system-specific models for how to handle the cleaning of RSS variations. However, this paper propose a novel model for both...... cleaning and processing RSS measurements for LF systems. The proposed model is evaluated with a state-of-the-art LF system. The evaluation results show improved accuracy for the evaluated LF system when used with the proposed model....

  2. Use of RSS feeds by library professionals in India

    OpenAIRE

    K., Mohamed Haneefa; S. R., Reshma; C., Manu

    2013-01-01

    The purpose of this study was to investigate the use of RSS by library professionals in India. A structured online questionnaire was posted in LIS-forum mailing list to collect data for the study. The study found that majority of the respondents are aware of RSS and they are using it for providing various library services. Majority of the respondents use RSS several times a day and most of them subscribes new RSS feeds through search engines. Current Awareness Service and news updates are t...

  3. Hydrogen Polysulfide Biosignal-Responsive Polymersomes as a Nanoplatform for Distinguishing Intracellular Reactive Sulfur Species (RSS).

    Science.gov (United States)

    Zhang, Jian; Hao, Xiang; Sang, Wei; Yan, Qiang

    2017-10-01

    Reactive sulfur species (RSS) are a family of crucial biosignals for regulating cell processes. Among these, hydrogen polysulfide (H2 Sn , n ≥ 2) is a hallmark of tumor suppressor activation and regarded as the actual regulator to mediate sulfur-related biology. However, high effective recognition of intracellular H2 Sn is insurmountable due to its extremely low concentration and the disturbance of RSS analogues. Here an H2 Sn -responsive macromolecule that can distinguish H2 Sn from intracellular RSS through polymer degradation in ultrasensitive and highly selective manner is reported. This kind of polymers can further self-assemble into vesicular nanostructure. Upon cell uptake, they can be function as "all-in-one" H2 Sn -nanoplatforms, in order to fulfill multiple ambitious tasks including monitoring the H2 Sn biosynthetic pathways, unraveling the puzzles of H2 Sn -mediated cellular events, and conducting H2 Sn pathological milieu-specific drug delivery. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  4. RSS-based localization with different antenna orientations

    NARCIS (Netherlands)

    Dil, B.J.; Havinga, Paul J.M.

    2010-01-01

    This paper analyzes the influence of the antenna orientation on the performance of Received Signal Strength (RSS) based localization algorithms. Existing RSS-based localization algorithms provide reliable results in environments with static sources of error. This paper analyzes the performance of

  5. BOREAS RSS-17 Dielectric Constant Profile Measurements

    Science.gov (United States)

    Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); McDonald, Kyle C.; Zimmerman, Reiner; Way, JoBea

    2000-01-01

    The BOREAS RSS-17 team acquired and analyzed imaging radar data from the ESA's ERS-1 over a complete annual cycle at the BOREAS sites in Canada in 1994 to detect shifts in radar backscatter related to varying environmental conditions. This data set consists of dielectric constant profile measurements from selected trees at various BOREAS flux tower sites. The relative dielectric constant was measured at C-band (frequency = 5 GHz) as a function of depth into the trunk of three trees at each site, Measurements were made during April 1994 with an Applied Microwave Corporation field PDP fitted with a 0.358-cm (0.141-inch) diameter coaxial probe tip. The data are available in tabular ASCII files. The data files are available on a CD-ROM (see document number 20010000884), or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  6. BOREAS RSS-12 Airborne Tracking Sunphotometer Measurements

    Science.gov (United States)

    Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Lobitz, Brad; Spanner, Michael; Wrigley, Robert

    2000-01-01

    The BOREAS RSS-12 team collected both ground and airborne sunphotometer measurements for use in characterizing the aerosol optical properties of the atmosphere during the BOREAS data collection activities. These measurements are to be used to: 1) measure the magnitude and variability of the aerosol optical depth in both time and space; 2) determine the optical properties of the boreal aerosols; and 3) atmospherically correct remotely sensed data acquired during BOREAS. This data set contains airborne tracking sunphotometer data that were acquired from the C-130 aircraft during its flights over the BOREAS study areas. The data cover selected days and times from May to September 1994. The data are stored in tabular ASCII files. The data files are available on a CD-ROM (see document number 20010000884), or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  7. Technical Evaluation Report 58: RSS Windows Editors: First impressions

    Directory of Open Access Journals (Sweden)

    Steve Swettenham

    2006-12-01

    Full Text Available An RSS feed is a list of topics made available from a webpage via a standard XML file format known as RSS, an abbreviation of either Really Simple Syndication or Rich Site Summary (Wikipedia, 2006. The end-user subscribes to their favorite Internet content site via RSS-aware software. Once subscribed, announcements with appropriate links are “pushed” from the publishing site whenever new material is added to that site (see Figure 1. This allows notification of new content of possible interest, fed with anonymity to subscribers, and reduces email clutter.

  8. RSS MONTHLY 1-DEG MERGED WIND CLIMATOLOGY NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS Monthly 1-deg Merged Wind Climatology netCDF dataset provides one degree gridded data for the monthly means of wind speed and wind direction, a 20 year...

  9. BOREAS RSS-08 Snow Maps Derived from Landsat TM Imagery

    Data.gov (United States)

    National Aeronautics and Space Administration — The BOREAS RSS-08 team utilized Landsat TM images to perform mapping of snow extent over the SSA. This data set consists of two Landsat TM images which were used to...

  10. Triple3 Redundant Spacecraft Subsystems (T3RSS) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — T3RSS is the system engineer's tool that allows a systematic approach to ensuring that even if one or more failures occur in a single component or subsystem, then...

  11. RSS as a distribution medium for geo-spatial hypermedia

    DEFF Research Database (Denmark)

    Hansen, Frank Allan; Christensen, Bent Guldbjerg; Bouvin, Niels Olof

    2005-01-01

    This paper describes how the XML based RSS syndication formats used in weblogs can be utilized as the distribution medium for geo-spatial hypermedia, and how this approach can be used to create a highly distributed multi-user annotation system for geo-spatial hypermedia. It is demonstrated, how...... the HyCon annotation model [2] can be formulated as a RSS 2.0 feed and how such feeds allow annotation threads to be distributed across multiple weblogs and servers....

  12. Free-range RSS feeds and farm-raised journals: what to expect when using RSS as a TOC service.

    Science.gov (United States)

    Fletcher, Adelaide Myers

    2009-01-01

    Anyone who has tried to set up RSS feeds with or for a patron knows that the RSS feeds for e-journals can behave wildly, like free-range cattle, while the e-journals that libraries subscribe to tend to be more like farm-raised cattle, because they are packaged for institutions rather than individuals. Because of this disconnect, the experience of teaching RSS feeds to one's patrons can be fraught with "oops" moments. Knowing what to expect can help librarians prepare to teach patrons to use RSS feeds without scaring them away from a powerful tool. This article will discuss some problems to expect and ways to work around them.

  13. Structural studies on MtRecA-nucleotide complexes: insights into DNA and nucleotide binding and the structural signature of NTP recognition.

    Science.gov (United States)

    Datta, S; Ganesh, N; Chandra, Nagasuma R; Muniyappa, K; Vijayan, M

    2003-02-15

    RecA protein plays a crucial role in homologous recombination and repair of DNA. Central to all activities of RecA is its binding to Mg(+2)-ATP. The active form of the protein is a helical nucleoprotein filament containing the nucleotide cofactor and single-stranded DNA. The stability and structure of the helical nucleoprotein filament formed by RecA are modulated by nucleotide cofactors. Here we report crystal structures of a MtRecA-ADP complex, complexes with ATPgammaS in the presence and absence of magnesium as well as a complex with dATP and Mg+2. Comparison with the recently solved crystal structures of the apo form as well as a complex with ADP-AlF4 confirms an expansion of the P-loop region in MtRecA, compared to its homologue in Escherichia coli, correlating with the reduced affinity of MtRecA for ATP. The ligand bound structures reveal subtle variations in nucleotide conformations among different nucleotides that serve in maintaining the network of interactions crucial for nucleotide binding. The nucleotide binding site itself, however, remains relatively unchanged. The analysis also reveals that ATPgammaS rather than ADP-AlF4 is structurally a better mimic of ATP. From among the complexed structures, a definition for the two DNA-binding loops L1 and L2 has clearly emerged for the first time and provides a basis to understand DNA binding by RecA. The structural information obtained from these complexes correlates well with the extensive biochemical data on mutants available in the literature, contributing to an understanding of the role of individual residues in the nucleotide binding pocket, at the molecular level. Modeling studies on the mutants again point to the relative rigidity of the nucleotide binding site. Comparison with other NTP binding proteins reveals many commonalties in modes of binding by diverse members in the structural family, contributing to our understanding of the structural signature of NTP recognition. Copyright 2003 Wiley

  14. Biochemical Characterization of RssA-RssB, a Two-Component Signal Transduction System Regulating Swarming Behavior in Serratia marcescens

    OpenAIRE

    Wei, Jun-Rong; Tsai, Yu-Huan; Soo, Po-Chi; Horng, Yu-Tze; Hsieh, Shang-Chen; Ho, Shen-Wu; Lai, Hsin-Chih

    2005-01-01

    Our previous study had identified a pair of potential two-component signal transduction proteins, RssA-RssB, involved in the regulation of Serratia marcescens swarming. When mutated, both rssA and rssB mutants showed precocious swarming phenotypes on LB swarming agar, whereby swarming not only occurred at 37°C but also initiated on a surface of higher agar concentration and more rapidly than did the parent strain at 30°C. In this study, we further show that the predicted sensor kinase RssA an...

  15. ELECTRONIC SIGNATURES

    African Journals Online (AJOL)

    10332324

    'electronic signature' means data attached to, incorporated in, or logically associated with other data and which is intended by the user to serve as a signature;. The suggested new definition for an electronic signature reads as follows: 'electronic signature' means a sound, symbol or process that is (i) uniquely linked to the ...

  16. RSS feeds: what are they and why should I care?

    Science.gov (United States)

    Bergeron, Bryan P

    2006-01-01

    Really simple syndication (RSS) feeds and aggregators are indispensable tools for clinicians who need to stay abreast of the latest clinical research, public health publications, and economic factors that might affect their practice. RSS enables clinicians with a compatible browser, such as Mozilla Firefox, or other desktop aggregator, to view headlines and journal article titles from dozens or even hundreds of disparate Web sites of their choosing. Instead of wasting time visiting each Web site, dealing with pop-ups and advertising, and parsing new data from old, aggregators provide a single, simple window into the information. Setting up a desktop aggregator to manage and display RSS feeds is straightforward and, thanks to open source applications, imminently affordable.

  17. RSS (http://www.iaees.org/publications/journals/environsc/rss.xml

    Directory of Open Access Journals (Sweden)

    Environmental Skeptics and Critics (ISSN 2224-4263

    Full Text Available Environmental Skeptics and Critics ISSN 2224-4263 URL: http://www.iaees.org/publications/journals/environsc/online-version.asp RSS: http://www.iaees.org/publications/journals/environsc/rss.xml E-mail: environsc@iaees.org Editor-in-Chief: WenJun Zhang Aims and Scope The more truth is debated, the clearer it becomes. Science will not proceed without debate and controversy. Wide and in-depth debate and controversy on human's knowledge, attitudes, policies and practices on the environment determines the future of our planet. There are numerous controversial and potentially controversial issues on environmental sciences and practices. ENVIRONMENTAL SKEPTICS and CRITICS (ISSN 2224-4263 is an international journal devoted to the publication of skeptical and critical articles/short communications/letters on theories, viewpoints, methodologies, practices, policies, etc., in ecological and environmental areas. The journal provides a forum for questioning, disputing, arguing, challenging, criticizing and judging known theories, methdologies, practices, and policies, etc., or presenting different ideas. The scope of Environmental Skeptics and Critics is wide and embraces all controversial, non-conclusive or unexplained issues in ecological and environmental areas. Authors can submit their works to the email box of this journal, environsc@iaees.org. All manuscripts submitted to this journal must be previously unpublished and may not be considered for publication elsewhere at any time during review period of this journal. Authors are asked to read Author Guidelines before submitting manuscripts. In addition to free submissions from authors around the world, special issues are also accepted. The organizer of a special issue can collect submissions (yielded from a research project, a research group, etc. on a specific research topic, or submissions of a scientific conference for publication of special issue.

  18. RSS (http://www.iaees.org/publications/journals/arthropods/rss.xml

    Directory of Open Access Journals (Sweden)

    Arthropods (ISSN 2224-4255

    Full Text Available Arthropods ISSN 2224-4255 URL: http://www.iaees.org/publications/journals/arthropods/online-version.asp RSS: http://www.iaees.org/publications/journals/arthropods/rss.xml E-mail: arthropods@iaees.org Editor-in-Chief: WenJun Zhang Aims and Scope ARTHROPODS (ISSN 2224-4255 is an international journal devoted to the publication of articles on various aspects of arthropods, e.g., ecology, biogeography, systematics, biodiversity (species diversity, genetic diversity, et al., conservation, control, etc. The journal provides a forum for examining the importance of arthropods in biosphere (both terrestrial and marine ecosystems and human life in such fields as agriculture, forestry, fishery, environmental management and human health. The scope of Arthropods is wide and embraces all arthropods-insects, arachnids, crustaceans, centipedes, millipedes, and other arthropods. Articles/short communications on new taxa (species, genus, families, orders, etc. and new records of arthropods are particularly welcome. Authors can submit their works to the email box of this journal, arthropods@iaees.org. All manuscripts submitted to this journal must be previously unpublished and may not be considered for publication elsewhere at any time during review period of this journal. Authors are asked to read Author Guidelines before submitting manuscripts. In addition to free submissions from authors around the world, special issues are also accepted. The organizer of a special issue can collect submissions (yielded from a research project, a research group, etc. on a specific research topic, or submissions of a scientific conference for publication of special issue.

  19. Automating Academic Literature Searches With RSS Feeds and Google Reader™

    Science.gov (United States)

    Dubuque, Erick M

    2011-01-01

    Behavior analytic practitioners have an ethical obligation to stay abreast of the most recent research developments in their areas of expertise. Although conducting frequent and comprehensive literature searches is one way to meet this mandate, doing so can be a time intensive process. One way to reduce the effort involved in this process is setting up automated literature and news searches using RSS feeds via programs like Google Reader™. This paper outlines the steps necessary for setting up a Google Reader™ account and creating customized RSS feeds based on searches of the National Center for Biotechnology Information (NCBI) PubMed database and the World Wide Web. PMID:22532905

  20. Mobile Learning Application Based on RSS Feed Technology

    Science.gov (United States)

    Mohanna, Mahmoud; Capus, Laurence

    2013-01-01

    This paper presents a mobile learning application for a learning course at higher education level. Based on the RSS feed technology, the presented mobile application establishes an in-time communication channel between the instructor and his/her students to keep them up-to-date with all course important dates, instructions and information in…

  1. RSS Made Easy with Engaged Patrons and Yahoo! Pipes

    Science.gov (United States)

    Widner, Melissa

    2010-01-01

    Jasper County Public Library in Indiana had started using EngagedPatrons.org (EP) in 2007. EP is a low-cost technology solution providing online events calendars, RSS feeds, database support, and other web services to connect libraries to their users. It was created in 2006 by Glenn Peterson, who also designs the feature-rich websites for…

  2. RSS (http://www.iaees.org/publications/journals/nb/rss.xml

    Directory of Open Access Journals (Sweden)

    Network Biology (ISSN 2220-8879

    Full Text Available Network Biology ISSN 2220-8879 URL: http://www.iaees.org/publications/journals/nb/online-version.asp RSS: http://www.iaees.org/publications/journals/nb/rss.xml E-mail: networkbiology@iaees.org Editor-in-Chief: WenJun Zhang Aims and Scope NETWORK BIOLOGY (ISSN 2220-8879; CODEN NBEICS is an open access, peer-reviewed international journal that considers scientific articles in all different areas of network biology. It is the transactions of the International Society of Network Biology. It dedicates to the latest advances in network biology. The goal of this journal is to keep a record of the state-of-the-art research and promote the research work in these fast moving areas. The topics to be covered by Network Biology include, but are not limited to: •Theories, algorithms and programs of network analysis •Innovations and applications of biological networks •Ecological networks, food webs and natural equilibrium •Co-evolution, co-extinction, biodiversity conservation •Metabolic networks, protein-protein interaction networks, biochemical reaction networks, gene networks, transcriptional regulatory networks, cell cycle networks, phylogenetic networks, network motifs •Physiological networks •Network regulation of metabolic processes, human diseases and ecological systems •Social networks, epidemiological networks •System complexity, self-organized systems, emergence of biological systems, agent-based modeling, individual-based modeling, neural network modeling, and other network-based modeling, etc. We are also interested in short communications that clearly address a specific issue or completely present a new ecological network, food web, or metabolic or gene network, etc. Authors can submit their works to the email box of this journal, networkbiology@iaees.org. All manuscripts submitted to this journal must be previously unpublished and may not be considered for publication elsewhere at any time during review period of this journal

  3. The architecture of the 12RSS in V(D)J recombination signal and synaptic complexes.

    Science.gov (United States)

    Ciubotaru, Mihai; Surleac, Marius D; Metskas, Lauren Ann; Koo, Peter; Rhoades, Elizabeth; Petrescu, Andrei J; Schatz, David G

    2015-01-01

    V(D)J recombination is initiated by RAG1 and RAG2, which together with HMGB1 bind to a recombination signal sequence (12RSS or 23RSS) to form the signal complex (SC) and then capture a complementary partner RSS, yielding the paired complex (PC). Little is known regarding the structural changes that accompany the SC to PC transition or the structural features that allow RAG to distinguish its two asymmetric substrates. To address these issues, we analyzed the structure of the 12RSS in the SC and PC using fluorescence resonance energy transfer (FRET) and molecular dynamics modeling. The resulting models indicate that the 12RSS adopts a strongly bent V-shaped structure upon RAG/HMGB1 binding and reveal structural differences, particularly near the heptamer, between the 12RSS in the SC and PC. Comparison of models of the 12RSS and 23RSS in the PC reveals broadly similar shapes but a distinct number and location of DNA bends as well as a smaller central cavity for the 12RSS. These findings provide the most detailed view yet of the 12RSS in RAG-DNA complexes and highlight structural features of the RSS that might underlie activation of RAG-mediated cleavage and substrate asymmetry important for the 12/23 rule of V(D)J recombination. © The Author(s) 2014. Published by Oxford University Press on behalf of Nucleic Acids Research.

  4. Using GeoRSS feeds to distribute house renting and selling information based on Google map

    Science.gov (United States)

    Nong, Yu; Wang, Kun; Miao, Lei; Chen, Fei

    2007-06-01

    Geographically Encoded Objects RSS (GeoRSS) is a way to encode location in RSS feeds. RSS is a widely supported format for syndication of news and weblogs, and is extendable to publish any sort of itemized data. When Weblogs explode since RSS became new portals, Geo-tagged feed is necessary to show the location that story tells. Geographically Encoded Objects adopts the core of RSS framework, making itself the map annotations specified in the RSS XML format. The case studied illuminates that GeoRSS could be maximally concise in representation and conception, so it's simple to manipulate generation and then mashup GeoRSS feeds with Google Map through API to show the real estate information with other attribute in the information window. After subscribe to feeds of concerned subjects, users could easily check for new bulletin showing on map through syndication. The primary design goal of GeoRSS is to make spatial data creation as easy as regular Web content development. However, it does more for successfully bridging the gap between traditional GIS professionals and amateurs, Web map hackers, and numerous services that enable location-based content for its simplicity and effectiveness.

  5. Quantitative analyses of RAG-RSS interactions and conformations revealed by atomic force microscopy.

    Science.gov (United States)

    Pavlicek, Jeffrey W; Lyubchenko, Yuri L; Chang, Yung

    2008-10-28

    During V(D)J recombination, site specific DNA excision is dictated by the binding of RAG1/2 proteins to the conserved recombination signal sequence (RSS) within the genome. The interaction between RAG1/2 and RSS is thought to involve a large DNA distortion that is permissive for DNA cleavage. In this study, using atomic force microscopy imaging (AFM), we analyzed individual RAG-RSS complexes, in which the bending angle of RAG-associated RSS substrates could be visualized and quantified. We provided the quantitative measurement on the conformations of specific RAG-12RSS complexes. Previous data indicating the necessity of RAG2 for recombination implies a structural role in the RAG-RSS complex. Surprisingly, however, no significant difference was observed in conformational bending with AFM between RAG1-12RSS and RAG1/2-12RSS. RAG1 was found sufficient to induce DNA bending, and the addition of RAG2 did not change the bending profile. In addition, a prenicked 12RSS bound by RAG1/2 proteins displayed a conformation similar to the one observed with the intact 12RSS, implying that no greater DNA bending occurs after the nicking step in the signal complex. Taken together, the quantitative AFM results on the components of the recombinase emphasize a tightly held complex with a bend angle value near 60 degrees , which may be a prerequisite step for the site-specific nicking by the V(D)J recombinase.

  6. BOREAS RSS-8 Snow Maps Derived from Landsat TM Imagery

    Science.gov (United States)

    Hall, Dorothy; Chang, Alfred T. C.; Foster, James L.; Chien, Janeet Y. L.; Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Smith, David E. (Technical Monitor)

    2000-01-01

    The Boreal Ecosystem-Atmosphere Study (BOREAS) Remote Sensing Science (RSS)-8 team utilized Landsat Thematic Mapper (TM) images to perform mapping of snow extent over the Southern Study Area (SSA). This data set consists of two Landsat TM images that were used to determine the snow-covered pixels over the BOREAS SSA on 18 Jan 1993 and on 06 Feb 1994. The data are stored in binary image format files. The RSS-08 snow map data are available from the Earth Observing System Data and Information System (EOSDIS) Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC). The data files are available on a CD-ROM (see document number 20010000884).

  7. BOREAS RSS-11 Ground Network of Sunphotometer Measurements

    Science.gov (United States)

    Markham, Brian L.; Hall, Forrest G. (Editor); Nickerson, Jaime (Editor); Schafer, Joel; Smith, David E. (Technical Monitor)

    2000-01-01

    The BOREAS RSS-11 team operated a network of five automated (Cimel) and two hand-held (Miami) solar radiometers from 1994 to 1996 during the BOREAS field campaigns. The data provide aerosol optical depth measurements, size distribution, phase function, and column water vapor amounts over points in northern Saskatchewan and Manitoba, Canada. The data are useful for the correction of remotely sensed aircraft and satellite images. The data are provided in tabular ASCII files.

  8. Penelitian pengaruh perbandingan rss dengan SBR dan PBN terhadap ketahanan sobek dan kekerasan kompon talang karet

    Directory of Open Access Journals (Sweden)

    Asrilah Asrilah

    1995-06-01

    Full Text Available The objective of this research is to know the influence variation in application RSS, SBR and PBN of Rubber gutter Compound to physical properties in tear resistance and hardness. Rubber gutter Compound is made from natural Rubber (RSS wich be mixed by sintetics Rubber (RSS and addition of ingredients such as : softener, activator filler antioxidant, accelerator and vulcanizing agent. It should be carried out using base formula by varying RSS/SBR 40/ 60; 50/50; 60;40 part and PBN 1; 1,5 and 2 part. Statistically prove that variation in application RSS/SBR and PBN influenced physical properties of the result test. The application RSS/SBR 60/40 part PBN 1,5 part will give the best compound with the tear resistance 11,05N/mm2 and hardness 72,33 Shore A.

  9. Randomized Controlled Trial of RSS Reader Use and Resident Familiarity With Primary Literature.

    Science.gov (United States)

    Jenssen, Brian P; Desai, Bimal R; Callahan, James M

    2014-06-01

    Awareness of the primary literature is important for clinicians. Lack of time, poor access to information, and lack of personal initiative may be barriers for some trainees. Really Simple Syndication (RSS) readers aggregate web content, such as journal abstracts, in a single location for easy viewing. We assessed whether use of an RSS reader would increase resident reading frequency, familiarity, and understanding of the primary literature. We conducted a single-center, prospective, randomized, nonblinded, controlled trial of the effect of RSS reader use on knowledge of recent literature among pediatrics residents. Residents were randomly assigned to the RSS group (education in RSS use and receipt of the Pediatrics RSS feed) or a control group that followed standard reading practices. Outcome measures were differences on baseline and monthly surveys of reading frequency, familiarity with recent publications, and knowledge of recent articles (familiarity validation). Of 144 eligible residents, 79 (55%) were enrolled in the survey, with 81% (64 of 79) of participants completing all surveys. The RSS reader use was correlated with greater familiarity with selected articles, but not with improved understanding (as measured by ability to answer multiple-choice questions about content). Participants reported satisfaction with the RSS reader based on its ease of use, accessibility, and as an aid in supplementing reading. The RSS reader use was accepted by residents and associated with increased familiarity with the primary literature but not with increased understanding.

  10. BOREAS RSS-08 IFC-3 ADS-PSII Measurements of BRDF at SSA-OBS and SSA-OA Sites

    Data.gov (United States)

    National Aeronautics and Space Administration — Ground BRDF measurements were acquired by the Remote Sensing Science (RSS)-08 team to aid in the development of advanced spectral vegetation indices. The RSS-08 team...

  11. The Nuts and Bolts of Delivering New Technical Reports via Database-Generated RSS Feeds

    Science.gov (United States)

    Zhu, Qin

    2006-01-01

    At the Hewlett-Packard (HP) Labs Research Library, the metadata of HP Labs technical reports (research papers, reports, and articles) is managed through their customized library catalog system. RSS is used to make newly published technical reports from the ILS available externally as RSS feeds on the HP Labs Technical Reports Web site and…

  12. RssAB signaling coordinates early development of surface multicellularity in Serratia marcescens.

    Directory of Open Access Journals (Sweden)

    Yu-Huan Tsai

    Full Text Available Bacteria can coordinate several multicellular behaviors in response to environmental changes. Among these, swarming and biofilm formation have attracted significant attention for their correlation with bacterial pathogenicity. However, little is known about when and where the signaling occurs to trigger either swarming or biofilm formation. We have previously identified an RssAB two-component system involved in the regulation of swarming motility and biofilm formation in Serratia marcescens. Here we monitored the RssAB signaling status within single cells by tracing the location of the translational fusion protein EGFP-RssB following development of swarming or biofilm formation. RssAB signaling is specifically activated before surface migration in swarming development and during the early stage of biofilm formation. The activation results in the release of RssB from its cognate inner membrane sensor kinase, RssA, to the cytoplasm where the downstream gene promoters are located. Such dynamic localization of RssB requires phosphorylation of this regulator. By revealing the temporal activation of RssAB signaling following development of surface multicellular behavior, our findings contribute to an improved understanding of how bacteria coordinate their lifestyle on a surface.

  13. Penelitian penggunaan campuran karet alam RSS dengan stiren butadien rubber (SBR dalam pembuatan soft rubber lining

    Directory of Open Access Journals (Sweden)

    Penny Setyowati

    1995-06-01

    Full Text Available The objective of this research is to obtain optimum composition of RSS and SBR compound for making soft rubber lining compound. Based on seven combination of trials in compound formulation proved that formulation with composition of RSS 50 parts and SBR 50 parts give the best physical properties and highly cemented on steel by using “Desmodur R” adhesive solution.

  14. Use of RSS feeds for the implementation of clinical reminder.

    Science.gov (United States)

    Chi, Wen-Chou; Wen, Chia-Hsien; Lin, Chih-Yu; Poon, Sek-Kwong; Huang, Shih-Che

    2012-06-01

    A computer-based reminder system can help physicians get right information and make right decisions in daily clinical work in time. This study presents a RSS-based Clinical Reminding System (RCRS) designed for reminding clinicians to deal with their varied unfinished clinical works. The RCRS was implemented in a hospital to automatically generate messages for every clinician on the basis of clinical information gathered from the hospital information system (HIS) and send them by RSS feed. In order to allow all physicians to participate in the project, the RCRS was integrated with the Computerized Physician Order Entry (COPE) system to provide messages whenever a clinician logs in the HIS; the connection on screen lets the clinician easily make some response. The system can help clinicians focus on patient care without keeping track of the schedule of clinical chores stored in various systems. Two physicians, also directors from Clinical Informatics Research & Development Center (CIRD) who were appointed as project leaders of the RCRS project who went through the entire development process were chosen as interviewees to obtain a preliminary evaluation of the system. The results show the "Information Content" of this system was suggested to be modified, and "Information Accuracy", "Formats", "Ease of use" and "Timeliness" of the system were appropriate to meet the system design purposes.

  15. The ABCs of RSS: Real Simple Syndication Can Be a Powerful Research and Teaching Tool for Internet-Inclined Educators. Here's How to Get Started

    Science.gov (United States)

    Richardson, Will

    2005-01-01

    Just what is RSS and how can it be used in education? Depending on who someone talks to, RSS stands for Rich Site Summary or Real Simple Syndication. Either way, RSS is an important technology that information specialists and educators would be wise to harness. In simple terms, RSS is a format for aggregating Web content in one place. This article…

  16. BOREAS RSS-17 Stem, Soil, and Air Temperature Data

    Science.gov (United States)

    Zimmerman, Reiner; McDonald, Kyle C.; Way, JoBea; Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Smith, David E. (Technical Monitor)

    2000-01-01

    The BOREAS RSS-17 team collected several data sets in support of its research in monitoring and analyzing environmental and phenological states using radar data. This data set consists of tree bole and soil temperature measurements from various BOREAS flux tower sites. Temperatures were measured with thermistors implanted in the hydroconductive tissue of the trunks of several trees at each site and at various depths in the soil. Data were stored on a data logger at intervals of either 1 or 2 hours. The majority of the data were acquired between early 1994 and early 1995. The primary product of this data set is the diurnal stem temperature measurements acquired for selected trees at five BOREAS tower sites. The data are provided in tabular ASCII format. The data files are available on a CD-ROM (see document number 20010000884) or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  17. An RSS based location estimation technique for cognitive relay networks

    KAUST Repository

    Qaraqe, Khalid A.

    2010-11-01

    In this paper, a received signal strength (RSS) based location estimation method is proposed for a cooperative wireless relay network where the relay is a cognitive radio. We propose a method for the considered cognitive relay network to determine the location of the source using the direct and the relayed signal at the destination. We derive the Cramer-Rao lower bound (CRLB) expressions separately for x and y coordinates of the location estimate. We analyze the effects of cognitive behaviour of the relay on the performance of the proposed method. We also discuss and quantify the reliability of the location estimate using the proposed technique if the source is not stationary. The overall performance of the proposed method is presented through simulations. ©2010 IEEE.

  18. BOREAS RSS-20 POLDER C-130 Measurements of Surface BRDF

    Science.gov (United States)

    Leroy, Marc; Hall, Forrest G. (Editor); Nickerson, Jaime (Editor); Smith, David E. (Technical Monitor)

    2000-01-01

    This Boreal Ecosystem-Atmosphere Study (BOREAS) Remote Sensing Science (RSS)-20 data set contains measurements of surface bidirectional reflectance distribution function (BRDF) made by the polarization and Directionality of Earth reflectances (POLDER) instrument over several surface types (pine, spruce, fen) of the BOREAS southern study area (SSA) during the 1994 intensive field campaigns (IFCs). Single-point BRDF values were acquired either from the NASA Ames Research Center (ARC) C-130 aircraft or from a NASA Wallops Flight Facility (WFF) helicopter. A related data set collected from the helicopter platform is available as is POLDER imagery acquired from the C-130. The data are stored in tabular ASCII files. The data files are available on a CD-ROM (see document number 20010000884) or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  19. BOREAS RSS-7 LAI, Gap Fraction, and FPAR Data

    Science.gov (United States)

    Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Chen, Jing

    2000-01-01

    The BOREAS RSS-7 team collected various data sets to develop and validate an algorithm to allow the retrieval of the spatial distribution of Leaf Area Index (LAI) from remotely sensed images. Ground measurements of LAI and Fraction of Photosynthetically Active Radiation (FPAR) absorbed by the plant canopy were made using the LAI-2000 and TRAC optical instruments during focused periods from 09-Aug-1993 to 19-Sep-1994. The measurements were intensive at the NSA and SSA tower sites, but were made just once or twice at auxiliary sites. The final processed LAI and FPAR data set is contained in tabular ASCII files. The data files are available on a CD-ROM (see document number 20010000884).

  20. RSS SSM/I OCEAN PRODUCT GRIDS DAILY FROM DMSP F11 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Daily from DMSP F11 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  1. RSS SSMIS OCEAN PRODUCT GRIDS WEEKLY AVERAGE FROM DMSP F17 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSMIS Ocean Product Grids Weekly Average from DMSP F17 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  2. RSS SSMIS OCEAN PRODUCT GRIDS DAILY FROM DMSP F17 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSMIS Ocean Product Grids Daily from DMSP F17 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  3. BOREAS RSS-02 Level-1b ASAS Image Data: At-sensor Radiance in BSQ Format

    Data.gov (United States)

    National Aeronautics and Space Administration — The BOREAS RSS-02 team used the ASAS instrument, mounted on the NASA C-130 aircraft, to create at-sensor radiance images of various sites as a function of spectral...

  4. RSS SSMIS OCEAN PRODUCT GRIDS 3-DAY AVERAGE FROM DMSP F16 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSMIS Ocean Product Grids 3-Day Average from DMSP F16 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  5. RSS SSMIS OCEAN PRODUCT GRIDS MONTHLY AVERAGE FROM DMSP F17 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSMIS Ocean Product Grids Monthly Average from DMSP F17 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special...

  6. BOREAS RSS-08 SSA IFC-3 Digitized Stereo Imagery at the OBS, OA, and OJP Sites

    Data.gov (United States)

    National Aeronautics and Space Administration — ABSTRACT: The RSS08 team acquired stereo photography from the double-scaffold towers at the Southern Study Area (SSA), Old Black Spruce (OBS), Old Aspen (OA), and...

  7. RSS SSM/I OCEAN PRODUCT GRIDS MONTHLY AVERAGE FROM DMSP F15 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Monthly Average from DMSP F15 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special...

  8. RSS SSM/I OCEAN PRODUCT GRIDS MONTHLY AVERAGE FROM DMSP F13 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Monthly Average from DMSP F13 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special...

  9. RSS SSMIS OCEAN PRODUCT GRIDS WEEKLY AVERAGE FROM DMSP F16 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSMIS Ocean Product Grids Weekly Average from DMSP F16 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  10. RSS SSM/I OCEAN PRODUCT GRIDS DAILY FROM DMSP F14 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Daily from DMSP F14 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  11. RSS SSM/I OCEAN PRODUCT GRIDS MONTHLY AVERAGE FROM DMSP F14 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Monthly Average from DMSP F14 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special...

  12. RSS SSM/I OCEAN PRODUCT GRIDS DAILY FROM DMSP F15 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Daily from DMSP F15 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  13. RSS SSM/I OCEAN PRODUCT GRIDS DAILY FROM DMSP F13 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Daily from DMSP F13 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  14. RSS SSM/I OCEAN PRODUCT GRIDS MONTHLY AVERAGE FROM DMSP F11 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Monthly Average from DMSP F11 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special...

  15. RSS SSM/I OCEAN PRODUCT GRIDS MONTHLY AVERAGE FROM DMSP F10 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Monthly Average from DMSP F10 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special...

  16. RSS SSM/I OCEAN PRODUCT GRIDS DAILY FROM DMSP F10 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Daily from DMSP F10 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  17. RSS SSMIS OCEAN PRODUCT GRIDS DAILY FROM DMSP F16 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSMIS Ocean Product Grids Daily from DMSP F16 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  18. RSS SSMIS OCEAN PRODUCT GRIDS MONTHLY AVERAGE FROM DMSP F16 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSMIS Ocean Product Grids Monthly Average from DMSP F16 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special...

  19. RSS SSMIS OCEAN PRODUCT GRIDS 3-DAY AVERAGE FROM DMSP F17 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSMIS Ocean Product Grids 3-Day Average from DMSP F17 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  20. BOREAS RSS-14 Level-3 Gridded Radiometer and Satellite Surface Radiation Images

    Data.gov (United States)

    National Aeronautics and Space Administration — ABSTRACT: The BOREAS RSS-14 team collected and processed GOES-7 and -8 images of the BOREAS region as part of their effort to characterize the incoming, reflected...

  1. BOREAS RSS-14 GOES-8 Level-1 Visible, Infrared and Water Vapor Images

    Data.gov (United States)

    National Aeronautics and Space Administration — The level-1 BOREAS GOES-8 images are raw data values collected by RSS-14 personnel at FSU and delivered to BORIS. The data cover 14-Jul-1995 to 21-Sep-1995 and...

  2. BOREAS RSS-17 1994 ERS-1 Level-3 Freeze/Thaw Backscatter Change Images

    Data.gov (United States)

    National Aeronautics and Space Administration — The BOREAS RSS-17 team acquired and analyzed imaging radar data from the ESA's ERS-1 over a complete annual cycle at the BOREAS sites in Canada in 1994 to detect...

  3. RSS MONTHLY 1-DEG MICROWAVE TOTAL PRECIPITABLE WATER NETCDF V7R01

    Data.gov (United States)

    National Aeronautics and Space Administration — The Remote Sensing Systems (RSS) Monthly 1-degree Microwave Total Precipitable Water (TPW) netCDF dataset V7R01 provides global total columnar water vapor values, or...

  4. Mobile robot trajectory tracking using noisy RSS measurements: an RFID approach.

    Science.gov (United States)

    Miah, M Suruz; Gueaieb, Wail

    2014-03-01

    Most RF beacons-based mobile robot navigation techniques rely on approximating line-of-sight (LOS) distances between the beacons and the robot. This is mostly performed using the robot's received signal strength (RSS) measurements from the beacons. However, accurate mapping between the RSS measurements and the LOS distance is almost impossible to achieve in reverberant environments. This paper presents a partially-observed feedback controller for a wheeled mobile robot where the feedback signal is in the form of noisy RSS measurements emitted from radio frequency identification (RFID) tags. The proposed controller requires neither an accurate mapping between the LOS distance and the RSS measurements, nor the linearization of the robot model. The controller performance is demonstrated through numerical simulations and real-time experiments. ©2013 Published by ISA. All rights reserved.

  5. RSS Fingerprint Based Indoor Localization Using Sparse Representation with Spatio-Temporal Constraint.

    Science.gov (United States)

    Piao, Xinglin; Zhang, Yong; Li, Tingshu; Hu, Yongli; Liu, Hao; Zhang, Ke; Ge, Yun

    2016-11-03

    The Received Signal Strength (RSS) fingerprint-based indoor localization is an important research topic in wireless network communications. Most current RSS fingerprint-based indoor localization methods do not explore and utilize the spatial or temporal correlation existing in fingerprint data and measurement data, which is helpful for improving localization accuracy. In this paper, we propose an RSS fingerprint-based indoor localization method by integrating the spatio-temporal constraints into the sparse representation model. The proposed model utilizes the inherent spatial correlation of fingerprint data in the fingerprint matching and uses the temporal continuity of the RSS measurement data in the localization phase. Experiments on the simulated data and the localization tests in the real scenes show that the proposed method improves the localization accuracy and stability effectively compared with state-of-the-art indoor localization methods.

  6. BOREAS RSS-14 Level-3 Gridded Radiometer and Satellite Surface Radiation Images

    Data.gov (United States)

    National Aeronautics and Space Administration — The BOREAS RSS-14 team collected and processed GOES-7 and -8 images of the BOREAS region as part of their effort to characterize the incoming, reflected and emitted...

  7. BOREAS RSS-07 Landsat TM LAI Images of the SSA and NSA

    Data.gov (United States)

    National Aeronautics and Space Administration — The BOREAS RSS-07 team used Landsat TM images processed at CCRS to produce images of LAI for the BOREAS study areas. Two images acquired on June 6 and August 9, 1991...

  8. Human-Induced Effects on RSS Ranging Measurements for Cooperative Positioning

    OpenAIRE

    Francescantonio Della Rosa; Mauro Pelosi; Jari Nurmi

    2012-01-01

    We present experimental evaluations of human-induced perturbations on received-signal-strength-(RSS-) based ranging measurements for cooperative mobile positioning. To the best of our knowledge, this work is the first attempt to gain insight and understand the impact of both body loss and hand grip on the RSS for enhancing proximity measurements among neighbouring devices in cooperative scenarios. Our main contribution is represented by experimental investigations. Analysis of the errors intr...

  9. Stay tuned. Comparison of journal updates tracking using RSS and e-mail technologies.

    Science.gov (United States)

    Rethlefsen, M; Rethlefsen, Melissa L; Gajic, O; Gajic, Ognjen; Herasevich, V; Herasevich, Vitaly

    2008-11-06

    Electronic subscription alerts provide new possibilities for health care providers to stay abreast with current literature and practice evidence-based medicine. During a 5 month prospective observation we compared the performance of the three common subscription methods: email and Really Simple Syndication (RSS) from the publisher and RSS from PubMed. The 3 methods were reliably updated without interruption in service but demonstrated significant variability in the contents and timing.

  10. Skutečně off-line čtení RSS

    OpenAIRE

    Dresto, Erik

    2009-01-01

    Práce se zabývá problematikou čtení RSS článků bez internetového připojení. Cílem bylo získat informace z oblasti čtení RSS článků, seznámit se s formátem RSS, poznat jeho strukturu a historii. Dále s dostupnými RSS čtečkami, zhodnotit jejich výhody a nevýhody z hlediska jednoduchosti rozšíření, aktualizace a možnosti převodu na mobilní zařízení. V práci se dále nachází stručný popis technologii, které se využívají při práci s RSS kanály. Jsou vysvětlené důvody zavedení formátu RSS pro publik...

  11. IraL is an RssB anti-adaptor that stabilizes RpoS during logarithmic phase growth in Escherichia coli and Shigella.

    Science.gov (United States)

    Hryckowian, Andrew J; Battesti, Aurelia; Lemke, Justin J; Meyer, Zachary C; Welch, Rodney A

    2014-05-27

    RpoS (σ(S)), the general stress response sigma factor, directs the expression of genes under a variety of stressful conditions. Control of the cellular σ(S) concentration is critical for appropriately scaled σ(S)-dependent gene expression. One way to maintain appropriate levels of σ(S) is to regulate its stability. Indeed, σ(S) degradation is catalyzed by the ClpXP protease and the recognition of σ(S) by ClpXP depends on the adaptor protein RssB. Three anti-adaptors (IraD, IraM, and IraP) exist in Escherichia coli K-12; each interacts with RssB and inhibits RssB activity under different stress conditions, thereby stabilizing σ(S). Unlike K-12, some E. coli isolates, including uropathogenic E. coli strain CFT073, show comparable cellular levels of σ(S) during the logarithmic and stationary growth phases, suggesting that there are differences in the regulation of σ(S) levels among E. coli strains. Here, we describe IraL, an RssB anti-adaptor that stabilizes σ(S) during logarithmic phase growth in CFT073 and other E. coli and Shigella strains. By immunoblot analyses, we show that IraL affects the levels and stability of σ(S) during logarithmic phase growth. By computational and PCR-based analyses, we reveal that iraL is found in many E. coli pathotypes but not in laboratory-adapted strains. Finally, by bacterial two-hybrid and copurification analyses, we demonstrate that IraL interacts with RssB by a mechanism distinct from that used by other characterized anti-adaptors. We introduce a fourth RssB anti-adaptor found in E. coli species and suggest that differences in the regulation of σ(S) levels may contribute to host and niche specificity in pathogenic and nonpathogenic E. coli strains. Bacteria must cope with a variety of environmental conditions in order to survive. RpoS (σ(S)), the general stress response sigma factor, directs the expression of many genes under stressful conditions in both pathogenic and nonpathogenic Escherichia coli strains

  12. Uav Positioning and Collision Avoidance Based on RSS Measurements

    Science.gov (United States)

    Masiero, A.; Fissore, F.; Guarnieri, A.; Pirotti, F.; Vettore, A.

