Search results for "Identification"

showing 10 items of 1600 documents

An Approach for the Evaluation of Risk Impact of Changes Addressing Uncertainties in a Surveillance Requirement Optimization Context

2014

This paper presents an approach for the evaluation of risk impact of Surveillance Requirement changes addressing identification, treatment and analysis of uncertainties in an integrated manner, which is intended to be used in an optimization context. It is also presented an example of application of the methodology to study a SF change of the Reactor Protection System of a Nuclear Power Plant.

Risk impactIdentification (information)Risk analysis (engineering)Computer sciencelawRisk informedNuclear power plantComputerApplications_COMPUTERSINOTHERSYSTEMSContext (language use)Reactor protection systemlaw.invention
researchProduct

Découverte des relations dans les réseaux sociaux

2011

In recent years, social network sites exploded in popularity and become an important part of the online activities on the web. This success is related to the various services/functionalities provided by each site (ranging from media sharing, tagging, blogging, and mainly to online social networking) pushing users to subscribe to several sites and consequently to create several social networks for different purposes and contexts (professional, private, etc.). Nevertheless, current tools and sites provide limited functionalities to organize and identify relationship types within and across social networks which is required in several scenarios such as enforcing users’ privacy, and enhancing t…

Rule-based relationship identificationCoreferent usersMetadataPhotos[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]Pas de mot clé en françaisClassificationLink miningSocial networks[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]Relationship discoveryLink type predictionEntity resolution[ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]CrowdsourcingUser profiles
researchProduct

Dissemination of wine-related yeasts by migratory birds.

2013

The present work was undertaken to evaluate the contribution of migratory birds in the environmental dissemination of yeasts. Four sites (Mazara del Vallo, Lampedusa, Ustica and Linosa), representing the main stop-over points in Sicily, were analysed during spring and autumnal bird migration and 349 birds (belonging to 10 families) were ringed and analysed for yeast presence. A total of 125 yeasts were isolated and identified by a multiple genotypic approach, consisting of restriction fragment length polymorphism (RFLP) of 5.8S rRNA gene and 26S rRNA and sequencing of D1/D2 domain of the 26S rRNA gene, which resulted in the recognition of 18 species, including the technological relevant Sac…

SACCHAROMYCES-CEREVISIAEFERMENTATIONIDENTIFICATIONSTRAIN CHARACTERIZATIONSURVIVALSettore BIO/05 - ZoologiaSACCHAROMYCES-CEREVISIAE; STRAIN CHARACTERIZATION; REGION; IDENTIFICATION; FERMENTATION; POPULATION; SONGBIRDS; EVOLUTION; SURVIVAL; HABITATHABITATPOPULATIONSONGBIRDSEVOLUTIONREGIONSettore AGR/16 - Microbiologia Agraria
researchProduct

Sintētisko kanabinoīdu un katinonu identifikācijas iespējas

2016

Vēl aizvien nelegālajā apritē parādās jaunas psihoaktīvās vielas, kuru identificēšanas iespējas ir apgrūtinātas un maz pētītas. Jaunās psihoaktīvās vielas ir potenciāls sabiedrības veselības drauds. Populārākās ir sintētiskie kanabinoīdi un sintētiskie katinoni. To iedarbība uz cilvēka organismu ir maz pētīta un neparedzama. Lai pētītu to iedarbību uz cilvēka organismu, ir nepieciešamas efektīvas un visaptverošas pētniecības metodes. Darba ir apkopoti dati par Latvijā biežāk sastopamajām jaunajām psihoaktīvajām vielām, kā arī apkopoti un analizēti dati par šo vielu noteikšanas metodēm, kā pielietojamāko metodi nosakot jauno psihoaktīvo vielu noteikšanu, var uzskatīt GH-MS/MS metodi. Atslēgv…

SYNTHETIC CANNABINOIDSIDENTIFICATION METHODSMS/MSFarmācijaCATHINONE
researchProduct

Morphological Enhancement and Triangular Matching for Fingerprint Recognition

2008

Among the principal problems for realizing a robust Automated Fingerprint Identification System (AFIS) there are the images quality and matching algorithms. In this paper a fingerprint enhancement algorithm based on morphological filter and a triangular matching are introduced. The enhancement phase is based on tree steps: directional decomposition, morphological filter and composition. For the matching phase a global transformation to overcame the effects of rotation, displacement and deformation between acquired and stored fingerprint is performed using the number of similar triangular, having fingerprint minutiae as vertexes. The performance of the proposed approach has been evaluated on…

ScannerMatching (graph theory)business.industryComputer scienceFingerprint (computing)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONFingerprint Verification CompetitionPattern recognitionFingerprint recognitionAutomated Fingerprint Identification System (AFIS)Tree (data structure)Computer Science::Computer Vision and Pattern RecognitionArtificial intelligenceAutomated fingerprint identificationbusinessRotation (mathematics)ComputingMethodologies_COMPUTERGRAPHICSComputer Science::Cryptography and Security
researchProduct

Simulation of parallel mechanisms for motion cueing generation in vehicle simulators using AM-FM bi-modulated signals

