Search results for "Identification"
showing 10 items of 1600 documents
An Approach for the Evaluation of Risk Impact of Changes Addressing Uncertainties in a Surveillance Requirement Optimization Context
2014
This paper presents an approach for the evaluation of risk impact of Surveillance Requirement changes addressing identification, treatment and analysis of uncertainties in an integrated manner, which is intended to be used in an optimization context. It is also presented an example of application of the methodology to study a SF change of the Reactor Protection System of a Nuclear Power Plant.
Découverte des relations dans les réseaux sociaux
2011
In recent years, social network sites exploded in popularity and become an important part of the online activities on the web. This success is related to the various services/functionalities provided by each site (ranging from media sharing, tagging, blogging, and mainly to online social networking) pushing users to subscribe to several sites and consequently to create several social networks for different purposes and contexts (professional, private, etc.). Nevertheless, current tools and sites provide limited functionalities to organize and identify relationship types within and across social networks which is required in several scenarios such as enforcing users’ privacy, and enhancing t…
Dissemination of wine-related yeasts by migratory birds.
2013
The present work was undertaken to evaluate the contribution of migratory birds in the environmental dissemination of yeasts. Four sites (Mazara del Vallo, Lampedusa, Ustica and Linosa), representing the main stop-over points in Sicily, were analysed during spring and autumnal bird migration and 349 birds (belonging to 10 families) were ringed and analysed for yeast presence. A total of 125 yeasts were isolated and identified by a multiple genotypic approach, consisting of restriction fragment length polymorphism (RFLP) of 5.8S rRNA gene and 26S rRNA and sequencing of D1/D2 domain of the 26S rRNA gene, which resulted in the recognition of 18 species, including the technological relevant Sac…
Sintētisko kanabinoīdu un katinonu identifikācijas iespējas
2016
Vēl aizvien nelegālajā apritē parādās jaunas psihoaktīvās vielas, kuru identificēšanas iespējas ir apgrūtinātas un maz pētītas. Jaunās psihoaktīvās vielas ir potenciāls sabiedrības veselības drauds. Populārākās ir sintētiskie kanabinoīdi un sintētiskie katinoni. To iedarbība uz cilvēka organismu ir maz pētīta un neparedzama. Lai pētītu to iedarbību uz cilvēka organismu, ir nepieciešamas efektīvas un visaptverošas pētniecības metodes. Darba ir apkopoti dati par Latvijā biežāk sastopamajām jaunajām psihoaktīvajām vielām, kā arī apkopoti un analizēti dati par šo vielu noteikšanas metodēm, kā pielietojamāko metodi nosakot jauno psihoaktīvo vielu noteikšanu, var uzskatīt GH-MS/MS metodi. Atslēgv…
Morphological Enhancement and Triangular Matching for Fingerprint Recognition
2008
Among the principal problems for realizing a robust Automated Fingerprint Identification System (AFIS) there are the images quality and matching algorithms. In this paper a fingerprint enhancement algorithm based on morphological filter and a triangular matching are introduced. The enhancement phase is based on tree steps: directional decomposition, morphological filter and composition. For the matching phase a global transformation to overcame the effects of rotation, displacement and deformation between acquired and stored fingerprint is performed using the number of similar triangular, having fingerprint minutiae as vertexes. The performance of the proposed approach has been evaluated on…
Simulation of parallel mechanisms for motion cueing generation in vehicle simulators using AM-FM bi-modulated signals
2018
Abstract The use of robotic motion platforms in vehicle simulators is relatively common. However, the process of testing and tuning the so-called washout algorithms, used for motion cueing generation in motion-based vehicle simulators, is complex. This process can be reduced in cost, simplified, improved, shortened and performed safer if virtual motion platforms are used instead of real devices. This paper deals with identifying a method to perform a fast but reliable simulation of parallel mechanisms to be used for motion cueing generation. The method relies on the use of Laplacian polynomial transfer function models by means of using AM-FM bi-modulated signals as reference inputs to achie…
Combining hashing and enciphering algorithms for epidemiological analysis of gathered data.
2008
Summary Objectives: Compiling individual records coming from different sources is necessary for multi-center studies. Legal aspects can be satisfied by implementing anonymization procedures. When using these procedures with a different key for each study it becomes almost impossible to link records from separate data collections. Methods: The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient’s identity. Results: The combination of hashing and enciphering techniques provides a great improvement in the overall security of the proposed scheme…
Developing a Tool Point Control Scheme for a Hydraulic Crane Using Interactive Real-time Dynamic Simulation
2010
This paper describes the implementation of an interactive real-time dynamic simulation model of a hydraulic crane. The user input to the model is given continuously via joystick and output is presented continuously in a 3D animation. Using this simulation model, a tool point control scheme is developed for the specific crane, considering the saturation phenomena of the system and practical implementation. This paper describes the implementation of an interactive real-time dynamic simulation model of a hydraulic crane. The user input to the model is given continuously via joystick and output is presented continuously in a 3D animation. Using this simulation model, a tool point control scheme…
Stretching the limits in help-seeking research: Theoretical, methodological, and technological advances
2011
Abstract This special section focuses on help seeking in a wide range of learning environments, from classrooms to online forums. Previous research has rather restrictively focused on the identification of personal characteristics that predict whether or not learners seek help under certain conditions. However, help-seeking research has begun to broaden these self-imposed limitations. The articles in this special section represent good examples of this development. Indeed, help seeking in the presented articles is explored through complementary theoretical lenses (e.g., linguistic, instructional), using a wide scope of methodologies (e.g., teacher reports, log files), and in a manner which …
The use of sonification for physiotherapy in human movement tasks: A scoping review
2020
Objectives: This review aims to: (1) map the use of sonification in human movement tasks for physical therapy; (2) identify methods of data capture, tasks and its effects on human subjects; (3) suggest future research directions. News: Sonification can be described as a technique to translate data into sound. It has been used for human motion analysis tasks even if it is not part of most physical therapist's lexicon. Prospects and projects: Identify and analyze publications where sonification was used as an audio-feedback technique for physical therapy. Thirty-five papers were included, 13 randomized-control-trials. Thirteen papers reported an investigation on a specific dysfunction, while …