    2015-08-01

    In recent years, Unmanned Aerial Vehicles (UAVs) are attracting more and more attention in both the research and industrial communities: indeed, the possibility to use them in a wide range of remote sensing applications makes them a very flexible and attractive solution in both civil and commercial cases (e.g. precision agriculture, security and control, monitoring of sites, exploration of areas difficult to reach). Most of the existing UAV positioning systems rely on the use of the GPS signal. Despite this can be a satisfactory solution in open environments where the GPS signal is available, there are several operating conditions of interest where it is unavailable or unreliable (e.g. close to high buildings, or mountains, in indoor environments). Consequently, a different approach has to be adopted in these cases. This paper considers the use ofWiFi measurements in order to obtain position estimations of the device of interest. More specifically, to limit the costs for the devices involved in the positioning operations, an approach based on radio signal strengths (RSS) measurements is considered. Thanks to the use of a Kalman filter, the proposed approach takes advantage of the temporal dynamic of the device of interest in order to improve the positioning results initially provided by means of maximum likelihood estimations. The considered UAVs are assumed to be provided with communication devices, which can allow them to communicate with each other in order to improve their cooperation abilities. In particular, the collision avoidance problem is examined in this work.

  13. BOREAS RSS-10 TOMS Circumpolar One-Degree PAR Images

    Science.gov (United States)

    Dye, Dennis G.; Holben, Brent; Nickeson, Jaime (Editor); Hall, Forrest G. (Editor); Smith, David E. (Technical Monitor)

    2000-01-01

    The Boreal Ecosystem-Atmosphere Study (BOREAS) Remote Sensing Science (RSS)-10 team investigated the magnitude of daily, seasonal, and yearly variations of Photosynthetically Active Radiation (PAR) from ground and satellite observations. This data set contains satellite estimates of surface-incident PAR (400-700 nm, MJ/sq m) at one-degree spatial resolution. The spatial coverage is circumpolar from latitudes of 41 to 66 degrees north. The temporal coverage is from May through September for years 1979 through 1989. Eleven-year statistics are also provided: (1) mean, (2) standard deviation, and (3) coefficient of variation for 1979-89. The PAR estimates were derived from the global gridded ultraviolet reflectivity data product (average of 360, 380 nm) from the Nimbus-7 Total Ozone Mapping Spectrometer (TOMS). Image mask data are provided for identifying the boreal forest zone, and ocean/land and snow/ice-covered areas. The data are available as binary image format data files. The PAR data are available from the Earth Observing System Data and Information System (EOSDIS) Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC). The data files are available on a CD-ROM (see document number 20010000884).

  14. RSS based CERN Alerter. Information broadcast to all CERN offices.

    CERN Multimedia

    Otto, R

    2007-01-01

    Nearly every large organization uses a tool to broadcast messages and information across the internal campus (messages like alerts announcing interruption in services or just information about upcoming events). These tools typically allow administrators (operators) to send "targeted" messages which are sent only to specific groups of users or computers, e/g only those located in a specified building or connected to a particular computing service. CERN has a long history of such tools: CERNVMS€™s SPM_quotMESSAGE command, Zephyr and the most recent the NICE Alerter based on the NNTP protocol. The NICE Alerter used on all Windows-based computers had to be phased out as a consequence of phasing out NNTP at CERN. The new solution to broadcast information messages on the CERN campus continues to provide the service based on cross-platform technologies, hence minimizing custom developments and relying on commercial software as much as possible. The new system, called CERN Alerter, is based on RSS (Really Simpl...

  15. Dosimetric verification and quality assurance of running-start-stop (RSS) delivery in tomotherapy.

    Science.gov (United States)

    Lee, Francis Kar-Ho; Chan, Simon Kar-Yiu; Chau, Ricky Ming-Chun

    2015-11-08

    The purpose of this study was to evaluate the dosimetric profiles and delivery accuracy of running-start-stop (RSS) delivery in tomotherapy and to present initial quality assurance (QA) results on the accuracy of the dynamic jaw motion, dosimetric penumbrae of the RSS dynamic jaw and the static jaw were measured by radiographic films. Delivery accuracy of the RSS was evaluated by gamma analysis on film measurements of 12 phantom plans. Consistency in the performance of RSS was evaluated by QA procedures over the first nine months after the installation of the feature. These QA were devised to check: 1) positional accuracy of moving jaws; 2) consistency of relative radiation output collimated by discrete and continuously sweeping jaws; 3) consistency of field widths and profiles. In the longitudinal direction, the dose penumbra in RSS delivery was reduced from 17.3mm to 10.2 mm for 2.5 cm jaw, and from 33.2 mm to 9.6 mm for 5 cm jaw. Gamma analysis on the twelve plans revealed that over 90% of the voxels in the proximity of the penumbra region satisfied the gamma criteria of 2% dose difference and 2 mm distance-to-agreement. The initial QA results during the first nine months after installation of the RSS are presented. Jaw motion was shown to be accurate with maximum encoder error less than 0.42 mm. The consistency of relative output for discrete and continuously sweeping jaws was within 1.2%. Longitudinal radiation profiles agreed to the reference profile with maximum gamma RSS showed better dose penumbrae compared to those from static jaw delivery. The initial QA results on the accuracy of moving jaws, reproducibility of dosimetric output and profiles were satisfactory.

  16. Relinkable Ring Signature

    Science.gov (United States)

    Suzuki, Koutarou; Hoshino, Fumitaka; Kobayashi, Tetsutaro

    In this paper, we propose the concept of a relinkable ring signature, which is a ring signature with ring reformation function, i.e., a signer can delegate ring reformation ability separately from signing ability to his/her proxy. The relinkable ring signature can be applicable to proxy ring reformation, anonymization of past-generated signature, or ring signature for dynamic group. We also propose a concrete relinkable ring signature scheme that uses pairing in the random oracle model.

  17. Saturn's Helium Abundance from Cassini CIRS and RSS Data

    Science.gov (United States)

    Achterberg, Richard K.; Schinder, Paul J.; Flasar, F. Michael

    2016-10-01

    The ratio of helium to hydrogen in Saturn's atmosphere provides an important constraint on models of Saturn's formation and evolution, but has been poorly constrained by available data. Measurements combining Voyager infrared and radio data [1] gave a He/H2 mole ratio of 0.034 ± 0.024, far below the protosolar value and requiring either significant helium loss or sequestration in the interior. Prompted by discrepancies between the Voyager infrared/radio and Galileo probe measurements of helium on Jupiter, Conrath and Gautier [2] reevaluated the helium abundance on Saturn from Voyager infrared data only, obtaining a He/H2 mole ratio of 0.135 ± 0.025, inconsistent with the previous results. Because of this discrepancy, estimating Saturn's atmospheric helium abundance has been a major goal of the Cassini mission.We are estimating the He/H2 mole ratio in Saturn's atmosphere using a combination of data from the Cassini Radio Science Subsystem (RSS) and Composite InfraRed Spectrometer (CIRS). Radio occultations, in which a carrier signal is observed as Cassini passed behind Saturn as seen from antennas on Earth, give a vertical profile of atmospheric refractivity, which can be converted to temperature as a function of pressure assuming a mean molecular weight. The assumed molecular weight is adjusted until synthetic thermal infrared spectra match spectra observed by CIRS at the same latitude and time. Preliminary results from a set of eleven near-equatorial occultations taken in 2005 give He/H2 mole ratios varying between ~0.060 and 0.085.[1] Conrath, B. J., et al., 1984, Ap. J., 282:807-815[2] Conrath, B. J. and D. Gautier, 2000, Icarus, 144:124-134

  18. Benefits and Impact of Joint Metric of AOA/RSS/TOF on Indoor Localization Error

    Directory of Open Access Journals (Sweden)

    Qing Jiang

    2016-10-01

    Full Text Available The emerging techniques in the Fifth Generation (5G communication system, like the millimeter-Wave (mmWave and massive Multiple Input Multiple Output (MIMO, make it possible to measure the Angle-Of-arrival (AOA, Receive Signal Strength (RSS and Time-Of-flight (TOF by using various types of mobile devices. At the same time, there is always significant interest in the high-precision localization techniques based on the joint metric of AOA/RSS/TOF, which enable one to overcome the drawback of the single metric-based localization. Motivated by this concern, we rely on the Cramer–Rao Lower Bound (CRLB to analyze the localization errors of RSS/AOA, RSS/TOF, AOA/TOF and the Joint Metric of AOA/RSS/TOF (JMART-based localization. The error bounds derived in this paper can be selected as the benchmarking results to evaluate the indoor localization performance. Finally, extensive simulations are conducted to support our claim.

  19. Developing composite signatures

    Science.gov (United States)

    Hawley, Chadwick T.; Carpenter, Tom; Cappelaere, Patrice G.; Frye, Stu; Lemoigne-Stewart, Jacqueline J.; Mandle, Dan; Montgomery, Sarah; Williams-Bess, Autumn

    2011-06-01

    A composite signature is a group of signatures that are related in such a way to more completely or further define a target or operational endeavor at a higher fidelity. This paper explores the merits of using composite signatures, in lieu of waiting for opportunities for the more elusive diagnostic signatures, to satisfy key essential elements of information Keywords: signature, composite signature, civil disaster (EEI) associated with civil disaster-related problems. It discusses efforts to refine composite signature development methodology and quantify the relative value of composite vs. diagnostic signatures. The objectives are to: 1) investigate and develop innovative composite signatures associated with civil disasters, including physical, chemical and pattern/behavioral; 2) explore the feasibility of collecting representative composite signatures using current and emerging intelligence, surveillance, and reconnaissance (ISR) collection architectures leveraging civilian and commercial architectures; and 3) collaborate extensively with scientists and engineers from U.S. government organizations and laboratories, the defense industry, and academic institutions.

  20. Project status of the Robert Stobie spectrograph near infrared instrument (RSS-NIR) for SALT

    Science.gov (United States)

    Wolf, Marsha J.; Mulligan, Mark P.; Smith, Michael P.; Adler, Douglas P.; Bartosz, Curtis M.; Bershady, Matthew A.; Buckley, David A. H.; Burse, Mahesh P.; Chordia, Pravin A.; Clemens, J. Christopher; Epps, Harland W.; Garot, Kristine; Indahl, Briana L.; Jaehnig, Kurt P.; Koch, Ron J.; Mason, William P.; Mosby, Gregory; Nordsieck, Kenneth H.; Percival, Jeffrey W.; Punnadi, Sujit; Ramaprakash, Anamparambu N.; Schier, J. Alan; Sheinis, Andrew I.; Smee, Stephen A.; Thielman, Donald J.; Werner, Mark W.; Williams, Theodore B.; Wong, Jeffrey P.

    2014-07-01

    The Robert Stobie Spectrograph Near Infrared Instrument (RSS-NIR), a prime focus facility instrument for the 11-meter Southern African Large Telescope (SALT), is well into its laboratory integration and testing phase. RSS-NIR will initially provide imaging and single or multi-object medium resolution spectroscopy in an 8 arcmin field of view at wavelengths of 0.9 - 1.7 μm. Future modes, including tunable Fabry-Perot spectral imaging and polarimetry, have been designed in and can be easily added later. RSS-NIR will mate to the existing visible wavelength RSS-VIS via a dichroic beamsplitter, allowing simultaneous operation of the two instruments in all modes. Multi-object spectroscopy covering a wavelength range of 0.32 - 1.7 μm on 10-meter class telescopes is a rare capability and once all the existing VIS modes are incorporated into the NIR, the combined RSS will provide observational modes that are completely unique. The VIS and NIR instruments share a common telescope focal plane, and slit mask for spectroscopic modes, and collimator optics that operate at ambient observatory temperature. Beyond the dichroic beamsplitter, RSS-NIR is enclosed in a pre-dewar box operating at -40 °C, and within that is a cryogenic dewar operating at 120 K housing the detector and final camera optics and filters. This semi-warm configuration with compartments at multiple operating temperatures poses a number of design and implementation challenges. In this paper we present overviews of the RSSNIR instrument design and solutions to design challenges, measured performance of optical components, detector system optimization results, and an update on the overall project status.

  1. ManA is regulated by RssAB signaling and promotes motility in Serratia marcescens.

    Science.gov (United States)

    Soo, Po-Chi; Horng, Yu-Tze; Chang, Yung-Lin; Tsai, Wei-Wen; Jeng, Wen-Yih; Lu, Chia-Chen; Lai, Hsin-Chih

    2014-01-01

    Serratia marcescens swarms on 0.8% LB agar at 30 °C but not at 37 °C. To understand the molecular mechanism regulating Serratia swarming, transposon mutagenesis was performed to screen for mutants that swarmed at 37 °C. In one mutant, S. marcescens WW100, the transposon was inserted in the upstream region of manA, which encodes mannose-6-phosphate isomerase, a type I phosphomannose isomerase. The transcriptional and translational levels of manA were higher in S. marcescens WW100 than in the wild-type strain. S. marcescens WW100 produced more serrawettin W1 (biosurfactant) than the wild-type, as detected by thin-layer chromatography, to promote surface motility by reducing surface tension. Serratia swarming was previously shown to be negatively regulated by the RssA-RssB two-component system. An electrophoretic mobility shift assay (EMSA) indicated that phosphorylated RssB (the response regulator) binds upstream of the transposon insertion site and manA in S. marcescens WW100. Analysis by real-time RT-PCR (qRT-PCR) revealed that, compared to the wild-type level, manA mRNA was increased in the rssA deletion mutant. The results indicated that RssA-RssB signaling directly represses the expression of manA and that overexpression of manA increases the production of serrawettin for Serratia swarming at 37 °C. Copyright © 2013 Institut Pasteur. All rights reserved.

  2. Human-Induced Effects on RSS Ranging Measurements for Cooperative Positioning

    DEFF Research Database (Denmark)

    Della Rosa, Francescantonio; Pelosi, Mauro; Nurmi, Jari

    2012-01-01

    We present experimental evaluations of human-induced perturbations on received-signal-strength-(RSS-) based ranging measurements for cooperative mobile positioning. To the best of our knowledge, this work is the first attempt to gain insight and understand the impact of both body loss and hand grip...... on the RSS for enhancing proximity measurements among neighbouring devices in cooperative scenarios. Our main contribution is represented by experimental investigations. Analysis of the errors introduced in the distance estimation using path-loss-based methods has been carried out. Moreover, the exploitation...

  3. Automating academic literature searches with RSS Feeds and Google Reader(™).

    Science.gov (United States)

    Dubuque, Erick M

    2011-01-01

    Behavior analytic practitioners have an ethical obligation to stay abreast of the most recent research developments in their areas of expertise. Although conducting frequent and comprehensive literature searches is one way to meet this mandate, doing so can be a time intensive process. One way to reduce the effort involved in this process is setting up automated literature and news searches using RSS feeds via programs like Google Reader(™). This paper outlines the steps necessary for setting up a Google Reader(™) account and creating customized RSS feeds based on searches of the National Center for Biotechnology Information (NCBI) PubMed database and the World Wide Web.

  4. Rashtriya Swayamsewak Sangh (RSS): History, Ideology and Its Influences on Indian Policy Towards Pakistan

    Science.gov (United States)

    2015-05-21

    Gandhi.65 This act of violence compelled the newly formed Union of India to put a ban on the RSS in 1948 which was later lifted in 1949 on the condition...likely to embark on a mission to prove its ‘ Masculine Power’ in the words of Pakistan’s former ambassador to US and UK.149 Moreover, the pursuit of a...rss-1794869.html. Accessed 15 November, 2014. Nussbaum, Martha C. The Clash Within: Democracy, Religious Violence , and India’s Future. USA

  5. Arabidopsis RSS1 Mediates Cross-Talk Between Glucose and Light Signaling During Hypocotyl Elongation Growth.

    Science.gov (United States)

    Singh, Manjul; Gupta, Aditi; Singh, Dhriti; Khurana, Jitendra P; Laxmi, Ashverya

    2017-11-23

    Plants possess exuberant plasticity that facilitates its ability to adapt and survive under challenging environmental conditions. The developmental plasticity largely depends upon cellular elongation which is governed by a complex network of environmental and phytohormonal signals. Here, we report role of glucose (Glc) and Glc-regulated factors in controlling elongation growth and shade response in Arabidopsis. Glc controls shade induced hypocotyl elongation in a dose dependent manner. We have identified a Glc repressed factor REGULATED BY SUGAR AND SHADE1 (RSS1) encoding for an atypical basic helix-loop-helix (bHLH) protein of unknown biological function that is required for normal Glc actions. Phenotype analysis of mutant and overexpression lines suggested RSS1 to be a negative regulator of elongation growth. RSS1 affects overall auxin homeostasis. RSS1 interacts with the elongation growth-promoting proteins HOMOLOG OF BEE2 INTERACTING WITH IBH 1 (HBI1) and BR ENHANCED EXPRESSION2 (BEE2) and negatively affects the transcription of their downstream targets such as YUCs, INDOLE-3-ACETIC ACID INDUCIBLE (IAAs), LONG HYPOCOTYL IN FAR-RED1 (HFR1), HOMEOBOX PROTEIN 2 (ATHB2), XYLOGLUCAN ENDOTRANSGLUCOSYLASE/HYDROLASES (XTHs) and EXPANSINS. We propose, Glc signals might maintain optimal hypocotyl elongation under multiple signals such as light, shade and phytohormones through the central growth regulatory bHLH/HLH module.

  6. Fils RSS | CRDI - Centre de recherches pour le développement ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Cliquez sur le fil pour ajouter votre site ou votre lecteur RSS préféré Fil de financement du CRDI Fil des nouvelles du CRDI Fil des perspectives du CRDI Fil des projets du CRDI Fil des publications du CRDI.

  7. RSS SSM/I OCEAN PRODUCT GRIDS WEEKLY AVERAGE FROM DMSP F10 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Weekly Average from DMSP F10 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  8. The Primary Care Electronic Library: RSS feeds using SNOMED-CT indexing for dynamic content delivery

    Directory of Open Access Journals (Sweden)

    Judas Robinson

    2006-12-01

    Conclusion The results of the pilot illustrate that it is possible to exchange data between servers using RSS syndication. This method could be utilised dynamically to supply digital library resources to a clinical system with SNOMED-CTdata used as the standard of reference.

  9. RSS SSM/I OCEAN PRODUCT GRIDS WEEKLY AVERAGE FROM DMSP F15 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Weekly Average from DMSP F15 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  10. RSS SSM/I OCEAN PRODUCT GRIDS WEEKLY AVERAGE FROM DMSP F13 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Weekly Average from DMSP F13 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  11. RSS SSM/I OCEAN PRODUCT GRIDS DAILY FROM DMSP F8 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Daily from DMSP F8 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor Microwave...

  12. RSS SSM/I OCEAN PRODUCT GRIDS MONTHLY AVERAGE FROM DMSP F8 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Monthly Average from DMSP F8 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  13. RSS SSM/I OCEAN PRODUCT GRIDS WEEKLY AVERAGE FROM DMSP F8 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Products Grid Weekly Average from DMSP F8 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  14. RSS SSM/I OCEAN PRODUCT GRIDS WEEKLY AVERAGE FROM DMSP F14 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Weekly Average from DMSP F14 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  15. RSS SSM/I OCEAN PRODUCT GRIDS WEEKLY AVERAGE FROM DMSP F11 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Weekly Average from DMSP F11 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  16. Chemical Markup, XML, and the World Wide Web. 5. Applications of chemical metadata in RSS aggregators

    NARCIS (Netherlands)

    Murray-Rust, P.; Rzepa, H.S.; Williamson, M.J.; Willighagen, E.L.

    2004-01-01

    Examples of the use of the RSS 1.0 (RDF Site Summary) specification together with CML (Chemical Markup Language) to create a metadata based alerting service termed CMLRSS for molecular content are presented. CMLRSS can be viewed either using generic software or with modular opensource chemical

  17. On the Calibration and Performance of RSS-based Localization Methods

    NARCIS (Netherlands)

    Dil, B.J.; Havinga, Paul J.M.

    2010-01-01

    This paper analyzes the performance of several Received Signal Strength (RSS) based localization methods as a function of the calibration effort, hence as a function of deployment and maintenance costs. The deployment and maintenance costs determine the scalability and thus the applicability of a

  18. Integration of Directional Antennas in an RSS Fingerprinting-Based Indoor Localization System.

    Science.gov (United States)

    Guzmán-Quirós, Raúl; Martínez-Sala, Alejandro; Gómez-Tornero, José Luis; García-Haro, Joan

    2015-12-23

    In this paper, the integration of directional antennas in a room-level received signal strength (RSS) fingerprinting-based indoor localization system (ILS) is studied. The sensor reader (SR), which is in charge of capturing the RSS to infer the tag position, can be attached to an omnidirectional or directional antenna. Unlike commonly-employed omnidirectional antennas, directional antennas can receive a stronger signal from the direction in which they are pointed, resulting in a different RSS distributions in space and, hence, more distinguishable fingerprints. A simulation tool and a system management software have been also developed to control the system and assist the initial antenna deployment, reducing time-consuming costs. A prototype was mounted in a real scenario, with a number of SRs with omnidirectional and directional antennas properly positioned. Different antenna configurations have been studied, evidencing a promising capability of directional antennas to enhance the performance of RSS fingerprinting-based ILS, reducing the number of required SRs and also increasing the localization success.

  19. E-Mail Alerts and RSS Feeds for Distance Learning Administrators

    Science.gov (United States)

    Washburn, Allyson; Howell, Scott L.

    2008-01-01

    This article describes how E-Mail Alerts and RSS feeds can be helpful tools for busy distance education administrators by helping them to efficiently sort through the research and news information that is now available. These tools and their respective filters and aggregators make it possible for busy distance education administrators to stay…

  20. Integrating RSS Feeds of New Books into the Campus Course Management System

    Science.gov (United States)

    Corrado, Edward M.; Moulaison, Heather L.

    2006-01-01

    By integrating RSS feeds of new books into their campus' course management system, the authors, a systems librarian (Corrado) and a cataloging/modern languages librarian (Moulaison) at the The College of New Jersey (TCNJ), simplified initial research and spotlighted the library's collections. Faculty members are flocking to this award-winning…

  1. RSS and Content Syndication in Higher Education: Subscribing to a New Model of Teaching and Learning

    Science.gov (United States)

    Lee, Mark J. W.; Miller, Charlynn; Newnham, Leon

    2008-01-01

    While blogs, wikis and social networking sites are enjoying high levels of attention as tools to support learning, Really Simple Syndication (RSS) remains the "poor cousin" of these technologies in the higher education classroom, with relatively low uptake amongst educators and students. In this article, the authors argue that the affordances of…

  2. Pattern recognition

    CERN Document Server

    Theodoridis, Sergios

    2003-01-01

    Pattern recognition is a scientific discipline that is becoming increasingly important in the age of automation and information handling and retrieval. Patter Recognition, 2e covers the entire spectrum of pattern recognition applications, from image analysis to speech recognition and communications. This book presents cutting-edge material on neural networks, - a set of linked microprocessors that can form associations and uses pattern recognition to ""learn"" -and enhances student motivation by approaching pattern recognition from the designer's point of view. A direct result of more than 10

  3. The Primary Care Electronic Library: RSS feeds using SNOMED-CT indexing for dynamic content delivery.

    Science.gov (United States)

    Robinson, Judas; de Lusignan, Simon; Kostkova, Patty; Madge, Bruce; Marsh, A; Biniaris, C

    2006-01-01

    Rich Site Summary (RSS) feeds are a method for disseminating and syndicating the contents of a website using extensible mark-up language (XML). The Primary Care Electronic Library (PCEL) distributes recent additions to the site in the form of an RSS feed. When new resources are added to PCEL, they are manually assigned medical subject headings (MeSH terms), which are then automatically mapped to SNOMED-CT terms using the Unified Medical Language System (UMLS) Metathesaurus. The library is thus searchable using MeSH or SNOMED-CT. Our syndicate partner wished to have remote access to PCEL coronary heart disease (CHD) information resources based on SNOMED-CT search terms. To pilot the supply of relevant information resources in response to clinically coded requests, using RSS syndication for transmission between web servers. Our syndicate partner provided a list of CHD SNOMED-CT terms to its end-users, a list which was coded according to UMLS specifications. When the end-user requested relevant information resources, this request was relayed from our syndicate partner's web server to the PCEL web server. The relevant resources were retrieved from the PCEL MySQL database. This database is accessed using a server side scripting language (PHP), which enables the production of dynamic RSS feeds on the basis of Source Asserted Identifiers (CODEs) contained in UMLS. Retrieving resources using SNOMED-CT terms using syndication can be used to build a functioning application. The process from request to display of syndicated resources took less than one second. The results of the pilot illustrate that it is possible to exchange data between servers using RSS syndication. This method could be utilised dynamically to supply digital library resources to a clinical system with SNOMED-CT data used as the standard of reference.

  4. NOAA Climate Data Record (CDR) of SSM/I and SSMIS Microwave Brightness Temperatures, RSS Version 7

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This Version 7 NOAA Fundamental Climate Data Record (CDR) from Remote Sensing Systems (RSS) contains brightness temperatures that have been inter-calibrated and...

  5. BOREAS RSS-15 SIR-C and TM Biomass and Landcover Maps of the NSA and SSA

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS-15 team conducted an investigation using SIR-C , X-SAR and Landsat TM data for estimating total above-ground dry biomass for the SSA and NSA modeling grids...

  6. BOREAS RSS-08 IFC-3 ADS-PSII Measurements of BRDF at SSA-OBS and SSA-OA Sites

    Data.gov (United States)

    National Aeronautics and Space Administration — ABSTRACT: Ground BRDF measurements were acquired by the Remote Sensing Science (RSS)-08 team to aid in the development of advanced spectral vegetation indices. The...

  7. Human-Induced Effects on RSS Ranging Measurements for Cooperative Positioning

    Directory of Open Access Journals (Sweden)

    Francescantonio Della Rosa

    2012-01-01

    Full Text Available We present experimental evaluations of human-induced perturbations on received-signal-strength-(RSS- based ranging measurements for cooperative mobile positioning. To the best of our knowledge, this work is the first attempt to gain insight and understand the impact of both body loss and hand grip on the RSS for enhancing proximity measurements among neighbouring devices in cooperative scenarios. Our main contribution is represented by experimental investigations. Analysis of the errors introduced in the distance estimation using path-loss-based methods has been carried out. Moreover, the exploitation of human-induced perturbations for enhancing the final positioning accuracy through cooperative schemes has been assessed. It has been proved that the effect of cooperation is very limited if human factors are not taken into account when performing experimental activities.

  8. Pengaruh rss/sbr dan filler CaCO3 terhadap sifat fisis kompon karpet karet

    Directory of Open Access Journals (Sweden)

    Supraptiningsih Supraptiningsih

    2005-07-01

    Full Text Available Research about preparing of rubber compound for carpet has been done. The aim of this research to study the effects of natural rubber RSS and CaCO3 as a filler, its physical properties, and also to find out rubber compound for carpet formula in accordance with SNI 12-1000-1989. The compound was produced from natural and synthetic rubber mixture with variation of RSS/SBR 70/30; 80/20; 90/10 phr respectively and the amount of CaCO3 90; 100; 110 phr respectively. The compound was made by using two roll mill machine and than it was tested the physical properties by methods of SNI 12-1000-1989 Rubber Carpet. The physical properties of compound showed that an increasing of natural rubber (RSS I significant enfluence to increase elongation from 420,00% until 466,66% while hardness from 69,11 shore A until 68,11 sore A, and compression resistance decrease from 580,42% N/cm2 until 523,20 N/cm2. The addition of CaCO3 very significant enfluence to increase hardness from 65,77 shore A until 71,83 shore A, permanent set from 482,32 N/cm2, and the density from 1,48 g/cm2 until 1,55 g/cm2. The physical properties of elongation decrease from 464,44 % until 406,66 % and the aging resistance decrease too (colour changing and cracked. The rubber compound for carpet was produced by using RSS/SBR 80/20 and added CaCO3 100 phr accordance with SNI 12-1000-1989 and significant difference with the others.

  9. Speech Recognition

    Directory of Open Access Journals (Sweden)

    Adrian Morariu

    2009-01-01

    Full Text Available This paper presents a method of speech recognition by pattern recognition techniques. Learning consists in determining the unique characteristics of a word (cepstral coefficients by eliminating those characteristics that are different from one word to another. For learning and recognition, the system will build a dictionary of words by determining the characteristics of each word to be used in the recognition. Determining the characteristics of an audio signal consists in the following steps: noise removal, sampling it, applying Hamming window, switching to frequency domain through Fourier transform, calculating the magnitude spectrum, filtering data, determining cepstral coefficients.

  10. Real Time Mash-Up of Earth Data and Information Through RSS Feed Correlation

    Science.gov (United States)

    Bingham, A.; Chung, N. T.; Roberts, J.; Stough, T.; Deen, R.

    2012-12-01

    The availability of timely and accurate information helps natural resource mangers to make informed decisions following the occurrence of an event. Data collected by earth observing instrumentation coupled with information and assessments provided by first responders, forecasters, eyewitnesses, reporters and experts help provide a complete picture of the extent and magnitude of the impact of the event. Much of the data and information are published immediately on the Internet, but it is impossible for an individual to sift through the disparate sources and extract those data and information relevant to a specific event. We solve this problem by correlating metadata contained in RSS, GeoRSS and DatacastingRSS feeds to form a single feed that references all data (satellite imagery, in situ measurements etc.) and information (news articles, photos, videos, blogs, reports, assessments etc.) related to an individual event of interest. In this paper, we will discuss our concept of cross-feed correlation for the purpose of classifying data and information by events. We will also describe the implementation of cross-feed correlation and show how software applications and decision support systems can leverage the technology to pull in data and information tailored to the needs of a specific user community.Even Viewer. Application showing a mashup of satellite data, forecast information, news articles and blogs categorized by natural event.

  11. Comparison of TOA and RSS based techniques for RF localization inside human tissue.

    Science.gov (United States)

    Khan, Umair I; Pahlavan, Kaveh; Makarov, Sergey

    2011-01-01

    Localization inside the human body using radio frequency (RF) transmission is gaining importance in a number of applications such as Capsule Endoscopy. The accuracy of RF localization depends on the technology adopted for this purpose. The two most common RF localization technologies use received signal strength (RSS) and time-of-arrival (TOA). This paper presents a comparison of the accuracy of TOA and RSS based localization inside human tissue. Analysis of the propagation of radio waves inside the human body is extremely challenging and computationally intensive. We use our proprietary finite difference time domain (FDTD) technique algorithm reported in [1] to simulate waveform transmissions inside the human body, which is almost 60 times faster than commercially available solvers used for similar purposes. The RSS and TOA of the waveforms are extracted for localization and the accuracies of the two methods are compared. The accuracy of each technique is compared with traditional CRLB commonly used for calculation of bounds for the performance of localization techniques.

  12. Compressed RSS Measurement for Communication and Sensing in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Yanchao Zhao

    2017-01-01

    Full Text Available The receiving signal strength (RSS is crucial for the Internet of Things (IoT, as it is the key foundation for communication resource allocation, localization, interference management, sensing, and so on. Aside from its significance, the measurement process could be tedious, time consuming, inaccurate, and involving human operations. The state-of-the-art works usually applied the fashion of “measure a few, predict many,” which use measurement calibrated models to generate the RSS for the whole networks. However, this kind of methods still cannot provide accurate results in a short duration with low measurement cost. In addition, they also require careful scheduling of the measurement which is vulnerable to measurement conflict. In this paper, we propose a compressive sensing- (CS- based RSS measurement solution, which is conflict-tolerant, time-efficient, and accuracy-guaranteed without any model-calibrate operation. The CS-based solution takes advantage of compressive sensing theory to enable simultaneous measurement in the same channel, which reduces the time cost to the level of O(log⁡N (where N is the network size and works well for sparse networks. Extensive experiments based on real data trace are conducted to show the efficiency of the proposed solutions.

  13. Physics of Automatic Target Recognition

    CERN Document Server

    Sadjadi, Firooz

    2007-01-01

    Physics of Automatic Target Recognition addresses the fundamental physical bases of sensing, and information extraction in the state-of-the art automatic target recognition field. It explores both passive and active multispectral sensing, polarimetric diversity, complex signature exploitation, sensor and processing adaptation, transformation of electromagnetic and acoustic waves in their interactions with targets, background clutter, transmission media, and sensing elements. The general inverse scattering, and advanced signal processing techniques and scientific evaluation methodologies being used in this multi disciplinary field will be part of this exposition. The issues of modeling of target signatures in various spectral modalities, LADAR, IR, SAR, high resolution radar, acoustic, seismic, visible, hyperspectral, in diverse geometric aspects will be addressed. The methods for signal processing and classification will cover concepts such as sensor adaptive and artificial neural networks, time reversal filt...

  14. Radar Signature Calculation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...

  15. Blind Collective Signature Protocol

    Directory of Open Access Journals (Sweden)

    Nikolay A. Moldovyan

    2011-06-01

    Full Text Available Using the digital signature (DS scheme specified by Belarusian DS standard there are designed the collective and blind collective DS protocols. Signature formation is performed simultaneously by all of the assigned signers, therefore the proposed protocols can be used also as protocols for simultaneous signing a contract. The proposed blind collective DS protocol represents a particular implementation of the blind multisignature schemes that is a novel type of the signature schemes. The proposed protocols are the first implementations of the multisignature schemes based on Belarusian signature standard.

  16. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  17. Detection of rotaviruses and intestinal lesions in broiler chicks from flocks with runting and stunting syndrome (RSS).

    Science.gov (United States)

    Otto, Peter; Liebler-Tenorio, Elisabeth M; Elschner, Mandy; Reetz, Jochen; Löhren, Ulrich; Diller, Roland

    2006-09-01

    The intestinal tract and intestinal contents were collected from 34 stunted, 5-to-14-day-old broiler chicks from eight flocks with runting and stunting syndrome (RSS) in Northern Germany to investigate intestinal lesions and the presence of enteric pathogens with a special focus on rotaviruses (RVs). Seven chicks from a healthy flock were used as controls. Severe villous atrophy was seen in chicks from six flocks with RSS but not in the control flock. Lesions were often "regionally" distributed in the middle-to-distal small intestine. Transmission electron microscopy (TEM), polyacrylamide-gel electrophoresis (PAGE), reverse-transcriptase polymerase chain reaction (RT-PCR), and seminested RT-PCR were used for detection and characterization of RVs. The PAGE allows discrimination of different RV groups, and the RT-PCR was used to verify the presence of group (gp) A RVs. RVs were detected (by all methods) in 32 of 34 chicks from the flocks with RSS. By TEM (negative staining), RV particles were observed in intestinal contents of 28 chicks from the flocks with RSS. PAGE analysis showed four RV groups: gpA, gpD, gpF, and gpG. Group A RVs were detected in four chicks from two flocks with RSS, without intestinal lesions. GpD RVs were detected in 12 chicks of five flocks with RSS, 10 of them with severe villous atrophy. GpF RVs were confirmed in four chicks from three flocks with RSS and in two birds in the control flock. GpG RVs were verified in two chicks from two flocks with RSS, one with, and one without, intestinal lesions. At present, PCR methods are only available for detection of gpA RVs. Using RT-PCR, gpA RVs were identified in samples from 22 chicks including samples of two chicks from the control flock. Statistical analysis revealed a positive correlation between presence of gpD RV and severe villous atrophy in flocks with RSS. The results suggest that gpD RV plays a major role in the pathogenesis of RSS.

  18. Electronic signatures and their specificity in national and European regulations

    Directory of Open Access Journals (Sweden)

    R. MATEFI

    2017-07-01

    Full Text Available The paper aims to emphasize the particularities of the electronic signature by reference to the national as well as to the European legislation, trying to point out its utility in the business environment as well as the controversies in this matter. The starting point of this analysis was the Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, which establishes the legal framework for electronic signatures and the recognition of certification-service providers. Its main aim was to ease its use and help it become legally recognized within all EU countries.

  19. Digital Signature Management.

    Science.gov (United States)

    Hassler, Vesna; Biely, Helmut

    1999-01-01

    Describes the Digital Signature Project that was developed in Austria to establish an infrastructure for applying smart card-based digital signatures in banking and electronic-commerce applications. Discusses the need to conform to international standards, an international certification infrastructure, and security features for a public directory…

  20. Prognostic Discrimination Using a 70-Gene Signature among Patients with Estrogen Receptor-Positive Breast Cancer and an Intermediate 21-Gene Recurrence Score

    Directory of Open Access Journals (Sweden)

    Sung Gwe Ahn

    2013-12-01

    Full Text Available The Oncotype DX® recurrence score (RS predictor has been clinically utilized to appropriately select adjuvant chemotherapy for patients with estrogen receptor (ER-positive early breast cancer. However, the selection of chemotherapy for patients with intermediate RSs remains controversial. We assessed the prognostic value of a 70-gene signature (70GS among patients with ER-positive breast cancer and intermediate RSs. In addition, we sought to identify genes associated with poor 70GS scores based on gene expression profiling (GEP. GEP was performed using gene expression data from 186 patients with ER-positive breast cancer. The RS and 70GS score were calculated on the basis of GEP. Among 186 patients, 82 ER-positive patients with intermediate RSs were identified. These patients were stratified by 70GS, overall survival (OS significantly differed according to 70GS (p = 0.013. In a supervised hierarchical analysis according to 70GS, the expression of several representative genes for cell proliferation was significantly higher in the poor 70GS cluster than in the good 70GS cluster. Furthermore, among these patients, FOXM1, AURKA, AURKB, and BIRC5 displayed prognostic significance for OS. In conclusion, 70GS can help to discriminate survival differences among ER-positive patients with intermediate RSs. FOXM1, AURKA, AURKB, and BIRC5, are associated with poor 70GS scores.

  1. Facial Recognition

    National Research Council Canada - National Science Library

    Mihalache Sergiu; Stoica Mihaela-Zoica

    2014-01-01

    .... From birth, faces are important in the individual's social interaction. Face perceptions are very complex as the recognition of facial expressions involves extensive and diverse areas in the brain...

  2. UV Signature Mutations †

    Science.gov (United States)

    2014-01-01

    Sequencing complete tumor genomes and exomes has sparked the cancer field's interest in mutation signatures for identifying the tumor's carcinogen. This review and meta-analysis discusses signatures and their proper use. We first distinguish between a mutagen's canonical mutations – deviations from a random distribution of base changes to create a pattern typical of that mutagen – and the subset of signature mutations, which are unique to that mutagen and permit inference backward from mutations to mutagen. To verify UV signature mutations, we assembled literature datasets on cells exposed to UVC, UVB, UVA, or solar simulator light (SSL) and tested canonical UV mutation features as criteria for clustering datasets. A confirmed UV signature was: ≥60% of mutations are C→T at a dipyrimidine site, with ≥5% CC→TT. Other canonical features such as a bias for mutations on the non-transcribed strand or at the 3' pyrimidine had limited application. The most robust classifier combined these features with criteria for the rarity of non-UV canonical mutations. In addition, several signatures proposed for specific UV wavelengths were limited to specific genes or species; non-signature mutations induced by UV may cause melanoma BRAF mutations; and the mutagen for sunlight-related skin neoplasms may vary between continents. PMID:25354245

  3. Differentiation of lisinopril and its RSS diastereomer by liquid chromatography combined with collision-induced dissociation mass spectrometry.

    Science.gov (United States)

    Sun, Cuirong; Zhu, Peixi; Hu, Nan; Wang, Danhua; Pan, Yuanjiang

    2010-01-01

    A simple and sensitive liquid chromatography tandem multiple-stage mass spectrometry (HPLC/MS/MS) method suitable for bulk lisinopril analysis was developed, by which lisinopril and its RSS isomer were separated and differentiated. In the collision-induced dissociation (CID) mass spectra of the [M + H](+) ions, the abundance of the fragment ion of m/z 246 for lisinopril was about two times higher than the ion of m/z 245; however, the former fragment ion was noted to be a little lower than the latter for RSS isomer at all collision energies. In the CID mass spectra of the [M + Li](+) ion, the abundance of the rearrangement ion of m/z 315 for the RSS isomer was about three times higher than that for lisinopril. Furthermore, the difference was supported by the results of energy-resolved mass spectrometry (ERMS) in the test range of collision energies. Similar differences were also observed between the CID mass spectra of lisinopril and RSS isomer methylester, which indicated that the RSS isomer could be rapidly characterized by the CID mass spectra of both the protonated and lithium adduct ion. Elemental compositions of all the ions were confirmed by Fourier Transform ion cyclotron resonance ESI mass spectrometry (FT-ICR-ESI/MS). In addition, theoretical computations were carried out to support the experimental results. Copyright 2009 John Wiley & Sons, Ltd.

  4. BOREAS RSS-7 Landsat TM LAI IMages of the SSA and NSA

    Science.gov (United States)

    Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Chen, Jing; Cihlar, Josef

    2000-01-01

    The BOReal Ecosystem-Atmosphere Study Remote Sensing Science (BOREAS RSS-7) team used Landsat Thematic Mapper (TM) images processed at CCRS to produce images of Leaf Area Index (LAI) for the BOREAS study areas. Two images acquired on 06-Jun and 09-Aug-1991 were used for the SSA, and one image acquired on 09-Jun-1994 was used for the NSA. The LAI images are based on ground measurements and Landsat TM Reduced Simple Ratio (RSR) images. The data are stored in binary image-format files.

  5. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  6. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  7. Digital signature feasibility study

    Science.gov (United States)

    2008-06-01

    The purpose of this study was to assess the advantages and disadvantages of using digital signatures to assist the Arizona Department of Transportation in conducting business. The Department is evaluating the potential of performing more electronic t...

  8. Are there molecular signatures?

    Energy Technology Data Exchange (ETDEWEB)

    Bennett, W.P.

    1995-10-01

    This report describes molecular signatures and mutational spectrum analysis. The mutation spectrum is defined as the type and location of DNA base change. There are currently about five well documented cases. Mutations and radon-associated tumors are discussed.

  9. A Multi-Sensor RSS Spatial Sensing-Based Robust Stochastic Optimization Algorithm for Enhanced Wireless Tethering

    CERN Document Server

    Parasuraman, Ramviyas; Molinari, Luca; Kershaw, Keith; Di Castro, Mario; Masi, Alessandro; Ferre, Manuel

    2014-01-01

    The reliability of wireless communication in a network of mobile wireless robot nodes depends on the received radio signal strength (RSS). When the robot nodes are deployed in hostile environments with ionizing radiations (such as in some scientific facilities), there is a possibility that some electronic components may fail randomly (due to radiation effects), which causes problems in wireless connectivity. The objective of this paper is to maximize robot mission capabilities by maximizing the wireless network capacity and to reduce the risk of communication failure. Thus, in this paper, we consider a multi-node wireless tethering structure called the “server-relay-client” framework that uses (multiple) relay nodes in between a server and a client node. We propose a robust stochastic optimization (RSO) algorithm using a multi-sensor-based RSS sampling method at the relay nodes to efficiently improve and balance the RSS between the source and client nodes to improve the network capacity and to provide red...

  10. [Keeping up to date with the relevant literature: 'really simple syndication'-(RSS)-feeds within PubMed].

    Science.gov (United States)

    Leclercq, E; Kremer, L C M

    2008-01-26

    For clinicians, researchers and policy makers in healthcare, it is important to keep up to date with the newest medical-scientific information. The large amount of new information makes this a difficult task. There are various techniques for keeping up to date, for instance reading systematic reviews, searching the literature at regular intervals oneself, and using the e-mail alerting services of, for example, PubMed. A new possibility is to be alerted to new scientific publications, for example, via a 'really simple syndication' (RSS)-feed. This option is now also made available by PubMed. In addition to PubMed, many other websites can now be searched systematically for new information by a RSS reader. With RSS feeds the user can be alerted to new information much faster than by an e-mail alerting service, so that one can anticipate new developments more rapidly.

