This paper presents a pioneering approach for weld bead detection in radiographic images obtained by the Double Wall Double Image (DWDI) technique. Such task constitutes an essential step for several high level proces...
详细信息
ISBN:
(纸本)9781467315104
This paper presents a pioneering approach for weld bead detection in radiographic images obtained by the Double Wall Double Image (DWDI) technique. Such task constitutes an essential step for several high level processes, such as fully automatic flaw identification on welded joints. Sets of sample pixels, corresponding to candidate solutions provided by a genetic algorithm (GA), are compared to pre-defined synthetic weld bead and pipe models in an image matching procedure. The fitness of each set (individual) is evaluated based on a linear combination of its genotype (evaluated by a heuristic function) and phenotype. The evolutionary process automatically selects the best individual in the population and, thus, provides information such as position, orientation and dimension of the detected object. The proposed approach successfully detects pipes and weld beads in radiographic images of different complexities, encouraging future works.
The localization of sound sources, and particularly speech, has a numerous number of applications to the industry. This has motivated a continuous effort in developing robust direction-of-arrival detection algorithms....
详细信息
ISBN:
(纸本)9781622761180
The localization of sound sources, and particularly speech, has a numerous number of applications to the industry. This has motivated a continuous effort in developing robust direction-of-arrival detection algorithms. Time difference of arrival-based methods, and particularly, generalized cross-correlation approaches have been widely investigated in acoustic signal processing. Once a probability function is obtained, indicating those directions of arrival with highest probability, the vast majority of methods have to assume a certain number of sound sources in order to process the information conveniently. In this paper, a model selection based on a Bayesian framework is proposed in order to determine, in an unsupervised way, how many sound sources are estimated together with the parameters estimation. Real measurements using two microphones are used to corroborate the proposed model.
In this work, we present the use of Shannon and Simpson Diversity Indices as texture descriptors for lung nodules in computerized Tomography (CT) images. These indices will be proposed to characterize the nodules into...
详细信息
In this study, we focused on the interoperability and authentication of medical devices in the context of telemedical systems. A recent standard called the ISO/IEEE 11073 Personal Health Device (X73-PHD) Standards add...
详细信息
ISBN:
(纸本)9781424441198
In this study, we focused on the interoperability and authentication of medical devices in the context of telemedical systems. A recent standard called the ISO/IEEE 11073 Personal Health Device (X73-PHD) Standards addresses the device interoperability problem by defining common protocols for agent (medical device) and manager (appliance) interface. The X73-PHD standard however has not addressed security and authentication of medical devices which is important in establishing integrity of a telemedical system. We have designed and implemented a security policy within the X73-PHD standards. The policy will enable device authentication using Asymmetric-Key Cryptography and the RSA algorithm as the digital signature scheme. We used two approaches for performing the digital signatures: direct software implementation and use of embedded security modules (ESM). The two approaches were evaluated and compared in terms of execution time and memory requirement. For the standard 2048-bit RSA, ESM calculates digital signatures only 12% of the total time for the direct implementation. Moreover, analysis shows that ESM offers more security advantage such as secure storage of keys compared to using direct implementation. Interoperability with other systems was verified by testing the system with LNI Healthlink, a manager software that implements the X73-PHD standard. Lastly, security analysis was done and the system's response to common attacks on authentication systems was analyzed and several measures were implemented to protect the system against them.
In this paper, we present a methodology, called Homology Graph Mining, for computer-aided extraction of Social Network rules from consolidated homology graphs of statements. First, we will generate homology sources of...
详细信息
This paper presents a new code compression method where we use different dictionaries, all of them are based in traditional Huffman algorithm. Our method reduces code size by up to 34.5% (including all extra costs) an...
详细信息
This paper presents a new code compression method where we use different dictionaries, all of them are based in traditional Huffman algorithm. Our method reduces code size by up to 34.5% (including all extra costs) and presents an improvement of almost 7% over the traditional Huffman method. We performed simulations using Simple Scalar and analyzes using the applications from benchmark MiBench and use the embedded processor ARM.
This paper proposes a multiobjective heuristic search approach to support a project portfolio selection technique on scenarios with a large number of candidate projects. The original formulation for the technique requ...
详细信息
ISBN:
(纸本)9781450311786
This paper proposes a multiobjective heuristic search approach to support a project portfolio selection technique on scenarios with a large number of candidate projects. The original formulation for the technique requires analyzing all combinations of candidate projects, which is unfeasible when more than a few alternatives are available. We have used a multiobjective genetic algorithm to partially explore the search space of project combinations and select the most effective ones. We present an experimental study based on four project selection problems that compares the results found by the genetic algorithm to those yielded by a non-systematic search procedure. Results show evidence that the project selection technique can be used in large-scale scenarios and that GA presents better results than simpler search strategy. Copyright is held by the author/owner(s).
The research proposes monitoring network traffic to preventing malicious attacks. It uses statistical theory and fuzzy control architecture to create a single transmission behavior. It will establish a normal transmis...
详细信息
The research proposes monitoring network traffic to preventing malicious attacks. It uses statistical theory and fuzzy control architecture to create a single transmission behavior. It will establish a normal transmission behavior module in order to achieve network monitoring and an alert mechanism. The mechanism tries to improve the abnormal behavior detection rate. The study is divided into three parts. The first part uses tools to simulate detection and aggressive behavior. According to many defensive measure reports, we will build a detection mechanism. The third part uses statistical theory and fuzzy control to monitor each network flow. The mechanism will preprocess denial of service attacks for an intrusion detection system.
In recent Inuit ethnography, a major concern has been how and to what extent contemporary Inuit participate in and depend on subsistence activities, particularly in the context of increasing wage employment and growin...
In recent Inuit ethnography, a major concern has been how and to what extent contemporary Inuit participate in and depend on subsistence activities, particularly in the context of increasing wage employment and growing participation in the cash economy. This paper provides an analysis of these activities in the predominately Inuit community of Nain, Labrador. Using social network data and demographic information collected between January and June 2010, we examine the interconnections between subsistence activities—obtaining “country food” through activities such as hunting, fishing, and collecting—with access to the means of obtaining subsistence resources (such as snow mobiles, cabins, and boats), employment status, and income. Our data indicate that individuals with higher employment status and income tend to be more central to the network of subsistence food sharing, but not because they have greater access to hunting tools or equipment (they do not). We conclude that those individuals who play the most central role in the network are those who are financially able to do so, regardless of access to hunting tools/means.
暂无评论