2018

Abstract The use of robotic motion platforms in vehicle simulators is relatively common. However, the process of testing and tuning the so-called washout algorithms, used for motion cueing generation in motion-based vehicle simulators, is complex. This process can be reduced in cost, simplified, improved, shortened and performed safer if virtual motion platforms are used instead of real devices. This paper deals with identifying a method to perform a fast but reliable simulation of parallel mechanisms to be used for motion cueing generation. The method relies on the use of Laplacian polynomial transfer function models by means of using AM-FM bi-modulated signals as reference inputs to achie…

Scheme (programming language)0209 industrial biotechnologyPolynomialComputer scienceMechanical EngineeringProcess (computing)Parallel manipulatorSystem identification02 engineering and technologyTransfer functionMotion (physics)Computer Science Applications020901 industrial engineering & automationControl and Systems Engineering0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingElectrical and Electronic EngineeringAM/FM/GIScomputerSimulationcomputer.programming_languageMechatronics
researchProduct

Combining hashing and enciphering algorithms for epidemiological analysis of gathered data.

2008

Summary Objectives: Compiling individual records coming from different sources is necessary for multi-center studies. Legal aspects can be satisfied by implementing anonymization procedures. When using these procedures with a different key for each study it becomes almost impossible to link records from separate data collections. Methods: The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient’s identity. Results: The combination of hashing and enciphering techniques provides a great improvement in the overall security of the proposed scheme…

Scheme (programming language)Computer sciencemedia_common.quotation_subjectHash functionHealth Informaticscomputer.software_genreEncryption01 natural sciencesField (computer science)Patient identificationPublic-key cryptography010104 statistics & probability03 medical and health sciences0302 clinical medicineHealth Information ManagementOriginality030212 general & internal medicine0101 mathematicscomputer.programming_languagemedia_commonAdvanced and Specialized Nursingbusiness.industryData CollectionEpidemiologic StudiesIdentity (object-oriented programming)Data miningbusinesscomputerAlgorithmsConfidentialityMethods of information in medicine
researchProduct

Developing a Tool Point Control Scheme for a Hydraulic Crane Using Interactive Real-time Dynamic Simulation

2010

This paper describes the implementation of an interactive real-time dynamic simulation model of a hydraulic crane. The user input to the model is given continuously via joystick and output is presented continuously in a 3D animation. Using this simulation model, a tool point control scheme is developed for the specific crane, considering the saturation phenomena of the system and practical implementation. This paper describes the implementation of an interactive real-time dynamic simulation model of a hydraulic crane. The user input to the model is given continuously via joystick and output is presented continuously in a 3D animation. Using this simulation model, a tool point control scheme…

Scheme (programming language)VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Engineeringhydraulic craneInteractive real-time dynamic simulationbusiness.industryControl (management)VDP::Technology: 500::Mechanical engineering: 570Control engineeringComputerApplications_COMPUTERSINOTHERSYSTEMSlcsh:QA75.5-76.95Computer Science ApplicationsDynamic simulationHydraulic craneTool point controlIdentification (information)Control and Systems EngineeringModeling and SimulationPoint (geometry)lcsh:Electronic computers. Computer sciencebusinesscomputerSoftwareSimulationcomputer.programming_language
researchProduct

Stretching the limits in help-seeking research: Theoretical, methodological, and technological advances

2011

Abstract This special section focuses on help seeking in a wide range of learning environments, from classrooms to online forums. Previous research has rather restrictively focused on the identification of personal characteristics that predict whether or not learners seek help under certain conditions. However, help-seeking research has begun to broaden these self-imposed limitations. The articles in this special section represent good examples of this development. Indeed, help seeking in the presented articles is explored through complementary theoretical lenses (e.g., linguistic, instructional), using a wide scope of methodologies (e.g., teacher reports, log files), and in a manner which …

Scope (project management)4. Education05 social sciences050301 educationCognitionHelp-seekingEducationIdentification (information)PedagogyDevelopmental and Educational PsychologySpecial section0501 psychology and cognitive sciencesEngineering ethicsTechnological advancePsychology0503 education050104 developmental & child psychologyLearning and Instruction
researchProduct

The use of sonification for physiotherapy in human movement tasks: A scoping review

2020

Objectives: This review aims to: (1) map the use of sonification in human movement tasks for physical therapy; (2) identify methods of data capture, tasks and its effects on human subjects; (3) suggest future research directions. News: Sonification can be described as a technique to translate data into sound. It has been used for human motion analysis tasks even if it is not part of most physical therapist's lexicon. Prospects and projects: Identify and analyze publications where sonification was used as an audio-feedback technique for physical therapy. Thirty-five papers were included, 13 randomized-control-trials. Thirteen papers reported an investigation on a specific dysfunction, while …

Scoping reviewmedicine.medical_specialtySonificationRehabilitationComputer scienceMovement (music)Movementmedicine.medical_treatmentAutomatic identification and data capturePsychological interventionMotor control030209 endocrinology & metabolism030229 sport sciencesPhysical therapy modalitie03 medical and health sciencesUnits of measurement0302 clinical medicineSonificationPhysical therapymedicineOrthopedics and Sports MedicineMotor learningPhysical therapyScience & Sports
researchProduct