  11. Technology of Electronic Signatur

    Directory of Open Access Journals (Sweden)

    Jaroslav Sadovsky

    2004-01-01

    Full Text Available An electronic signature uses a hash of message and an asymetrical algorithm of encryption for its generation. During verification of message on receiver side the hash of original message must be identical with the hash of received message. Electronic message is secured autentization of author and integrity of transmission date. By electronic signature it is possible to sign everything what is in digital form.

  12. Meteor signature interpretation

    Energy Technology Data Exchange (ETDEWEB)

    Canavan, G.H.

    1997-01-01

    Meteor signatures contain information about the constituents of space debris and present potential false alarms to early warnings systems. Better models could both extract the maximum scientific information possible and reduce their danger. Accurate predictions can be produced by models of modest complexity, which can be inverted to predict the sizes, compositions, and trajectories of object from their signatures for most objects of interest and concern.

  13. Determining workspace parameters for a new type of 6RSS parallel manipulator based on structural and geometric models

    Directory of Open Access Journals (Sweden)

    Milica Lucian

    2017-01-01

    Full Text Available Workspace geometric modelling of a new type of 6RSS parallel manipulator is described below. In the beginning, the researches undertaken in this area by other authors are highlighted and then a definition of this type of mechanisms is provided. The structural model of the 6RSS manipulator is briefly described. Inverse geometric model and translation subspace methods are used in order to determine the dimensions that define the workspace volume of the parallel manipulator. The reachable workspace is defined as a subset of the whole workspace in relation with the positions achieved by the characteristic point.

  14. Signature verification: A comprehensive study of the hidden signature method

    Directory of Open Access Journals (Sweden)

    Putz-Leszczyńska Joanna

    2015-09-01

    Full Text Available Many handwritten signature verification algorithms have been developed in order to distinguish between genuine signatures and forgeries. An important group of these methods is based on dynamic time warping (DTW. Traditional use of DTW for signature verification consists in forming a misalignment score between the verified signature and a set of template signatures. The right selection of template signatures has a big impact on that verification. In this article, we describe our proposition for replacing the template signatures with the hidden signature-an artificial signature which is created by minimizing the mean misalignment between itself and the signatures from the enrollment set. We present a few hidden signature estimation methods together with their comprehensive comparison. The hidden signature opens a number of new possibilities for signature analysis. We apply statistical properties of the hidden signature to normalize the error signal of the verified signature and to use the misalignment on the normalized errors as a verification basis. A result, we achieve satisfying error rates that allow creating an on-line system, ready for operating in a real-world environment

  15. CERN alerter—RSS based system for information broadcast to all CERN offices

    Science.gov (United States)

    Otto, R.

    2008-07-01

    Nearly every large organization uses a tool to broadcast messages and information across the internal campus (messages like alerts announcing interruption in services or just information about upcoming events). These tools typically allow administrators (operators) to send 'targeted' messages which are sent only to specific groups of users or computers, e/g only those located in a specified building or connected to a particular computing service. CERN has a long history of such tools: CERNVMS's SPM_quotMESSAGE command, Zephyr [2] and the most recent the NICE Alerter based on the NNTP protocol. The NICE Alerter used on all Windows-based computers had to be phased out as a consequence of phasing out NNTP at CERN. The new solution to broadcast information messages on the CERN campus continues to provide the service based on cross-platform technologies, hence minimizing custom developments and relying on commercial software as much as possible. The new system, called CERN Alerter, is based on RSS (Really Simple Syndication) [9] for the transport protocol and uses Microsoft SharePoint as the backend for database and posting interface. The windows-based client relies on Internet Explorer 7.0 with custom code to trigger the window pop-ups and the notifications for new events. Linux and Mac OS X clients could also rely on any RSS readers to subscribe to targeted notifications. The paper covers the architecture and implementation aspects of the new system.

  16. Efficient Underwater RSS Value to Distance Inversion Using the Lambert Function

    Directory of Open Access Journals (Sweden)

    Majid Hosseini

    2014-01-01

    Full Text Available There are many applications for using wireless sensor networks (WSN in ocean science; however, identifying the exact location of a sensor by itself (localization is still a challenging problem, where global positioning system (GPS devices are not applicable underwater. Precise distance measurement between two sensors is a tool of localization and received signal strength (RSS, reflecting transmission loss (TL phenomena, is widely used in terrestrial WSNs for that matter. Underwater acoustic sensor networks have not been used (UASN, due to the complexity of the TL function. In this paper, we addressed these problems by expressing underwater TL via the Lambert W function, for accurate distance inversion by the Halley method, and compared this to Newton-Raphson inversion. Mathematical proof, MATLAB simulation, and real device implementation demonstrate the accuracy and efficiency of the proposed equation in distance calculation, with fewer iterations, computation stability for short and long distances, and remarkably short processing time. Then, the sensitivities of Lambert W function and Newton-Raphson inversion to alteration in TL were examined. The simulation results showed that Lambert W function is more stable to errors than Newton-Raphson inversion. Finally, with a likelihood method, it was shown that RSS is a practical tool for distance measurement in UASN.

  17. BOREAS RSS-16 AIRSAR CM Images: Integrated Processor Version 6.1 Level-3b

    Science.gov (United States)

    Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Saatchi, Susan; Newcomer, Jeffrey A.; Strub, Richard; Irani, Fred

    2000-01-01

    The BOREAS RSS-16 team used satellite and aircraft SAR data in conjunction with various ground measurements to determine the moisture regime of the boreal forest. RSS-16 assisted with the acquisition and ordering of NASA JPL AIRSAR data collected from the NASA DC-8 aircraft. The NASA JPL AIRSAR is a side-looking imaging radar system that utilizes the SAR principle to obtain high resolution images that represent the radar backscatter of the imaged surface at different frequencies and polarizations. The information contained in each pixel of the AIRSAR data represents the radar backscatter for all possible combinations of horizontal and vertical transmit and receive polarizations (i.e., HH, HV, VH, and VV). Geographically, the data cover portions of the BOREAS SSA and NSA. Temporally, the data were acquired from 12-Aug-1993 to 31-Jul-1995. The level-3b AIRSAR CM data are in compressed Stokes matrix format, which has 10 bytes per pixel. From this data format, it is possible to synthesize a number of different radar backscatter measurements. The data are stored in binary image-format files. The data files are available on a CD-ROM (see document number 20010000884), or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  18. BOREAS RSS-16 Level-3b DC-8 AIRSAR SY Images

    Science.gov (United States)

    Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Saatchi, Sasan; Newcomer, Jeffrey A.; Strub, Richard; Irani, Fred

    2000-01-01

    The BOREAS RSS-16 team used satellite and aircraft SAR data in conjunction with various ground measurements to determine the moisture regime of the boreal forest. RSS-16 assisted with the acquisition and ordering of NASA JPL AIRSAR data collected from the NASA DC-8 aircraft. The NASA JPL AIRSAR is a side-looking imaging radar system that utilizes the SAR principle to obtain high-resolution images that represent the radar backscatter of the imaged surface at different frequencies and polarizations. The information contained in each pixel of the AIRSAR data represents the radar backscatter for all possible combinations of horizontal and vertical transmit and receive polarizations (i.e., HH, HV, VH, and VV). Geographically, the data cover portions of the BOREAS SSA and NSA. Temporally, the data were acquired from 12-Aug-1993 to 31-Jul-1995. The level-3b AIRSAR SY data are the JPL synoptic product and contain 3 of the 12 total frequency and polarization combinations that are possible. The data are stored in binary image format files. The data files are available on a CD-ROM (see document number 20010000884), or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  19. Robust Statistical Approaches for RSS-Based Floor Detection in Indoor Localization.

    Science.gov (United States)

    Razavi, Alireza; Valkama, Mikko; Lohan, Elena Simona

    2016-05-31

    Floor detection for indoor 3D localization of mobile devices is currently an important challenge in the wireless world. Many approaches currently exist, but usually the robustness of such approaches is not addressed or investigated. The goal of this paper is to show how to robustify the floor estimation when probabilistic approaches with a low number of parameters are employed. Indeed, such an approach would allow a building-independent estimation and a lower computing power at the mobile side. Four robustified algorithms are to be presented: a robust weighted centroid localization method, a robust linear trilateration method, a robust nonlinear trilateration method, and a robust deconvolution method. The proposed approaches use the received signal strengths (RSS) measured by the Mobile Station (MS) from various heard WiFi access points (APs) and provide an estimate of the vertical position of the MS, which can be used for floor detection. We will show that robustification can indeed increase the performance of the RSS-based floor detection algorithms.

  20. On the Dynamic RSS Feedbacks of Indoor Fingerprinting Databases for Localization Reliability Improvement.

    Science.gov (United States)

    Wen, Xiaoyang; Tao, Wenyuan; Own, Chung-Ming; Pan, Zhenjiang

    2016-08-15

    Location data is one of the most widely used context data types in context-aware and ubiquitous computing applications. To support locating applications in indoor environments, numerous systems with different deployment costs and positioning accuracies have been developed over the past decade. One useful method, based on received signal strength (RSS), provides a set of signal transmission access points. However, compiling a remeasurement RSS database involves a high cost, which is impractical in dynamically changing environments, particularly in highly crowded areas. In this study, we propose a dynamic estimation resampling method for certain locations chosen from a set of remeasurement fingerprinting databases. Our proposed method adaptively applies different, newly updated and offline fingerprinting points according to the temporal and spatial strength of the location. To achieve accuracy within a simulated area, the proposed method requires approximately 3% of the feedback to attain a double correctness probability comparable to similar methods; in a real environment, our proposed method can obtain excellent 1 m accuracy errors in the positioning system.

  1. Robust Statistical Approaches for RSS-Based Floor Detection in Indoor Localization

    Directory of Open Access Journals (Sweden)

    Alireza Razavi

    2016-05-01

    Full Text Available Floor detection for indoor 3D localization of mobile devices is currently an important challenge in the wireless world. Many approaches currently exist, but usually the robustness of such approaches is not addressed or investigated. The goal of this paper is to show how to robustify the floor estimation when probabilistic approaches with a low number of parameters are employed. Indeed, such an approach would allow a building-independent estimation and a lower computing power at the mobile side. Four robustified algorithms are to be presented: a robust weighted centroid localization method, a robust linear trilateration method, a robust nonlinear trilateration method, and a robust deconvolution method. The proposed approaches use the received signal strengths (RSS measured by the Mobile Station (MS from various heard WiFi access points (APs and provide an estimate of the vertical position of the MS, which can be used for floor detection. We will show that robustification can indeed increase the performance of the RSS-based floor detection algorithms.

  2. BOREAS RSS-14 Level-1 GOES-8 Visible, IR and Water Vapor Images

    Science.gov (United States)

    Hall, Forrest G. (Editor); Faysash, David; Cooper, Harry J.; Smith, Eric A.; Newcomer, Jeffrey A.

    2000-01-01

    The BOREAS RSS-14 team collected and processed several GOES-7 and GOES-8 image data sets that covered the BOREAS study region. The level-1 BOREAS GOES-8 images are raw data values collected by RSS-14 personnel at FSU and delivered to BORIS. The data cover 14-Jul-1995 to 21-Sep-1995 and 01-Jan-1996 to 03-Oct-1996. The data start out containing three 8-bit spectral bands and end up containing five 10-bit spectral bands. No major problems with the data have been identified. The data are contained in binary image format files. Due to the large size of the images, the level-1 GOES-8 data are not contained on the BOREAS CD-ROM set. An inventory listing file is supplied on the CD-ROM to inform users of what data were collected. The level-1 GOES-8 image data are available from the Earth Observing System Data and Information System (EOSDIS) Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC). See sections 15 and 16 for more information. The data files are available on a CD-ROM (see document number 20010000884).

  3. BOREAS RSS-14 Level-1 GOES-7 Visible, IR and Water Vapor Images

    Science.gov (United States)

    Hall, Forrest G. (Editor); Faysash, David; Cooper, Harry J.; Smith, Eric A.; Newcomer, Jeffrey A.

    2000-01-01

    The BOREAS RSS-14 team collected and processed GOES-7 and -8 images of the BOREAS region as part of its effort to characterize the incoming, reflected, and emitted radiation at regional scales. The level-1 BOREAS GOES-7 image data were collected by RSS-14 personnel at FSU and delivered to BORIS. The data cover the period of 01-Jan-1994 through 08-Jul-1995, with partial to complete coverage on the majority of the days. The data include three bands with eight-bit pixel values. No major problems with the data have been identified. Due to the large size of the images, the level-1 GOES-7 data are not contained on the BOREAS CD-ROM set. An inventory listing file is supplied on the CD-ROM to inform users of what data were collected. The level-1 GOES-7 image data are available from the Earth Observing System Data and Information System (EOSDIS) Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC). See sections 15 and 16 for more information. The data files are available on a CD-ROM (see document number 20010000884).

  4. BOREAS RSS-14 Level 1a GOES-7 Visible, IR, and Water Vapor Images

    Science.gov (United States)

    Hall, Forrest G. (Editor); Newcomer, Jeffrey A.; Faysash, David; Cooper, Harry J.; Smith, Eric A.

    2000-01-01

    The BOREAS RSS-14 team collected and processed GOES-7 and -8 images of the BOREAS region as part of its effort to characterize the incoming, reflected, and emitted radiation at regional scales. The level-1a BOREAS GOES-7 image data were collected by RSS-14 personnel at FSU and processed to level-1a products by BORIS personnel. The data cover the period of 01-Jan-1994 through 08-Jul-1995 with partial to complete coverage on the majority of the days. The data include three bands with eightbit pixel values. No major problems with the data have been identified. Due to the large size of the images, the level-1a GOES-7 data are not contained on the BOREAS CD-ROM set. An inventory listing file is supplied on the CD-ROM to inform users of what data were collected. The level-1a GOES-7 image data are available from the Earth Observing System Data and Information System (EOSDIS) Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC). See sections 15 and 16 for more information. The data files are available on a CD-ROM (see document number 20010000884).

  5. Karakteristik karet ebonit yang dibuat dengan berbagai variasi rasio RSS I/Riklim dan jumlah belerang

    Directory of Open Access Journals (Sweden)

    Penny Setyowati

    2004-07-01

    Full Text Available The aim of the research was to study the influence of utilization of sulphur and reclaim rubber on the characteristics of ebonite rubber, and also to determine the optimum utilization of reclaim rubber and sulphur which yield good physical properties. Ebonite rubber was made by special natural rubber of RSS I (Ribbed Smoke Sheet I mixed with reclaimed rubber at ratio 80/20, 70/30 and 60/40 part hundred rubber/part hundred rubber (phr/phr and utilization of sulphur 30, 40, and 50 phr and also additives respectively. Mixing was done by using open mill, and vulcanization was conducted at early temperature 1200C for 2 hours, and it was continued by post curing at temperature 1500C for 2 hours. The physical properties such as tensile strength, elongation at break, D shore hardness, and izod impact of ebonite rubber vulcanized were determined. The result indicated that characteristics of ebonite rubber was significantly influenced by the amount of added sulphur and 40 phr reclaim rubber or at ratio of RSS I to reclaim rubber 60 to 40 phr/phr. However, the physical properties of ebonite rubber was able to meet the standard quality of group 2 regarding to Classification Hard Rubber issued by ASTM D 2135

  6. Improved shape-signature and matching methods for model-based robotic vision

    Science.gov (United States)

    Schwartz, J. T.; Wolfson, H. J.

    1987-01-01

    Researchers describe new techniques for curve matching and model-based object recognition, which are based on the notion of shape-signature. The signature which researchers use is an approximation of pointwise curvature. Described here is curve matching algorithm which generalizes a previous algorithm which was developed using this signature, allowing improvement and generalization of a previous model-based object recognition scheme. The results and the experiments described relate to 2-D images. However, natural extensions to the 3-D case exist and are being developed.

  7. Synergistic requirement of orphan nonamer-like elements and DNA bending enhanced by HMGB1 for RAG-mediated nicking at cryptic 12-RSS but not authentic 12-RSS.

    Science.gov (United States)

    Numata, Masashi; Nagata, Kyosuke

    2011-08-01

    V(D)J recombination is initiated by the specific binding of the recombination activating gene (RAG) complex to the heptamer and nonamer elements within recombination signal sequence (RSS). The break points associated with some chromosomal translocations contain cryptic RSSs, and mistargeting of RAG proteins to these less conserved elements could contribute to an aberrant V(D)J recombination. Recently, we found RAG-dependent recombination in the hotspots of TEL-AML1 t(12;21)(p13;q22) chromosomal translocation by an extrachromosomal recombination assay. Here, we describe using in vitro cleavage assays that RAG proteins directly bind to and introduce nicks into TEL and AML1 translocation regions, which contain several heptamer-like sequences. The cryptic nicking site within the TEL fragment was cleaved by RAG proteins essentially depending on a 12-RSS framework, and the nicking activity was enhanced synergistically by both HMGB1 and orphan nonamer-like (NL) sequences, which do not possess counterpart heptamers. In addition, we found that DNA bending stimulated by HMGB1 is indispensable for the HMGB1- and orphan NL element-dependent enhancement of RAG-mediated nicking at the cryptic 12-RSS. Collectively, we would propose the mechanism of HMGB1-dependent enhancement of RAG-mediated nicking at a cryptic RSS through enhanced DNA bending. © 2011 The Authors. Journal compilation © 2011 by the Molecular Biology Society of Japan/Blackwell Publishing Ltd.

  8. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  9. Factor models for cancer signatures

    Science.gov (United States)

    Kakushadze, Zura; Yu, Willie

    2016-11-01

    We present a novel method for extracting cancer signatures by applying statistical risk models (http://ssrn.com/abstract=2732453) from quantitative finance to cancer genome data. Using 1389 whole genome sequenced samples from 14 cancers, we identify an ;overall; mode of somatic mutational noise. We give a prescription for factoring out this noise and source code for fixing the number of signatures. We apply nonnegative matrix factorization (NMF) to genome data aggregated by cancer subtype and filtered using our method. The resultant signatures have substantially lower variability than those from unfiltered data. Also, the computational cost of signature extraction is cut by about a factor of 10. We find 3 novel cancer signatures, including a liver cancer dominant signature (96% contribution) and a renal cell carcinoma signature (70% contribution). Our method accelerates finding new cancer signatures and improves their overall stability. Reciprocally, the methods for extracting cancer signatures could have interesting applications in quantitative finance.

  10. Current signature sensor

    Science.gov (United States)

    Perotti, Jose M. (Inventor); Lucena, Angel (Inventor); Ihlefeld, Curtis (Inventor); Burns, Bradley (Inventor); Bassignani, Karin E. (Inventor)

    2005-01-01

    A solenoid health monitoring system uses a signal conditioner and controller assembly in one embodiment that includes analog circuitry and a DSP controller. The analog circuitry provides signal conditioning to the low-level raw signal coming from a signal acquisition assembly. Software running in a DSP analyzes the incoming data (recorded current signature) and determines the state of the solenoid whether it is energized, de-energized, or in a transitioning state. In one embodiment, the software identifies key features in the current signature during the transition phase and is able to determine the health of the solenoid.

  11. RSS SSM/I OCEAN PRODUCT GRIDS 3-DAY AVERAGE FROM DMSP F13 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids 3-Day Average from DMSP F13 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  12. RSS SSM/I OCEAN PRODUCT GRIDS 3-DAY AVERAGE FROM DMSP F8 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Oceean Product Grids 3-Day Average from DMSP F8 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  13. RSS SSM/I OCEAN PRODUCT GRIDS 3-DAY AVERAGE FROM DMSP F10 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids 3-Day Average from DMSP F10 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  14. RSS SSM/I OCEAN PRODUCT GRIDS 3-DAY AVERAGE FROM DMSP F11 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids 3-Day Average from DMSP F11 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  15. RSS SSM/I OCEAN PRODUCT GRIDS 3-DAY AVERAGE FROM DMSP F15 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids 3-Day Average from DMSP F15 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  16. RSS SSM/I OCEAN PRODUCT GRIDS 3-DAY AVERAGE FROM DMSP F14 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids 3-Day Average from DMSP F14 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  17. Facial Recognition

    Directory of Open Access Journals (Sweden)

    Mihalache Sergiu

    2014-05-01

    Full Text Available During their lifetime, people learn to recognize thousands of faces that they interact with. Face perception refers to an individual's understanding and interpretation of the face, particularly the human face, especially in relation to the associated information processing in the brain. The proportions and expressions of the human face are important to identify origin, emotional tendencies, health qualities, and some social information. From birth, faces are important in the individual's social interaction. Face perceptions are very complex as the recognition of facial expressions involves extensive and diverse areas in the brain. Our main goal is to put emphasis on presenting human faces specialized studies, and also to highlight the importance of attractiviness in their retention. We will see that there are many factors that influence face recognition.

  18. A Multi-Sensor RSS Spatial Sensing-Based Robust Stochastic Optimization Algorithm for Enhanced Wireless Tethering

    Science.gov (United States)

    Parasuraman, Ramviyas; Fabry, Thomas; Molinari, Luca; Kershaw, Keith; Di Castro, Mario; Masi, Alessandro; Ferre, Manuel

    2014-01-01

    The reliability of wireless communication in a network of mobile wireless robot nodes depends on the received radio signal strength (RSS). When the robot nodes are deployed in hostile environments with ionizing radiations (such as in some scientific facilities), there is a possibility that some electronic components may fail randomly (due to radiation effects), which causes problems in wireless connectivity. The objective of this paper is to maximize robot mission capabilities by maximizing the wireless network capacity and to reduce the risk of communication failure. Thus, in this paper, we consider a multi-node wireless tethering structure called the “server-relay-client” framework that uses (multiple) relay nodes in between a server and a client node. We propose a robust stochastic optimization (RSO) algorithm using a multi-sensor-based RSS sampling method at the relay nodes to efficiently improve and balance the RSS between the source and client nodes to improve the network capacity and to provide redundant networking abilities. We use pre-processing techniques, such as exponential moving averaging and spatial averaging filters on the RSS data for smoothing. We apply a receiver spatial diversity concept and employ a position controller on the relay node using a stochastic gradient ascent method for self-positioning the relay node to achieve the RSS balancing task. The effectiveness of the proposed solution is validated by extensive simulations and field experiments in CERN facilities. For the field trials, we used a youBot mobile robot platform as the relay node, and two stand-alone Raspberry Pi computers as the client and server nodes. The algorithm has been proven to be robust to noise in the radio signals and to work effectively even under non-line-of-sight conditions. PMID:25615734

  19. A Multi-Sensor RSS Spatial Sensing-Based Robust Stochastic Optimization Algorithm for Enhanced Wireless Tethering

    Directory of Open Access Journals (Sweden)

    Ramviyas Parasuraman

    2014-12-01

    Full Text Available The reliability of wireless communication in a network of mobile wireless robot nodes depends on the received radio signal strength (RSS. When the robot nodes are deployed in hostile environments with ionizing radiations (such as in some scientific facilities, there is a possibility that some electronic components may fail randomly (due to radiation effects, which causes problems in wireless connectivity. The objective of this paper is to maximize robot mission capabilities by maximizing the wireless network capacity and to reduce the risk of communication failure. Thus, in this paper, we consider a multi-node wireless tethering structure called the “server-relay-client” framework that uses (multiple relay nodes in between a server and a client node. We propose a robust stochastic optimization (RSO algorithm using a multi-sensor-based RSS sampling method at the relay nodes to efficiently improve and balance the RSS between the source and client nodes to improve the network capacity and to provide redundant networking abilities. We use pre-processing techniques, such as exponential moving averaging and spatial averaging filters on the RSS data for smoothing. We apply a receiver spatial diversity concept and employ a position controller on the relay node using a stochastic gradient ascent method for self-positioning the relay node to achieve the RSS balancing task. The effectiveness of the proposed solution is validated by extensive simulations and field experiments in CERN facilities. For the field trials, we used a youBot mobile robot platform as the relay node, and two stand-alone Raspberry Pi computers as the client and server nodes. The algorithm has been proven to be robust to noise in the radio signals and to work effectively even under non-line-of-sight conditions.

  20. A multi-sensor RSS spatial sensing-based robust stochastic optimization algorithm for enhanced wireless tethering.

    Science.gov (United States)

    Parasuraman, Ramviyas; Fabry, Thomas; Molinari, Luca; Kershaw, Keith; Di Castro, Mario; Masi, Alessandro; Ferre, Manuel

    2014-12-12

    The reliability of wireless communication in a network of mobile wireless robot nodes depends on the received radio signal strength (RSS). When the robot nodes are deployed in hostile environments with ionizing radiations (such as in some scientific facilities), there is a possibility that some electronic components may fail randomly (due to radiation effects), which causes problems in wireless connectivity. The objective of this paper is to maximize robot mission capabilities by maximizing the wireless network capacity and to reduce the risk of communication failure. Thus, in this paper, we consider a multi-node wireless tethering structure called the "server-relay-client" framework that uses (multiple) relay nodes in between a server and a client node. We propose a robust stochastic optimization (RSO) algorithm using a multi-sensor-based RSS sampling method at the relay nodes to efficiently improve and balance the RSS between the source and client nodes to improve the network capacity and to provide redundant networking abilities. We use pre-processing techniques, such as exponential moving averaging and spatial averaging filters on the RSS data for smoothing. We apply a receiver spatial diversity concept and employ a position controller on the relay node using a stochastic gradient ascent method for self-positioning the relay node to achieve the RSS balancing task. The effectiveness of the proposed solution is validated by extensive simulations and field experiments in CERN facilities. For the field trials, we used a youBot mobile robot platform as the relay node, and two stand-alone Raspberry Pi computers as the client and server nodes. The algorithm has been proven to be robust to noise in the radio signals and to work effectively even under non-line-of-sight conditions.

  1. Statistical clumped isotope signatures

    NARCIS (Netherlands)

    Röckmann, T.; Popa, M.E.; Krol, M.C.; Hofmann, M.E.G.

    2016-01-01

    High precision measurements of molecules containing more than one heavy isotope may provide novel constraints on element cycles in nature. These so-called clumped isotope signatures are reported relative to the random (stochastic) distribution of heavy isotopes over all available isotopocules of

  2. Statistical clumped isotope signatures

    NARCIS (Netherlands)

    Röckmann, T.|info:eu-repo/dai/nl/304838233; Popa, M. E.|info:eu-repo/dai/nl/375806407; Krol, M. C.|info:eu-repo/dai/nl/078760410; Hofmann, M. E. G.|info:eu-repo/dai/nl/374642907

    2016-01-01

    High precision measurements of molecules containing more than one heavy isotope may provide novel constraints on element cycles in nature. These so-called clumped isotope signatures are reported relative to the random (stochastic) distribution of heavy isotopes over all available isotopocules of a

  3. Signatures of the Invisible

    CERN Multimedia

    Strom, D

    2003-01-01

    On the Net it is possible to take a look at art from afar via Virtual Museums. One such exhibition was recently in the New York Museum of Modern Art's branch, PS1. Entitled 'Signatures of the Invisible' it was a collaborative effort between artists and physicists (1/2 page).

  4. BOREAS RSS-8 BIOME-BGC SSA Simulation of Annual Water and Carbon Fluxes

    Science.gov (United States)

    Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Kimball, John

    2000-01-01

    The BOREAS RSS-8 team performed research to evaluate the effect of seasonal weather and landcover heterogeneity on boreal forest regional water and carbon fluxes using a process-level ecosystem model, BIOME-BGC, coupled with remote sensing-derived parameter maps of key state variables. This data set contains derived maps of landcover type and crown and stem biomass as model inputs to determine annual evapotranspiration, gross primary production, autotrophic respiration, and net primary productivity within the BOREAS SSA-MSA, at a 30-m spatial resolution. Model runs were conducted over a 3-year period from 1994-1996; images are provided for each of those years. The data are stored in binary image format. The data files are available on a CD-ROM (see document number 20010000884), or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  5. The RSS rolls back revealing STS-102 Discovery on Launch Pad 39B

    Science.gov (United States)

    2001-01-01

    KENNEDY SPACE CENTER, Fla. - Workers watch the rollback of the Rotating Service Structure (left) from around Space Shuttle Discovery on Launch Pad 39B. Poised above the orange external tank is the Gaseous Oxygen Vent Arm with the '''beanie cap,''' a vent hood. The RSS provides protected access to the orbiter for changeout and servicing of payloads. It is supported by a rotating bridge that pivots about a vertical axis on the west side of the pad'''s flame trench. Space Shuttle Discovery is scheduled to launch March 8 at 6:42 a.m. EST on the eighth construction flight to the International Space Station. It carries the Multi-Purpose Logistics Module Leonardo, the primary delivery system used to resupply and return Station cargo requiring a pressurized environment. Leonardo will deliver up to 10 tons of laboratory racks filled with equipment, experiments and supplies for outfitting the newly installed U.S. Laboratory Destiny.

  6. BOREAS RSS-7 Regional LAI and FPAR Images From 10-Day AVHRR-LAC Composites

    Science.gov (United States)

    Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Chen, Jing; Cihlar, Josef

    2000-01-01

    The BOReal Ecosystem-Atmosphere Study Remote Sensing Science (BOREAS RSS-7) team collected various data sets to develop and validate an algorithm to allow the retrieval of the spatial distribution of Leaf Area Index (LAI) from remotely sensed images. Advanced Very High Resolution Radiometer (AVHRR) level-4c 10-day composite Normalized Difference Vegetation Index (NDVI) images produced at CCRS were used to produce images of LAI and the Fraction of Photosynthetically Active Radiation (FPAR) absorbed by plant canopies for the three summer IFCs in 1994 across the BOREAS region. The algorithms were developed based on ground measurements and Landsat Thematic Mapper (TM) images. The data are stored in binary image format files.

  7. BOREAS RSS-15 SIR-C and Landsat TM Biomass and Landcover Maps of the NSA

    Science.gov (United States)

    Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Ranson, K. Jon

    2000-01-01

    As part of BOREAS, the RSS-15 team conducted an investigation using SIR-C, X-SAR, and Landsat TM data for estimating total above-ground dry biomass for the SSA and NSA modeling grids and component biomass for the SSA. Relationships of backscatter to total biomass and total biomass to foliage, branch, and bole biomass were used to estimate biomass density across the landscape. The procedure involved image classification with SAR and Landsat TM data and development of simple mapping techniques using combinations of SAR channels. For the SSA, the SIR-C data used were acquired on 06-Oct-1994, and the Landsat TM data used were acquired on 02-Sep-1995. The maps of the NSA were developed from SIR-C data acquired on 13-Apr-1994. The data files are available on a CD-ROM (see document number 20010000884), or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  8. Identification and on-line monitoring of reduced sulphur species (RSS) by voltammetry in oxic waters.

    Science.gov (United States)

    Superville, Pierre-Jean; Pižeta, Ivanka; Omanović, Dario; Billon, Gabriel

    2013-08-15

    Based on automatic on-line measurements on the Deûle River that showed daily variation of a peak around -0.56V (vs Ag|AgCl 3M), identification of Reduced Sulphur Species (RSS) in oxic waters was performed applying cathodic stripping voltammetry (CSV) with the hanging mercury drop electrode (HMDE). Pseudopolarographic studies accompanied with increasing concentrations of copper revealed the presence of elemental sulphur S(0), thioacetamide (TA) and reduced glutathione (GSH) as the main sulphur compounds in the Deûle River. In order to resolve these three species, a simple procedure was developed and integrated in an automatic on-line monitoring system. During one week monitoring with hourly measurements, GSH and S(0) exhibited daily cycles whereas no consequential pattern was observed for TA. Copyright © 2013 Elsevier B.V. All rights reserved.

  9. BOREAS RSS-20 POLDER Radiance Images From the NASA C-130

    Science.gov (United States)

    Leroy, M.; Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Smith, David E. (Technical Monitor)

    2000-01-01

    These Boreal Ecosystem-Atmosphere Study (BOREAS) Remote Sensing Science (RSS)-20 data are a subset of images collected by the Polarization and Directionality of Earth's Reflectance (POLDER) instrument over tower sites in the BOREAS study areas during the intensive field campaigns (IFCs) in 1994. The POLDER images presented here from the NASA ARC C-130 aircraft are made available for illustration purposes only. The data are stored in binary image-format files. The POLDER radiance images are available from the Earth Observing System Data and Information System (EOSDIS) Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC). The data files are available on a CD-ROM (see document number 20010000884).

  10. BOREAS RSS-17 Xylem Flux Density Measurements at the SSA-OBS Site

    Science.gov (United States)

    Zimmerman, Reiner; Way, JoBea; McDonald, Kyle; Nickeson, Jaime (Editor); Hall, Forrest G. (Editor); Smith, David E. (Technical Monitor)

    2000-01-01

    As part of its efforts to determine environmental and phenological states from radar imagery, the Boreal Ecosystem-Atmosphere Study (BOREAS) Remote Sensing Science (RSS)-17 team collected in situ tree xylem flow measurements for one growing season on five Picea mariana (black spruce) trees. The data were collected to obtain information on the temporal and spatial variability in water uptake by trees in the Southern Study Area-Old Black Spruce (SSA-OBS) stand in the BOREAS SSA. Temporally, the data were collected in 30-minute intervals for 120 days from 31 May 1994 until 27 September 1994. The data are stored in tabular ASCII files. The xylem flux data are available from the Earth Observing System Data and Information System (EOSDIS) Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC). The data files are available on a CD-ROM (see document number 20010000884).

  11. Mashup of Tools through Interoperability Standards RSS, RDF, KML and XSL

    Science.gov (United States)

    Robinson, E. M.; Kieffer, M.; Kovacs, S.; Falke, S. R.; Husar, R. B.

    2007-12-01

    Considerable effort is being devoted to the development, and testing of interoperability standards for data access, such as the OGC Web Services WMS/WCS/WFS. The federated data system, DataFed, developed as a broad partnership utilizes these data access standards to deliver a rich array of quantitative air quality and geospatial data to any client application. Recent advances in standardization also allow the linking of distributed applications through the exchange of additional data types: (1)The Really Simple Syndication (RSS) standard facilitates the exchange of simple text records (e.g. annotated bookmarks); (2) The Resource Description Framework (RDF) standard allows the formal description of semantically rich data structures; (3) The Google Keyhole Markup Language (KML) is the standard way to encode/render geospatial data and metadata; (4) The EMBED standard facilitates the incorporation of web content from one server into the web page hosted on another server. Use of these standards now permits the easy creation of user-defined application "mashups" that transform/integrate various data/metadata streams. Wikis, originally used to collaboratively write documents, are now also used as a host for integrating mashups of this type. In this paper, we will illustrate these application mashups. We will show an example where the wiki host receives RSS feeds from Del.icio.us, blogs, etc. A semantically enhanced wiki is used to create and manage structured metadata, which then can be shared through the RDF standard feed. Content from Google Maps, videos from YouTube, PPT slides from SlideShare are also integrated into wiki pages through the EMBED standard. Mashups between the DataFed data access system, the wiki and GoogleEarth using KML, XSL and RDF will also be demonstrated.

  12. Face recognition in the thermal infrared domain

    Science.gov (United States)

    Kowalski, M.; Grudzień, A.; Palka, N.; Szustakowski, M.

    2017-10-01

    Biometrics refers to unique human characteristics. Each unique characteristic may be used to label and describe individuals and for automatic recognition of a person based on physiological or behavioural properties. One of the most natural and the most popular biometric trait is a face. The most common research methods on face recognition are based on visible light. State-of-the-art face recognition systems operating in the visible light spectrum achieve very high level of recognition accuracy under controlled environmental conditions. Thermal infrared imagery seems to be a promising alternative or complement to visible range imaging due to its relatively high resistance to illumination changes. A thermal infrared image of the human face presents its unique heat-signature and can be used for recognition. The characteristics of thermal images maintain advantages over visible light images, and can be used to improve algorithms of human face recognition in several aspects. Mid-wavelength or far-wavelength infrared also referred to as thermal infrared seems to be promising alternatives. We present the study on 1:1 recognition in thermal infrared domain. The two approaches we are considering are stand-off face verification of non-moving person as well as stop-less face verification on-the-move. The paper presents methodology of our studies and challenges for face recognition systems in the thermal infrared domain.

  13. Speaker Recognition

    DEFF Research Database (Denmark)

    Mølgaard, Lasse Lohilahti; Jørgensen, Kasper Winther

    2005-01-01

    Speaker recognition is basically divided into speaker identification and speaker verification. Verification is the task of automatically determining if a person really is the person he or she claims to be. This technology can be used as a biometric feature for verifying the identity of a person...... in applications like banking by telephone and voice mail. The focus of this project is speaker identification, which consists of mapping a speech signal from an unknown speaker to a database of known speakers, i.e. the system has been trained with a number of speakers which the system can recognize....

  14. On Recognition

    DEFF Research Database (Denmark)

    Gjødsbøl, Iben Mundbjerg; Svendsen, Mette Nordahl

    2017-01-01

    to misrecognize and humiliate the person under examination. The article ends by proposing that dementia be the condition that forces us to rethink our ways of recognizing persons more generally. Thus, dementia diagnostics provide insights into different enactments of the person that invite us to explore practices......This article investigates how a person with dementia is made up through intersubjective acts of recognition. Based on ethnographic fieldwork in a Danish memory clinic, we show that identification of disease requires patients to be substituted by their relatives in constructing believable medical...

  15. MGN V RSS SPHERICAL HARMONIC AND GRAVITY MAP DATA V1.0

    Data.gov (United States)

    National Aeronautics and Space Administration — The gravitational signature of Venus was determined from velocity perturbations of the Pioneer Venus Orbiter (PVO) and the Magellan spacecraft as measured from the...

  16. Penelitian “rubber blend” antara karet alam rss dengan karet sintesis jsr 0061 untuk sol ringan sesuai sni 12-0778-1989

    Directory of Open Access Journals (Sweden)

    Penny Setyowati

    1997-12-01

    Full Text Available The objective of this research is to find composision of rubber blend of RSS and JSR 0061 and Carbon black for preparation light rubber sole compound and stabile on high process temperature that give the best fisical properties and the best sole product at moulding vulcanization trial. The best rubber compound to be reached at the compound formulation R III with composision of RSS 90 phr, JSR 0061 10 phr dan carbon black 40 phr.

  17. Calcium signatures and signaling events orchestrate plant-microbe interactions.

    Science.gov (United States)

    Yuan, Peiguo; Jauregui, Edgard; Du, Liqun; Tanaka, Kiwamu; Poovaiah, B W

    2017-08-01

    Calcium (Ca2+) acts as an essential second messenger connecting the perception of microbe signals to the establishment of appropriate immune and symbiotic responses in plants. Accumulating evidence suggests that plants distinguish different microorganisms through plasma membrane-localized pattern recognition receptors. The particular recognition events are encoded into Ca2+ signatures, which are sensed by diverse intracellular Ca2+ binding proteins. The Ca2+ signatures are eventually decoded to distinct downstream responses through transcriptional reprogramming of the defense or symbiosis-related genes. Recent observations further reveal that Ca2+-mediated signaling is also involved in negative regulation of plant immunity. This review is intended as an overview of Ca2+ signaling during immunity and symbiosis, including Ca2+ responses in the nucleus and cytosol. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Formation of Core-Shell Nanoparticles Composed of Magnetite and Samarium Oxide in Magnetospirillum magneticum Strain RSS-1.

    Science.gov (United States)

    Shimoshige, Hirokazu; Nakajima, Yoshikata; Kobayashi, Hideki; Yanagisawa, Keiichi; Nagaoka, Yutaka; Shimamura, Shigeru; Mizuki, Toru; Inoue, Akira; Maekawa, Toru

    2017-01-01

    Magnetotactic bacteria (MTB) synthesize magnetosomes composed of membrane-enveloped magnetite (Fe3O4) or greigite (Fe3S4) particles in the cells. Recently, several studies have shown some possibilities of controlling the biomineralization process and altering the magnetic properties of magnetosomes by adding some transition metals to the culture media under various environmental conditions. Here, we successfully grow Magnetospirillum magneticum strain RSS-1, which are isolated from a freshwater environment, and find that synthesis of magnetosomes are encouraged in RSS-1 in the presence of samarium and that each core magnetic crystal composed of magnetite is covered with a thin layer of samarium oxide (Sm2O3). The present results show some possibilities of magnetic recovery of transition metals and synthesis of some novel structures composed of magnetic particles and transition metals utilizing MTB.

  19. Early steps of V(D)J rearrangement: insights from biochemical studies of RAG-RSS complexes.

    Science.gov (United States)

    Swanson, Patrick C; Kumar, Sushil; Raval, Prafulla

    2009-01-01

    V(D)J recombination is initiated by the synapsis and cleavage of a complementary (12/23) pair of recombination signal sequences (RSSs) by the RAG1 and RAG2 proteins. Our understanding of these processes has been greatly aided by the development of in vitro biochemical assays of RAG binding and cleavage activity. Accumulating evidence suggests that synaptic complex assembly occurs in a step-wise manner and that the RAG proteins catalyze RSS cleavage by mechanisms similar to those used by bacterial transposases. In this chapter we will review the molecular mechanisms of RAG synaptic complex assembly and 12/23-regulated RSS cleavage, focusing on recent advances that shed new light on these processes.

  20. The influence of background music on recognition processes of Chinese characters: an ERP study.

    Science.gov (United States)

    Liu, Baolin; Huang, Yizhou; Wang, Zhongning; Wu, Guangning

    2012-06-19

    In this paper, we employed RSS (rapid stream stimulation) paradigm to study the recognition processes of Chinese characters in background music. Real Chinese characters (upright or rotated) were used as target stimuli, while pseudo-words were used as background stimuli. Subjects were required to detect real characters while listening to Mozart's Sonata K. 448 and in silence. Both behavioral results and ERP results supported that Mozart's music mainly served as a distracter in the recognition processes of real Chinese characters in the experiment. The modulation of Mozart's music on RP (recognition potential) was different across different orientations of Chinese characters; in particular, the modulation of RP elicited by upright Chinese characters was more significant, suggesting that the music factor and orientation factor interact to affect the RP component. In brief, the simultaneous playing of Mozart's music did not improve subjects' performance in the detection of real Chinese characters. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  1. Hand Gesture Recognition Using Ultrasonic Waves

    KAUST Repository

    AlSharif, Mohammed Hussain

    2016-04-01

    Gesturing is a natural way of communication between people and is used in our everyday conversations. Hand gesture recognition systems are used in many applications in a wide variety of fields, such as mobile phone applications, smart TVs, video gaming, etc. With the advances in human-computer interaction technology, gesture recognition is becoming an active research area. There are two types of devices to detect gestures; contact based devices and contactless devices. Using ultrasonic waves for determining gestures is one of the ways that is employed in contactless devices. Hand gesture recognition utilizing ultrasonic waves will be the focus of this thesis work. This thesis presents a new method for detecting and classifying a predefined set of hand gestures using a single ultrasonic transmitter and a single ultrasonic receiver. This method uses a linear frequency modulated ultrasonic signal. The ultrasonic signal is designed to meet the project requirements such as the update rate, the range of detection, etc. Also, it needs to overcome hardware limitations such as the limited output power, transmitter, and receiver bandwidth, etc. The method can be adapted to other hardware setups. Gestures are identified based on two main features; range estimation of the moving hand and received signal strength (RSS). These two factors are estimated using two simple methods; channel impulse response (CIR) and cross correlation (CC) of the reflected ultrasonic signal from the gesturing hand. A customized simple hardware setup was used to classify a set of hand gestures with high accuracy. The detection and classification were done using methods of low computational cost. This makes the proposed method to have a great potential for the implementation in many devices including laptops and mobile phones. The predefined set of gestures can be used for many control applications.

  2. Pengaruh anti oksidan phenyl beta naphtylamine (PBN, dan variasi rss dengan SBR terhadap sifat fisika kompon talang karet

    Directory of Open Access Journals (Sweden)

    Siti Rochani

    1998-06-01

    Full Text Available The aim of the research was to find some important characteristics of rubber gutter compound such as tensile strength, elongation at break, and constant deflection because of adding Phenyl Beta Naphtylamine on it. Rubber gutter compound was made from mixing of natural (RSS and synthetic rubber (SBR and some aditives such Zink Oxide, Stearic Acid, Napthenic Oil, HAF black, Phenyl Beta Naphtylamine, Mercapto Benz Thiazol Disulfide, Diphenyl Guanidine and Sulphur. Three compositions of RSS/SBR and Phenyl Beta Naphtylamine were used in the research, namely 40/60; 50/50; 60/40, and 1 : 1,5 ; 2 respectively. A statistical procedure was used to analyze the data of the physical characteristic of rubber gutter compound produced. The results were compared to the data of the physical characteristic of rubber gutter compound produced. The results were compared to the physical strength of rubber gutter available in the market. From the statistical analyses they denoted that the levels of Phenyl Beta Naphtylamine gave significant effects on elongation at break and constant deflection however there was no effect on tensile strength. The composition levels of RSS /SBR could produce compounds which were significant difference in the tensile strength, elongation at break and constant deflection. Compounds resulted from this research had better tensile strength and elongation compared to rubber gutter available in the market.

  3. Phytohormone sensing in the biotrophic fungus Ustilago maydis - the dual role of the transcription factor Rss1.

    Science.gov (United States)

    Rabe, Franziska; Seitner, Denise; Bauer, Lisa; Navarrete, Fernando; Czedik-Eysenberg, Angelika; Rabanal, Fernando A; Djamei, Armin

    2016-10-01

    The phenolic compound salicylic acid (SA) is a key signalling molecule regulating local and systemic plant defense responses, mainly against biotrophs. Many microbial organisms, including pathogens, share the ability to degrade SA. However, the mechanism by which they perceive SA is unknown. Here we show that Ustilago maydis, the causal agent of corn smut disease, employs a so far uncharacterized SA sensing mechanism. We identified and characterized the novel SA sensing regulator, Rss1, a binuclear zinc cluster protein with dual functions as putative SA receptor and transcriptional activator regulating genes important for SA and tryptophan degradation. Rss1 represents a major component in the identified SA sensing pathway during the fungus' saprophytic stage. However, Rss1 does not have a detectable impact on virulence. The data presented in this work indicate that alternative or redundant sensing cascades exist that regulate the expression of SA-responsive genes in U. maydis during its pathogenic development. © 2016 The Authors. Molecular Microbiology Published by John Wiley & Sons Ltd.

  4. Viral RNA silencing suppressors (RSS): novel strategy of viruses to ablate the host RNA interference (RNAi) defense system.

    Science.gov (United States)

    Bivalkar-Mehla, Shalmali; Vakharia, Janaki; Mehla, Rajeev; Abreha, Measho; Kanwar, Jagat Rakesh; Tikoo, Akshay; Chauhan, Ashok

    2011-01-01

    Pathogenic viruses have developed a molecular defense arsenal for their survival by counteracting the host anti-viral system known as RNA interference (RNAi). Cellular RNAi, in addition to regulating gene expression through microRNAs, also serves as a barrier against invasive foreign nucleic acids. RNAi is conserved across the biological species, including plants, animals and invertebrates. Viruses in turn, have evolved mechanisms that can counteract this anti-viral defense of the host. Recent studies of mammalian viruses exhibiting RNA silencing suppressor (RSS) activity have further advanced our understanding of RNAi in terms of host-virus interactions. Viral proteins and non-coding viral RNAs can inhibit the RNAi (miRNA/siRNA) pathway through different mechanisms. Mammalian viruses having dsRNA-binding regions and GW/WG motifs appear to have a high chance of conferring RSS activity. Although, RSSs of plant and invertebrate viruses have been well characterized, mammalian viral RSSs still need in-depth investigations to present the concrete evidences supporting their RNAi ablation characteristics. The information presented in this review together with any perspective research should help to predict and identify the RSS activity-endowed new viral proteins that could be the potential targets for designing novel anti-viral therapeutics. Copyright © 2010 Elsevier B.V. All rights reserved.

  5. RSS-Based Method for Sensor Localization with Unknown Transmit Power and Uncertainty in Path Loss Exponent.

    Science.gov (United States)

    Huang, Jiyan; Liu, Peng; Lin, Wei; Gui, Guan

    2016-09-08

    The localization of a sensor in wireless sensor networks (WSNs) has now gained considerable attention. Since the transmit power and path loss exponent (PLE) are two critical parameters in the received signal strength (RSS) localization technique, many RSS-based location methods, considering the case that both the transmit power and PLE are unknown, have been proposed in the literature. However, these methods require a search process, and cannot give a closed-form solution to sensor localization. In this paper, a novel RSS localization method with a closed-form solution based on a two-step weighted least squares estimator is proposed for the case with the unknown transmit power and uncertainty in PLE. Furthermore, the complete performance analysis of the proposed method is given in the paper. Both the theoretical variance and Cramer-Rao lower bound (CRLB) are derived. The relationships between the deterministic CRLB and the proposed stochastic CRLB are presented. The paper also proves that the proposed method can reach the stochastic CRLB.

  6. Dual function seal: visualized digital signature for electronic medical record systems.

    Science.gov (United States)

    Yu, Yao-Chang; Hou, Ting-Wei; Chiang, Tzu-Chiang

    2012-10-01

    Digital signature is an important cryptography technology to be used to provide integrity and non-repudiation in electronic medical record systems (EMRS) and it is required by law. However, digital signatures normally appear in forms unrecognizable to medical staff, this may reduce the trust from medical staff that is used to the handwritten signatures or seals. Therefore, in this paper we propose a dual function seal to extend user trust from a traditional seal to a digital signature. The proposed dual function seal is a prototype that combines the traditional seal and digital seal. With this prototype, medical personnel are not just can put a seal on paper but also generate a visualized digital signature for electronic medical records. Medical Personnel can then look at the visualized digital signature and directly know which medical personnel generated it, just like with a traditional seal. Discrete wavelet transform (DWT) is used as an image processing method to generate a visualized digital signature, and the peak signal to noise ratio (PSNR) is calculated to verify that distortions of all converted images are beyond human recognition, and the results of our converted images are from 70 dB to 80 dB. The signature recoverability is also tested in this proposed paper to ensure that the visualized digital signature is verifiable. A simulated EMRS is implemented to show how the visualized digital signature can be integrity into EMRS.

  7. Privacy protection schemes for fingerprint recognition systems

    Science.gov (United States)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  8. Signatures of topological superconductivity

    Energy Technology Data Exchange (ETDEWEB)

    Peng, Yang

    2017-07-19

    The prediction and experimental discovery of topological insulators brought the importance of topology in condensed matter physics into the limelight. Topology hence acts as a new dimension along which more and more new states of matter start to emerge. One of these topological states of matter, namely topological superconductors, comes into the focus because of their gapless excitations. These gapless excitations, especially in one dimensional topological superconductors, are Majorana zero modes localized at the ends of the superconductor and exhibit exotic nonabelian statistics, which can be potentially applied to fault-tolerant quantum computation. Given their highly interesting physical properties and potential applications to quantum computation, both theorists and experimentalists spend great efforts to realize topological supercondoctors and to detect Majoranas. In two projects within this thesis, we investigate the properties of Majorana zero modes in realistic materials which are absent in simple theoretical models. We find that the superconducting proximity effect, an essential ingredient in all existing platforms for topological superconductors, plays a significant role in determining the localization property of the Majoranas. Strong proximity coupling between the normal system and the superconducting substrate can lead to strongly localized Majoranas, which can explain the observation in a recent experiment. Motivated by experiments in Molenkamp's group, we also look at realistic quantum spin Hall Josephson junctions, in which charge puddles acting as magnetic impurities are coupled to the helical edge states. We find that with this setup, the junction generically realizes an exotic 8π periodic Josephson effect, which is absent in a pristine Josephson junction. In another two projects, we propose more pronounced signatures of Majoranas that are accessible with current experimental techniques. The first one is a transport measurement, which uses

  9. R2NA: Received Signal Strength (RSS Ratio-Based Node Authentication for Body Area Network

    Directory of Open Access Journals (Sweden)

    Yang Wu

    2013-12-01

    Full Text Available The body area network (BAN is an emerging branch of wireless sensor networks for personalized applications. The services in BAN usually have a high requirement on security, especially for the medical diagnosis. One of the fundamental directions to ensure security in BAN is how to provide node authentication. Traditional research using cryptography relies on prior secrets shared among nodes, which leads to high resource cost. In addition, most existing non-cryptographic solutions exploit out-of-band (OOB channels, but they need the help of additional hardware support or significant modifications to the system software. To avoid the above problems, this paper presents a proximity-based node authentication scheme, which only uses wireless modules equipped on sensors. With only one sensor and one control unit (CU in BAN, we could detect a unique physical layer characteristic, namely, the difference between the received signal strength (RSS measured on different devices in BAN. Through the above-mentioned particular difference, we can tell whether the sender is close enough to be legitimate. We validate our scheme through both theoretical analysis and experiments, which are conducted on the real Shimmer nodes. The results demonstrate that our proposed scheme has a good security performance.

  10. R2NA: Received Signal Strength (RSS) Ratio-Based Node Authentication for Body Area Network

    Science.gov (United States)

    Wu, Yang; Wang, Kai; Sun, Yongmei; Ji, Yuefeng

    2013-01-01

    The body area network (BAN) is an emerging branch of wireless sensor networks for personalized applications. The services in BAN usually have a high requirement on security, especially for the medical diagnosis. One of the fundamental directions to ensure security in BAN is how to provide node authentication. Traditional research using cryptography relies on prior secrets shared among nodes, which leads to high resource cost. In addition, most existing non-cryptographic solutions exploit out-of-band (OOB) channels, but they need the help of additional hardware support or significant modifications to the system software. To avoid the above problems, this paper presents a proximity-based node authentication scheme, which only uses wireless modules equipped on sensors. With only one sensor and one control unit (CU) in BAN, we could detect a unique physical layer characteristic, namely, the difference between the received signal strength (RSS) measured on different devices in BAN. Through the above-mentioned particular difference, we can tell whether the sender is close enough to be legitimate. We validate our scheme through both theoretical analysis and experiments, which are conducted on the real Shimmer nodes. The results demonstrate that our proposed scheme has a good security performance.

  11. BOREAS RSS-14 Level-2 GOES-7 Shortwave and Longwave Radiation Images

    Science.gov (United States)

    Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Gu, Jiujing; Smith, Eric A.

    2000-01-01

    The BOREAS RSS-14 team collected and processed several GOES-7 and GOES-8 image data sets that covered the BOREAS study region. This data set contains images of shortwave and longwave radiation at the surface and top of the atmosphere derived from collected GOES-7 data. The data cover the time period of 05-Feb-1994 to 20-Sep-1994. The images missing from the temporal series were zero-filled to create a consistent sequence of files. The data are stored in binary image format files. Due to the large size of the images, the level-1a GOES-7 data are not contained on the BOREAS CD-ROM set. An inventory listing file is supplied on the CD-ROM to inform users of what data were collected. The level-1a GOES-7 image data are available from the Earth Observing System Data and Information System (EOSDIS) Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC). See sections 15 and 16 for more information. The data files are available on a CD-ROM (see document number 20010000884).

  12. Target Tracking with Sensor Navigation Using Coupled RSS and AoA Measurements.

    Science.gov (United States)

    Tomic, Slavisa; Beko, Marko; Dinis, Rui; Gomes, João Pedro

    2017-11-21

    This work addresses the problem of tracking a signal-emitting mobile target in wireless sensor networks (WSNs) with navigated mobile sensors. The sensors are properly equipped to acquire received signal strength (RSS) and angle of arrival (AoA) measurements from the received signal, while the target transmit power is assumed not known. We start by showing how to linearize the highly non-linear measurement model. Then, by employing a Bayesian approach, we combine the linearized observation model with prior knowledge extracted from the state transition model. Based on the maximum a posteriori (MAP) principle and the Kalman filtering (KF) framework, we propose new MAP and KF algorithms, respectively. We also propose a simple and efficient mobile sensor navigation procedure, which allows us to further enhance the estimation accuracy of our algorithms with a reduced number of sensors. Model flaws, which result in imperfect knowledge about the path loss exponent (PLE) and the true mobile sensors' locations, are taken into consideration. We have carried out an extensive simulation study, and our results confirm the superiority of the proposed algorithms, as well as the effectiveness of the proposed navigation routine.

  13. Distributed RSS-based localization in wireless sensor networks based on second-order cone programming.

    Science.gov (United States)

    Tomic, Slavisa; Beko, Marko; Dinis, Rui

    2014-10-01

    In this paper, we propose a new approach based on convex optimization to address the received signal strength (RSS)-based cooperative localization problem in wireless sensor networks (WSNs). By using iterative procedures and measurements between two adjacent nodes in the network exclusively, each target node determines its own position locally. The localization problem is formulated using the maximum likelihood (ML) criterion, since ML-based solutions have the property of being asymptotically efficient. To overcome the non-convexity of the ML optimization problem, we employ the appropriate convex relaxation technique leading to second-order cone programming (SOCP). Additionally, a simple heuristic approach for improving the convergence of the proposed scheme for the case when the transmit power is known is introduced. Furthermore, we provide details about the computational complexity and energy consumption of the considered approaches. Our simulation results show that the proposed approach outperforms the existing ones in terms of the estimation accuracy for more than 1:5 m. Moreover, the new approach requires a lower number of iterations to converge, and consequently, it is likely to preserve energy in all presented scenarios, in comparison to the state-of-the-art approaches.

  14. BOREAS RSS-14 Level -3 Gridded Radiometer and Satellite Surface Radiation Images

    Science.gov (United States)

    Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Hodges, Gary; Smith, Eric A.

    2000-01-01

    The BOREAS RSS-14 team collected and processed GOES-7 and -8 images of the BOREAS region as part of its effort to characterize the incoming, reflected, and emitted radiation at regional scales. This data set contains surface radiation parameters, such as net radiation and net solar radiation, that have been interpolated from GOES-7 images and AMS data onto the standard BOREAS mapping grid at a resolution of 5 km N-S and E-W. While some parameters are taken directly from the AMS data set, others have been corrected according to calibrations carried out during IFC-2 in 1994. The corrected values as well as the uncorrected values are included. For example, two values of net radiation are provided: an uncorrected value (Rn), and a value that has been corrected according to the calibrations (Rn-COR). The data are provided in binary image format data files. Some of the data files on the BOREAS CD-ROMs have been compressed using the Gzip program. See section 8.2 for details. The data files are available on a CD-ROM (see document number 20010000884), or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  15. BOREAS RSS-18 Level-1B AVIRIS Imagery: At-Sensor Radiance in BIL Format

    Science.gov (United States)

    Newcomer, Jeffrey A.; Hall, Forrest G. (Editor); Nickerson, Jaime (Editor); Green, Robert O.; Smith, David E. (Technical Monitor)

    2000-01-01

    These data were collected and processed by the BOREAS RSS-18 team at NASA JPL. Data were acquired for BOREAS with NASA's AVIRIS. This optical sensor measures images that consist of spectra from 400 to 2500 nm at 10-nm sampling. These spectra are acquired as images with 20-meter spatial resolution, 11-km swath width and up to 800-km length. The measurements are spectrally, radiometrically, and geometrically calibrated. Spatially, the data are focused on the BOREAS NSA and SSA near Thompson, Manitoba, and Candle Lake, Saskatchewan, Canada, respectively. AVIRIS data were collected in 1994 during the Thaw campaign at the NSA and SSA, at the SSA in IFC-1, and at the NSA and SSA in both IFC-2 and IFC-3. In 1996, AVIRIS was deployed in the winter and summer campaigns in the SSA only. The data files are available on a CD-ROM (see document number 20010000884) or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  16. BOREAS RSS-19 1996 CASI At-Sensor Radiance and Reflectance Images

    Science.gov (United States)

    Miller, John; Hall, Forrest G. (Editor); Nickerson, Jaime (Editor); Freemantle, Jim; Smith, David E. (Technical Monitor)

    2000-01-01

    The BOREAS RSS-19 team collected CASI images from the Chieftain Navaho aircraft in order to observe the seasonal change in the radiometric reflectance properties of the boreal forest landscape. CASI was deployed as a site-specific optical sensor as part of BOREAS. The overall objective of the CASI deployment was to observe the seasonal change in the radiometric reflectance properties of the boreal forest landscape. In 1996, image data were collected with CASI on 15 days during a field campaign between 18-July and 01 -August, primarily at flux tower sites located at study sites near Thompson, Manitoba, and Prince Albert, Saskatchewan. A variety of CASI data collection strategies were used to meet the following scientific objectives: 1) canopy bidirectional reflectance, 2) canopy biochemistry, 3) spatial variability, and 4) estimates of up and downwelling PAR spectral albedo, as well as changes along transects across lakes at the southern site and transects between the NSA and SSA. The images are stored as binary image files. The data files are available on a CD-ROM (see document number 20010000884) or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  17. BOREAS RSS-17 1994 ERS-1 Level-3 Freeze/Thaw Backscatter Change Images

    Science.gov (United States)

    Rignot, Eric; Nickeson, Jaime (Editor); Hall, Forrest G. (Editor); Way, JoBea; McDonald, Kyle C.; Smith, David E. (Technical Monitor)

    2000-01-01

    The Boreal Ecosystem-Atmosphere Study (BOREAS) Remote Sensing Science (RSS)-17 team acquired and analyzed imaging radar data from the European Space Agency's (ESA's) European Remote Sensing Satellite (ERS)-1 over a complete annual cycle at the BOREAS sites in Canada in 1994 to detect shifts in radar backscatter related to varying environmental conditions. Two independent transitions corresponding to soil thaw and possible canopy thaw were revealed by the data. The results demonstrated that radar provides an ability to observe thaw transitions at the beginning of the growing season, which in turn helps constrain the length of the growing season. The data set presented here includes change maps derived from radar backscatter images that were mosaicked together to cover the southern BOREAS sites. The image values used for calculating the changes are given relative to the reference mosaic image. The data are stored in binary image format files. The imaging radar data are available from the Earth Observing System Data and Information System (EOSDIS) Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC). The data files are available on a CD-ROM (see document number 20010000884).

  18. CERN Alerter - RSS based system for information broadcast to all CERN offices

    CERN Document Server

    Otto, R

    2008-01-01

    Nearly every large organization uses a tool to broadcast messages and information across the internal campus (messages like alerts announcing interruption in services or just information about upcoming events). These tools typically allow administrators (operators) to send "targeted" messages which are sent only to specific groups of users or computers, e/g only those located in a specified building or connected to a particular computing service. CERN has a long history of such tools: CERNVMS's SPM_quotMESSAGE command, Zephyr [2] and the most recent the NICE Alerter based on the NNTP protocol. The NICE Alerter used on all Windows-based computers had to be phased out as a consequence of phasing out NNTP at CERN. The new solution to broadcast information messages on the CERN campus continues to provide the service based on cross-platform technologies, hence minimizing custom developments and relying on commercial software as much as possible. The new system, called CERN Alerter, is based on RSS (Really Simple S...

  19. Clustering signatures classify directed networks

    Science.gov (United States)

    Ahnert, S. E.; Fink, T. M. A.

    2008-09-01

    We use a clustering signature, based on a recently introduced generalization of the clustering coefficient to directed networks, to analyze 16 directed real-world networks of five different types: social networks, genetic transcription networks, word adjacency networks, food webs, and electric circuits. We show that these five classes of networks are cleanly separated in the space of clustering signatures due to the statistical properties of their local neighborhoods, demonstrating the usefulness of clustering signatures as a classifier of directed networks.

  20. Metabolism of hydrogen sulfide (H2S) and Production of Reactive Sulfur Species (RSS) by superoxide dismutase.

    Science.gov (United States)

    Olson, Kenneth R; Gao, Yan; Arif, Faihaan; Arora, Kanika; Patel, Shivali; DeLeon, Eric R; Sutton, Thomas R; Feelisch, Martin; Cortese-Krott, Miriam M; Straub, Karl D

    2017-11-20

    Reactive sulfur species (RSS) such as H2S, HS•, H2Sn, (n = 2-7) and HS2•- are chemically similar to H2O and the reactive oxygen species (ROS) HO•, H2O2, O2•- and act on common biological effectors. RSS were present in evolution long before ROS, and because both are metabolized by catalase it has been suggested that "antioxidant" enzymes originally evolved to regulate RSS and may continue to do so today. Here we examined RSS metabolism by Cu/Zn superoxide dismutase (SOD) using amperometric electrodes for dissolved H2S, a polysulfide-specific fluorescent probe (SSP4), and mass spectrometry to identify specific polysulfides (H2S2-H2S5). H2S was concentration- and oxygen-dependently oxidized by 1μM SOD to polysulfides (mainly H2S2, and to a lesser extent H2S3 and H2S5) with an EC50 of approximately 380μM H2S. H2S concentrations > 750μM inhibited SOD oxidation (IC50 = 1.25mM) with complete inhibition when H2S > 1.75mM. Polysulfides were not metabolized by SOD. SOD oxidation preferred dissolved H2S over hydrosulfide anion (HS-), whereas HS- inhibited polysulfide production. In hypoxia, other possible electron donors such as nitrate, nitrite, sulfite, sulfate, thiosulfate and metabisulfite were ineffective. Manganese SOD also catalyzed H2S oxidation to form polysulfides, but did not metabolize polysulfides indicating common attributes of these SODs. These experiments suggest that, unlike the well-known SOD-mediated dismutation of two O2•- to form H2O2 and O2, SOD catalyzes a reaction using H2S and O2 to form persulfide. These can then combine in various ways to form polysulfides and sulfur oxides. It is also possible that H2S (or polysulfides) interact/react with SOD cysteines to affect catalytic activity or to directly contribute to sulfide metabolism. Our studies suggest that H2S metabolism by SOD may have been an ancient mechanism to detoxify sulfide or to regulate RSS and along with catalase may continue to do so in contemporary organisms. Copyright

  1. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  2. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  3. Streptococcus suis small RNA rss04 contributes to the induction of meningitis by regulating capsule synthesis and by inducing biofilm formation in a mouse infection model.

    Science.gov (United States)

    Xiao, Genhui; Tang, Huanyu; Zhang, Shouming; Ren, Haiyan; Dai, Jiao; Lai, Liying; Lu, Chengping; Yao, Huochun; Fan, Hongjie; Wu, Zongfu

    2017-02-01

    Streptococcus suis (SS) is an important pathogen for pigs, and it is also considered as a zoonotic agent for humans. Meningitis is one of the most common features of the infection caused by SS, but little is known about the mechanisms of SS meningitis. Recent studies have revealed that small RNAs (sRNAs) have emerged as key regulators of the virulence in several bacteria. In the previous study, we reported that SS sRNA rss04 was up-regulated in pig cerebrospinal fluid and contributes to SS virulence in a zebrafish infection model. Here, we show that rss04 facilitates SS invasion of mouse brain and lung in vivo. Label-free quantitation mass spectrometry analysis revealed that rss04 regulates transcriptional regulator CcpA and several virulence factors including LuxS. Transmission electron microscope and Dot-blot analyses indicated that rss04 represses capsular polysaccharide (CPS) production, which in turn facilitates SS adherence and invasion of mouse brain microvascular endothelial cells bEnd.3 in vitro and activates the mRNA expression of TLR2, CCL2, IL-6 and TNF-α in mouse brain in vivo at 12h post-infection. In addition, rss04 positively regulates SS biofilm formation. Survival analysis of infected mice showed that biofilm state in brain contributes to SS virulence by intracranial subarachnoidal route of infection. Together, our data reveal that SS sRNA rss04 contributes to the induction of meningitis by regulating the CPS synthesis and by inducing biofilm formation, thereby increasing the virulence in a mouse infection model. To our knowledge, rss04 represents the first bacterial sRNA that plays definitive roles in bacterial meningitis. Copyright © 2017 Elsevier B.V. All rights reserved.

  4. Recognition of social identity in ants

    DEFF Research Database (Denmark)

    Bos, Nick; d'Ettorre, Patrizia

    2012-01-01

    Recognizing the identity of others, from the individual to the group level, is a hallmark of society. Ants, and other social insects, have evolved advanced societies characterized by efficient social recognition systems. Colony identity is mediated by colony specific signature mixtures, a blend...... of hydrocarbons present on the cuticle of every individual (the “label”). Recognition occurs when an ant encounters another individual, and compares the label it perceives to an internal representation of its own colony odor (the “template”). A mismatch between label and template leads to rejection...... of the encountered individual. Although advances have been made in our understanding of how the label is produced and acquired, contradictory evidence exists about information processing of recognition cues. Here, we review the literature on template acquisition in ants and address how and when the template...

  5. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  6. Ship Signature Management System : Functionality

    NARCIS (Netherlands)

    Arciszewski, H.F.R.; Lier, L. van; Meijer, Y.G.S.; Noordkamp, H.W.; Wassenaar, A.S.

    2010-01-01

    A signature of a platform is the manner in which the platform manifests itself to a certain type of sensor and how observable it is when such a sensor is used to detect the platform. Because many military platforms use sensors in different media, it is the total of its different signatures that

  7. Photonic quantum digital signatures operating over kilometer ranges in installed optical fiber

    Science.gov (United States)

    Collins, Robert J.; Fujiwara, Mikio; Amiri, Ryan; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Andersson, Erika; Buller, Gerald S.; Sasaki, Masahide

    2016-10-01

    The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable. The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure. There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority. Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.

  8. Maternal signature whistle use aids mother-calf reunions in a bottlenose dolphin, Tursiops truncatus.

    Science.gov (United States)

    King, Stephanie L; Guarino, Emily; Keaton, Loriel; Erb, Linda; Jaakkola, Kelly

    2016-05-01

    Individual vocal signatures play an important role in parent-offspring recognition in many animals. One species that uses signature calls to accurately facilitate individual recognition is the bottlenose dolphin. Female dolphins and their calves will use their highly individualised signature whistles to identify and maintain contact with one another. Previous studies have shown high signature whistle rates of both mothers and calves during forced separations. In more natural settings, it appears that the calf vocalises more frequently to initiate reunions with its mother. However, little is known about the mechanisms a female dolphin may employ when there is strong motivation for her to reunite with her calf. In this study, we conducted a series of experimental trials in which we asked a female dolphin to retrieve either her wandering calf or a series of inanimate objects (control). Our results show that she used her vocal signature to actively recruit her calf, and produced no such signal when asked to retrieve the objects. This is the first study to clearly manipulate a dolphin's motivation to retrieve her calf with experimental controls. The results highlight that signature whistles are not only used in broadcasting individual identity, but that maternal signature whistle use is important in facilitating mother-calf reunions. Copyright © 2016 Elsevier B.V. All rights reserved.

  9. BOREAS RSS-14 Level-1a GOES-8 Visible, IR and Water Vapor Images

    Science.gov (United States)

    Hall, Forrest G. (Editor); Newcomer, Jeffrey A.; Faysash, David; Cooper, Harry J.; Smith, Eric A.

    2000-01-01

    The BOREAS RSS-14 team collected and processed several GOES-7 and GOES-8 image data sets that covered the BOREAS study region. The level-1a GOES-8 images were created by BORIS personnel from the level-1 images delivered by FSU personnel. The data cover 14-Jul-1995 to 21-Sep-1995 and 12-Feb-1996 to 03-Oct-1996. The data start out as three bands with 8-bit pixel values and end up as five bands with 10-bit pixel values. No major problems with the data have been identified. The differences between the level-1 and level-1a GOES-8 data are the formatting and packaging of the data. The images missing from the temporal series of level-1 GOES-8 images were zero-filled by BORIS staff to create files consistent in size and format. In addition, BORIS staff packaged all the images of a given type from a given day into a single file, removed the header information from the individual level-1 files, and placed it into a single descriptive ASCII header file. The data are contained in binary image format files. Due to the large size of the images, the level-1a GOES-8 data are not contained on the BOREAS CD-ROM set. An inventory listing file is supplied on the CD-ROM to inform users of what data were collected. The level-1a GOES-8 image data are available from the Earth Observing System Data and Information System (EOSDIS) Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC). See sections 15 and 16 for more information. The data files are available on a CD-ROM (see document number 20010000884).

  10. Tombusvirus P19 RNA silencing suppressor (RSS) activity in mammalian cells correlates with charged amino acids that contribute to direct RNA-binding.

    Science.gov (United States)

    Liu, Xiang; Houzet, Laurent; Jeang, Kuan-Teh

    2012-12-06

    Tombusvirus P19 is a protein encoded by tomato bushy stunt virus and related tombusviruses. Earlier studies have demonstrated that P19 is an RNA silencing suppressor (RSS) in plant cells. However, it has not been systematically investigated how P19 suppresses RNA interference in various mammalian cell settings. We have studied the RSS effect of P19 in mammalian cells, HEK293T, HeLa, and mouse embryonic fibroblasts. We have individually mutated 18 positively charged residues in P19 and found that 6 of these charged residues in P19 reduce its ability to suppress RNA interference. In each case, the reduction of silencing of RNA interference correlated with the reduced ability by these P19 mutants to bind siRNAs (small interfering RNAs). Our findings characterize a class of RNA-binding proteins that function as RSS moieties. We find a tight correlation between positively charged residues in P19 accounting for siRNA-binding and their RSS activity. Because P19's activity is conserved in plant and animal cells, we conclude that its RSS function unlikely requires cell type-specific co-factors and likely arises from direct RNA-binding.

  11. On the signature of LINCOS

    Science.gov (United States)

    Ollongren, Alexander

    2010-12-01

    Suppose the international SETI effort yields the discovery of some signal of evidently non-natural origin. Could it contain linguistic information formulated in some kind of Lingua Cosmica? One way to get insight into this matter is to consider what specific (bio) linguistic signature( s) could be attached to a cosmic language for interstellar communication—designed by humans or an alien society having reached a level of intelligence (and technology) comparable to or surpassing ours. For this purpose, we consider in the present paper the logico-linguistic system LINCOS for ( A)CETI, developed during a number of years by the author in several papers and a monograph [1]. The system has a two-fold signature, which distinguishes it significantly from natural languages. In fact abstract and concrete signatures can be distinguished. That an abstract kind occurs is due to the manner in which abstractions of reality are represented in LINCOS-texts. They can take compound forms because the system is multi-expressive—partly due to the availability of inductive (recursive) entities. On the other hand, the concrete signature of LINCOS is related to the distribution of delimiters and predefined tokens in texts. Assigning measures to concrete signatures will be discussed elsewhere. The present contribution concentrates on the abstract signature of the language. At the same time, it is realized that an alien Lingua Cosmica might, but not necessarily needs to have this kind of signatures.

  12. Persistence characterization and data calibration scheme for the RSS-NIR H2RG detector on SALT

    Science.gov (United States)

    Mosby, Gregory; Eggen, Nathan; Wolf, Marsha; Jaehnig, Kurt; Kotulla, Ralf

    2016-07-01

    The University of Wisconsin Madison is building a NIR spectrograph (RSS-NIR) for the Southern African Large Telescope. The detector system uses a H2RG HdCdTe 1.7 μm cutoff array. We performed tests to measure and characterize the persistence of the detector to inform strategies to mitigate this effect. These tests use up-the- ramp group samples to get finer time resolution of the release of persistence. We share these test results. We also present preliminary results of the dependence of persistence on detector temperature. We conclude with an outline and assessment of a persistence calibration scheme.

  13. Statistical clumped isotope signatures

    Science.gov (United States)

    Röckmann, T.; Popa, M. E.; Krol, M. C.; Hofmann, M. E. G.

    2016-01-01

    High precision measurements of molecules containing more than one heavy isotope may provide novel constraints on element cycles in nature. These so-called clumped isotope signatures are reported relative to the random (stochastic) distribution of heavy isotopes over all available isotopocules of a molecule, which is the conventional reference. When multiple indistinguishable atoms of the same element are present in a molecule, this reference is calculated from the bulk (≈average) isotopic composition of the involved atoms. We show here that this referencing convention leads to apparent negative clumped isotope anomalies (anti-clumping) when the indistinguishable atoms originate from isotopically different populations. Such statistical clumped isotope anomalies must occur in any system where two or more indistinguishable atoms of the same element, but with different isotopic composition, combine in a molecule. The size of the anti-clumping signal is closely related to the difference of the initial isotope ratios of the indistinguishable atoms that have combined. Therefore, a measured statistical clumped isotope anomaly, relative to an expected (e.g. thermodynamical) clumped isotope composition, may allow assessment of the heterogeneity of the isotopic pools of atoms that are the substrate for formation of molecules. PMID:27535168

  14. AUTOMATIC LICENSE PLATE LOCALISATION AND IDENTIFICATION VIA SIGNATURE ANALYSIS

    Directory of Open Access Journals (Sweden)

    Lorita Angeline

    2014-02-01

    Full Text Available A new algorithm for license plate localisation and identification is proposed on the basis of Signature analysis. Signature analysis has been used to locate license plate candidate and its properties can be further utilised in supporting and affirming the license plate character recognition. This paper presents Signature Analysis and the improved conventional Connected Component Analysis (CCA to design an automatic license plate localisation and identification. A procedure called Euclidean Distance Transform is added to the conventional CCA in order to tackle the multiple bounding boxes that occurred. The developed algorithm, SAICCA achieved 92% successful rate, with 8% failed localisation rate due to the restrictions such as insufficient light level, clarity and license plate perceptual information. The processing time for a license plate localisation and recognition is a crucial criterion that needs to be concerned. Therefore, this paper has utilised several approaches to decrease the processing time to an optimal value. The results obtained show that the proposed system is capable to be implemented in both ideal and non-ideal environments.

  15. Password-based digital signatures

    OpenAIRE

    Sivagnanasuntharam, Sangeepan

    2013-01-01

    This thesis is about implementing a digital signature scheme proposed by associate professor Kristian Gjøsteen and Oystein Thuen.The thesis explains the implementation, the challenges met and a security assessment of the implementation.

  16. Intrusion detection using secure signatures

    Science.gov (United States)

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  17. Epigenetic Signatures of Cigarette Smoking

    National Research Council Canada - National Science Library

    Joehanes, Roby; Just, A.C; Marioni, Riccardo; Pilling, Luke; Reynolds, Lindsay; Mandaviya, P.R; Guan, Weihua; Xu, T; Elks, Cathy; Aslibekyan, S; Moreno-Macías, Hortensia; Smith, Jennifer A; Brody, Jennifer; Dhingra, R; Yousefi, Paul; Pankow, James; Kunze, S; Shah, S.H; McRae, Allan F; Lohman, Kurt; Sha, J; Absher, Devin; Ferrucci, Luigi; Zhao, W; Demerath, Ellen; Bressler, Jan; Grove, Megan; Huan, Tianxiao; Liu, Chunyu; Mendelson, M.M; Yao, Chen; Kiel, Douglas P; Peters, Annette; Wang-Sattler, Rui; Visscher, Peter; Wray, Naomi; Starr, John; Ding, J; Roiguez, C.J; Wareham, Nick; Irvin, M.R; Zhi, D; Barrdahl, Myrto; Vineis, Paolo; Ambatipudi, S; Uitterlinden, Ané; Hofman, Albert; Schwartz, J; Colicino, E; Hou, L; Vokonas, P.S; Hernandez, Dena; Singleton, Anew; Bandinelli, Stefania; Turner, Stephen; Ware, Erin B; Smith, A.K; Klengel, Torsten; Binder, Elisabeth B; Psaty, Bruce; Taylor, Kent; Gharib, Sina; Swenson, B.R; Liang, L; Demeo, Dawn L; O'Connor, George; Herceg, Zdenko; Ressler, K.J; Conneely, Karen N; Sotoodehnia, Nona; Kardia, S.L.R; Melzer, David; Baccarelli, Anea A; Meurs, Joyce; Romieu, Isabelle; Arnett, Donna; Ong, K.K; Liu, Yongmei; Waldenberger, Melanie; Deary, Ian J; Fornage, Myriam; Levy, Daniel; London, Stephanie J

    2016-01-01

    textabstractBackground-DNA methylation leaves a long-term signature of smoking exposure and is one potential mechanism by which tobacco exposure predisposes to adverse health outcomes, such as cancers...

  18. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  19. Object reading: text recognition for object recognition

    NARCIS (Netherlands)

    Karaoglu, S.; van Gemert, J.C.; Gevers, T.

    2012-01-01

    We propose to use text recognition to aid in visual object class recognition. To this end we first propose a new algorithm for text detection in natural images. The proposed text detection is based on saliency cues and a context fusion step. The algorithm does not need any parameter tuning and can

  20. Thermal imaging as a biometrics approach to facial signature authentication.

    Science.gov (United States)

    Guzman, A M; Goryawala, M; Wang, Jin; Barreto, A; Andrian, J; Rishe, N; Adjouadi, M

    2013-01-01

    A new thermal imaging framework with unique feature extraction and similarity measurements for face recognition is presented. The research premise is to design specialized algorithms that would extract vasculature information, create a thermal facial signature and identify the individual. The proposed algorithm is fully integrated and consolidates the critical steps of feature extraction through the use of morphological operators, registration using the Linear Image Registration Tool and matching through unique similarity measures designed for this task. The novel approach at developing a thermal signature template using four images taken at various instants of time ensured that unforeseen changes in the vasculature over time did not affect the biometric matching process as the authentication process relied only on consistent thermal features. Thirteen subjects were used for testing the developed technique on an in-house thermal imaging system. The matching using the similarity measures showed an average accuracy of 88.46% for skeletonized signatures and 90.39% for anisotropically diffused signatures. The highly accurate results obtained in the matching process clearly demonstrate the ability of the thermal infrared system to extend in application to other thermal imaging based systems. Empirical results applying this approach to an existing database of thermal images proves this assertion.

  1. Face Detection and Recognition

    National Research Council Canada - National Science Library

    Jain, Anil K

    2004-01-01

    This report describes research efforts towards developing algorithms for a robust face recognition system to overcome many of the limitations found in existing two-dimensional facial recognition systems...

  2. Attribute-Based Digital Signature System

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, Muhammad; Petkovic, M.

    2011-01-01

    An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret

  3. Practical Certificateless Aggregate Signatures From Bilinear Maps

    NARCIS (Netherlands)

    Gong, Zheng; Long, Y.; Hong, X.; Chen, Kefei

    2010-01-01

    Aggregate signature is a digital signature with a striking property that anyone can aggregate n individual signatures on n different messages which are signed by n distinct signers, into a single compact signature to reduce computational and storage costs. In this work, two practical certificateless

  4. Simulating realistic predator signatures in quantitative fatty acid signature analysis

    Science.gov (United States)

    Bromaghin, Jeffrey F.

    2015-01-01

    Diet estimation is an important field within quantitative ecology, providing critical insights into many aspects of ecology and community dynamics. Quantitative fatty acid signature analysis (QFASA) is a prominent method of diet estimation, particularly for marine mammal and bird species. Investigators using QFASA commonly use computer simulation to evaluate statistical characteristics of diet estimators for the populations they study. Similar computer simulations have been used to explore and compare the performance of different variations of the original QFASA diet estimator. In both cases, computer simulations involve bootstrap sampling prey signature data to construct pseudo-predator signatures with known properties. However, bootstrap sample sizes have been selected arbitrarily and pseudo-predator signatures therefore may not have realistic properties. I develop an algorithm to objectively establish bootstrap sample sizes that generates pseudo-predator signatures with realistic properties, thereby enhancing the utility of computer simulation for assessing QFASA estimator performance. The algorithm also appears to be computationally efficient, resulting in bootstrap sample sizes that are smaller than those commonly used. I illustrate the algorithm with an example using data from Chukchi Sea polar bears (Ursus maritimus) and their marine mammal prey. The concepts underlying the approach may have value in other areas of quantitative ecology in which bootstrap samples are post-processed prior to their use.

  5. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  6. Significance analysis of prognostic signatures.

    Directory of Open Access Journals (Sweden)

    Andrew H Beck

    Full Text Available A major goal in translational cancer research is to identify biological signatures driving cancer progression and metastasis. A common technique applied in genomics research is to cluster patients using gene expression data from a candidate prognostic gene set, and if the resulting clusters show statistically significant outcome stratification, to associate the gene set with prognosis, suggesting its biological and clinical importance. Recent work has questioned the validity of this approach by showing in several breast cancer data sets that "random" gene sets tend to cluster patients into prognostically variable subgroups. This work suggests that new rigorous statistical methods are needed to identify biologically informative prognostic gene sets. To address this problem, we developed Significance Analysis of Prognostic Signatures (SAPS which integrates standard prognostic tests with a new prognostic significance test based on stratifying patients into prognostic subtypes with random gene sets. SAPS ensures that a significant gene set is not only able to stratify patients into prognostically variable groups, but is also enriched for genes showing strong univariate associations with patient prognosis, and performs significantly better than random gene sets. We use SAPS to perform a large meta-analysis (the largest completed to date of prognostic pathways in breast and ovarian cancer and their molecular subtypes. Our analyses show that only a small subset of the gene sets found statistically significant using standard measures achieve significance by SAPS. We identify new prognostic signatures in breast and ovarian cancer and their corresponding molecular subtypes, and we show that prognostic signatures in ER negative breast cancer are more similar to prognostic signatures in ovarian cancer than to prognostic signatures in ER positive breast cancer. SAPS is a powerful new method for deriving robust prognostic biological signatures from clinically

  7. Pattern recognition monitoring of PEM fuel cell

    Science.gov (United States)

    Meltser, Mark Alexander

    1999-01-01

    The CO-concentration in the H.sub.2 feed stream to a PEM fuel cell stack is monitored by measuring current and voltage behavior patterns from an auxiliary cell attached to the end of the stack. The auxiliary cell is connected to the same oxygen and hydrogen feed manifolds that supply the stack, and discharges through a constant load. Pattern recognition software compares the current and voltage patterns from the auxiliary cell to current and voltage signature determined from a reference cell similar to the auxiliary cell and operated under controlled conditions over a wide range of CO-concentrations in the H.sub.2 fuel stream.

  8. Multimodal Biometrics Recognition by Dimensionality Diminution Method

    Directory of Open Access Journals (Sweden)

    Suvarnsing Bhable

    2015-12-01

    Full Text Available Multimodal biometric system utilizes two or more character modalities, e.g., face, ear, and fingerprint, Signature, plamprint to improve the recognition accuracy of conventional unimodal methods. We propose a new dimensionality reduction method called Dimension Diminish Projection (DDP in this paper. DDP can not only preserve local information by capturing the intra-modal geometry, but also extract between-class relevant structures for classification effectively. Experimental results show that our proposed method performs better than other algorithms including PCA, LDA and MFA.

  9. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  10. Molecular signatures in breast cancer.

    Science.gov (United States)

    Lal, Samir; McCart Reed, Amy E; de Luca, Xavier M; Simpson, Peter T

    2017-12-01

    The use of molecular signatures to add value to standard clinical and pathological parameters has impacted clinical practice in many cancer types, but perhaps most notably in the breast cancer field. This is, in part, due to the considerable complexity of the disease at the clinical, morphological and molecular levels. The adoption of molecular profiling of DNA, RNA and protein continues to reveal important differences in the intrinsic biology between molecular subtypes and has begun to impact the way patients are managed. Several bioinformatic tools have been developed using DNA or RNA-based signatures to stratify the disease into biologically and/or clinically meaningful subgroups. Here, we review the approaches that have been used to develop gene expression signatures into currently available diagnostic assays (e.g., OncotypeDX® and Mammaprint®), plus we describe the latest work on genome sequencing, the methodologies used in the discovery process of mutational signatures, and the potential of these signatures to impact the clinic. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. Differences in Intention to Use Educational RSS Feeds between Lebanese and British Students: A Multi-Group Analysis Based on the Technology Acceptance Model

    Science.gov (United States)

    Tarhini, Ali; Scott, Michael James; Sharma, Sujeet Kumar; Abbasi, Muhammad Sharif

    2015-01-01

    Really Simple Syndication (RSS) offers a means for university students to receive timely updates from virtual learning environments. However, despite its utility, only 21% of home students surveyed at a university in Lebanon claim to have ever used the technology. To investigate whether national culture could be an influence on intention to use…

  12. Machine Learning Untuk Estimasi Posisi Objek Berbasis RSS Fingerprint Menggunakan IEEE 802.11g Pada Lantai 3 Gedung JTETI UGM

    Directory of Open Access Journals (Sweden)

    Chairani Chairani

    2015-05-01

    Full Text Available Penelitian ini membahas tentang estimasi posisi (localization objek dalam gedung menggunakan jaringan wireless atau IEEE 802.11g dengan pendekatan Machine Learning. Metode pada pengukuran RSS menggunakan RSS-based fingerprint.  Algoritma Machine Learning yang digunakan dalam memperkirakan lokasi dari pengukuran RSS-based menggunakan Naive Bayes.  Localization dilakukan pada lantai 3 gedung Jurusan Teknik Elektro dan Teknologi Informasi (JTETI dengan luas 1969,68 m2 dan memiliki 5 buah titik penempatan access point (AP. Untuk membentuk peta fingerprint digunakan dimensi 1 m x 1 m sehingga terbentuk grid sebanyak  1893 buah. Dengan menggunakan software Net Surveyor terkumpul data kekuatan sinyal yang diterima (RSS dari jaringan wireless ke perangkat penerima (laptop sebanyak 86.980 record. Hasil nilai rata-rata error jarak estimasi untuk localization seluruh ruangan di lantai 3 dengan menggunakan algoritma Naive Bayes pada fase offline tahap learning adalah 6,29 meter. Untuk fase online dan tahap post learning diperoleh rata-rata error jarak estimasi sebesar 7,82 meter.

  13. Extracting and analyzing micro-Doppler from ladar signatures

    Science.gov (United States)

    Tahmoush, Dave

    2015-05-01

    Ladar and other 3D imaging modalities have the capability of creating 3D micro-Doppler to analyze the micro-motions of human subjects. An additional capability to the recognition of micro-motion is the recognition of the moving part, such as the hand or arm. Combined with measured RCS values of the body, ladar imaging can be used to ground-truth the more sensitive radar micro-Doppler measurements and associate the moving part of the subject with the measured Doppler and RCS from the radar system. The 3D ladar signatures can also be used to classify activities and actions on their own, achieving an 86% accuracy using a micro-Doppler based classification strategy.

  14. Signature Visualization of Software Binaries

    Energy Technology Data Exchange (ETDEWEB)

    Panas, T

    2008-07-01

    In this paper we present work on the visualization of software binaries. In particular, we utilize ROSE, an open source compiler infrastructure, to pre-process software binaries, and we apply a landscape metaphor to visualize the signature of each binary (malware). We define the signature of a binary as a metric-based layout of the functions contained in the binary. In our initial experiment, we visualize the signatures of a series of computer worms that all originate from the same line. These visualizations are useful for a number of reasons. First, the images reveal how the archetype has evolved over a series of versions of one worm. Second, one can see the distinct changes between version. This allows the viewer to form conclusions about the development cycle of a particular worm.

  15. Recognition of social identity in ants.

    Science.gov (United States)

    Bos, Nick; d'Ettorre, Patrizia

    2012-01-01

    Recognizing the identity of others, from the individual to the group level, is a hallmark of society. Ants, and other social insects, have evolved advanced societies characterized by efficient social recognition systems. Colony identity is mediated by colony specific signature mixtures, a blend of hydrocarbons present on the cuticle of every individual (the "label"). Recognition occurs when an ant encounters another individual, and compares the label it perceives to an internal representation of its own colony odor (the "template"). A mismatch between label and template leads to rejection of the encountered individual. Although advances have been made in our understanding of how the label is produced and acquired, contradictory evidence exists about information processing of recognition cues. Here, we review the literature on template acquisition in ants and address how and when the template is formed, where in the nervous system it is localized, and the possible role of learning. We combine seemingly contradictory evidence in to a novel, parsimonious theory for the information processing of nestmate recognition cues.

  16. Recognition of social identity in ants

    Directory of Open Access Journals (Sweden)

    Nick eBos

    2012-03-01

    Full Text Available Recognizing the identity of others, from the individual to the group level, is a hallmark of society. Ants, and other social insects, have evolved advanced societies characterized by efficient social recognition systems. Colony identity is mediated by colony specific signature mixtures, a blend of hydrocarbons present on the cuticle of every individual (the label. Recognition occurs when an ant encounters another individual, and compares the label it perceives to an internal representation of its own colony odor (the template. A mismatch between label and template leads to rejection of the encountered individual. Although advances have been made in our understanding of how the label is produced and acquired, contradictory evidence exists about information processing of recognition cues. Here, we review the literature on template acquisition in ants and address how and when the template is formed, where in the nervous system it is localized, and the possible role of learning. We combine seemingly contradictory evidence in to a novel, parsimonious theory for the information processing of nestmate recognition cues.

  17. Multimodal eye recognition

    Science.gov (United States)

    Zhou, Zhi; Du, Yingzi; Thomas, N. L.; Delp, Edward J., III

    2010-04-01

    Multimodal biometrics use more than one means of biometric identification to achieve higher recognition accuracy, since sometimes a unimodal biometric is not good enough used to do identification and classification. In this paper, we proposed a multimodal eye recognition system, which can obtain both iris and sclera patterns from one color eye image. Gabor filter and 1-D Log-Gabor filter algorithms have been applied as the iris recognition algorithms. In sclera recognition, we introduced automatic sclera segmentation, sclera pattern enhancement, sclera pattern template generation, and sclera pattern matching. We applied kernelbased matching score fusion to improve the performance of the eye recognition system. The experimental results show that the proposed eye recognition method can achieve better performance compared to unimodal biometric identification, and the accuracy of our proposed kernel-based matching score fusion method is higher than two classic linear matching score fusion methods: Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA).

  18. Pattern recognition & machine learning

    CERN Document Server

    Anzai, Y

    1992-01-01

    This is the first text to provide a unified and self-contained introduction to visual pattern recognition and machine learning. It is useful as a general introduction to artifical intelligence and knowledge engineering, and no previous knowledge of pattern recognition or machine learning is necessary. Basic for various pattern recognition and machine learning methods. Translated from Japanese, the book also features chapter exercises, keywords, and summaries.

  19. Motif signatures of transcribed enhancers

    KAUST Repository

    Kleftogiannis, Dimitrios

    2017-09-14

    In mammalian cells, transcribed enhancers (TrEn) play important roles in the initiation of gene expression and maintenance of gene expression levels in spatiotemporal manner. One of the most challenging questions in biology today is how the genomic characteristics of enhancers relate to enhancer activities. This is particularly critical, as several recent studies have linked enhancer sequence motifs to specific functional roles. To date, only a limited number of enhancer sequence characteristics have been investigated, leaving space for exploring the enhancers genomic code in a more systematic way. To address this problem, we developed a novel computational method, TELS, aimed at identifying predictive cell type/tissue specific motif signatures. We used TELS to compile a comprehensive catalog of motif signatures for all known TrEn identified by the FANTOM5 consortium across 112 human primary cells and tissues. Our results confirm that distinct cell type/tissue specific motif signatures characterize TrEn. These signatures allow discriminating successfully a) TrEn from random controls, proxy of non-enhancer activity, and b) cell type/tissue specific TrEn from enhancers expressed and transcribed in different cell types/tissues. TELS codes and datasets are publicly available at http://www.cbrc.kaust.edu.sa/TELS.

  20. Galaxy interactions : The HI signature

    NARCIS (Netherlands)

    Sancisi, R; Barnes, JE; Sanders, DB

    1999-01-01

    HI observations are an excellent tool for investigating tidal interactions. Ongoing major and minor interactions which can lead to traumatic mergers or to accretion and the triggering of star formation, show distinct HI signatures. Interactions and mergers in the recent past can also be recognized

  1. Signature simulation of mixed materials

    Science.gov (United States)

    Carson, Tyler D.; Salvaggio, Carl

    2015-05-01

    Soil target signatures vary due to geometry, chemical composition, and scene radiometry. Although radiative transfer models and function-fit physical models may describe certain targets in limited depth, the ability to incorporate all three signature variables is difficult. This work describes a method to simulate the transient signatures of soil by first considering scene geometry synthetically created using 3D physics engines. Through the assignment of spectral data from the Nonconventional Exploitation Factors Data System (NEFDS), the synthetic scene is represented as a physical mixture of particles. Finally, first principles radiometry is modeled using the Digital Imaging and Remote Sensing Image Generation (DIRSIG) model. With DIRSIG, radiometric and sensing conditions were systematically manipulated to produce and record goniometric signatures. The implementation of this virtual goniometer allows users to examine how a target bidirectional reflectance distribution function (BRDF) will change with geometry, composition, and illumination direction. By using 3D computer graphics models, this process does not require geometric assumptions that are native to many radiative transfer models. It delivers a discrete method to circumnavigate the significant cost of time and treasure associated with hardware-based goniometric data collections.

  2. Epigenetic Signatures of Cigarette Smoking

    NARCIS (Netherlands)

    R. Joehanes (Roby); Just, A.C. (Allan C.); R.E. Marioni (Riccardo); L.C. Pilling (Luke); L.M. Reynolds (Lindsay); Mandaviya, P.R. (Pooja R.); W. Guan (Weihua); Xu, T. (Tao); C.E. Elks (Cathy); Aslibekyan, S. (Stella); H. Moreno-Macías (Hortensia); J.A. Smith (Jennifer A); J. Brody (Jennifer); Dhingra, R. (Radhika); P. Yousefi (Paul); J.S. Pankow (James); Kunze, S. (Sonja); Shah, S.H. (Sonia H.); A.F. McRae (Allan F.); K. Lohman (Kurt); Sha, J. (Jin); D. Absher (Devin); L. Ferrucci (Luigi); Zhao, W. (Wei); E.W. Demerath (Ellen); J. Bressler (Jan); M.L. Grove (Megan); T. Huan (Tianxiao); C. Liu (Chunyu); Mendelson, M.M. (Michael M.); C. Yao (Chen); D.P. Kiel (Douglas P.); A. Peters (Annette); R. Wang-Sattler (Rui); P.M. Visscher (Peter); N.R. Wray (Naomi); J.M. Starr (John); Ding, J. (Jingzhong); Rodriguez, C.J. (Carlos J.); N.J. Wareham (Nick); Irvin, M.R. (Marguerite R.); Zhi, D. (Degui); M. Barrdahl (Myrto); P. Vineis (Paolo); Ambatipudi, S. (Srikant); A.G. Uitterlinden (André); A. Hofman (Albert); Schwartz, J. (Joel); Colicino, E. (Elena); Hou, L. (Lifang); Vokonas, P.S. (Pantel S.); D.G. Hernandez (Dena); A. Singleton (Andrew); S. Bandinelli (Stefania); S.T. Turner (Stephen); E.B. Ware (Erin B.); Smith, A.K. (Alicia K.); T. Klengel (Torsten); E.B. Binder (Elisabeth B.); B.M. Psaty (Bruce); K.D. Taylor (Kent); S.A. Gharib (Sina); Swenson, B.R. (Brenton R.); Liang, L. (Liming); D.L. Demeo (Dawn L.); G.T. O'Connor (George); Z. Herceg (Zdenko); Ressler, K.J. (Kerry J.); K.N. Conneely (Karen N.); N. Sotoodehnia (Nona); Kardia, S.L.R. (Sharon L. R.); D. Melzer (David); A.A. Baccarelli (Andrea A.); J.B.J. van Meurs (Joyce); I. Romieu (Isabelle); D.K. Arnett (Donna); Ong, K.K. (Ken K.); Y. Liu (Yongmei); M. Waldenberger (Melanie); I.J. Deary (Ian J.); M. Fornage (Myriam); D. Levy (Daniel); S.J. London (Stephanie J.)

    2016-01-01

    textabstractBackground-DNA methylation leaves a long-term signature of smoking exposure and is one potential mechanism by which tobacco exposure predisposes to adverse health outcomes, such as cancers, osteoporosis, lung, and cardiovascular disorders. Methods and Results-To comprehensively determine

  3. Disaster relief through composite signatures

    Science.gov (United States)

    Hawley, Chadwick T.; Hyde, Brian; Carpenter, Tom; Nichols, Steve

    2012-06-01

    A composite signature is a group of signatures that are related in such a way to more completely or further define a target or operational endeavor at a higher fidelity. This paper builds on previous work developing innovative composite signatures associated with civil disasters, including physical, chemical and pattern/behavioral. For the composite signature approach to be successful it requires effective data fusion and visualization. This plays a key role in both preparedness and the response and recovery which are critical to saving lives. Visualization tools enhance the overall understanding of the crisis by pulling together and analyzing the data, and providing a clear and complete analysis of the information to the organizations/agencies dependant on it for a successful operation. An example of this, Freedom Web, is an easy-to-use data visualization and collaboration solution for use in homeland security, emergency preparedness, situational awareness, and event management. The solution provides a nationwide common operating picture for all levels of government through a web based, map interface. The tool was designed to be utilized by non-geospatial experts and is easily tailored to the specific needs of the users. Consisting of standard COTS and open source databases and a web server, users can view, edit, share, and highlight information easily and quickly through a standard internet browser.

  4. Recognition and Toleration

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2010-01-01

    Recognition and toleration are ways of relating to the diversity characteristic of multicultural societies. The article concerns the possible meanings of toleration and recognition, and the conflict that is often claimed to exist between these two approaches to diversity. Different forms or inter......Recognition and toleration are ways of relating to the diversity characteristic of multicultural societies. The article concerns the possible meanings of toleration and recognition, and the conflict that is often claimed to exist between these two approaches to diversity. Different forms...

  5. Statistical Pattern Recognition

    CERN Document Server

    Webb, Andrew R

    2011-01-01

    Statistical pattern recognition relates to the use of statistical techniques for analysing data measurements in order to extract information and make justified decisions.  It is a very active area of study and research, which has seen many advances in recent years. Applications such as data mining, web searching, multimedia data retrieval, face recognition, and cursive handwriting recognition, all require robust and efficient pattern recognition techniques. This third edition provides an introduction to statistical pattern theory and techniques, with material drawn from a wide range of fields,

  6. A Markov Random Field Groupwise Registration Framework for Face Recognition.

    Science.gov (United States)

    Liao, Shu; Shen, Dinggang; Chung, Albert C S

    2014-04-01

    In this paper, we propose a new framework for tackling face recognition problem. The face recognition problem is formulated as groupwise deformable image registration and feature matching problem. The main contributions of the proposed method lie in the following aspects: (1) Each pixel in a facial image is represented by an anatomical signature obtained from its corresponding most salient scale local region determined by the survival exponential entropy (SEE) information theoretic measure. (2) Based on the anatomical signature calculated from each pixel, a novel Markov random field based groupwise registration framework is proposed to formulate the face recognition problem as a feature guided deformable image registration problem. The similarity between different facial images are measured on the nonlinear Riemannian manifold based on the deformable transformations. (3) The proposed method does not suffer from the generalizability problem which exists commonly in learning based algorithms. The proposed method has been extensively evaluated on four publicly available databases: FERET, CAS-PEAL-R1, FRGC ver 2.0, and the LFW. It is also compared with several state-of-the-art face recognition approaches, and experimental results demonstrate that the proposed method consistently achieves the highest recognition rates among all the methods under comparison.

  7. Detection and recognition of analytes based on their crystallization patterns

    Science.gov (United States)

    Morozov, Victor [Manassas, VA; Bailey, Charles L [Cross Junction, VA; Vsevolodov, Nikolai N [Kensington, MD; Elliott, Adam [Manassas, VA

    2008-05-06

    The invention contemplates a method for recognition of proteins and other biological molecules by imaging morphology, size and distribution of crystalline and amorphous dry residues in droplets (further referred to as "crystallization pattern") containing predetermined amount of certain crystal-forming organic compounds (reporters) to which protein to be analyzed is added. It has been shown that changes in the crystallization patterns of a number of amino-acids can be used as a "signature" of a protein added. It was also found that both the character of changer in the crystallization patter and the fact of such changes can be used as recognition elements in analysis of protein molecules.

  8. Recent developments in the study of rapid human movements with the kinematic theory: Applications to handwriting and signature synthesis

    OpenAIRE

    Plamondon, Réjean; O’Reilly, Christian; Galbally, Javier; Almaksour, Abdullah; Anquetil, Éric

    2014-01-01

    International audience; Human movement modeling can be of great interest for the design of pattern recognition systems relying on the understanding of the fine motor control (such as on-line handwriting recognition or signature verification) as well as for the development of intelligent systems involving in a way or another the processing of human movements. In this paper, we briefly list the different models that have been proposed in order to characterize the handwriting process and focus o...

  9. Electronic Signatures in Law: 4th Edition

    OpenAIRE

    Mason, Stephen

    2016-01-01

    Stephen Mason is a leading authority on electronic signatures and electronic evidence, having advised global corporations and governments on these topics. He is also the founder and editor of the international open source journal the Digital Evidence and Electronic Signature Law Review. Stephen is an Associate Research Fellow at the IALS.\\ud \\ud This fourth edition of the well-established practitioner text sets out what constitutes an electronic signature; the form an electronic signature can...

  10. Polygraph: Automatically Generating Signatures for Polymorphic Worms

    OpenAIRE

    Newsome, J.; Karp, B.; Song, D.

    2005-01-01

    It is widely believed that content-signature-based intrusion detection systems (IDSes) are easily evaded by polymorphic worms, which vary their payload on every infection attempt. In this paper, we present Polygraph, a signature generation system that successfully produces signatures that match polymorphic worms. Polygraph generates signatures that consist of multiple disjoint content substrings. In doing so, Polygraph leverages our insight that for a real-world exploit to function properly, ...

  11. SIGNCRYPTION BASED ON DIFFERENT DIGITAL SIGNATURE SCHEMES

    OpenAIRE

    Adrian Atanasiu; Laura Savu

    2012-01-01

    This article presents two new signcryption schemes. The first one is based on Schnorr digital signature algorithm and the second one is using Proxy Signature scheme introduced by Mambo. Schnorr Signcryption has been implemented in a program and here are provided the steps of the algorithm, the results and some examples. The Mambo’s Proxy Signature is adapted for Shortened Digital Signature Standard, being part of a new Proxy Signcryption scheme.

  12. L-Band Polarimetric SAR Signatures of Lava Flows in the Northern Volcanic Zone, Iceland

    DEFF Research Database (Denmark)

    Dierking, Wolfgang; Haack, Henning

    1998-01-01

    of polarimetric L-band radar signatures observed over different lava flows located in the Northern Volcanic Zone in Iceland. Intensity images with a high spatial resolution are well suited for geological interpretation, both in the discrimination of lava flows from the surrounding terrain and in the recognition......Studies of radar scattering signatures typical for lava surfaces are needed in order to interprete SAR images of volcanic terrain on the Earth and on other planets, and to establish a physical basis for the choice of optimal radar configurations for geological mapping. The authors focus on a study...

  13. What's in a voice? Dolphins do not use voice cues for individual recognition.

    Science.gov (United States)

    Sayigh, Laela S; Wells, Randall S; Janik, Vincent M

    2017-11-01

    Most mammals can accomplish acoustic recognition of other individuals by means of "voice cues," whereby characteristics of the vocal tract render vocalizations of an individual uniquely identifiable. However, sound production in dolphins takes place in gas-filled nasal sacs that are affected by pressure changes, potentially resulting in a lack of reliable voice cues. It is well known that bottlenose dolphins learn to produce individually distinctive signature whistles for individual recognition, but it is not known whether they may also use voice cues. To investigate this question, we played back non-signature whistles to wild dolphins during brief capture-release events in Sarasota Bay, Florida. We hypothesized that non-signature whistles, which have varied contours that can be shared among individuals, would be recognizable to dolphins only if they contained voice cues. Following established methodology used in two previous sets of playback experiments, we found that dolphins did not respond differentially to non-signature whistles of close relatives versus known unrelated individuals. In contrast, our previous studies showed that in an identical context, dolphins reacted strongly to hearing the signature whistle or even a synthetic version of the signature whistle of a close relative. Thus, we conclude that dolphins likely do not use voice cues to identify individuals. The low reliability of voice cues and the need for individual recognition were likely strong selective forces in the evolution of vocal learning in dolphins.

  14. 1 CFR 18.7 - Signature.

    Science.gov (United States)

    2010-01-01

    ... under § 18.4(c) may be authenticated as original documents by digital signatures. ... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original...

  15. Signature Size: A Key to Status Awareness

    Science.gov (United States)

    Zweigenhaft, Richard L.

    1970-01-01

    Hypothesizing that signature size is related to status, signatures of undergraduates, blue collar workers, and professors were compared and found to be ranked in the above order. Further, case studies of professors revealed a 50 percent increase in size of signature from several months prior to attainment of the Ph. D. to four years afterward. (DB)

  16. Recognition and Toleration

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2010-01-01

    Recognition and toleration are ways of relating to the diversity characteristic of multicultural societies. The article concerns the possible meanings of toleration and recognition, and the conflict that is often claimed to exist between these two approaches to diversity. Different forms or inter...

  17. Recognition as care

    DEFF Research Database (Denmark)

    Ahlmark, Nanna; Whyte, Susan Reynolds; Harting, Janneke

    2014-01-01

    -based and solidarity-based recognition to analyse what was at stake in these experiences, and we engage Annemarie Mol’s concept of a logic of care to show how recognition unfolded practically during the training. We propose that participants’ wider social context and experiences of misrecognition situated the training...

  18. Challenging ocular image recognition

    Science.gov (United States)

    Pauca, V. Paúl; Forkin, Michael; Xu, Xiao; Plemmons, Robert; Ross, Arun A.

    2011-06-01

    Ocular recognition is a new area of biometric investigation targeted at overcoming the limitations of iris recognition performance in the presence of non-ideal data. There are several advantages for increasing the area beyond the iris, yet there are also key issues that must be addressed such as size of the ocular region, factors affecting performance, and appropriate corpora to study these factors in isolation. In this paper, we explore and identify some of these issues with the goal of better defining parameters for ocular recognition. An empirical study is performed where iris recognition methods are contrasted with texture and point operators on existing iris and face datasets. The experimental results show a dramatic recognition performance gain when additional features are considered in the presence of poor quality iris data, offering strong evidence for extending interest beyond the iris. The experiments also highlight the need for the direct collection of additional ocular imagery.

  19. Signatures of a shadow biosphere.

    Science.gov (United States)

    Davies, Paul C W; Benner, Steven A; Cleland, Carol E; Lineweaver, Charles H; McKay, Christopher P; Wolfe-Simon, Felisa

    2009-03-01

    Astrobiologists are aware that extraterrestrial life might differ from known life, and considerable thought has been given to possible signatures associated with weird forms of life on other planets. So far, however, very little attention has been paid to the possibility that our own planet might also host communities of weird life. If life arises readily in Earth-like conditions, as many astrobiologists contend, then it may well have formed many times on Earth itself, which raises the question whether one or more shadow biospheres have existed in the past or still exist today. In this paper, we discuss possible signatures of weird life and outline some simple strategies for seeking evidence of a shadow biosphere.

  20. Epigenetic signatures of cigarette smoking

    OpenAIRE

    Deary, Ian; Joehanes, Roby; Just, Allan C.; Marioni, Riccardo

    2016-01-01

    Background—DNA methylation leaves a long-term signature of smoking exposure and is one potential mechanism by which tobacco exposure predisposes to adverse health outcomes, such as cancers, osteoporosis, lung, and cardiovascular disorders. Methods and Results—To comprehensively determine the association between cigarette smoking and DNA methylation, we conducted a meta-analysis of genome-wide DNA methylation assessed using the Illumina BeadChip 450K array on 15 907 blood-derived DNA samples f...

  1. Implementing Signature Neural Networks with Spiking Neurons.

    Science.gov (United States)

    Carrillo-Medina, José Luis; Latorre, Roberto

    2016-01-01

    Spiking Neural Networks constitute the most promising approach to develop realistic Artificial Neural Networks (ANNs). Unlike traditional firing rate-based paradigms, information coding in spiking models is based on the precise timing of individual spikes. It has been demonstrated that spiking ANNs can be successfully and efficiently applied to multiple realistic problems solvable with traditional strategies (e.g., data classification or pattern recognition). In recent years, major breakthroughs in neuroscience research have discovered new relevant computational principles in different living neural systems. Could ANNs benefit from some of these recent findings providing novel elements of inspiration? This is an intriguing question for the research community and the development of spiking ANNs including novel bio-inspired information coding and processing strategies is gaining attention. From this perspective, in this work, we adapt the core concepts of the recently proposed Signature Neural Network paradigm-i.e., neural signatures to identify each unit in the network, local information contextualization during the processing, and multicoding strategies for information propagation regarding the origin and the content of the data-to be employed in a spiking neural network. To the best of our knowledge, none of these mechanisms have been used yet in the context of ANNs of spiking neurons. This paper provides a proof-of-concept for their applicability in such networks. Computer simulations show that a simple network model like the discussed here exhibits complex self-organizing properties. The combination of multiple simultaneous encoding schemes allows the network to generate coexisting spatio-temporal patterns of activity encoding information in different spatio-temporal spaces. As a function of the network and/or intra-unit parameters shaping the corresponding encoding modality, different forms of competition among the evoked patterns can emerge even in the absence

  2. Implementing Signature Neural Networks with Spiking Neurons

    Science.gov (United States)

    Carrillo-Medina, José Luis; Latorre, Roberto

    2016-01-01

    Spiking Neural Networks constitute the most promising approach to develop realistic Artificial Neural Networks (ANNs). Unlike traditional firing rate-based paradigms, information coding in spiking models is based on the precise timing of individual spikes. It has been demonstrated that spiking ANNs can be successfully and efficiently applied to multiple realistic problems solvable with traditional strategies (e.g., data classification or pattern recognition). In recent years, major breakthroughs in neuroscience research have discovered new relevant computational principles in different living neural systems. Could ANNs benefit from some of these recent findings providing novel elements of inspiration? This is an intriguing question for the research community and the development of spiking ANNs including novel bio-inspired information coding and processing strategies is gaining attention. From this perspective, in this work, we adapt the core concepts of the recently proposed Signature Neural Network paradigm—i.e., neural signatures to identify each unit in the network, local information contextualization during the processing, and multicoding strategies for information propagation regarding the origin and the content of the data—to be employed in a spiking neural network. To the best of our knowledge, none of these mechanisms have been used yet in the context of ANNs of spiking neurons. This paper provides a proof-of-concept for their applicability in such networks. Computer simulations show that a simple network model like the discussed here exhibits complex self-organizing properties. The combination of multiple simultaneous encoding schemes allows the network to generate coexisting spatio-temporal patterns of activity encoding information in different spatio-temporal spaces. As a function of the network and/or intra-unit parameters shaping the corresponding encoding modality, different forms of competition among the evoked patterns can emerge even in the

  3. Infrared signature studies of aerospace vehicles

    Science.gov (United States)

    Mahulikar, Shripad P.; Sonawane, Hemant R.; Arvind Rao, G.

    2007-10-01

    Infrared (IR) emissions from aircraft are used to detect, track, and lock-on to the target. MAN Portable Air Defence Systems (MANPADS) have emerged as a major cause of aircraft and helicopter loss. Therefore, IR signature studies are important to counter this threat for survivability enhancement, and are an important aspect of stealth technology. This paper reviews contemporary developments in this discipline, with particular emphasis on IR signature prediction from aerospace vehicles. The role of atmosphere in IR signature analysis, and relation between IR signature level and target susceptibility are illustrated. Also, IR signature suppression systems and countermeasure techniques are discussed, to highlight their effectiveness and implications in terms of penalties.

  4. Initial stages of V(D)J recombination: the organization of RAG1/2 and RSS DNA in the postcleavage complex.

    Science.gov (United States)

    Grundy, Gabrielle J; Ramón-Maiques, Santiago; Dimitriadis, Emilios K; Kotova, Svetlana; Biertümpfel, Christian; Heymann, J Bernard; Steven, Alasdair C; Gellert, Martin; Yang, Wei

    2009-07-31

    To obtain structural information on the early stages of V(D)J recombination, we isolated a complex of the core RAG1 and RAG2 proteins with DNA containing a pair of cleaved recombination signal sequences (RSS). Stoichiometric and molecular mass analysis established that this signal-end complex (SEC) contains two protomers each of RAG1 and RAG2. Visualization of the SEC by negative-staining electron microscopy revealed an anchor-shaped particle with approximate two-fold symmetry. Consistent with a parallel arrangement of DNA and protein subunits, the N termini of RAG1 and RAG2 are positioned at opposing ends of the complex, and the DNA chains beyond the RSS nonamer emerge from the same face of the complex, near the RAG1 N termini. These first images of the V(D)J recombinase in its postcleavage state provide a framework for modeling RAG domains and their interactions with DNA.

  5. Visible, near infrared and thermal hand-based image biometric recognition

    OpenAIRE

    Font Aragonès, Xavier

    2013-01-01

    Biometric Recognition refers to the automatic identification of a person based on his or her anatomical characteristic or modality (i.e., fingerprint, palmprint, face) or behavioural (i.e., signature) characteristic. It is a fundamental key issue in any process concerned with security, shared resources, network transactions among many others. Arises as a fundamental problem widely known as recognition, and becomes a must step before permission is granted. It is supposed that protects key reso...

  6. Time Series Based for Online Signature Verification

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Darma Putra

    2013-11-01

    Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.

  7. Design of Genomic Signatures of Pathogen Identification & Characterization

    Energy Technology Data Exchange (ETDEWEB)

    Slezak, T; Gardner, S; Allen, J; Vitalis, E; Jaing, C

    2010-02-09

    of species and strains is not always possible. In contrast, protein recognition signatures composed of antibodies or synthetic high-affinity ligands offer extremely fast results but require a large quantity of the target to be present. False positives/negatives are also a problem with some protein-based techniques (home pregnancy kits use this basic approach).

  8. Location service for wireless network using improved RSS-based cellular localisation

    Science.gov (United States)

    Fayaz, Sara; Sarrafian, Sara

    2014-06-01

    Value-added services, especially in mobile environments, have recently become the key component of making more profit and attracting more subscribers. One of the most commonly used such service is location-based advertiser services. The main issue which should be considered in providing such services is determining the position of the mobile terminals precisely. In this paper, one pattern recognition localisation method based on the signal strength appropriated for implementing a location-based service is presented. The main aim is to introduce some practical solutions to decrease error and computational load and also eliminate the necessity of updating the database. Practical results illustrate high accuracy of this technique and its suitability to apply in such services. The mean error declines to 9.7 m and mean error corresponding to CDF = 67% and CDF = 95% are less than 11 m and 23 m, respectively. We also present a location-based advertising service, in which the customer's interests and local time are considered, in order to enhance the efficiency and individualism of this service.

  9. The Particle Size Distribution in Saturn’s C Ring from UVIS and VIMS Stellar Occultations and RSS Radio Occultations

    Science.gov (United States)

    Jerousek, Richard Gregory; Colwell, Josh; Hedman, Matthew M.; French, Richard G.; Marouf, Essam A.; Esposito, Larry; Nicholson, Philip D.

    2017-10-01

    The Cassini Ultraviolet Imaging Spectrograph (UVIS) and Visual and Infrared Mapping Spectrometer (VIMS) have measured ring optical depths over a wide range of viewing geometries at effective wavelengths of 0.15 μm and 2.9 μm respectively. Using Voyager S and X band radio occultations and the direct inversion of the forward scattered S band signal, Marouf et al. (1982), (1983), and Zebker et al. (1985) determined the power-law size distribution parameters assuming a minimum particle radius of 1 mm. Many further studies have also constrained aspects of the particle size distribution throughout the main rings. Marouf et al. (2008a) determined the smallest ring particles to have radii of 4-5 mm using Cassini RSS data. Harbison et al. (2013) used VIMS solar occultations and also found minimum particle sizes of 4-5 mm in the C ring with q ~ 3.1, where n(a)da=Ca^(-q)da is the assumed differential power-law size distribution for particles of radius a. Recent studies of excess variance in stellar signal by Colwell et al. (2017, submitted) constrain the cross-section-weighted effective particle radius to 1 m to several meters. Using the wide range of viewing geometries available to VIMS and UVIS stellar occultations we find that normal optical depth does not strongly depend on viewing geometry at 10km resolution (which would be the case if self-gravity wakes were present). Throughout the C ring, we fit power-law derived optical depths to those measured by UVIS, VIMS, and by the Cassini Radio Science Subsystem (RSS) at 0.94 and 3.6 cm wavelengths to constrain the four parameters of the size distribution at 10km radial resolution. We find significant amounts of particle size sorting throughout the region with a positive correlation between maximum particles size (amax) and normal optical depth with a mean value of amax ~ 3 m in the background C ring. This correlation is negative in the C ring plateaus. We find an inverse correlation in minimum particle radius with normal

  10. Recognition: Conceptualization and Context

    DEFF Research Database (Denmark)

    Gimmler, Antje

    2017-01-01

    be evaluated. In the first section, I will introduce the concept of recognition as a travelling concept playing a role both on the intellectual stage and in real life. In the second section, I will concentrate on the presentation of Honneth’s theory of recognition, emphasizing the construction of the concept......In this article, I shall examine the cognitive, heuristic and theoretical functions of the concept of recognition. To evaluate both the explanatory power and the limitations of a sociological concept, the theory construction must be analysed and its actual productivity for sociological theory must...

  11. Machine Recognition vs Human Recognition of Voices

    Science.gov (United States)

    2012-05-01

    been studied for a while. For example, an early reference [1] is from 1966. 10 male speakers were recorded and their voices were presented to 16... recognized . The accuracy of speaker recognition for disyllables was 87%. For monosyllables, it was 81%, consonant-vowel excerpts were 63%, and...vowel excerpts were 56%. Thus, they demonstrated that the identification performance decreased as the number of phonemes decreased. In [2], the

  12. Utilising E-on Vue and Unity 3D scenes to generate synthetic images and videos for visible signature analysis

    Science.gov (United States)

    Madden, Christopher S.; Richards, Noel J.; Culpepper, Joanne B.

    2016-10-01

    This paper investigates the ability to develop synthetic scenes in an image generation tool, E-on Vue, and a gaming engine, Unity 3D, which can be used to generate synthetic imagery of target objects across a variety of conditions in land environments. Developments within these tools and gaming engines have allowed the computer gaming industry to dramatically enhance the realism of the games they develop; however they utilise short cuts to ensure that the games run smoothly in real-time to create an immersive effect. Whilst these short cuts may have an impact upon the realism of the synthetic imagery, they do promise a much more time efficient method of developing imagery of different environmental conditions and to investigate the dynamic aspect of military operations that is currently not evaluated in signature analysis. The results presented investigate how some of the common image metrics used in target acquisition modelling, namely the Δμ1, Δμ2, Δμ3, RSS, and Doyle metrics, perform on the synthetic scenes generated by E-on Vue and Unity 3D compared to real imagery of similar scenes. An exploration of the time required to develop the various aspects of the scene to enhance its realism are included, along with an overview of the difficulties associated with trying to recreate specific locations as a virtual scene. This work is an important start towards utilising virtual worlds for visible signature evaluation, and evaluating how equivalent synthetic imagery is to real photographs.

  13. Algebraic pattern recognition

    Science.gov (United States)

    Przybyłek, Michał R.

    2014-01-01

    This paper offers an algebraic explanation for the phenomenon of a new and prosperous branch of evolutionary metaheuristics - "skeletal algorithms". We show how this explanation gives rise to algorithms for recognition of algebraic theories and present sample applications.

  14. Forensic speaker recognition

    NARCIS (Netherlands)

    Meuwly, Didier

    2013-01-01

    The aim of forensic speaker recognition is to establish links between individuals and criminal activities, through audio speech recordings. This field is multidisciplinary, combining predominantly phonetics, linguistics, speech signal processing, and forensic statistics. On these bases, expert-based

  15. Automatic speech recognition systems

    Science.gov (United States)

    Catariov, Alexandru

    2005-02-01

    In this paper is presented analyses in automatic speech recognition (ASR) to find out what is the state of the arts in this direction and, eventually, it can be a starting point for the implementation of a real ASR system. In the second chapter of this work, it is revealed the structure of a typical speech recognition system and the used methods for each step of the recognition process, and in special, there are described two kinds of speech recognition algorithms, namely, Dynamic Time Warping (DTW) and Hidden Markov Model (HMM). The work continues with some results of ASR, in order to make conclusions about what is needed to be improved and what is more eligible to implement an ASR system.

  16. Work and Recognition

    DEFF Research Database (Denmark)

    Willig, Rasmus

    2004-01-01

    individual and collective identity formation and has led to an increase in social pathological illnesses such as stress and depression. By juxtaposing these analyses with Honneth’s theory on recognition, we conclude that the contemporary logic of work is unable to provide adequate forms of recognition......The article deals with the relationship between work and recognition, taking Axel Honneth’s social-philosophical theory of the struggle for recognition as its point of departure. In order to give sociological substance to Honneth’s theory, we turn to three contemporary social theorists - Jean......-Pierre Le Goff, Christophe Dejours and Emmanuel Renault. In spite of many differences, their work is united by a critical description of the logic of work and its consequences for individual individuation. These theorists agree that the growth of autonomy, flexibility and mobility has destabilised...

  17. Aging in biometrics: an experimental analysis on on-line signature.

    Directory of Open Access Journals (Sweden)

    Javier Galbally

    Full Text Available The first consistent and reproducible evaluation of the effect of aging on dynamic signature is reported. Experiments are carried out on a database generated from two previous datasets which were acquired, under very similar conditions, in 6 sessions distributed in a 15-month time span. Three different systems, representing the current most popular approaches in signature recognition, are used in the experiments, proving the degradation suffered by this trait with the passing of time. Several template update strategies are also studied as possible measures to reduce the impact of aging on the system's performance. Different results regarding the way in which signatures tend to change with time, and their most and least stable features, are also given.

  18. Evaluating music emotion recognition

    DEFF Research Database (Denmark)

    Sturm, Bob L.

    2013-01-01

    A fundamental problem with nearly all work in music genre recognition (MGR)is that evaluation lacks validity with respect to the principal goals of MGR. This problem also occurs in the evaluation of music emotion recognition (MER). Standard approaches to evaluation, though easy to implement, do...... not reliably differentiate between recognizing genre or emotion from music, or by virtue of confounding factors in signals (e.g., equalization). We demonstrate such problems for evaluating an MER system, and conclude with recommendations....

  19. The Recognition Of Fatigue

    DEFF Research Database (Denmark)

    Elsass, Peter; Jensen, Bodil; Mørup, Rikke

    2007-01-01

    Elsass P., Jensen B., Morup R., Thogersen M.H. (2007). The Recognition Of Fatigue: A qualitative study of life-stories from rehabilitation clients. International Journal of Psychosocial Rehabilitation. 11 (2), 75-87......Elsass P., Jensen B., Morup R., Thogersen M.H. (2007). The Recognition Of Fatigue: A qualitative study of life-stories from rehabilitation clients. International Journal of Psychosocial Rehabilitation. 11 (2), 75-87...

  20. Character Recognition (Devanagari Script)

    OpenAIRE

    Ankita Karia; Sonali Sharma

    2015-01-01

    Character Recognition is has found major interest in field of research and practical application to analyze and study characters in different languages using image as their input. In this paper the user writes the Devanagari character using mouse as a plotter and then the corresponding character is saved in the form of image. This image is processed using Optical Character Recognition in which location, segmentation, pre-processing of image is done. Later Neural Networks is used t...

  1. Gesture recognition for smart home applications using portable radar sensors.

    Science.gov (United States)

    Wan, Qian; Li, Yiran; Li, Changzhi; Pal, Ranadip

    2014-01-01

    In this article, we consider the design of a human gesture recognition system based on pattern recognition of signatures from a portable smart radar sensor. Powered by AAA batteries, the smart radar sensor operates in the 2.4 GHz industrial, scientific and medical (ISM) band. We analyzed the feature space using principle components and application-specific time and frequency domain features extracted from radar signals for two different sets of gestures. We illustrate that a nearest neighbor based classifier can achieve greater than 95% accuracy for multi class classification using 10 fold cross validation when features are extracted based on magnitude differences and Doppler shifts as compared to features extracted through orthogonal transformations. The reported results illustrate the potential of intelligent radars integrated with a pattern recognition system for high accuracy smart home and health monitoring purposes.

  2. Why recognition is rational

    Directory of Open Access Journals (Sweden)

    Clintin P. Davis-Stober

    2010-07-01

    Full Text Available The Recognition Heuristic (Gigerenzer and Goldstein, 1996; Goldstein and Gigerenzer, 2002 makes the counter-intuitive prediction that a decision maker utilizing less information may do as well as, or outperform, an idealized decision maker utilizing more information. We lay a theoretical foundation for the use of single-variable heuristics such as the Recognition Heuristic as an optimal decision strategy within a linear modeling framework. We identify conditions under which over-weighting a single predictor is a mini-max strategy among a class of a priori chosen weights based on decision heuristics with respect to a measure of statistical lack of fit we call ``risk''. These strategies, in turn, outperform standard multiple regression as long as the amount of data available is limited. We also show that, under related conditions, weighting only one variable and ignoring all others produces the same risk as ignoring the single variable and weighting all others. This approach has the advantage of generalizing beyond the original environment of the Recognition Heuristic to situations with more than two choice options, binary or continuous representations of recognition, and to other single variable heuristics. We analyze the structure of data used in some prior recognition tasks and find that it matches the sufficient conditions for optimality in our results. Rather than being a poor or adequate substitute for a compensatory model, the Recognition Heuristic closely approximates an optimal strategy when a decision maker has finite data about the world.

  3. Cryptoschemes Based on New Signature Formation Mechanism

    Directory of Open Access Journals (Sweden)

    A.A.Moldovyan

    2006-12-01

    Full Text Available Several variants of new digital signature schemes (DSS based on the discrete logarithm and factorization problems have been proposed. Considered DSS are characterized in that a novel mechanism of the signature generation is used, in which two parameters of the (k,S or (R,S signature are defined after solving a system of two congruences. In the case of composite modulus additional restrictions conditions have been introduced for selection of the public key.

  4. Cryptographic key generation using handwritten signature

    Science.gov (United States)

    Freire-Santos, M.; Fierrez-Aguilar, J.; Ortega-Garcia, J.

    2006-04-01

    Based on recent works showing the feasibility of key generation using biometrics, we study the application of handwritten signature to cryptography. Our signature-based key generation scheme implements the cryptographic construction named fuzzy vault. The use of distinctive signature features suited for the fuzzy vault is discussed and evaluated. Experimental results are reported, including error rates to unlock the secret data by using both random and skilled forgeries from the MCYT database.

  5. Molecular Signatures in Urologic Tumors

    Directory of Open Access Journals (Sweden)

    Spencer Larkin

    2013-09-01

    Full Text Available Urologic tumors continue to represent a huge fraction of cancer cases in the United States, with over 376,310 estimated new diagnoses in 2013. As with many types of tumors, urologic tumors vary greatly in their phenotype, ranging from minimally invasive to malignancies possessing great metastatic potential. The increasing need for more efficient and less invasive methods of cancer detection, as well as the ability to predict severity of the disease phenotype is readily evident—yet reliable methods remain elusive in a clinical setting today. Comprehensive panels of gene clusters are being developed toward the generation of molecular signatures in order to better diagnose urologic malignancies, and identify effective treatment strategies in the emerging era of personalized medicine. In this review, we discuss the current literature on the credibility and biomarker value of such molecular signatures in the context of clinical significance relating to the pathological aggressiveness of urologic tumors (prostate, bladder and renal cancer—also exploiting their predictive potential in the response to treatment.

  6. SUSTENTABILIDADE NA GESTÃO DE RESÍDUOS DE SERVIÇOS DE SAÚDE (RSS EM INSTITUIÇÕES DE SAÚDE: UM OVERVIEW SOBRE O ESTADO DA ARTE

    Directory of Open Access Journals (Sweden)

    Jackeline Neres dos Santos

    2013-09-01

    Full Text Available O desenvolvimento da sociedade moderna nas últimas décadas principalmente nos quesitos tecnológico e industrial trouxe um conjunto de melhorias significativas à população no âmbito da saúde, infraestrutura, educação, saneamento básico entre outras. No entanto, o mesmo desenvolvimento que alavanca a qualidade de vida da população, proporciona novos desafios à sociedade moderna como, por exemplo, a grande produção e o gerenciamento dos Resíduos de Serviços de Saúde – RSS. O presente trabalho teve como principal objetivo realizar um levantamento do atual estado da arte sobre o tema sustentabilidade na gestão de Resíduos de Serviços de Saúde (RSS em instituições de saúde brasileiras destacando o papel do enfermeiro junto a equipes multidisciplinares no tratamento do tema. Foram consultadas fontes bibliográficas consolidadas tais como ivros, revistas, teses, dissertações, monografias e publicações científicas obtidas via repertórios científicos como Web Of Science, Scientific Electronic Library Online (SciELO, Google Acadêmico, Biblioteca Virtual em Saúde (BVS e Literatura Latino-Americana e do Caribe em Ciências da Saúde (LILACS, desde 2005. Temas como: (i Legislação Vigente para Área; (ii Atual Panorama dos RSS no Brasil; (iii Discussão sobre o Papel do Enfermeiro no Gerenciamento dos RSS – Aspectos gerais, Papel do enfermeiro à luz da Teoria Ambientalista de Florence Nightingale, Gerenciamento dos RSS: papel do enfermeiro versus custo; (iv Destinação e Eliminação Adequada para os RSS; e (v Sustentabilidade Ambiental no Gerenciamento dos RSS foram levantados, investigados e discutidos.

  7. Page Recognition: Quantum Leap In Recognition Technology

    Science.gov (United States)

    Miller, Larry

    1989-07-01

    No milestone has proven as elusive as the always-approaching "year of the LAN," but the "year of the scanner" might claim the silver medal. Desktop scanners have been around almost as long as personal computers. And everyone thinks they are used for obvious desktop-publishing and business tasks like scanning business documents, magazine articles and other pages, and translating those words into files your computer understands. But, until now, the reality fell far short of the promise. Because it's true that scanners deliver an accurate image of the page to your computer, but the software to recognize this text has been woefully disappointing. Old optical-character recognition (OCR) software recognized such a limited range of pages as to be virtually useless to real users. (For example, one OCR vendor specified 12-point Courier font from an IBM Selectric typewriter: the same font in 10-point, or from a Diablo printer, was unrecognizable!) Computer dealers have told me the chasm between OCR expectations and reality is so broad and deep that nine out of ten prospects leave their stores in disgust when they learn the limitations. And this is a very important, very unfortunate gap. Because the promise of recognition -- what people want it to do -- carries with it tremendous improvements in our productivity and ability to get tons of written documents into our computers where we can do real work with it. The good news is that a revolutionary new development effort has led to the new technology of "page recognition," which actually does deliver the promise we've always wanted from OCR. I'm sure every reader appreciates the breakthrough represented by the laser printer and page-makeup software, a combination so powerful it created new reasons for buying a computer. A similar breakthrough is happening right now in page recognition: the Macintosh (and, I must admit, other personal computers) equipped with a moderately priced scanner and OmniPage software (from Caere

  8. An Arbitrated Quantum Signature Scheme without Entanglement*

    Science.gov (United States)

    Li, Hui-Ran; Luo, Ming-Xing; Peng, Dai-Yuan; Wang, Xiao-Jun

    2017-09-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks.

  9. On reliable discovery of molecular signatures

    Directory of Open Access Journals (Sweden)

    Björkegren Johan

    2009-01-01

    Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.

  10. Institute of Geophysics, Planetary Physics, and Signatures

    Data.gov (United States)

    Federal Laboratory Consortium — The Institute of Geophysics, Planetary Physics, and Signatures at Los Alamos National Laboratory is committed to promoting and supporting high quality, cutting-edge...

  11. Novel Quantum Proxy Signature without Entanglement

    Science.gov (United States)

    Xu, Guang-bao

    2015-08-01

    Proxy signature is an important research topic in classic cryptography since it has many application occasions in our real life. But only a few quantum proxy signature schemes have been proposed up to now. In this paper, we propose a quantum proxy signature scheme, which is designed based on quantum one-time pad. Our scheme can be realized easily since it only uses single-particle states. Security analysis shows that it is secure and meets all the properties of a proxy signature, such as verifiability, distinguishability, unforgeability and undeniability.

  12. An electrophysiological signature for proactive interference resolution in working memory.

    Science.gov (United States)

    Du, Yingchun; Xiao, Zhuangwei; Song, Yan; Fan, Silu; Wu, Renhua; Zhang, John X

    2008-08-01

    We used event-related potentials (ERPs) to study the temporal dynamics of proactive interference in working memory. Participants performed a Sternberg item-recognition task to determine whether a probe was in a target memory set. Familiar negative probes were found to be more difficult to reject than less familiar ones. A fronto-central N2 component peaking around 300 ms post-probe-onset differentiated among target probes, familiar and less familiar non-target probes. The study identifies N2 as the ERP signature for proactive interference resolution. It also indicates that the resolution process occurs in the same time window as target/non-target discrimination and provides the first piece of electrophysiological evidence supporting a recent interference resolution model based on localization data [Jonides, J., Nee, D.E., 2006. Brain mechanisms of proactive interference in working memory. Neuroscience 139, 181-193].

  13. Probabilistic Open Set Recognition

    Science.gov (United States)

    Jain, Lalit Prithviraj

    Real-world tasks in computer vision, pattern recognition and machine learning often touch upon the open set recognition problem: multi-class recognition with incomplete knowledge of the world and many unknown inputs. An obvious way to approach such problems is to develop a recognition system that thresholds probabilities to reject unknown classes. Traditional rejection techniques are not about the unknown; they are about the uncertain boundary and rejection around that boundary. Thus traditional techniques only represent the "known unknowns". However, a proper open set recognition algorithm is needed to reduce the risk from the "unknown unknowns". This dissertation examines this concept and finds existing probabilistic multi-class recognition approaches are ineffective for true open set recognition. We hypothesize the cause is due to weak adhoc assumptions combined with closed-world assumptions made by existing calibration techniques. Intuitively, if we could accurately model just the positive data for any known class without overfitting, we could reject the large set of unknown classes even under this assumption of incomplete class knowledge. For this, we formulate the problem as one of modeling positive training data by invoking statistical extreme value theory (EVT) near the decision boundary of positive data with respect to negative data. We provide a new algorithm called the PI-SVM for estimating the unnormalized posterior probability of class inclusion. This dissertation also introduces a new open set recognition model called Compact Abating Probability (CAP), where the probability of class membership decreases in value (abates) as points move from known data toward open space. We show that CAP models improve open set recognition for multiple algorithms. Leveraging the CAP formulation, we go on to describe the novel Weibull-calibrated SVM (W-SVM) algorithm, which combines the useful properties of statistical EVT for score calibration with one-class and binary

  14. Touchless palmprint recognition systems

    CERN Document Server

    Genovese, Angelo; Scotti, Fabio

    2014-01-01

    This book examines the context, motivation and current status of biometric systems based on the palmprint, with a specific focus on touchless and less-constrained systems. It covers new technologies in this rapidly evolving field and is one of the first comprehensive books on palmprint recognition systems.It discusses the research literature and the most relevant industrial applications of palmprint biometrics, including the low-cost solutions based on webcams. The steps of biometric recognition are described in detail, including acquisition setups, algorithms, and evaluation procedures. Const

  15. FUNDAMENTALS OF SPEAKER RECOGNITION

    Directory of Open Access Journals (Sweden)

    Figen ERTAŞ

    2000-02-01

    Full Text Available The explosive growth of information technology in the last decade has made a considerable impact on the design and construction of systems for human-machine communication, which is becoming increasingly important in many aspects of life. Amongst other speech processing tasks, a great deal of attention has been devoted to developing procedures that identify people from their voices, and the design and construction of speaker recognition systems has been a fascinating enterprise pursued over many decades. This paper introduces speaker recognition in general and discusses its relevant parameters in relation to system performance.

  16. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  17. Prediction of soil effects on GPR signatures

    NARCIS (Netherlands)

    Rhebergen, J.B.; Lensen, H.A.; Wijk, C.V. van; Hendrickx, J.M.H.; Dam, R. van; Borchers, B.

    2004-01-01

    In previous work we have shown that GPR signatures are affected by soil texture and soil water content. In this contribution we will use a three dimensional electromagnetic model and a hydrological soil model to explore in more detail the relationships between GPR signatures, soil physical

  18. Measuring ship acoustic signatures against mine threat

    NARCIS (Netherlands)

    Jong, C.A.F. de; Quesson, B.A.J.; Ainslie, M.A.; Vermeulen, R.C.N.

    2012-01-01

    The NATO standard ‘AMP-15’ [1] provides procedures for the measurement and reporting of the acoustic signature of ships and for the establishment of acoustic signature goals to counter the naval mine threat. Measurements are carried out at dedicated shallow water acoustic ranges. Measurements

  19. 21 CFR 11.50 - Signature manifestations.

    Science.gov (United States)

    2010-04-01

    ... and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic... the same controls as for electronic records and shall be included as part of any human readable form...

  20. [Prosopagnosia and facial expression recognition].

    Science.gov (United States)

    Koyama, Shinichi

    2014-04-01

    This paper reviews clinical neuropsychological studies that have indicated that the recognition of a person's identity and the recognition of facial expressions are processed by different cortical and subcortical areas of the brain. The fusiform gyrus, especially the right fusiform gyrus, plays an important role in the recognition of identity. The superior temporal sulcus, amygdala, and medial frontal cortex play important roles in facial-expression recognition. Both facial recognition and facial-expression recognition are highly intellectual processes that involve several regions of the brain.

  1. Redactable signatures for signed CDA Documents.

    Science.gov (United States)

    Wu, Zhen-Yu; Hsueh, Chih-Wen; Tsai, Cheng-Yu; Lai, Feipei; Lee, Hung-Chang; Chung, Yufang

    2012-06-01

    The Clinical Document Architecture, introduced by Health Level Seven, is a XML-based standard intending to specify the encoding, structure, and semantics of clinical documents for exchange. Since the clinical document is in XML form, its authenticity and integrity could be guaranteed by the use of the XML signature published by W3C. While a clinical document wants to conceal some personal or private information, the document needs to be redacted. It makes the signed signature of the original clinical document not be verified. The redactable signature is thus proposed to enable verification for the redacted document. Only a little research does the implementation of the redactable signature, and there still not exists an appropriate scheme for the clinical document. This paper will investigate the existing web-technologies and find a compact and applicable model to implement a suitable redactable signature for the clinical document viewer.

  2. Real time gamma-ray signature identifier

    Science.gov (United States)

    Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  3. Harmonization versus Mutual Recognition

    DEFF Research Database (Denmark)

    Jørgensen, Jan Guldager; Schröder, Philipp

    The present paper examines trade liberalization driven by the coordination of product standards. For oligopolistic firms situated in separate markets that are initially sheltered by national standards, mutual recognition of standards implies entry and reduced profits at home paired with the oppor...

  4. Facial Expression Recognition

    NARCIS (Netherlands)

    Pantic, Maja; Li, S.; Jain, A.

    2009-01-01

    Facial expression recognition is a process performed by humans or computers, which consists of: 1. Locating faces in the scene (e.g., in an image; this step is also referred to as face detection), 2. Extracting facial features from the detected face region (e.g., detecting the shape of facial

  5. Recognition of fractal graphs

    NARCIS (Netherlands)

    Perepelitsa, VA; Sergienko, [No Value; Kochkarov, AM

    1999-01-01

    Definitions of prefractal and fractal graphs are introduced, and they are used to formulate mathematical models in different fields of knowledge. The topicality of fractal-graph recognition from the point of view, of fundamental improvement in the efficiency of the solution of algorithmic problems

  6. 2D DOST based local phase pattern for face recognition

    Science.gov (United States)

    Moniruzzaman, Md.; Alam, Mohammad S.

    2017-05-01

    A new two dimensional (2-D) Discrete Orthogonal Stcokwell Transform (DOST) based Local Phase Pattern (LPP) technique has been proposed for efficient face recognition. The proposed technique uses 2-D DOST as preliminary preprocessing and local phase pattern to form robust feature signature which can effectively accommodate various 3D facial distortions and illumination variations. The S-transform, is an extension of the ideas of the continuous wavelet transform (CWT), is also known for its local spectral phase properties in time-frequency representation (TFR). It provides a frequency dependent resolution of the time-frequency space and absolutely referenced local phase information while maintaining a direct relationship with the Fourier spectrum which is unique in TFR. After utilizing 2-D Stransform as the preprocessing and build local phase pattern from extracted phase information yield fast and efficient technique for face recognition. The proposed technique shows better correlation discrimination compared to alternate pattern recognition techniques such as wavelet or Gabor based face recognition. The performance of the proposed method has been tested using the Yale and extended Yale facial database under different environments such as illumination variation and 3D changes in facial expressions. Test results show that the proposed technique yields better performance compared to alternate time-frequency representation (TFR) based face recognition techniques.

  7. A disseminação seletiva da informação e a tecnologia RSS nas bibliotecas de Tribunais em Brasília

    Directory of Open Access Journals (Sweden)

    Thiago Gomes Eirão

    2015-09-01

    Full Text Available A pesquisa teve como objetivo verificar a utilização do serviço de disseminação seletiva da informação (DSI e a tecnologia RSS em bibliotecas de Tribunais em Brasília. Esse estudo foi proposto para identificar como os serviços de referência de tais bibliotecas veem a validade do serviço de disseminação seletiva e mais especificamente a tecnologia RSS como instrumentos para o desenvolvimento de novos produtos e serviços de informação com o foco nas necessidades do usuário. Ao todo foram visitadas seis instituições do poder Judiciário que possuem sede em Brasília. A amostra dos respondentes foi composta por doze profissionais formados em Biblioteconomia, que atuavam no serviço de referência dos respectivos órgãos. A técnica de pesquisa utilizada foi a entrevista semiaberta. Para obtenção das respostas foi utilizado um roteiro de perguntas que permitia ao entrevistador aprofundar as questões a partir das respostas concedidas pelos entrevistados. Os resultados obtidos demonstraram que os profissionais ainda veem utilidade do serviço de DSI, apesar de apenas duas das bibliotecas visitadas o utilizarem. Também foi possível verificar que os profissionais vislumbram a utilização da tecnologia RSS nos serviços de referência, apesar de nenhuma biblioteca visitada já ter pensado na utilização da tecnologia e os sites dessas bibliotecas ainda possuírem uma baixa disponibilização de serviços e utilização.

  8. Algorithms for Hyperspectral Endmember Extraction and Signature Classification with Morphological Dendritic Networks

    Science.gov (United States)

    Schmalz, M.; Ritter, G.

    Accurate multispectral or hyperspectral signature classification is key to the nonimaging detection and recognition of space objects. Additionally, signature classification accuracy depends on accurate spectral endmember determination [1]. Previous approaches to endmember computation and signature classification were based on linear operators or neural networks (NNs) expressed in terms of the algebra (R, +, x) [1,2]. Unfortunately, class separation in these methods tends to be suboptimal, and the number of signatures that can be accurately classified often depends linearly on the number of NN inputs. This can lead to poor endmember distinction, as well as potentially significant classification errors in the presence of noise or densely interleaved signatures. In contrast to traditional CNNs, autoassociative morphological memories (AMM) are a construct similar to Hopfield autoassociatived memories defined on the (R, +, ?,?) lattice algebra [3]. Unlimited storage and perfect recall of noiseless real valued patterns has been proven for AMMs [4]. However, AMMs suffer from sensitivity to specific noise models, that can be characterized as erosive and dilative noise. On the other hand, the prior definition of a set of endmembers corresponds to material spectra lying on vertices of the minimum convex region covering the image data. These vertices can be characterized as morphologically independent patterns. It has further been shown that AMMs can be based on dendritic computation [3,6]. These techniques yield improved accuracy and class segmentation/separation ability in the presence of highly interleaved signature data. In this paper, we present a procedure for endmember determination based on AMM noise sensitivity, which employs morphological dendritic computation. We show that detected endmembers can be exploited by AMM based classification techniques, to achieve accurate signature classification in the presence of noise, closely spaced or interleaved signatures, and

  9. Whole-book recognition.

    Science.gov (United States)

    Xiu, Pingping; Baird, Henry S

    2012-12-01

    Whole-book recognition is a document image analysis strategy that operates on the complete set of a book's page images using automatic adaptation to improve accuracy. We describe an algorithm which expects to be initialized with approximate iconic and linguistic models--derived from (generally errorful) OCR results and (generally imperfect) dictionaries--and then, guided entirely by evidence internal to the test set, corrects the models which, in turn, yields higher recognition accuracy. The iconic model describes image formation and determines the behavior of a character-image classifier, and the linguistic model describes word-occurrence probabilities. Our algorithm detects "disagreements" between these two models by measuring cross entropy between 1) the posterior probability distribution of character classes (the recognition results resulting from image classification alone) and 2) the posterior probability distribution of word classes (the recognition results from image classification combined with linguistic constraints). We show how disagreements can identify candidates for model corrections at both the character and word levels. Some model corrections will reduce the error rate over the whole book, and these can be identified by comparing model disagreements, summed across the whole book, before and after the correction is applied. Experiments on passages up to 180 pages long show that when a candidate model adaptation reduces whole-book disagreement, it is also likely to correct recognition errors. Also, the longer the passage operated on by the algorithm, the more reliable this adaptation policy becomes, and the lower the error rate achieved. The best results occur when both the iconic and linguistic models mutually correct one another. We have observed recognition error rates driven down by nearly an order of magnitude fully automatically without supervision (or indeed without any user intervention or interaction). Improvement is nearly monotonic, and

  10. Autonomy and Recognition

    Directory of Open Access Journals (Sweden)

    Miguel Giusti

    2007-04-01

    Full Text Available Resumen:El presente ensayo contiene dos partes. En la primera se hace una breve descripción de las carencias de la reflexión moral a las que parece venir al encuentro el concepto de reconocimiento. Charles Taylor y Axel Honneth, protagonistas en estos debates, dan buenas razones para dirigir la discusión hacia el tema del reconocimiento, pero no coinciden ni en su definición, ni en el modo de recuperar la tesis de Hegel, ni tampoco en la forma de tratar la relación entre autonomía y reconocimiento. En la segunda parte se analiza la concepción propiamente hegeliana, con la intención de destacar el nexo esencial, no la ruptura, que existe entre la noción de reconocimiento y el modelo conceptual de la voluntad libre o del espíritu. Abstract:This essay is divided into two parts. The first one is a short description of the deficiencies of moral reflection, which seem to lead the discussion towards the concept of recognition. Charles Taylor and Axel Honneth, two of the protagonists of these debates, give very good reasons for turning the argument towards the issue of recognition, but they do not agree on its definition, on the way to recover the Hegelian thesis, or on how to approach the relationship between autonomy and recognition. The second part constitutes an analysis of the Hegelian conception of recognition, in order to highlight the essential link –rather than the rupture– between the notion of recognition and the conceptual model of free will or spirit.

  11. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  12. Non-contact multi-radar smart probing of body orientation based on micro-Doppler signatures.

    Science.gov (United States)

    Li, Yiran; Pal, Ranadip; Li, Changzhi

    2014-01-01

    Micro-Doppler signatures carry useful information about body movements and have been widely applied to different applications such as human activity recognition and gait analysis. In this paper, micro-Doppler signatures are used to identify body orientation. Four AC-coupled continuous-wave (CW) smart radar sensors were used to form a multiple-radar network to carry out the experiments in this paper. 162 tests were performed in total. The experiment results showed a 100% accuracy in recognizing eight body orientations, i.e., facing north, northeast, east, southeast, south, southwest, west, and northwest.

  13. Stereotype Associations and Emotion Recognition

    NARCIS (Netherlands)

    Bijlstra, Gijsbert; Holland, Rob W.; Dotsch, Ron; Hugenberg, Kurt; Wigboldus, Daniel H. J.

    We investigated whether stereotype associations between specific emotional expressions and social categories underlie stereotypic emotion recognition biases. Across two studies, we replicated previously documented stereotype biases in emotion recognition using both dynamic (Study 1) and static

  14. Galeotti on recognition as inclusion

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2008-01-01

    Anna Elisabetta Galeotti's theory of 'toleration as recognition' has been criticised by Peter Jones for being conceptually incoherent, since liberal toleration presupposes a negative attitude to differences, whereas multicultural recognition requires positive affirmation hereof. The paper spells ...

  15. Doing Justice to Recognition

    Directory of Open Access Journals (Sweden)

    Will Colish

    2009-06-01

    Full Text Available The traditional role of justice is to arbitrate where the good will of people is not enough, if even present, to settle a dispute between the concerned parties. It is a procedural approach that assumes a fractured relationship between those involved. Recognition, at first glance, would not seem to mirror these aspects of justice. Yet recognition is very much a subject of justice these days. The aim of this paper is to question the applicability of justice to the practice of recognition. The methodological orientation of this paper is a Kantian-style critique of the institution of justice, highlighting the limits of its reach and the dangers of overextension. The critique unfolds in the following three steps: 1 There is an immediate appeal to justice as a practice of recognition through its commitment to universality. This allure is shown to be deceptive in providing no prescription for the actual practice of this universality. 2 The interventionist character of justice is designed to address divided relationships. If recognition is only given expression through this channel, then we can only assume division as our starting ground. 3 The outcome of justice in respect to recognition is identification. This identification is left vulnerable to misrecognition itself, creating a cycle of injustice that demands recognition from anew. It seems to be well accepted that recognition is essentjustice, but less clear how to do justice to recognition. This paper is an effort in clarification. Le rôle traditionnel de la justice est celui d’arbitrer des situations où la bonne volonté ne suffit pas à régler un différend entre les parties concernées. Il s'agit d'une approche procédurale qui suppose une relation brisée entre les personnes impliquées. La reconnaissance, à première vue, ne semble pas refléter ces caractéristiques de la justice. Pourtant, elle est souvent présentée comme rétablissant une justice entre les parties concernés. Le

  16. Immediate recognition memory for wine

    OpenAIRE

    Johnson, A.J.; Volp, A.; Miles, C.

    2014-01-01

    We describe a preliminary investigation concerning the short-term recognition memory function for gustatory stimuli (wines). In Experiment 1a, 24 non-expert wine drinkers completed a yes/no recognition task for 3-wine sequences. For the raw recognition scores, the serial position function comprised both primacy and recency. Recency did not, however, achieve significance for the d′ scores. In Experiment 1b, 24 participants completed the same yes/no recognition task for 3-visual matrix sequence...

  17. Forensic Face Recognition: A Survey

    NARCIS (Netherlands)

    Ali, Tauseef; Spreeuwers, Lieuwe Jan; Veldhuis, Raymond N.J.; Quaglia, Adamo; Epifano, Calogera M.

    2012-01-01

    The improvements of automatic face recognition during the last 2 decades have disclosed new applications like border control and camera surveillance. A new application field is forensic face recognition. Traditionally, face recognition by human experts has been used in forensics, but now there is a

  18. Visual Recognition Memory across Contexts

    Science.gov (United States)

    Jones, Emily J. H.; Pascalis, Olivier; Eacott, Madeline J.; Herbert, Jane S.

    2011-01-01

    In two experiments, we investigated the development of representational flexibility in visual recognition memory during infancy using the Visual Paired Comparison (VPC) task. In Experiment 1, 6- and 9-month-old infants exhibited recognition when familiarization and test occurred in the same room, but showed no evidence of recognition when…

  19. Bilepton signatures at the LHC

    Science.gov (United States)

    Corcella, Gennaro; Corianò, Claudio; Costantini, Antonio; Frampton, Paul H.

    2017-10-01

    We discuss the main signatures of the Bilepton Model at the Large Hadron Collider, focusing on its gauge boson sector. The model is characterised by five additional gauge bosons, four charged and one neutral, beyond those of the Standard Model, plus three exotic quarks. The latter turn into ordinary quarks with the emission of bilepton doublets (Y++ ,Y+) and (Y- ,Y-) of lepton number L = - 2 and L = + 2 respectively, with the doubly-charged bileptons decaying into same-sign lepton pairs. We perform a phenomenological analysis investigating processes with two doubly-charged bileptons and two jets at the LHC and find that, setting suitable cuts on pseudorapidities and transverse momenta of final-states jets and leptons, the model yields a visible signal and the main Standard Model backgrounds can be suppressed. Compared to previous studies, our investigation is based on a full Monte Carlo implementation of the model and accounts for parton showers, hadronization and an actual jet-clustering algorithm for both signal and Standard Model background, thus providing an optimal framework for an actual experimental search.

  20. Epigenetic Signatures of Cigarette Smoking.

    Science.gov (United States)

    Joehanes, Roby; Just, Allan C; Marioni, Riccardo E; Pilling, Luke C; Reynolds, Lindsay M; Mandaviya, Pooja R; Guan, Weihua; Xu, Tao; Elks, Cathy E; Aslibekyan, Stella; Moreno-Macias, Hortensia; Smith, Jennifer A; Brody, Jennifer A; Dhingra, Radhika; Yousefi, Paul; Pankow, James S; Kunze, Sonja; Shah, Sonia H; McRae, Allan F; Lohman, Kurt; Sha, Jin; Absher, Devin M; Ferrucci, Luigi; Zhao, Wei; Demerath, Ellen W; Bressler, Jan; Grove, Megan L; Huan, Tianxiao; Liu, Chunyu; Mendelson, Michael M; Yao, Chen; Kiel, Douglas P; Peters, Annette; Wang-Sattler, Rui; Visscher, Peter M; Wray, Naomi R; Starr, John M; Ding, Jingzhong; Rodriguez, Carlos J; Wareham, Nicholas J; Irvin, Marguerite R; Zhi, Degui; Barrdahl, Myrto; Vineis, Paolo; Ambatipudi, Srikant; Uitterlinden, André G; Hofman, Albert; Schwartz, Joel; Colicino, Elena; Hou, Lifang; Vokonas, Pantel S; Hernandez, Dena G; Singleton, Andrew B; Bandinelli, Stefania; Turner, Stephen T; Ware, Erin B; Smith, Alicia K; Klengel, Torsten; Binder, Elisabeth B; Psaty, Bruce M; Taylor, Kent D; Gharib, Sina A; Swenson, Brenton R; Liang, Liming; DeMeo, Dawn L; O'Connor, George T; Herceg, Zdenko; Ressler, Kerry J; Conneely, Karen N; Sotoodehnia, Nona; Kardia, Sharon L R; Melzer, David; Baccarelli, Andrea A; van Meurs, Joyce B J; Romieu, Isabelle; Arnett, Donna K; Ong, Ken K; Liu, Yongmei; Waldenberger, Melanie; Deary, Ian J; Fornage, Myriam; Levy, Daniel; London, Stephanie J

    2016-10-01

    DNA methylation leaves a long-term signature of smoking exposure and is one potential mechanism by which tobacco exposure predisposes to adverse health outcomes, such as cancers, osteoporosis, lung, and cardiovascular disorders. To comprehensively determine the association between cigarette smoking and DNA methylation, we conducted a meta-analysis of genome-wide DNA methylation assessed using the Illumina BeadChip 450K array on 15 907 blood-derived DNA samples from participants in 16 cohorts (including 2433 current, 6518 former, and 6956 never smokers). Comparing current versus never smokers, 2623 cytosine-phosphate-guanine sites (CpGs), annotated to 1405 genes, were statistically significantly differentially methylated at Bonferroni threshold of Psmoking-related traits in genome-wide studies including pulmonary function, cancers, inflammatory diseases, and heart disease. Comparing former versus never smokers, 185 of the CpGs that differed between current and never smokers were significant Psmoking cessation. Transcriptomic integration identified effects on gene expression at many differentially methylated CpGs. Cigarette smoking has a broad impact on genome-wide methylation that, at many loci, persists many years after smoking cessation. Many of the differentially methylated genes were novel genes with respect to biological effects of smoking and might represent therapeutic targets for prevention or treatment of tobacco-related diseases. Methylation at these sites could also serve as sensitive and stable biomarkers of lifetime exposure to tobacco smoke. © 2016 American Heart Association, Inc.

  1. Metabolomic signature of brain cancer.

    Science.gov (United States)

    Pandey, Renu; Caflisch, Laura; Lodi, Alessia; Brenner, Andrew J; Tiziani, Stefano

    2017-11-01

    Despite advances in surgery and adjuvant therapy, brain tumors represent one of the leading causes of cancer-related mortality and morbidity in both adults and children. Gliomas constitute about 60% of all cerebral tumors, showing varying degrees of malignancy. They are difficult to treat due to dismal prognosis and limited therapeutics. Metabolomics is the untargeted and targeted analyses of endogenous and exogenous small molecules, which charact erizes the phenotype of an individual. This emerging "omics" science provides functional readouts of cellular activity that contribute greatly to the understanding of cancer biology including brain tumor biology. Metabolites are highly informative as a direct signature of biochemical activity; therefore, metabolite profiling has become a promising approach for clinical diagnostics and prognostics. The metabolic alterations are well-recognized as one of the key hallmarks in monitoring disease progression, therapy, and revealing new molecular targets for effective therapeutic intervention. Taking advantage of the latest high-throughput analytical technologies, that is, nuclear magnetic resonance (NMR) spectroscopy and mass spectrometry (MS), metabolomics is now a promising field for precision medicine and drug discovery. In the present report, we review the application of metabolomics and in vivo metabolic profiling in the context of adult gliomas and paediatric brain tumors. Analytical platforms such as high-resolution (HR) NMR, in vivo magnetic resonance spectroscopic imaging and high- and low-resolution MS are discussed. Moreover, the relevance of metabolic studies in the development of new therapeutic strategies for treatment of gliomas are reviewed. © 2017 Wiley Periodicals, Inc.

  2. Reduction of a Ship's Magnetic Field Signatures

    CERN Document Server

    Holmes, John

    2008-01-01

    Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al

  3. Image recognition: visual grouping, recognition, and learning.

    Science.gov (United States)

    Buhmann, J M; Malik, J; Perona, P

    1999-12-07

    Vision extracts useful information from images. Reconstructing the three-dimensional structure of our environment and recognizing the objects that populate it are among the most important functions of our visual system. Computer vision researchers study the computational principles of vision and aim at designing algorithms that reproduce these functions. Vision is difficult: the same scene may give rise to very different images depending on illumination and viewpoint. Typically, an astronomical number of hypotheses exist that in principle have to be analyzed to infer a correct scene description. Moreover, image information might be extracted at different levels of spatial and logical resolution dependent on the image processing task. Knowledge of the world allows the visual system to limit the amount of ambiguity and to greatly simplify visual computations. We discuss how simple properties of the world are captured by the Gestalt rules of grouping, how the visual system may learn and organize models of objects for recognition, and how one may control the complexity of the description that the visual system computes.

  4. Catalase as a sulfide-sulfur oxido-reductase: An ancient (and modern? regulator of reactive sulfur species (RSS

    Directory of Open Access Journals (Sweden)

    Kenneth R. Olson

    2017-08-01

    Full Text Available Catalase is well-known as an antioxidant dismutating H2O2 to O2 and H2O. However, catalases evolved when metabolism was largely sulfur-based, long before O2 and reactive oxygen species (ROS became abundant, suggesting catalase metabolizes reactive sulfide species (RSS. Here we examine catalase metabolism of H2Sn, the sulfur analog of H2O2, hydrogen sulfide (H2S and other sulfur-bearing molecules using H2S-specific amperometric electrodes and fluorophores to measure polysulfides (H2Sn; SSP4 and ROS (dichlorofluorescein, DCF. Catalase eliminated H2Sn, but did not anaerobically generate H2S, the expected product of dismutation. Instead, catalase concentration- and oxygen-dependently metabolized H2S and in so doing acted as a sulfide oxidase with a P50 of 20 mmHg. H2O2 had little effect on catalase-mediated H2S metabolism but in the presence of the catalase inhibitor, sodium azide (Az, H2O2 rapidly and efficiently expedited H2S metabolism in both normoxia and hypoxia suggesting H2O2 is an effective electron acceptor in this reaction. Unexpectedly, catalase concentration-dependently generated H2S from dithiothreitol (DTT in both normoxia and hypoxia, concomitantly oxidizing H2S in the presence of O2. H2S production from DTT was inhibited by carbon monoxide and augmented by NADPH suggesting that catalase heme-iron is the catalytic site and that NADPH provides reducing equivalents. Catalase also generated H2S from garlic oil, diallyltrisulfide, thioredoxin and sulfur dioxide, but not from sulfite, metabisulfite, carbonyl sulfide, cysteine, cystine, glutathione or oxidized glutathione. Oxidase activity was also present in catalase from Aspergillus niger. These results show that catalase can act as either a sulfide oxidase or sulfur reductase and they suggest that these activities likely played a prominent role in sulfur metabolism during evolution and may continue do so in modern cells as well. This also appears to be the first observation of catalase

  5. Catalase as a sulfide-sulfur oxido-reductase: An ancient (and modern?) regulator of reactive sulfur species (RSS).

    Science.gov (United States)

    Olson, Kenneth R; Gao, Yan; DeLeon, Eric R; Arif, Maaz; Arif, Faihaan; Arora, Nitin; Straub, Karl D

    2017-08-01

    Catalase is well-known as an antioxidant dismutating H2O2 to O2 and H2O. However, catalases evolved when metabolism was largely sulfur-based, long before O2 and reactive oxygen species (ROS) became abundant, suggesting catalase metabolizes reactive sulfide species (RSS). Here we examine catalase metabolism of H2Sn, the sulfur analog of H2O2, hydrogen sulfide (H2S) and other sulfur-bearing molecules using H2S-specific amperometric electrodes and fluorophores to measure polysulfides (H2Sn; SSP4) and ROS (dichlorofluorescein, DCF). Catalase eliminated H2Sn, but did not anaerobically generate H2S, the expected product of dismutation. Instead, catalase concentration- and oxygen-dependently metabolized H2S and in so doing acted as a sulfide oxidase with a P50 of 20mmHg. H2O2 had little effect on catalase-mediated H2S metabolism but in the presence of the catalase inhibitor, sodium azide (Az), H2O2 rapidly and efficiently expedited H2S metabolism in both normoxia and hypoxia suggesting H2O2 is an effective electron acceptor in this reaction. Unexpectedly, catalase concentration-dependently generated H2S from dithiothreitol (DTT) in both normoxia and hypoxia, concomitantly oxidizing H2S in the presence of O2. H2S production from DTT was inhibited by carbon monoxide and augmented by NADPH suggesting that catalase heme-iron is the catalytic site and that NADPH provides reducing equivalents. Catalase also generated H2S from garlic oil, diallyltrisulfide, thioredoxin and sulfur dioxide, but not from sulfite, metabisulfite, carbonyl sulfide, cysteine, cystine, glutathione or oxidized glutathione. Oxidase activity was also present in catalase from Aspergillus niger. These results show that catalase can act as either a sulfide oxidase or sulfur reductase and they suggest that these activities likely played a prominent role in sulfur metabolism during evolution and may continue do so in modern cells as well. This also appears to be the first observation of catalase reductase

  6. Towards Automatic Threat Recognition

    Science.gov (United States)

    2006-12-01

    York: Bantam. Forschungsinstitut für Kommunikation , Informationsverarbeitung und Ergonomie FGAN Informationstechnik und Führungssysteme KIE Towards...Automatic Threat Recognition Dr. Ulrich Schade Joachim Biermann Miłosław Frey FGAN – FKIE Germany Forschungsinstitut für Kommunikation ...as Processing Principle Back to the Example Conclusion and Outlook Forschungsinstitut für Kommunikation , Informationsverarbeitung und Ergonomie FGAN

  7. Amazigh recognition in Algeria

    OpenAIRE

    Kristensen, Mia; Meškinytė, Vilma

    2015-01-01

    The indigenous people of North Africa, the Amazigh population, have been outnumbered by the Arabs since their invasion in the 7th century. Fighting and bombing heads have been regular ever since. However, during the period of decolonization the two populations fought side by side. After independence in the North African countries a heavy Arabisation followed, once again creating tension between the Arab and Amazigh population. Fighting to get recognition the Amazigh population has gained some...

  8. Pattern Recognition Control Design

    Science.gov (United States)

    Gambone, Elisabeth A.

    2018-01-01

    Spacecraft control algorithms must know the expected vehicle response to any command to the available control effectors, such as reaction thrusters or torque devices. Spacecraft control system design approaches have traditionally relied on the estimated vehicle mass properties to determine the desired force and moment, as well as knowledge of the effector performance to efficiently control the spacecraft. A pattern recognition approach was used to investigate the relationship between the control effector commands and spacecraft responses. Instead of supplying the approximated vehicle properties and the thruster performance characteristics, a database of information relating the thruster ring commands and the desired vehicle response was used for closed-loop control. A Monte Carlo simulation data set of the spacecraft dynamic response to effector commands was analyzed to establish the influence a command has on the behavior of the spacecraft. A tool developed at NASA Johnson Space Center to analyze flight dynamics Monte Carlo data sets through pattern recognition methods was used to perform this analysis. Once a comprehensive data set relating spacecraft responses with commands was established, it was used in place of traditional control methods and gains set. This pattern recognition approach was compared with traditional control algorithms to determine the potential benefits and uses.

  9. Audio-visual gender recognition

    Science.gov (United States)

    Liu, Ming; Xu, Xun; Huang, Thomas S.

    2007-11-01

    Combining different modalities for pattern recognition task is a very promising field. Basically, human always fuse information from different modalities to recognize object and perform inference, etc. Audio-Visual gender recognition is one of the most common task in human social communication. Human can identify the gender by facial appearance, by speech and also by body gait. Indeed, human gender recognition is a multi-modal data acquisition and processing procedure. However, computational multimodal gender recognition has not been extensively investigated in the literature. In this paper, speech and facial image are fused to perform a mutli-modal gender recognition for exploring the improvement of combining different modalities.

  10. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  11. Electronic Signatures for Public Procurement across Europe

    Science.gov (United States)

    Ølnes, Jon; Andresen, Anette; Arbia, Stefano; Ernst, Markus; Hagen, Martin; Klein, Stephan; Manca, Giovanni; Rossi, Adriano; Schipplick, Frank; Tatti, Daniele; Wessolowski, Gesa; Windheuser, Jan

    The PEPPOL (Pan-European Public Procurement On-Line) project is a large scale pilot under the CIP programme of the EU, exploring electronic public procurement in a unified European market. An important element is interoperability of electronic signatures across borders, identified today as a major obstacle to cross-border procurement. PEPPOL will address use of signatures in procurement processes, in particular tendering but also post-award processes like orders and invoices. Signature policies, i.e. quality requirements and requirements on information captured in the signing process, will be developed. This as well as technical interoperability of e-signatures across Europe will finally be piloted in demonstrators starting late 2009 or early 2010.

  12. Magnetic Signature of Brushless Electric Motors

    National Research Council Canada - National Science Library

    Clarke, David

    2006-01-01

    Brushless electric motors are used in a number of underwater vehicles. When these underwater vehicles are used for mine clearance operations the magnetic signature of the brushless motors is important...

  13. Evidence for discrete-state processing in recognition memory.

    Science.gov (United States)

    Province, Jordan M; Rouder, Jeffrey N

    2012-09-04

    We provide evidence that recognition memory is mediated by a detect-or-guess mental-state model without recourse to concepts of latent-strength or multiple-memory systems. We assess performance in a two-alternative forced-choice recognition memory task with confidence ratings. The key manipulation is that sometimes participants are asked which of two new items is old, and the resulting confidence distribution is unambiguously interpreted as arising from a guessing state. The confidence ratings for other conditions are seemingly the resultant of mixing this stable guessing state with an additional stable detect state. Formal model comparison supports this observation, and an analysis of associated response times reveals a mixture signature as well.

  14. Robust Real-Time and Rotation-Invariant American Sign Language Alphabet Recognition Using Range Camera

    Science.gov (United States)

    Lahamy, H.; Lichti, D.

    2012-07-01

    The automatic interpretation of human gestures can be used for a natural interaction with computers without the use of mechanical devices such as keyboards and mice. The recognition of hand postures have been studied for many years. However, most of the literature in this area has considered 2D images which cannot provide a full description of the hand gestures. In addition, a rotation-invariant identification remains an unsolved problem even with the use of 2D images. The objective of the current study is to design a rotation-invariant recognition process while using a 3D signature for classifying hand postures. An heuristic and voxelbased signature has been designed and implemented. The tracking of the hand motion is achieved with the Kalman filter. A unique training image per posture is used in the supervised classification. The designed recognition process and the tracking procedure have been successfully evaluated. This study has demonstrated the efficiency of the proposed rotation invariant 3D hand posture signature which leads to 98.24% recognition rate after testing 12723 samples of 12 gestures taken from the alphabet of the American Sign Language.

  15. ROBUST REAL-TIME AND ROTATION-INVARIANT AMERICAN SIGN LANGUAGE ALPHABET RECOGNITION USING RANGE CAMERA

    Directory of Open Access Journals (Sweden)

    H. Lahamy

    2012-07-01

    Full Text Available The automatic interpretation of human gestures can be used for a natural interaction with computers without the use of mechanical devices such as keyboards and mice. The recognition of hand postures have been studied for many years. However, most of the literature in this area has considered 2D images which cannot provide a full description of the hand gestures. In addition, a rotation-invariant identification remains an unsolved problem even with the use of 2D images. The objective of the current study is to design a rotation-invariant recognition process while using a 3D signature for classifying hand postures. An heuristic and voxelbased signature has been designed and implemented. The tracking of the hand motion is achieved with the Kalman filter. A unique training image per posture is used in the supervised classification. The designed recognition process and the tracking procedure have been successfully evaluated. This study has demonstrated the efficiency of the proposed rotation invariant 3D hand posture signature which leads to 98.24% recognition rate after testing 12723 samples of 12 gestures taken from the alphabet of the American Sign Language.

  16. The postprocessing of quantum digital signatures

    Science.gov (United States)

    Wang, Tian-Yin; Ma, Jian-Feng; Cai, Xiao-Qiu

    2017-01-01

    Many novel quantum digital signature proposals have been proposed, which can effectively guarantee the information-theoretic security of the signature for a singe bit against forging and denying. Using the current basic building blocks of signing a single bit, we give a new proposal to construct an entire protocol for signing a long message. Compared with the previous work, it can improve at least 33.33% efficiency.

  17. Signature for the shape of the universe

    Energy Technology Data Exchange (ETDEWEB)

    Gomero, G.I.; Reboucas, M.J.; Teixeira, A.F.F. [Centro Brasileiro de Pesquisas Fisicas (CBPF), Rio de Janeiro, RJ (Brazil)]. E-mail: german@cbpf.br; reboucas@cbpf.br; teixeira@cbpf.br

    2001-03-01

    If the universe has a nontrival shape (topology) the sky may show multiple correlated images of cosmic objects. These correlations can be counched in terms of distance correlations. We propose a statistical quantity which can be used to reveal the topological signature of any Roberston-Walker (RW) spacetime with nontrivial topology. We also show through computer-aided simulations how one can extract the topological signatures of flat elliptic and hyperbolic RW universes with nontrivial topology. (author)

  18. Quantum blind signature with an offline repository

    Science.gov (United States)

    Ribeiro, J.; Souto, A.; Mateus, P.

    2015-04-01

    We propose a quantum blind signature scheme that achieves perfect security under the assumption of an honest offline repository. The security of the protocol also relies on perfect private quantum channels, which are achievable using quantum one-time pads with keys shared via a quantum key distribution (QKD) protocol. The proposed approach ensures that signatures cannot be copied and that the sender must compromise to a single message, which are important advantages over classical protocols for certain applications.

  19. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  20. Peripheral Blood Signatures of Lead Exposure

    Science.gov (United States)

    LaBreche, Heather G.; Meadows, Sarah K.; Nevins, Joseph R.; Chute, John P.

    2011-01-01

    Background Current evidence indicates that even low-level lead (Pb) exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. Methodology/Principal Finding Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. Conclusions/Significance The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway. PMID:21829687

  1. Endeavour after RSS rollback

    Science.gov (United States)

    2000-01-01

    After rollback of the Rotating Service Structure, Space Shuttle Endeavour is spotlighted against the still-black sky of pre-dawn. At the top of the external tank is the Gaseous Oxygen Vent Arm and its vent hood, known as the '''beanie cap.''' The hood is raised to clear the external tank 2.5 minutes before launch. Endeavour is targeted for launch Nov. 30 at about 10:06 p.m. EST on mission STS-97. In the background, the sky prepares for dawn. The mission to the International Space Station carries the P6 Integrated Truss Segment containing solar arrays and batteries that will be temporarily installed to the Unity connecting module by the Z1 truss, recently delivered to and installed on the Station on mission STS-92. The two solar arrays are each more than 100 feet long. They will capture energy from the sun and convert it to power for the Station. Two spacewalks will be required to install the solar array connections.

  2. rss.html

    Science.gov (United States)

    ... Occupational Health Pet Health Sexual Health Sports Fitness Sports Injuries Traveler's Health Vital Signs Women's Health Checkup MedlinePlus “To Your Health: NLM Update” Podcasts are multimedia files, such as audio programs or music videos, that are distributed over the Internet using ...

  3. Arabic CWR Based on Correlation of Normalized Signatures of Words Images

    Directory of Open Access Journals (Sweden)

    Hala S. Zaghloul

    2007-12-01

    Full Text Available The traditional methods for Arabic OCR (AOCR based on segmentation of each word into a set of characters. The Arabic language is of cursive nature, and the character's shape depends on its position in the word. There are about 100 shape of the characters have to be classified, and some of them may be overlapped. Our approach use a normalized signature of the time signal of the pulse coupled neural network PCNN, supported with some shape primitives to represent the number of the word complementary and their positions within the image of the word. A lookup dictionary of words with its signatures was constructed, and structured in groups using a decision tree. The tested signature was routed through the tree to the nearest group, and then the signature and its related word with higher correlation within the selected group will be the classified. This method overcome many difficulties arise in cursive word recognition CWR for printed script with different font type and size; also it shows higher accuracy for the classification process, 96%.

  4. An efficient modified Elliptic Curve Digital Signature Algorithm | Kiros ...

    African Journals Online (AJOL)

    Many digital signatures which are based on Elliptic Curves Cryptography (ECC) have been proposed. Among these digital signatures, the Elliptic Curve Digital Signature Algorithm (ECDSA) is the widely standardized one. However, the verification process of ECDSA is slower than the signature generation process. Hence ...

  5. 21 CFR 11.70 - Signature/record linking.

    Science.gov (United States)

    2010-04-01

    ... and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective...

  6. Re-thinking employee recognition: understanding employee experiences of recognition

    OpenAIRE

    Smith, Charlotte

    2013-01-01

    Despite widespread acceptance of the importance of employee recognition for both individuals and organisations and evidence of its increasing use in organisations, employee recognition has received relatively little focused attention from academic researchers. Particularly lacking is research exploring the lived experience of employee recognition and the interpretations and meanings which individuals give to these experiences. Drawing on qualitative interviews conducted as part of my PhD rese...

  7. Recognition using gait.

    Energy Technology Data Exchange (ETDEWEB)

    Koch, Mark William

    2007-09-01

    Gait or an individual's manner of walking, is one approach for recognizing people at a distance. Studies in psychophysics and medicine indicate that humans can recognize people by their gait and have found twenty-four different components to gait that taken together make it a unique signature. Besides not requiring close sensor contact, gait also does not necessarily require a cooperative subject. Using video data of people walking in different scenarios and environmental conditions we develop and test an algorithm that uses shape and motion to identify people from their gait. The algorithm uses dynamic time warping to match stored templates against an unknown sequence of silhouettes extracted from a person walking. While results under similar constraints and conditions are very good, the algorithm quickly degrades with varying conditions such as surface and clothing.

  8. Does Twitter trigger bursts in signature collections?

    Science.gov (United States)

    Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro

    2013-01-01

    The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena.

  9. Does Twitter trigger bursts in signature collections?

    Directory of Open Access Journals (Sweden)

    Rui Yamaguchi

    Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore

  10. Reactor coolant pump testing using motor current signatures analysis

    Energy Technology Data Exchange (ETDEWEB)

    Burstein, N.; Bellamy, J.

    1996-12-01

    This paper describes reactor coolant pump motor testing carried out at Florida Power Corporation`s Crystal River plant using Framatome Technologies` new EMPATH (Electric Motor Performance Analysis and Trending Hardware) system. EMPATH{trademark} uses an improved form of Motor Current Signature Analysis (MCSA), technology, originally developed at Oak Ridge National Laboratories, for detecting deterioration in the rotors of AC induction motors. Motor Current Signature Analysis (MCSA) is a monitoring tool for motor driven equipment that provides a non-intrusive means for detecting the presence of mechanical and electrical abnormalities in the motor and the driven equipment. The base technology was developed at the Oak Ridge National Laboratory as a means for determining the affects of aging and service wear specifically on motor-operated valves used in nuclear power plant safety systems, but it is applicable to a broad range of electric machinery. MCSA is based on the recognition that an electric motor (ac or dc) driving a mechanical load acts as an efficient and permanently available transducer by sensing mechanical load variations, large and small, long-term and rapid, and converting them into variations in the induced current generated in the motor windings. The motor current variations, resulting from changes in load caused by gears, pulleys, friction, bearings, and other conditions that may change over the life of the motor, are carried by the electrical cables powering the motor and are extracted at any convenient location along the motor lead. These variations modulate the 60 Hz carrier frequency and appear as sidebands in the spectral plot.

  11. Human activity recognition and prediction

    CERN Document Server

    2016-01-01

    This book provides a unique view of human activity recognition, especially fine-grained human activity structure learning, human-interaction recognition, RGB-D data based action recognition, temporal decomposition, and causality learning in unconstrained human activity videos. The techniques discussed give readers tools that provide a significant improvement over existing methodologies of video content understanding by taking advantage of activity recognition. It links multiple popular research fields in computer vision, machine learning, human-centered computing, human-computer interaction, image classification, and pattern recognition. In addition, the book includes several key chapters covering multiple emerging topics in the field. Contributed by top experts and practitioners, the chapters present key topics from different angles and blend both methodology and application, composing a solid overview of the human activity recognition techniques. .

  12. Radically enhanced molecular recognition

    KAUST Repository

    Trabolsi, Ali

    2009-12-17

    The tendency for viologen radical cations to dimerize has been harnessed to establish a recognition motif based on their ability to form extremely strong inclusion complexes with cyclobis(paraquat-p-phenylene) in its diradical dicationic redox state. This previously unreported complex involving three bipyridinium cation radicals increases the versatility of host-guest chemistry, extending its practice beyond the traditional reliance on neutral and charged guests and hosts. In particular, transporting the concept of radical dimerization into the field of mechanically interlocked molecules introduces a higher level of control within molecular switches and machines. Herein, we report that bistable and tristable [2]rotaxanes can be switched by altering electrochemical potentials. In a tristable [2]rotaxane composed of a cyclobis(paraquat-p-phenylene) ring and a dumbbell with tetrathiafulvalene, dioxynaphthalene and bipyridinium recognition sites, the position of the ring can be switched. On oxidation, it moves from the tetrathiafulvalene to the dioxynaphthalene, and on reduction, to the bipyridinium radical cation, provided the ring is also reduced simultaneously to the diradical dication. © 2010 Macmillan Publishers Limited. All rights reserved.

  13. Deep Learning For Smile Recognition

    OpenAIRE

    Glauner, Patrick O.

    2016-01-01

    Inspired by recent successes of deep learning in computer vision, we propose a novel application of deep convolutional neural networks to facial expression recognition, in particular smile recognition. A smile recognition test accuracy of 99.45% is achieved for the Denver Intensity of Spontaneous Facial Action (DISFA) database, significantly outperforming existing approaches based on hand-crafted features with accuracies ranging from 65.55% to 79.67%. The novelty of this approach includes a c...

  14. Research of speech recognition methods

    OpenAIRE

    Prokopovič, Valerij

    2005-01-01

    Two speech recognition methods: Dynamic Time Warping and Hidden Markov model based methods were investigated in this work To estimate efficiency of the methods, speaker dependent and speaker independent isolated word recognition experiments were performed. During experimental research it was determined that Dynamic Time Warping method is suitable only for speaker dependent speech recognition. Hidden Markov model based method is suitable for both – speaker dependent and speaker independent spe...

  15. Pilgrims Face Recognition Dataset -- HUFRD

    OpenAIRE

    Aly, Salah A.

    2012-01-01

    In this work, we define a new pilgrims face recognition dataset, called HUFRD dataset. The new developed dataset presents various pilgrims' images taken from outside the Holy Masjid El-Harram in Makkah during the 2011-2012 Hajj and Umrah seasons. Such dataset will be used to test our developed facial recognition and detection algorithms, as well as assess in the missing and found recognition system \\cite{crowdsensing}.

  16. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  17. Markov Models for Handwriting Recognition

    CERN Document Server

    Plotz, Thomas

    2011-01-01

    Since their first inception, automatic reading systems have evolved substantially, yet the recognition of handwriting remains an open research problem due to its substantial variation in appearance. With the introduction of Markovian models to the field, a promising modeling and recognition paradigm was established for automatic handwriting recognition. However, no standard procedures for building Markov model-based recognizers have yet been established. This text provides a comprehensive overview of the application of Markov models in the field of handwriting recognition, covering both hidden

  18. Speech Recognition on Mobile Devices

    DEFF Research Database (Denmark)

    Tan, Zheng-Hua; Lindberg, Børge

    2010-01-01

    The enthusiasm of deploying automatic speech recognition (ASR) on mobile devices is driven both by remarkable advances in ASR technology and by the demand for efficient user interfaces on such devices as mobile phones and personal digital assistants (PDAs). This chapter presents an overview of ASR...... in the mobile context covering motivations, challenges, fundamental techniques and applications. Three ASR architectures are introduced: embedded speech recognition, distributed speech recognition and network speech recognition. Their pros and cons and implementation issues are discussed. Applications within...... command and control, text entry and search are presented with an emphasis on mobile text entry....

  19. Molecular Mechanisms of Odor Recognition

    National Research Council Canada - National Science Library

    Anholt, Robert

    2000-01-01

    .... We characterized the transduction pathway for the recognition of pheromones in the vomeronasal organ and also characterized subpopulations of olfactory neurons expressing different axonal G proteins...

  20. Lattice-Based Revocable Certificateless Signature

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-10-01

    Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.

  1. A smart pattern recognition system for the automatic identification of aerospace acoustic sources

    Science.gov (United States)

    Cabell, R. H.; Fuller, C. R.

    1989-01-01

    An intelligent air-noise recognition system is described that uses pattern recognition techniques to distinguish noise signatures of five different types of acoustic sources, including jet planes, propeller planes, a helicopter, train, and wind turbine. Information for classification is calculated using the power spectral density and autocorrelation taken from the output of a single microphone. Using this system, as many as 90 percent of test recordings were correctly identified, indicating that the linear discriminant functions developed can be used for aerospace source identification.

  2. The ERP signature of the contextual diversity effect in visual word recognition.

    Science.gov (United States)

    Vergara-Martínez, Marta; Comesaña, Montserrat; Perea, Manuel

    2017-06-01

    Behavioral experiments have revealed that words appearing in many different contexts are responded to faster than words that appear in few contexts. Although this contextual diversity (CD) effect has been found to be stronger than the word-frequency (WF) effect, it is a matter of debate whether the facilitative effects of CD and WF reflect the same underlying mechanisms. The analysis of the electrophysiological correlates of CD may shed some light on this issue. This experiment is the first to examine the ERPs to high- and low-CD words when WF is controlled for. Results revealed that while high-CD words produced faster responses than low-CD words, their ERPs showed larger negativities (225-325 ms) than low-CD words. This result goes in the opposite direction of the ERP WF effect (high-frequency words elicit smaller N400 amplitudes than low-frequency words). The direction and scalp distribution of the CD effect resembled the ERP effects associated with "semantic richness." Thus, while apparently related, CD and WF originate from different sources during the access of lexical-semantic representations.

  3. Quantum mechanical stabilization of Minkowski signature wormholes

    Energy Technology Data Exchange (ETDEWEB)

    Visser, M.

    1989-05-19

    When one attempts to construct classical wormholes in Minkowski signature Lorentzian spacetimes violations of both the weak energy hypothesis and averaged weak energy hypothesis are encountered. Since the weak energy hypothesis is experimentally known to be violated quantum mechanically, this suggests that a quantum mechanical analysis of Minkowski signature wormholes is in order. In this note I perform a minisuperspace analysis of a simple class of Minkowski signature wormholes. By solving the Wheeler-de Witt equation for pure Einstein gravity on this minisuperspace the quantum mechanical wave function of the wormhole is obtained in closed form. The wormhole is shown to be quantum mechanically stabilized with an average radius of order the Planck length. 8 refs.

  4. Digital signature of electronic dental records.

    Science.gov (United States)

    Maruo, Ivan Toshio; Maruo, Hiroshi

    2012-05-01

    The purpose of this article is to examine the feasibility of digital signature technology to guarantee the legal validation of electronic dental records. The possible uses of digital signature technology, the actual use of digital signature technology to authenticate electronic dental records, the authentication of each part of the electronic dental record, the general legal principles involved, how to digitally sign electronic dental record files, and the limitations of this method are discussed. It is possible to obtain electronic dental records that carry the same legal certainty as conventional, nonelectronic records. For this purpose, each part of the electronic dental records should be digitally signed by the author of the document. Copyright © 2012 American Association of Orthodontists. Published by Mosby, Inc. All rights reserved.

  5. A Methodology for Calculating Radiation Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Klasky, Marc Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wilcox, Trevor [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bathke, Charles G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); James, Michael R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-01

    A rigorous formalism is presented for calculating radiation signatures from both Special Nuclear Material (SNM) as well as radiological sources. The use of MCNP6 in conjunction with CINDER/ORIGEN is described to allow for the determination of both neutron and photon leakages from objects of interest. In addition, a description of the use of MCNP6 to properly model the background neutron and photon sources is also presented. Examinations of the physics issues encountered in the modeling are investigated so as to allow for guidance in the user discerning the relevant physics to incorporate into general radiation signature calculations. Furthermore, examples are provided to assist in delineating the pertinent physics that must be accounted for. Finally, examples of detector modeling utilizing MCNP are provided along with a discussion on the generation of Receiver Operating Curves, which are the suggested means by which to determine detectability radiation signatures emanating from objects.

  6. Cryptanalysis of the arbitrated quantum signature protocols

    Energy Technology Data Exchange (ETDEWEB)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2011-08-15

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  7. Low Scale Gravity Signatures in ATLAS

    CERN Document Server

    Karagoz-Unel, M

    2008-01-01

    The ATLAS detector may reveal in the LHC collisions signatures of extra dimensional models which predict quantum gravity at the TeV scale. One of the most dramatic consequences of such models is the copious production of micro blackholes. Micro blackholes can yield distinct signatures with large multiplicity and large energy release in the ATLAS detector. Extra dimensional models also predict the existence of Kaluza-Klein partners of SM gauge bosons, such as the excited graviton and gluon. These particles can be searched for in their two-body decays. The emerging final state particles are highly energetic, thus requiring novel reconstruction techniques, in particular in the heavy quark (t, b) channels. I will summarize the current status of the low scale gravity studies in ATLAS with example signatures.

  8. A possible signature of annihilating dark matter

    Science.gov (United States)

    Chan, Man Ho

    2018-02-01

    In this article, we report a new signature of dark matter annihilation based on the radio continuum data of NGC 1569 galaxy detected in the past few decades. After eliminating the thermal contribution of the radio signal, an abrupt change in the spectral index is shown in the radio spectrum. Previously, this signature was interpreted as an evidence of convective outflow of cosmic ray. However, we show that the cosmic ray contribution is not enough to account for the observed radio flux. We then discover that if dark matter annihilates via the 4-e channel with the thermal relic cross-section, the electrons and positrons produced would emit a strong radio flux which can provide an excellent agreement with the observed signature. The best-fitting dark matter mass is 25 GeV.

  9. SAR: Stroke Authorship Recognition

    KAUST Repository

    Shaheen, Sara

    2015-10-15

    Are simple strokes unique to the artist or designer who renders them? If so, can this idea be used to identify authorship or to classify artistic drawings? Also, could training methods be devised to develop particular styles? To answer these questions, we propose the Stroke Authorship Recognition (SAR) approach, a novel method that distinguishes the authorship of 2D digitized drawings. SAR converts a drawing into a histogram of stroke attributes that is discriminative of authorship. We provide extensive classification experiments on a large variety of data sets, which validate SAR\\'s ability to distinguish unique authorship of artists and designers. We also demonstrate the usefulness of SAR in several applications including the detection of fraudulent sketches, the training and monitoring of artists in learning a particular new style and the first quantitative way to measure the quality of automatic sketch synthesis tools. © 2015 The Eurographics Association and John Wiley & Sons Ltd.

  10. Iris Recognition Using Wavelet

    Directory of Open Access Journals (Sweden)

    Khaliq Masood

    2013-08-01

    Full Text Available Biometric systems are getting more attention in the present era. Iris recognition is one of the most secure and authentic among the other biometrics and this field demands more authentic, reliable and fast algorithms to implement these biometric systems in real time. In this paper, an efficient localization technique is presented to identify pupil and iris boundaries using histogram of the iris image. Two small portions of iris have been used for polar transformation to reduce computational time and to increase the efficiency of the system. Wavelet transform is used for feature vector generation. Rotation of iris is compensated without shifts in the iris code. System is tested on Multimedia University Iris Database and results show that proposed system has encouraging performance.

  11. Automatic speech recognition

    Science.gov (United States)

    Espy-Wilson, Carol

    2005-04-01

    Great strides have been made in the development of automatic speech recognition (ASR) technology over the past thirty years. Most of this effort has been centered around the extension and improvement of Hidden Markov Model (HMM) approaches to ASR. Current commercially-available and industry systems based on HMMs can perform well for certain situational tasks that restrict variability such as phone dialing or limited voice commands. However, the holy grail of ASR systems is performance comparable to humans-in other words, the ability to automatically transcribe unrestricted conversational speech spoken by an infinite number of speakers under varying acoustic environments. This goal is far from being reached. Key to the success of ASR is effective modeling of variability in the speech signal. This tutorial will review the basics of ASR and the various ways in which our current knowledge of speech production, speech perception and prosody can be exploited to improve robustness at every level of the system.

  12. Peripheral blood signatures of lead exposure.

    Directory of Open Access Journals (Sweden)

    Heather G LaBreche

    Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.

  13. The encoding of individual identity in dolphin signature whistles: how much information is needed?

    Directory of Open Access Journals (Sweden)

    Arik Kershenbaum

    Full Text Available Bottlenose dolphins (Tursiops truncatus produce many vocalisations, including whistles that are unique to the individual producing them. Such "signature whistles" play a role in individual recognition and maintaining group integrity. Previous work has shown that humans can successfully group the spectrographic representations of signature whistles according to the individual dolphins that produced them. However, attempts at using mathematical algorithms to perform a similar task have been less successful. A greater understanding of the encoding of identity information in signature whistles is important for assessing similarity of whistles and thus social influences on the development of these learned calls. We re-examined 400 signature whistles from 20 individual dolphins used in a previous study, and tested the performance of new mathematical algorithms. We compared the measure used in the original study (correlation matrix of evenly sampled frequency measurements to one used in several previous studies (similarity matrix of time-warped whistles, and to a new algorithm based on the Parsons code, used in music retrieval databases. The Parsons code records the direction of frequency change at each time step, and is effective at capturing human perception of music. We analysed similarity matrices from each of these three techniques, as well as a random control, by unsupervised clustering using three separate techniques: k-means clustering, hierarchical clustering, and an adaptive resonance theory neural network. For each of the three clustering techniques, a seven-level Parsons algorithm provided better clustering than the correlation and dynamic time warping algorithms, and was closer to the near-perfect visual categorisations of human judges. Thus, the Parsons code captures much of the individual identity information present in signature whistles, and may prove useful in studies requiring quantification of whistle similarity.

  14. Transient thermal camouflage and heat signature control

    Science.gov (United States)

    Yang, Tian-Zhi; Su, Yishu; Xu, Weikai; Yang, Xiao-Dong

    2016-09-01

    Thermal metamaterials have been proposed to manipulate heat flux as a new way to cloak or camouflage objects in the infrared world. To date, however, thermal metamaterials only operate in the steady-state and exhibit detectable, transient heat signatures. In this letter, the theoretical basis for a thermal camouflaging technique with controlled transient diffusion is presented. This technique renders an object invisible in real time. More importantly, the thermal camouflaging device instantaneously generates a pre-designed heat signature and behaves as a perfect thermal illusion device. A metamaterial coating with homogeneous and isotropic thermal conductivity, density, and volumetric heat capacity was fabricated and very good camouflaging performance was achieved.

  15. Experimental quantum digital signature over 102 km

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Liu, Hui; Tang, Qi-Jie; Wang, Jian; You, Li-Xing; Zhang, Wei-Jun; Chen, Si-Jing; Wang, Zhen; Zhang, Qiang; Chen, Teng-Yun; Chen, Zeng-Bing; Pan, Jian-Wei

    2017-03-01

    Quantum digital signature (QDS) is an approach to guarantee the nonrepudiation, unforgeability, and transferability of a signature with information-theoretical security. Previous experimental realizations of QDS relied on an unrealistic assumption of secure channels and the longest distance is several kilometers. Here, we have experimentally demonstrated a recently proposed QDS protocol without assuming any secure channel. Exploiting the decoy state modulation, we have successfully signed a one-bit message through an up to 102-km optical fiber. Furthermore, we continuously run the system to sign the longer message "USTC" with 32 bits at the distance of 51 km. Our results pave the way towards the practical application of QDS.

  16. State of the Art: Signature Biometrics Verification

    Directory of Open Access Journals (Sweden)

    Nourddine Guersi

    2010-04-01

    Full Text Available This paper presents a comparative analysis of the performance of three estimation algorithms: Expectation Maximization (EM, Greedy EM Algorithm (GEM and Figueiredo-Jain Algorithm (FJ - based on the Gaussian mixture models (GMMs for signature biometrics verification. The simulation results have shown significant performance achievements. The test performance of EER=5.49 % for "EM", EER=5.04 % for "GEM" and EER=5.00 % for "FJ", shows that the behavioral information scheme of signature biometrics is robust and has a discriminating power, which can be explored for identity authentication.

  17. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  18. Cryptanalysis of the Quantum Group Signature Protocols

    Science.gov (United States)

    Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan

    2013-11-01

    Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.

  19. The Legal Recognition of Sign Languages

    Science.gov (United States)

    De Meulder, Maartje

    2015-01-01

    This article provides an analytical overview of the different types of explicit legal recognition of sign languages. Five categories are distinguished: constitutional recognition, recognition by means of general language legislation, recognition by means of a sign language law or act, recognition by means of a sign language law or act including…

  20. FILTWAM and Voice Emotion Recognition

    NARCIS (Netherlands)

    Bahreini, Kiavash; Nadolski, Rob; Westera, Wim

    2014-01-01

    This paper introduces the voice emotion recognition part of our framework for improving learning through webcams and microphones (FILTWAM). This framework enables multimodal emotion recognition of learners during game-based learning. The main goal of this study is to validate the use of microphone

  1. Face recognition using Krawtchouk moment

    Indian Academy of Sciences (India)

    Feature extraction is one of the important tasks in face recognition. Moments are widely used feature extractor due to their superior discriminatory power and geometrical invariance. Moments generally capture the global features of the image. This paper proposes Krawtchouk moment for feature extraction in face recognition ...

  2. Sign Facilitation in Word Recognition.

    Science.gov (United States)

    Wauters, Loes N.; Knoors, Harry E. T.; Vervloed, Mathijs P. J.; Aarnoutse, Cor A. J.

    2001-01-01

    This study examined whether use of sign language would facilitate reading word recognition by 16 deaf children (6- to 1 years-old) in the Netherlands. Results indicated that if words were learned through speech, accompanied by the relevant sign, accuracy of word recognition was greater than if words were learned solely through speech. (Contains…

  3. Iris Recognition - Beyond One Meter

    Science.gov (United States)

    Matey, James R.; Kennell, Lauren R.

    Iris recognition Iris recognition is, arguably, the most robust form of biometric Biometrics identification. It has been deployed in large-scale systems that have been very effective. The systems deployed to date make use of iris Remote Biometric cameras that require significant user cooperation; that in turn imposes significant constraints on the deployment scenarios that are practical.

  4. Methods of Teaching Speech Recognition

    Science.gov (United States)

    Rader, Martha H.; Bailey, Glenn A.

    2010-01-01

    Objective: This article introduces the history and development of speech recognition, addresses its role in the business curriculum, outlines related national and state standards, describes instructional strategies, and discusses the assessment of student achievement in speech recognition classes. Methods: Research methods included a synthesis of…

  5. Side-View Face Recognition

    NARCIS (Netherlands)

    Santemiz, P.; Spreeuwers, Lieuwe Jan; Veldhuis, Raymond N.J.

    2010-01-01

    Side-view face recognition is a challenging problem with many applications. Especially in real-life scenarios where the environment is uncontrolled, coping with pose variations up to side-view positions is an important task for face recognition. In this paper we discuss the use of side view face

  6. Forensic Face Recognition: A Survey

    NARCIS (Netherlands)

    Ali, Tauseef; Veldhuis, Raymond N.J.; Spreeuwers, Lieuwe Jan

    2010-01-01

    Beside a few papers which focus on the forensic aspects of automatic face recognition, there is not much published about it in contrast to the literature on developing new techniques and methodologies for biometric face recognition. In this report, we review forensic facial identification which is

  7. Side-View Face Recognition

    NARCIS (Netherlands)

    Santemiz, P.; Spreeuwers, Lieuwe Jan; Veldhuis, Raymond N.J.; van den Biggelaar, Olivier

    As a widely used biometrics, face recognition has many advantages such as being non-intrusive, natural and passive. On the other hand, in real-life scenarios with uncontrolled environment, pose variation up to side-view positions makes face recognition a challenging work. In this paper we discuss

  8. Recognition of emotion in others

    NARCIS (Netherlands)

    Frijda, N.H.; Paglieri, F.

    2012-01-01

    This chapter argues that recognition of emotion had a simple basis and a highly complex edifice above it. Its basis is formed by catching intent from expressive and other emotional behavior, using elementary principles of perceptual integration. In intent recognition, mirror neurons under particular

  9. Viewpoint Manifolds for Action Recognition

    Directory of Open Access Journals (Sweden)

    Souvenir Richard

    2009-01-01

    Full Text Available Abstract Action recognition from video is a problem that has many important applications to human motion analysis. In real-world settings, the viewpoint of the camera cannot always be fixed relative to the subject, so view-invariant action recognition methods are needed. Previous view-invariant methods use multiple cameras in both the training and testing phases of action recognition or require storing many examples of a single action from multiple viewpoints. In this paper, we present a framework for learning a compact representation of primitive actions (e.g., walk, punch, kick, sit that can be used for video obtained from a single camera for simultaneous action recognition and viewpoint estimation. Using our method, which models the low-dimensional structure of these actions relative to viewpoint, we show recognition rates on a publicly available dataset previously only achieved using multiple simultaneous views.

  10. Pattern-recognition receptors in human eosinophils.

    Science.gov (United States)

    Kvarnhammar, Anne Månsson; Cardell, Lars Olaf

    2012-05-01

    The pattern-recognition receptor (PRR) family includes Toll-like receptors (TLRs), nucleotide-binding oligomerization domain (NOD) -like receptors (NLRs), RIG-I-like receptors (RLRs), C-type lectin receptors (CLRs) and the receptor for advanced glycation end products (RAGE). They recognize various microbial signatures or host-derived danger signals and trigger an immune response. Eosinophils are multifunctional leucocytes involved in the pathogenesis of several inflammatory processes, including parasitic helminth infection, allergic diseases, tissue injury and tumour immunity. Human eosinophils express several PRRs, including TLR1-5, TLR7, TLR9, NOD1, NOD2, Dectin-1 and RAGE. Receptor stimulation induces survival, oxidative burst, activation of the adhesion system and release of cytokines (interleukin-1β, interleukin-6, tumour necrosis factor-α and granulocyte-macrophage colony-stimulating factor), chemokines (interleukin-8 and growth-related oncogene-α) and cytotoxic granule proteins (eosinophil cationic protein, eosinophil-derived neurotoxin, eosinophil peroxidase and major basic protein). It is also evident that eosinophils play an immunomodulatory role by interacting with surrounding cells. The presence of a broad range of PRRs in eosinophils indicates that they are not only involved in defence against parasitic helminths, but also against bacteria, viruses and fungi. From a clinical perspective, eosinophilic PRRs seem to be involved in both allergic and malignant diseases by causing exacerbations and affecting tumour growth, respectively. © 2012 The Authors. Immunology © 2012 Blackwell Publishing Ltd.

  11. A group signature scheme based on quantum teleportation

    Science.gov (United States)

    Wen, Xiaojun; Tian, Yuan; Ji, Liping; Niu, Xiamu

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  12. Hydrocarbon circulation and colonial signature in Pachycondyla villosa.

    Science.gov (United States)

    Lucas, C; Pho, D B; Fresneau, D; Jallon, J M

    2004-07-01

    In ants, both cuticular and postpharyngeal gland (PPG) hydrocarbons (HCs) have been involved in nestmate recognition. However, no detailed comparison is available. A comparative study including also high density lipophorin (HDLp), an internal HC carrier, was therefore undertaken on Pachycondyla villosa. Purified HDLp is an 820 kDa lipoprotein with a density of 1.114 g/ml and two 245 and 80 kDa apo-proteins. Its hydrocarbon profile is very similar with the cuticular one, in agreement with its hydrocarbon carrier function. Conversely, n-alkanes and externally branched monomethylalkanes are markedly decreased in the PPG. According to their physical properties, this suggests that they are involved in waterproofing on the cuticle. The PPG actually contains only internally branched mono-, dimethylalkanes or monomethylalkenes; their greater fluidity is more adequate for chemical communication. The percentages of some of them are statistically not different between the cuticle and PPG. Their mixtures vary with colonies and they may thus be involved in colonial signature. A scheme for hydrocarbon circulation is discussed, involving lipophorin, cuticle, PPG and self-grooming in one individual, a pathway complementary or alternative to the selective delivery by lipophorin in some other insects. HCs are then distributed between nestmates' cuticles through allo-grooming and physical contacts.

  13. The acoustic signature for intelligibility test words.

    Science.gov (United States)

    Weismer, G; Kent, R D; Hodge, M; Martin, R

    1988-10-01

    As part of a research program that aims to develop an explicit acoustic basis for a single-word intelligibility test, an initial attempt to characterize the formant trajectories and segment durations of seven test words produced by 30 normal speakers is described. These characterizations are referred to as "acoustic signatures." The data indicate that: (1) formant trajectories show two sex effects, namely, that females are more variable as a group than males and tend to have greater slopes for the transitional segment of the second-formant trajectories and that these effects are consistent across words; (2) Bark transformations of the frequency data do not seem to eliminate the interspeaker differences in formant trajectories, nor do they eliminate either of the sex effects described above; and (3) segment durations have different variabilities depending on the syllabic structure of the word; no sex effect was noted here. The discussion focuses on the appropriate form for the acoustic signatures, as well as factors that should be considered in selecting words for signature development. To demonstrate the potential application of these data, formant trajectory and segment duration data from 18 speakers with amyotrophic lateral sclerosis and varying degrees of dysarthria are compared to the acoustic signature for the word wax.

  14. Detection of proteolytic signatures for Parkinson's disease

    DEFF Research Database (Denmark)

    Jordal, Peter Lüttge; Dyrlund, Thomas F.; Winge, Kristian

    2016-01-01

    Aim: To investigate if idiopathic Parkinson's disease (IPD) is associated with distinct proteolytic signatures relative to non-neurodegenerative controls (NND) and patients with multiple system atrophy (MSA). Materials & methods: A subtiligase-based N-terminomics screening method was exploited...

  15. Molecular signatures of thyroid follicular neoplasia

    DEFF Research Database (Denmark)

    Borup, R.; Rossing, M.; Henao, Ricardo

    2010-01-01

    The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...

  16. Negative obstacle detection by thermal signature

    Science.gov (United States)

    Matthies, Larry; Rankin, A.

    2003-01-01

    Detecting negative obstacles (ditches, potholes, and other depressions) is one of the most difficult problems in perception for autonomous, off-road navigation. Past work has largely relied on range imagery, because that is based on the geometry of the obstacle, is largely insensitive to illumination variables, and because there have not been other reliable alternatives. However, the visible aspect of negative obstacles shrinks rapidly with range, making them impossible to detect in time to avoid them at high speed. To relive this problem, we show that the interiors of negative obstacles generally remain warmer than the surrounding terrain throughout the night, making thermal signature a stable property for night-time negative obstacle detection. Experimental results to date have achieved detection distances 45% greater by using thermal signature than by using range data alone. Thermal signature is the first known observable with potential to reveal a deep negative obstacle without actually seeing far into it. Modeling solar illumination has potential to extend the usefulness of thermal signature through daylight hours.

  17. Exploring Signature Pedagogies in Undergraduate Leadership Education

    Science.gov (United States)

    Jenkins, Daniel M.

    2012-01-01

    This research explores the instructional strategies most frequently used by leadership educators who teach academic credit-bearing undergraduate leadership studies courses through a national survey and identifies signature pedagogies within the leadership discipline. Findings from this study suggest that class discussion--whether in the form of…

  18. SUSY with ATLAS Leptonic Signatures, Coannihilation Region

    CERN Document Server

    Comune, G

    2004-01-01

    In this work we present an initial study on how leptonic signatures can be used at ATLAS to constrain SUSY particle masses combinations for the first time in the so called "coannihilation region''. The analysis is carried out in the framework of mSUGRA constrained SUSY model using fast detector simulation and reconstruction exploiting an invariant mass endpoint technique.

  19. Practical Certificateless Aggregate Signatures From Bilinear Maps

    NARCIS (Netherlands)

    Gong, Zheng; Long, Yu; Hong, Xuan; Chen, Kefei

    2008-01-01

    In some restrictive environments, such as sensor networks, each sensor submits the newest information to the server, every message must be authenticated to immune forgery and replay attacks. But the regular signatures need to be saved and verified individually, which will heavily add the costs of

  20. Speech Recognition: How Do We Teach It?

    Science.gov (United States)

    Barksdale, Karl

    2002-01-01

    States that growing use of speech recognition software has made voice writing an essential computer skill. Describes how to present the topic, develop basic speech recognition skills, and teach speech recognition outlining, writing, proofreading, and editing. (Contains 14 references.) (SK)

  1. High-resolution ground target infrared signature modeling for combat target identification training

    Science.gov (United States)

    Sanders, Jeffrey S.

    2003-09-01

    Recent world events have accelerated the evolution of the US military from monolithic formations arrayed against a known enemy, to a force that must respond to rapidly changing world events. New technologies are part of the Army's evolution and thermal imaging sensors are becoming more and more prevalent on the modern battlefield. These sensors are integrated into advanced weapon systems or commonly used for battlefield surveillance. Thermal imaging systems give the soldier the ability to deliver deadly force onto an enemy at long ranges at any time of day or night. The ability to differentiate friendly and threat forces in this situation is critical for the avoidance of friendly fire incidents and for the proper use of battlefield resources. The ability to foresee the location of the Army's next battlefield is becoming more difficult, and we don't know where the next battlefield will be from year to year. Infrared target recognition training tools need to be flexible, adaptable, and be based on not only the latest intelligence data but have geographically specific training available to the soldier. To address this training issue, personnel of the Measurement and Signatures Division at the National Ground Intelligence Center have created the Simulated Infrared Earth Environment Lab (SIREEL) web site. The SIREEL web site contains extensive infrared signature data on numerous threat and friendly vehicles and the site is designed to provide country-specific vehicle identification training in support of US military deployments. The bulk of the content currently on the site consists of infrared signature data collected over a decade of intelligence gathering. The site also employs state of the art infrared signature modeling capabilities to provide the soldier in training the most flexible training possible. If measured data on a vehicle is not available, the website developers have the capability to calculate the infrared signature of ground vehicles in any location

  2. Comparison of metagenomic samples using sequence signatures

    Directory of Open Access Journals (Sweden)

    Jiang Bai

    2012-12-01

    Full Text Available Abstract Background Sequence signatures, as defined by the frequencies of k-tuples (or k-mers, k-grams, have been used extensively to compare genomic sequences of individual organisms, to identify cis-regulatory modules, and to study the evolution of regulatory sequences. Recently many next-generation sequencing (NGS read data sets of metagenomic samples from a variety of different environments have been generated. The assembly of these reads can be difficult and analysis methods based on mapping reads to genes or pathways are also restricted by the availability and completeness of existing databases. Sequence-signature-based methods, however, do not need the complete genomes or existing databases and thus, can potentially be very useful for the comparison of metagenomic samples using NGS read data. Still, the applications of sequence signature methods for the comparison of metagenomic samples have not been well studied. Results We studied several dissimilarity measures, including d2, d2* and d2S recently developed from our group, a measure (hereinafter noted as Hao used in CVTree developed from Hao’s group (Qi et al., 2004, measures based on relative di-, tri-, and tetra-nucleotide frequencies as in Willner et al. (2009, as well as standard lp measures between the frequency vectors, for the comparison of metagenomic samples using sequence signatures. We compared their performance using a series of extensive simulations and three real next-generation sequencing (NGS metagenomic datasets: 39 fecal samples from 33 mammalian host species, 56 marine samples across the world, and 13 fecal samples from human individuals. Results showed that the dissimilarity measure d2S can achieve superior performance when comparing metagenomic samples by clustering them into different groups as well as recovering environmental gradients affecting microbial samples. New insights into the environmental factors affecting microbial compositions in metagenomic samples

  3. Signature analysis of ballistic missile warhead with micro-nutation in terahertz band

    Science.gov (United States)

    Li, Ming; Jiang, Yue-song

    2013-08-01

    In recent years, the micro-Doppler effect has been proposed as a new technique for signature analysis and extraction of radar targets. The ballistic missile is known as a typical radar target and has been paid many attentions for the complexities of its motions in current researches. The trajectory of a ballistic missile can be generally divided into three stages: boost phase, midcourse phase and terminal phase. The midcourse phase is the most important phase for radar target recognition and interception. In this stage, the warhead forms a typical micro-motion called micro-nutation which consists of three basic micro-motions: spinning, coning and wiggle. This paper addresses the issue of signature analysis of ballistic missile warhead in terahertz band via discussing the micro-Doppler effect. We establish a simplified model (cone-shaped) for the missile warhead followed by the micro-motion models including of spinning, coning and wiggle. Based on the basic formulas of these typical micro-motions, we first derive the theoretical formula of micro-nutation which is the main micro-motion of the missile warhead. Then, we calculate the micro-Doppler frequency in both X band and terahertz band via these micro-Doppler formulas. The simulations are given to show the superiority of our proposed method for the recognition and detection of radar micro targets in terahertz band.

  4. Pattern recognition in spectra

    Science.gov (United States)

    Gebran, M.; Paletou, F.

    2017-06-01

    We present a new automated procedure that simultaneously derives the effective temperature Teff, surface gravity log g, metallicity [Fe/H], and equatorial projected rotational velocity ve sin i for stars. The procedure is inspired by the well-known PCA-based inversion of spectropolarimetric full-Stokes solar data, which was used both for Zeeman and Hanle effects. The efficiency and accuracy of this procedure have been proven for FGK, A, and late type dwarf stars of K and M spectral types. Learning databases are generated from the Elodie stellar spectra library using observed spectra for which fundamental parameters were already evaluated or with synthetic data. The synthetic spectra are calculated using ATLAS9 model atmospheres. This technique helped us to detect many peculiar stars such as Am, Ap, HgMn, SiEuCr and binaries. This fast and efficient technique could be used every time a pattern recognition is needed. One important application is the understanding of the physical properties of planetary surfaces by comparing aboard instrument data to synthetic ones.

  5. Arabic character recognition

    Science.gov (United States)

    Allam, May

    1994-03-01

    This paper presents a complete system for learning and recognizing Arabic characters. Arabic OCR faces technical problems not encountered in other languages such as cursiveness, overriding and overlapping of characters, multiple shapes per character and the presence of vowels above and below the characters. The proposed approach relies on the fact that the process of connecting Arabic characters to produce cursive writing tends to form a fictitious baseline. During preprocessing, contour analysis provides both component isolation and baseline location. In the feature extraction phase, the words are processed from right to left to generate a sequence of labels. Each label is one of a predetermined codebook that represents all possible bit distribution with respect to the baseline. At a certain position, which depends on the label context, a segmentation decision is taken. During training, a model is generated for each character. This model describes the probability of the occurrence of the labels at each vertical position. During recognition, the probability of the label observation sequence is computed and accumulated. The system has been tested on different typewritten, typeset fonts and diacriticized versions of both and the evaluation results are presented.

  6. Kernel learning algorithms for face recognition

    CERN Document Server

    Li, Jun-Bao; Pan, Jeng-Shyang

    2013-01-01

    Kernel Learning Algorithms for Face Recognition covers the framework of kernel based face recognition. This book discusses the advanced kernel learning algorithms and its application on face recognition. This book also focuses on the theoretical deviation, the system framework and experiments involving kernel based face recognition. Included within are algorithms of kernel based face recognition, and also the feasibility of the kernel based face recognition method. This book provides researchers in pattern recognition and machine learning area with advanced face recognition methods and its new

  7. Vision-Based Navigation and Recognition

    National Research Council Canada - National Science Library

    Rosenfeld, Azriel

    1996-01-01

    .... (4) Invariants -- both geometric and other types. (5) Human faces: Analysis of images of human faces, including feature extraction, face recognition, compression, and recognition of facial expressions...

  8. Vision-Based Navigation and Recognition

    National Research Council Canada - National Science Library

    Rosenfeld, Azriel

    1998-01-01

    .... (4) Invariants: both geometric and other types. (5) Human faces: Analysis of images of human faces, including feature extraction, face recognition, compression, and recognition of facial expressions...

  9. Forward secure digital signature for electronic medical records.

    Science.gov (United States)

    Yu, Yao-Chang; Huang, To-Yeh; Hou, Ting-Wei

    2012-04-01

    The Technology Safeguard in Health Insurance Portability and Accountability Act (HIPAA) Title II has addressed a way to maintain the integrity and non-repudiation of Electronic Medical Record (EMR). One of the important cryptographic technologies is mentioned in the ACT is digital signature; however, the ordinary digital signature (e.g. DSA, RSA, GQ...) has an inherent weakness: if the key (certificate) is updated, than all signatures, even the ones generated before the update, are no longer trustworthy. Unfortunately, the current most frequently used digital signature schemes are categorized into the ordinary digital signature scheme; therefore, the objective of this paper is to analyze the shortcoming of using ordinary digital signatures in EMR and to propose a method to use forward secure digital signature to sign EMR to ensure that the past EMR signatures remain trustworthy while the key (certificate) is updated.

  10. The ICDAR 2009 Signature Verification Competition

    NARCIS (Netherlands)

    Blankers, V.L.; Heuvel, C.E. van den; Franke, K.Y.; Vuurpijl, L.G.

    2009-01-01

    Recent results of forgery detection by implementing biometric signature verification methods are promising. At present, forensic signature verification in daily casework is performed through visual examination by trained forensic handwriting experts, without reliance on computerassisted methods.

  11. A blind digital signature scheme using elliptic curve digital signature algorithm

    OpenAIRE

    BÜTÜN, İsmail; DEMİRER, Mehmet

    2014-01-01

    In this study, we propose a blind digital signature (BDS) scheme based on the elliptic curve digital signature algorithm that increases the performance significantly. The security of our scheme is based on the difficulty of the elliptic curve discrete algorithm problem. Therefore, it offers much smaller key lengths for the desired security levels, along with much faster cryptographic processes, leading to fewer hardware and software requirements. According to our simulation results, ...

  12. The effects of extrinsic motivation on signature authorship opinions in forensic signature blind trials.

    Science.gov (United States)

    Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug

    2014-03-01

    Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials. Crown

  13. CHARACTER RECOGNITION OF VIDEO SUBTITLES\\

    Directory of Open Access Journals (Sweden)

    Satish S Hiremath

    2016-11-01

    Full Text Available An important task in content based video indexing is to extract text information from videos. The challenges involved in text extraction and recognition are variation of illumination on each video frame with text, the text present on the complex background and different font size of the text. Using various image processing algorithms like morphological operations, blob detection and histogram of oriented gradients the character recognition of video subtitles is implemented. Segmentation, feature extraction and classification are the major steps of character recognition. Several experimental results are shown to demonstrate the performance of the proposed algorithm

  14. Face Recognition using Approximate Arithmetic

    DEFF Research Database (Denmark)

    Marso, Karol

    Face recognition is image processing technique which aims to identify human faces and found its use in various different fields for example in security. Throughout the years this field evolved and there are many approaches and many different algorithms which aim to make the face recognition as effective...... processing applications the results do not need to be completely precise and use of the approximate arithmetic can lead to reduction in terms of delay, space and power consumption. In this paper we examine possible use of approximate arithmetic in face recognition using Eigenfaces algorithm....

  15. Facial recognition in education system

    Science.gov (United States)

    Krithika, L. B.; Venkatesh, K.; Rathore, S.; Kumar, M. Harish

    2017-11-01

    Human beings exploit emotions comprehensively for conveying messages and their resolution. Emotion detection and face recognition can provide an interface between the individuals and technologies. The most successful applications of recognition analysis are recognition of faces. Many different techniques have been used to recognize the facial expressions and emotion detection handle varying poses. In this paper, we approach an efficient method to recognize the facial expressions to track face points and distances. This can automatically identify observer face movements and face expression in image. This can capture different aspects of emotion and facial expressions.

  16. Iris recognition via plenoptic imaging

    Energy Technology Data Exchange (ETDEWEB)

    Santos-Villalobos, Hector J.; Boehnen, Chris Bensing; Bolme, David S.

    2017-11-07

    Iris recognition can be accomplished for a wide variety of eye images by using plenoptic imaging. Using plenoptic technology, it is possible to correct focus after image acquisition. One example technology reconstructs images having different focus depths and stitches them together, resulting in a fully focused image, even in an off-angle gaze scenario. Another example technology determines three-dimensional data for an eye and incorporates it into an eye model used for iris recognition processing. Another example technology detects contact lenses. Application of the technologies can result in improved iris recognition under a wide variety of scenarios.

  17. Genetic Algorithm based Gait Recognition

    OpenAIRE

    R.Ashok Kumar Reddy; G. Venkata Narasimhulu; Dr. S. A. K. Jilani; Dr D.Seshappa

    2013-01-01

    In this paper, a face/gait recognition system for personal identification and verification using genetic algorithm. This face/gait Recognition System (FRS/GRS) is also being trained for gender identification. The Face/Gait recognition system consists of three steps. At the very outset some pre-processing are applied on the input image. Secondly face/gait features are extracted, which will be taken as the input of the BPNN and genetic algorithm (GA) in the third step and classification is carr...

  18. Performance tests of signature extension algorithms. [for large area crop inventory experiment

    Science.gov (United States)

    Abotteen, R.; Levy, S.; Mendlowitz, M.; Moritz, T.; Potter, J.; Thadani, S.; Wehmanen, O.

    1977-01-01

    Comparative tests were performed on seven signature extension algorithms to evaluate their effectiveness in correcting for changes in atmospheric haze and sun angle in a Landsat scene. Four of the algorithms were cluster matching, and two were maximum likelihood algorithms. The seventh algorithm determined the haze level in both training and recognition segments and used a set of tables calculated from an atmospheric model to determine the affine transformation that corrects the training signatures for changes in sun angle and haze level. Three of the algorithms were tested on a simulated data set, and all of the algorithms were tested on consecutive-day data. The classification performance on the data sets using the algorithms is presented, along with results of statistical tests on the accuracy and proportion estimates. The three algorithms tested on the simulated data produced significant improvements over the results obtained using untransformed signatures. For the consecutive-day data, the tested algorithms produced improvements in most but not all cases. The tests indicated also that no statistically significant differences were noted among the algorithms.

  19. A Signature Comparing Android Mobile Application Utilizing Feature Extracting Algorithms

    Directory of Open Access Journals (Sweden)

    Paul Grafilon

    2017-08-01

    Full Text Available The paper presented one of the application that can be done using smartphones camera. Nowadays forgery is one of the most undetected crimes. With the forensic technology used today it is still difficult for authorities to compare and define what a real signature is and what a forged signature is. A signature is a legal representation of a person. All transactions are based on a signature. Forgers may use a signature to sign illegal contracts and withdraw from bank accounts undetected. A signature can also be forged during election periods for repeated voting. Addressing the issues a signature should always be secure. Signature verification is a reduced problem that still poses a real challenge for researchers. The literature on signature verification is quite extensive and shows two main areas of research off-line and on-line systems. Off-line systems deal with a static image of the signature i.e. the result of the action of signing while on-line systems work on the dynamic process of generating the signature i.e. the action of signing itself. The researchers have found a way to resolve the concerns. A mobile application that integrates the camera to take a picture of a signature analyzes it and compares it to other signatures for verification. It will exist to help citizens to be more cautious and aware with issues regarding the signatures. This might also be relevant to help organizations and institutions such as banks and insurance companies in verifying signatures that may avoid unwanted transactions and identity theft. Furthermore this might help the authorities in the never ending battle against crime especially against forgers and thieves. The project aimed to design and develop a mobile application that integrates the smartphone camera for verifying and comparing signatures for security using the best algorithm possible. As the result of the development the said smartphone camera application is functional and reliable.

  20. Acoustic Signature Monitoring and Management of Naval Platforms

    NARCIS (Netherlands)

    Basten, T.G.H.; Jong, C.A.F. de; Graafland, F.; Hof, J. van 't

    2015-01-01

    Acoustic signatures make naval platforms susceptible to detection by threat sensors. The variable operational conditions and lifespan of a platform cause variations in the acoustic signature. To deal with these variations, a real time signature monitoring capability is being developed, with advisory

  1. Radar micro-doppler signatures processing and applications

    CERN Document Server

    Chen, Victor C; Miceli, William J

    2014-01-01

    Radar Micro-Doppler Signatures: Processing and applications concentrates on the processing and application of radar micro-Doppler signatures in real world situations, providing readers with a good working knowledge on a variety of applications of radar micro-Doppler signatures.

  2. 36 CFR 1150.22 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Signature of documents. 1150... Documents for Proceedings on Citations § 1150.22 Signature of documents. The signature of a party, authorized officer, employee or attorney constitutes a certification that he/she has read the document, that...

  3. 21 CFR 11.200 - Electronic signature components and controls.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Electronic signature components and controls. 11.200 Section 11.200 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Signatures § 11.200 Electronic...

  4. Unequal recognition, misrecognition and injustice

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2012-01-01

    Euro-multiculturalism is (1) concerned with religiously defined immigrant minorities; (2) sees policies of recognition as a means to secure multicultural equality between groups; (3) endorses the moderate secularism of European states; and (4) adopts a contextualist approach to answering the norm......Euro-multiculturalism is (1) concerned with religiously defined immigrant minorities; (2) sees policies of recognition as a means to secure multicultural equality between groups; (3) endorses the moderate secularism of European states; and (4) adopts a contextualist approach to answering...... by the state of religious minorities. It argues that state–religion relations can be analysed as relations of recognition, which are not only unequal but also multi-dimensional, and that it is difficult to answer the question whether multi-dimensional recognitive inequalities are unjust or wrong if one...

  5. Indoor navigation by image recognition

    Science.gov (United States)

    Choi, Io Teng; Leong, Chi Chong; Hong, Ka Wo; Pun, Chi-Man

    2017-07-01

    With the progress of smartphones hardware, it is simple on smartphone using image recognition technique such as face detection. In addition, indoor navigation system development is much slower than outdoor navigation system. Hence, this research proves a usage of image recognition technique for navigation in indoor environment. In this paper, we introduced an indoor navigation application that uses the indoor environment features to locate user's location and a route calculating algorithm to generate an appropriate path for user. The application is implemented on Android smartphone rather than iPhone. Yet, the application design can also be applied on iOS because the design is implemented without using special features only for Android. We found that digital navigation system provides better and clearer location information than paper map. Also, the indoor environment is ideal for Image recognition processing. Hence, the results motivate us to design an indoor navigation system using image recognition.

  6. On speech recognition during anaesthesia

    DEFF Research Database (Denmark)

    Alapetite, Alexandre

    2007-01-01

    This PhD thesis in human-computer interfaces (informatics) studies the case of the anaesthesia record used during medical operations and the possibility to supplement it with speech recognition facilities. Problems and limitations have been identified with the traditional paper-based anaesthesia...... interface with speech input facilities in Danish. The evaluation of the new interface was carried out in a full-scale anaesthesia simulator. This has been complemented by laboratory experiments on several aspects of speech recognition for this type of use, e.g. the effects of noise on speech recognition...... accuracy. Finally, the last part of the thesis looks at the acceptance and success of a speech recognition system introduced in a Danish hospital to produce patient records....

  7. Similarity measures for face recognition

    CERN Document Server

    Vezzetti, Enrico

    2015-01-01

    Face recognition has several applications, including security, such as (authentication and identification of device users and criminal suspects), and in medicine (corrective surgery and diagnosis). Facial recognition programs rely on algorithms that can compare and compute the similarity between two sets of images. This eBook explains some of the similarity measures used in facial recognition systems in a single volume. Readers will learn about various measures including Minkowski distances, Mahalanobis distances, Hansdorff distances, cosine-based distances, among other methods. The book also summarizes errors that may occur in face recognition methods. Computer scientists "facing face" and looking to select and test different methods of computing similarities will benefit from this book. The book is also useful tool for students undertaking computer vision courses.

  8. Genetic specificity of face recognition

    National Research Council Canada - National Science Library

    Nicholas G. Shakeshaft; Robert Plomin

    2015-01-01

    ...), both phenotypically and genetically. Recent twin studies have found the ability to memorize and recognize faces to be an exception, being similarly heritable but phenotypically substantially uncorrelated both with g and with general object recognition...

  9. Pattern recognition and string matching

    CERN Document Server

    Cheng, Xiuzhen

    2002-01-01

    The research and development of pattern recognition have proven to be of importance in science, technology, and human activity. Many useful concepts and tools from different disciplines have been employed in pattern recognition. Among them is string matching, which receives much theoretical and practical attention. String matching is also an important topic in combinatorial optimization. This book is devoted to recent advances in pattern recognition and string matching. It consists of twenty eight chapters written by different authors, addressing a broad range of topics such as those from classifica­ tion, matching, mining, feature selection, and applications. Each chapter is self-contained, and presents either novel methodological approaches or applications of existing theories and techniques. The aim, intent, and motivation for publishing this book is to pro­ vide a reference tool for the increasing number of readers who depend upon pattern recognition or string matching in some way. This includes student...

  10. Towards real-time and rotation-invariant American Sign Language alphabet recognition using a range camera.

    Science.gov (United States)

    Lahamy, Hervé; Lichti, Derek D

    2012-10-29

    The automatic interpretation of human gestures can be used for a natural interaction with computers while getting rid of mechanical devices such as keyboards and mice. In order to achieve this objective, the recognition of hand postures has been studied for many years. However, most of the literature in this area has considered 2D images which cannot provide a full description of the hand gestures. In addition, a rotation-invariant identification remains an unsolved problem, even with the use of 2D images. The objective of the current study was to design a rotation-invariant recognition process while using a 3D signature for classifying hand postures. A heuristic and voxel-based signature has been designed and implemented. The tracking of the hand motion is achieved with the Kalman filter. A unique training image per posture is used in the supervised classification. The designed recognition process, the tracking procedure and the segmentation algorithm have been successfully evaluated. This study has demonstrated the efficiency of the proposed rotation invariant 3D hand posture signature which leads to 93.88% recognition rate after testing 14,732 samples of 12 postures taken from the alphabet of the American Sign Language.

  11. Towards Real-Time and Rotation-Invariant American Sign Language Alphabet Recognition Using a Range Camera

    Directory of Open Access Journals (Sweden)

    Derek D. Lichti

    2012-10-01

    Full Text Available The automatic interpretation of human gestures can be used for a natural interaction with computers while getting rid of mechanical devices such as keyboards and mice. In order to achieve this objective, the recognition of hand postures has been studied for many years. However, most of the literature in this area has considered 2D images which cannot provide a full description of the hand gestures. In addition, a rotation-invariant identification remains an unsolved problem, even with the use of 2D images. The objective of the current study was to design a rotation-invariant recognition process while using a 3D signature for classifying hand postures. A heuristic and voxel-based signature has been designed and implemented. The tracking of the hand motion is achieved with the Kalman filter. A unique training image per posture is used in the supervised classification. The designed recognition process, the tracking procedure and the segmentation algorithm have been successfully evaluated. This study has demonstrated the efficiency of the proposed rotation invariant 3D hand posture signature which leads to 93.88% recognition rate after testing 14,732 samples of 12 postures taken from the alphabet of the American Sign Language.

  12. Towards Real-Time and Rotation-Invariant American Sign Language Alphabet Recognition Using a Range Camera

    Science.gov (United States)

    Lahamy, Hervé; Lichti, Derek D.

    2012-01-01

    The automatic interpretation of human gestures can be used for a natural interaction with computers while getting rid of mechanical devices such as keyboards and mice. In order to achieve this objective, the recognition of hand postures has been studied for many years. However, most of the literature in this area has considered 2D images which cannot provide a full description of the hand gestures. In addition, a rotation-invariant identification remains an unsolved problem, even with the use of 2D images. The objective of the current study was to design a rotation-invariant recognition process while using a 3D signature for classifying hand postures. A heuristic and voxel-based signature has been designed and implemented. The tracking of the hand motion is achieved with the Kalman filter. A unique training image per posture is used in the supervised classification. The designed recognition process, the tracking procedure and the segmentation algorithm have been successfully evaluated. This study has demonstrated the efficiency of the proposed rotation invariant 3D hand posture signature which leads to 93.88% recognition rate after testing 14,732 samples of 12 postures taken from the alphabet of the American Sign Language. PMID:23202168

  13. COMPRESSIVE CLASSIFICATION FOR FACE RECOGNITION

    OpenAIRE

    Majumdar, Angshul; Ward, Rabab K.

    2010-01-01

    This chapter reviews an alternate face recognition method than those provided by traditional machine learning tools. Conventional machine learning solutions to dimensionality reduction and classification require all the data to be present beforehand, i.e. whenever new data is added, the system cannot be updated in online fashion, rather all the calculations need to be re-done from scratch. This creates a computational bottleneck for large scale implementation of face recognition systems.

  14. Recognition Memory in Psychotic Patients

    Directory of Open Access Journals (Sweden)

    H. Ellis

    1992-01-01

    Full Text Available Preliminary data are reported from experiments in which Warrington's (1984 Recognition Memory Tests were given to patients with misidentification delusions including the Capgras type and to psychotic patients. The results showed a profound impairment on face recognition for most groups, especially those with the Capgras delusion. It was rare to find a patent whose score on the word test was anything but normal.

  15. Bidirectional Modulation of Recognition Memory

    OpenAIRE

    Ho, Jonathan W.; Poeta, Devon L.; Jacobson, Tara K.; Zolnik, Timothy A.; Neske, Garrett T.; Connors, Barry W.; Burwell, Rebecca D.

    2015-01-01

    Perirhinal cortex (PER) has a well established role in the familiarity-based recognition of individual items and objects. For example, animals and humans with perirhinal damage are unable to distinguish familiar from novel objects in recognition memory tasks. In the normal brain, perirhinal neurons respond to novelty and familiarity by increasing or decreasing firing rates. Recent work also implicates oscillatory activity in the low-beta and low-gamma frequency bands in sensory detection, per...

  16. An automatic image recognition approach

    Directory of Open Access Journals (Sweden)

    Tudor Barbu

    2007-07-01

    Full Text Available Our paper focuses on the graphical analysis domain. We propose an automatic image recognition technique. This approach consists of two main pattern recognition steps. First, it performs an image feature extraction operation on an input image set, using statistical dispersion features. Then, an unsupervised classification process is performed on the previously obtained graphical feature vectors. An automatic region-growing based clustering procedure is proposed and utilized in the classification stage.

  17. [Neurological disease and facial recognition].

    Science.gov (United States)

    Kawamura, Mitsuru; Sugimoto, Azusa; Kobayakawa, Mutsutaka; Tsuruya, Natsuko

    2012-07-01

    To discuss the neurological basis of facial recognition, we present our case reports of impaired recognition and a review of previous literature. First, we present a case of infarction and discuss prosopagnosia, which has had a large impact on face recognition research. From a study of patient symptoms, we assume that prosopagnosia may be caused by unilateral right occipitotemporal lesion and right cerebral dominance of facial recognition. Further, circumscribed lesion and degenerative disease may also cause progressive prosopagnosia. Apperceptive prosopagnosia is observed in patients with posterior cortical atrophy (PCA), pathologically considered as Alzheimer's disease, and associative prosopagnosia in frontotemporal lobar degeneration (FTLD). Second, we discuss face recognition as part of communication. Patients with Parkinson disease show social cognitive impairments, such as difficulty in facial expression recognition and deficits in theory of mind as detected by the reading the mind in the eyes test. Pathological and functional imaging studies indicate that social cognitive impairment in Parkinson disease is possibly related to damages in the amygdalae and surrounding limbic system. The social cognitive deficits can be observed in the early stages of Parkinson disease, and even in the prodromal stage, for example, patients with rapid eye movement (REM) sleep behavior disorder (RBD) show impairment in facial expression recognition. Further, patients with myotonic dystrophy type 1 (DM 1), which is a multisystem disease that mainly affects the muscles, show social cognitive impairment similar to that of Parkinson disease. Our previous study showed that facial expression recognition impairment of DM 1 patients is associated with lesion in the amygdalae and insulae. Our study results indicate that behaviors and personality traits in DM 1 patients, which are revealed by social cognitive impairment, are attributable to dysfunction of the limbic system.

  18. Human Activity Recognition using Smartphone

    OpenAIRE

    Rasekh, Amin; Chen, Chien-An; Lu, Yan

    2014-01-01

    Human activity recognition has wide applications in medical research and human survey system. In this project, we design a robust activity recognition system based on a smartphone. The system uses a 3-dimentional smartphone accelerometer as the only sensor to collect time series signals, from which 31 features are generated in both time and frequency domain. Activities are classified using 4 different passive learning methods, i.e., quadratic classifier, k-nearest neighbor algorithm, support ...

  19. Voice congruency facilitates word recognition.

    Directory of Open Access Journals (Sweden)

    Sandra Campeanu

    Full Text Available Behavioral studies of spoken word memory have shown that context congruency facilitates both word and source recognition, though the level at which context exerts its influence remains equivocal. We measured event-related potentials (ERPs while participants performed both types of recognition task with words spoken in four voices. Two voice parameters (i.e., gender and accent varied between speakers, with the possibility that none, one or two of these parameters was congruent between study and test. Results indicated that reinstating the study voice at test facilitated both word and source recognition, compared to similar or no context congruency at test. Behavioral effects were paralleled by two ERP modulations. First, in the word recognition test, the left parietal old/new effect showed a positive deflection reflective of context congruency between study and test words. Namely, the same speaker condition provided the most positive deflection of all correctly identified old words. In the source recognition test, a right frontal positivity was found for the same speaker condition compared to the different speaker conditions, regardless of response success. Taken together, the results of this study suggest that the benefit of context congruency is reflected behaviorally and in ERP modulations traditionally associated with recognition memory.

  20. Pattern recognition receptors: an update.

    Science.gov (United States)

    Goutagny, Nadege; Fitzgerald, Katherine A

    2006-07-01

    The vertebrate immune system consists of two inter-related components, the innate and adaptive responses, which are required for the resolution of infection. The innate immune response is critical for the immediate protection from infection and for marshalling the B- and T-cell responses of the adaptive response. A key component of the innate immune response is germline-encoded pattern recognition receptors that detect pathogens. Several families of these pattern recognition receptors have now been described. Microbial recognition by these receptors triggers appropriate immune responses, including the direct uptake and killing of pathogens and/or initiation of intracellular signaling pathways that culminate in the activation of immune responsive transcriptional programs. Pattern recognition receptors include soluble receptors in serum (collectins), transmembrane receptors on cell surfaces or vacuolar membranes (C-type lectins and Toll-like receptors) or cytoplasmic sensors (NACHT-LRR proteins and RNA helicases). Roles for these pattern recognition receptor families are emerging in the susceptibility to bacterial and viral infections and in acute and chronic conditions, such as sepsis, autoimmune disease and atherosclerosis. These findings suggest that the selective targeting of pattern recognition receptors and the pathways they trigger may be useful clinically. Progress towards therapeutics designed to target Toll-like receptor signaling is already well underway. This review will describe our current understanding of innate immune sensors and the mechanisms regulating their activity.

  1. Gene signatures in hepatocellular carcinoma (HCC).

    Science.gov (United States)

    Andrisani, Ourania M; Studach, Leo; Merle, Philippe

    2011-02-01

    Primary hepatocellular carcinoma (HCC) is a significant human cancer globally, with poor prognosis. New and efficacious therapy strategies are needed as well as new biomarkers for early detection of at-risk patients. In this review, we discuss select microarray studies of human HCCs, and propose a gene signature that has promise for clinical/translational application. This gene signature combines the proliferation cluster of genes and the hepatic cancer initiating/stem cell gene cluster for identification of HCCs with poor prognosis. Evidence from cell-based assays identifies the existence of a mechanistic link between these two gene clusters, involving the proliferation cluster gene polo-like kinase 1 (PLK1). We propose that PLK1 is a promising therapy target for HCC. Copyright © 2010 Elsevier Ltd. All rights reserved.

  2. Stochastic monotony signature and biomedical applications.

    Science.gov (United States)

    Demongeot, Jacques; Galli Carminati, Giuliana; Carminati, Federico; Rachdi, Mustapha

    2015-12-01

    We introduce a new concept, the stochastic monotony signature of a function, made of the sequence of the signs that indicate if the function is increasing or constant (sign +), or decreasing (sign -). If the function results from the averaging of successive observations with errors, the monotony sign is a random binary variable, whose density is studied under two hypotheses for the distribution of errors: uniform and Gaussian. Then, we describe a simple statistical test allowing the comparison between the monotony signatures of two functions (e.g., one observed and the other as reference) and we apply the test to four biomedical examples, coming from genetics, psychology, gerontology, and morphogenesis. Copyright © 2015 Académie des sciences. Published by Elsevier SAS. All rights reserved.

  3. Characterizing the psychophysiological signature of boredom.

    Science.gov (United States)

    Merrifield, Colleen; Danckert, James

    2014-02-01

    Research on the experience and expression of boredom is underdeveloped. The purpose of the present study was to explore the psychophysiological signature of the subjective experience of boredom. Healthy undergraduates (n = 72) viewed previously validated and standardized video clips to induce boredom, sadness, and a neutral affective state, while their heart rate (HR), skin conductance levels (SCL), and cortisol levels were measured. Boredom yielded dynamic psychophysiological responses that differed from the other emotional states. Of particular interest, the physiological signature of boredom relative to sadness was characterized by rising HR, decreased SCL, and increased cortisol levels. This pattern of results suggests that boredom may be associated with both increased arousal and difficulties with sustained attention. These findings may help to resolve divergent conceptualizations of boredom in the extant literature and, ultimately, to enhance our understanding and treatment of clinical syndromes in which self-reported boredom is a prominent symptom.

  4. RSS應用於數位化圖書館專題選粹服務之研究 RSS Applied to Selective Dissemination Service of Library

    Directory of Open Access Journals (Sweden)

    Ming-Jiu Hwang

    2007-03-01

    Full Text Available 本文利用近年來新興的資訊推播工具—RSS(Really Simple Syndication)技術,建置一個訂閱專題選粹服務的新平台—MJFB(My Journal Filter Broker)。MJFB系統採MyLibrary的設計理念,利用個人化的技術與方法,依讀者個人背景與特性,精確定義期刊訂閱的需求,並過濾與整理搜尋到的期刊文章;不但減少讀者接收不必要的新資訊,且僅須透過瀏覽器即可在同一頁面閱覽到所訂定的期刊及���章內容。研究結果顯示,利用RSS傳遞新資訊可以避免現行電子郵件的問題;同時,靈活運用XML tag的彈性和OPML檔案規格,在訂閱和閱覽新資訊時可以更加便利,符合個人需求,很適合在數位化圖書館導入此項新的專題選粹服務。This paper proposed a new web system—MJFB for SDI service between electronic journal databases and patrons which used RSS technology as an information dissemination pushing approach. MJFB system adopts the concepts of “MyLibrary” and “Personalization” to be developed, and patrons can precisely subscribe their own electronic journals and articles based on backgrounds and features. Lastly, MJFB system filters articles searched by keywords to eliminate unnecessary information. Also, those subscribed new information can be viewed on the same web page as MJFB system without using other application. The result of this research shows that RSS as an information delivering tool can avoid those problems occurring in e-mail. Meanwhile, using the flexibility of XML and OPML file can subscribe and browse new information much more conveniently and conforms to personal needs. In conclusion, MJFB can be a new aspect of SDI in digital library.

  5. Limits and signatures of relativistic spaceflight

    Science.gov (United States)

    Yurtsever, Ulvi; Wilkinson, Steven

    2018-01-01

    While special relativity imposes an absolute speed limit at the speed of light, our Universe is not empty Minkowski spacetime. The constituents that fill the interstellar/intergalactic vacuum, including the cosmic microwave background photons, impose a lower speed limit on any object travelling at relativistic velocities. Scattering of cosmic microwave photons from an ultra-relativistic object may create radiation with a characteristic signature allowing the detection of such objects at large distances.

  6. Constraining blazar physics with polarization signatures

    Science.gov (United States)

    Zhang, Haocheng; Boettcher, Markus; Li, Hui

    2016-01-01

    Blazars are active galactic nuclei whose jets are directed very close to our line of sight. They emit nonthermal-dominated emission from radio to gamma-rays, with the radio to optical emissions known to be polarized. Both radiation and polarization signatures can be strongly variable. Observations have shown that sometimes strong multiwavelength flares are accompanied by drastic polarization variations, indicating active participation of the magnetic field during flares. We have developed a 3D multi-zone time-dependent polarization-dependent radiation transfer code, which enables us to study the spectral and polarization signatures of blazar flares simultaneously. By combining this code with a Fokker-Planck nonthermal particle evolution scheme, we are able to derive simultaneous fits to time-dependent spectra, multiwavelength light curves, and time-dependent optical polarization signatures of a well-known multiwavelength flare with 180 degree polarization angle swing of the blazar 3C279. Our work shows that with detailed consideration of light travel time effects, the apparently symmetric time-dependent radiation and polarization signatures can be naturally explained by a straight, helically symmetric jet pervaded by a helical magnetic field, without the need of any asymmetric structures. Also our model suggests that the excess in the nonthermal particles during flares can originate from magnetic reconnection events, initiated by a shock propagating through the emission region. Additionally, the magnetic field should generally revert to its initial topology after the flare. We conclude that such shock-initiated magnetic reconnection event in an emission environment with relatively strong magnetic energy can be the driver of multiwavelength flares with polarization angle swings. Future statistics on such observations will constrain general features of such events, while magneto-hydrodynamic simulations will provide physical scenarios for the magnetic field evolution

  7. Digital gene expression signatures for maize development.

    Science.gov (United States)

    Eveland, Andrea L; Satoh-Nagasawa, Namiko; Goldshmidt, Alexander; Meyer, Sandra; Beatty, Mary; Sakai, Hajime; Ware, Doreen; Jackson, David

    2010-11-01

    Genome-wide expression signatures detect specific perturbations in developmental programs and contribute to functional resolution of key regulatory networks. In maize (Zea mays) inflorescences, mutations in the RAMOSA (RA) genes affect the determinacy of axillary meristems and thus alter branching patterns, an important agronomic trait. In this work, we developed and tested a framework for analysis of tag-based, digital gene expression profiles using Illumina's high-throughput sequencing technology and the newly assembled B73 maize reference genome. We also used a mutation in the RA3 gene to identify putative expression signatures specific to stem cell fate in axillary meristem determinacy. The RA3 gene encodes a trehalose-6-phosphate phosphatase and may act at the interface between developmental and metabolic processes. Deep sequencing of digital gene expression libraries, representing three biological replicate ear samples from wild-type and ra3 plants, generated 27 million 20- to 21-nucleotide reads with frequencies spanning 4 orders of magnitude. Unique sequence tags were anchored to 3'-ends of individual transcripts by DpnII and NlaIII digests, which were multiplexed during sequencing. We mapped 86% of nonredundant signature tags to the maize genome, which associated with 37,117 gene models and unannotated regions of expression. In total, 66% of genes were detected by at least nine reads in immature maize ears. We used comparative genomics to leverage existing information from Arabidopsis (Arabidopsis thaliana) and rice (Oryza sativa) in functional analyses of differentially expressed maize genes. Results from this study provide a basis for the analysis of short-read expression data in maize and resolved specific expression signatures that will help define mechanisms of action for the RA3 gene.

  8. Selection signatures in Canchim beef cattle

    OpenAIRE

    URBINATI, I.; STAFUZZA, N. B.; OLIVEIRA, M. T.; CHUD, T. C. S.; HIGA, R. H.; L.C.A. Regitano; M.M. Alencar; Buzanskas, M. E. [UNESP; MUNARI, D. P.

    2016-01-01

    Background Recent technological advances in genomics have allowed the genotyping of cattle through single nucleotide polymorphism (SNP) panels. High-density SNP panels possess greater genome coverage and are useful for the identification of conserved regions of the genome due to selection, known as selection signatures (SS). The SS are detectable by different methods, such as the extended haplotype homozygosity (EHH); and the integrated haplotype score (iHS), which is derived from the EHH. Th...

  9. Identity-Based Verifiably Encrypted Signatures without Random Oracles

    Science.gov (United States)

    Zhang, Lei; Wu, Qianhong; Qin, Bo

    Fair exchange protocol plays an important role in electronic commerce in the case of exchanging digital contracts. Verifiably encrypted signatures provide an optimistic solution to these scenarios with an off-line trusted third party. In this paper, we propose an identity-based verifiably encrypted signature scheme. The scheme is non-interactive to generate verifiably encrypted signatures and the resulting encrypted signature consists of only four group elements. Based on the computational Diffie-Hellman assumption, our scheme is proven secure without using random oracles. To the best of our knowledge, this is the first identity-based verifiably encrypted signature scheme provably secure in the standard model.

  10. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  11. Hereditary family signature of facial expression.

    Science.gov (United States)

    Peleg, Gili; Katzir, Gadi; Peleg, Ofer; Kamara, Michal; Brodsky, Leonid; Hel-Or, Hagit; Keren, Daniel; Nevo, Eviatar

    2006-10-24

    Although facial expressions of emotion are universal, individual differences create a facial expression "signature" for each person; but, is there a unique family facial expression signature? Only a few family studies on the heredity of facial expressions have been performed, none of which compared the gestalt of movements in various emotional states; they compared only a few movements in one or two emotional states. No studies, to our knowledge, have compared movements of congenitally blind subjects with their relatives to our knowledge. Using two types of analyses, we show a correlation between movements of congenitally blind subjects with those of their relatives in think-concentrate, sadness, anger, disgust, joy, and surprise and provide evidence for a unique family facial expression signature. In the analysis "in-out family test," a particular movement was compared each time across subjects. Results show that the frequency of occurrence of a movement of a congenitally blind subject in his family is significantly higher than that outside of his family in think-concentrate, sadness, and anger. In the analysis "the classification test," in which congenitally blind subjects were classified to their families according to the gestalt of movements, results show 80% correct classification over the entire interview and 75% in anger. Analysis of the movements' frequencies in anger revealed a correlation between the movements' frequencies of congenitally blind individuals and those of their relatives. This study anticipates discovering genes that influence facial expressions, understanding their evolutionary significance, and elucidating repair mechanisms for syndromes lacking facial expression, such as autism.

  12. Measurement-device-independent quantum digital signatures

    Science.gov (United States)

    Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika

    2016-08-01

    Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.

  13. Online Signature Verification Using Fourier Descriptors

    Directory of Open Access Journals (Sweden)

    Berrin Yanikoglu

    2009-01-01

    Full Text Available We present a novel online signature verification system based on the Fast Fourier Transform. The advantage of using the Fourier domain is the ability to compactly represent an online signature using a fixed number of coefficients. The fixed-length representation leads to fast matching algorithms and is essential in certain applications. The challenge on the other hand is to find the right preprocessing steps and matching algorithm for this representation. We report on the effectiveness of the proposed method, along with the effects of individual preprocessing and normalization steps, based on comprehensive tests over two public signature databases. We also propose to use the pen-up duration information in identifying forgeries. The best results obtained on the SUSIG-Visual subcorpus and the MCYT-100 database are 6.2% and 12.1% error rate on skilled forgeries, respectively. The fusion of the proposed system with our state-of-the-art Dynamic Time Warping (DTW system lowers the error rate of the DTW system by up to about 25%. While the current error rates are higher than state-of-the-art results for these databases, as an approach using global features, the system possesses many advantages. Considering also the suggested improvements, the FFT system shows promise both as a stand-alone system and especially in combination with approaches that are based on local features.

  14. Signature stability in laser Doppler vibrometry

    Science.gov (United States)

    Iverson, Thomas Z.; Watson, Edward A.

    2017-05-01

    Speckle can complicate signal acquisition in coherent laser systems such as Laser Doppler Vibrometry (LDV). Variations in the speckle pattern at the reliever due to fluctuations in the system such as beam pointing can lead to impulsive events in the signature. The beam size at the object has a direct influence on the size of the speckle at the receiving aperture. Increasing the beam spot size reduces the average speckle size, but also decreases the strength of the signal coupled with the local oscillator in the LDV. In this paper, we derive the relationship between scattering spot size at the object and average speckle size at the receiver. Theory is presented on how increasing the beam diameter at the object can reduce the fluctuations of the heterodyned signal coupled with the Local Oscillator (LO). The Antenna theorem is presented to show the tradeoff between angular field of view and capture area. We show experimental results on the effects of speckle size and decreasing signal strength have on the stability of an LDV signature. We use a kurtosis metric previously reported in the literature to assess the stability and quality of the return signature.

  15. On psychoanalytic supervision as signature pedagogy.

    Science.gov (United States)

    Watkins, C Edward

    2014-04-01

    What is signature pedagogy in psychoanalytic education? This paper examines that question, considering why psychoanalytic supervision best deserves that designation. In focusing on supervision as signature pedagogy, I accentuate its role in building psychoanalytic habits of mind, habits of hand, and habits of heart, and transforming theory and self-knowledge into practical product. Other facets of supervision as signature pedagogy addressed in this paper include its features of engagement, uncertainty, formation, and pervasiveness, as well as levels of surface, deep, and implicit structure. Epistemological, ontological, and axiological in nature, psychoanalytic supervision engages trainees in learning to do, think, and value what psychoanalytic practitioners in the field do, think, and value: It is, most fundamentally, professional preparation for competent, "good work." In this paper, effort is made to shine a light on and celebrate the pivotal role of supervision in "making" or developing budding psychoanalysts and psychoanalytic psychotherapists. Now over a century old, psychoanalytic supervision remains unparalleled in (1) connecting and integrating conceptualization and practice, (2) transforming psychoanalytic theory and self-knowledge into an informed analyzing instrument, and (3) teaching, transmitting, and perpetuating the traditions, practice, and culture of psychoanalytic treatment.

  16. SIGNATURES OF LONG-LIVED SPIRAL PATTERNS

    Energy Technology Data Exchange (ETDEWEB)

    Martinez-Garcia, Eric E. [Instituto Nacional de Astrofisica, Optica y Electronica (INAOE), Aptdo. Postal 51 y 216, 72000 Puebla, Pue. (Mexico); Gonzalez-Lopezlira, Rosa A., E-mail: ericmartinez@inaoep.mx, E-mail: martinez@astro.unam.mx, E-mail: r.gonzalez@crya.unam.mx [Centro de Radioastronomia y Astrofisica, UNAM, Campus Morelia, Michoacan, C.P. 58089 (Mexico)

    2013-03-10

    Azimuthal age/color gradients across spiral arms are a signature of long-lived spirals. From a sample of 19 normal (or weakly barred) spirals where we have previously found azimuthal age/color gradient candidates, 13 objects were further selected if a two-armed grand-design pattern survived in a surface density stellar mass map. Mass maps were obtained from optical and near-infrared imaging, by comparison with a Monte Carlo library of stellar population synthesis models that allowed us to obtain the mass-to-light ratio in the J band, (M/L){sub J}, as a function of (g - i) versus (i - J) color. The selected spirals were analyzed with Fourier methods in search of other signatures of long-lived modes related to the gradients, such as the gradient divergence toward corotation, and the behavior of the phase angle of the two-armed spiral in different wavebands, as expected from theory. The results show additional signatures of long-lived spirals in at least 50% of the objects.

  17. Comparing Face Detection and Recognition Techniques

    OpenAIRE

    Korra, Jyothi

    2016-01-01

    This paper implements and compares different techniques for face detection and recognition. One is find where the face is located in the images that is face detection and second is face recognition that is identifying the person. We study three techniques in this paper: Face detection using self organizing map (SOM), Face recognition by projection and nearest neighbor and Face recognition using SVM.

  18. Robotic single-site hysterectomy (RSS-H) vs. laparoendoscopic single-site hysterectomy (LESS-H) in early endometrial cancer: a double-institution case-control study.

    Science.gov (United States)

    Fagotti, A; Corrado, G; Fanfani, F; Mancini, M; Paglia, A; Vizzielli, G; Sindico, S; Scambia, G; Vizza, E

    2013-07-01

    To report our experience with single-site robotic platform for IS3000 "Da Vinci" Si Surgical System to perform robotic single site hysterectomy (RSS-H), and to compare peri-operative results with a historical series of laparoendoscopic single site hysterectomies (LESS-H). This is a retrospective case-control study, performed at the Gynecologic Oncologic Unit, National Cancer Institute "Regina Elena", Rome, and at the Gynecologic Oncologic Unit, Catholic University of the Sacred Heart, Rome, Italy between December 2011 and January 2013. 19 women underwent RSS-H (cases) and 38 patients were submitted to LESS-H (controls) for early endometrial cancer. Pre-surgical procedures (port placement and docking) required a median time of 8 min in the RSS-H group and a median time of 2 min in the LESS-H group (p=0.0001). The median estimated blood loss was 75 ml in the cases and 30 ml in the controls (p=0.005). The median operative time, calculated from the beginning of intraperitoneal procedures to the skin closure, was 90 min in the cases and 107 ml in the controls (p=ns). The median time to discharge from the hospital was postoperative day two for both techniques. The few differences we registered do not seem clinically relevant, thus making the two procedures comparable. Copyright © 2013 Elsevier Inc. All rights reserved.

  19. A comparative neuropsychological test battery differentiates cognitive signatures of Fragile X and Down syndrome.

    Science.gov (United States)

    Kogan, C S; Boutet, I; Cornish, K; Graham, G E; Berry-Kravis, E; Drouin, A; Milgram, N W

    2009-02-01

    Standardised neuropsychological and cognitive measures present some limitations in their applicability and generalisability to individuals with intellectual disability (ID). Alternative approaches to defining the cognitive signatures of various forms of ID are needed to advance our understanding of the profiles of strengths and weaknesses as well as the affected brain areas. To evaluate the utility and feasibility of six non-verbal comparative neuropsychological (CN) tasks administered in a modified version of the Wisconsin General Test Apparatus (WGTA) to confirm and extend our knowledge of unique cognitive signatures of Fragile X syndrome (FXS) and Down syndrome (DS). A test battery of CN tasks adapted from the animal literature was administered in a modified WGTA. Tasks were selected that have established or emerging brain-behaviour relationships in the domains of visual-perceptual, visual-spatial, working memory and inhibition. Despite the fact that these tasks revealed cognitive signatures for the two ID groups, only some hypotheses were supported. Results suggest that whereas individuals with DS were relatively impaired on visual-perceptual and visual-spatial reversal learning tasks they showed strengths in egocentric spatial learning and object discrimination tasks. Individuals with FXS were relatively impaired on object discrimination learning and reversal tasks, which was attributable to side preferences. In contrast, these same individuals exhibited strengths in egocentric spatial learning and reversal tasks as well as on an object recognition memory task. Both ID groups demonstrated relatively poor performance for a visual-spatial working memory task. Performance on the modified WGTA tasks differentiated cognitive signatures between two of the most common forms of ID. Results are discussed in the context of the literature on the cognitive and neurobiological features of FXS and DS.

  20. Distribution-based dimensionality reduction applied to articulated motion recognition.

    Science.gov (United States)

    Nayak, Sunita; Sarkar, Sudeep; Loeding, Barbara

    2009-05-01

    Some articulated motion representations rely on frame-wise abstractions of the statistical distribution of low-level features such as orientation, color, or relational distributions. As configuration among parts changes with articulated motion, the distribution changes, tracing a trajectory in the latent space of distributions, which we call the configuration space. These trajectories can then be used for recognition using standard techniques such as dynamic time warping. The core theory in this paper concerns embedding the frame-wise distributions, which can be looked upon as probability functions, into a low-dimensional space so that we can estimate various meaningful probabilistic distances such as the Chernoff, Bhattacharya, Matusita, Kullback-Leibler (KL) or symmetric-KL distances based on dot products between points in this space. Apart from computational advantages, this representation also affords speed-normalized matching of motion signatures. Speed normalized representations can be formed by interpolating the configuration trajectories along their arc lengths, without using any knowledge of the temporal scale variations between the sequences. We experiment with five different probabilistic distance measures and show the usefulness of the representation in three different contexts-sign recognition (with large number of possible classes), gesture recognition (with person variations), and classification of human-human interaction sequences (with segmentation problems). We find the importance of using the right distance measure for each situation. The low-dimensional embedding makes matching two to three times faster, while achieving recognition accuracies that are close to those obtained without using a low-dimensional embedding. We also empirically establish the robustness of the representation with respect to low-level parameters, embedding parameters, and temporal-scale parameters.