311 research outputs found

    A PERTURBATION­BASED APPROACH FOR MULTI­CLASSIFIER SYSTEM DESIGN

    Get PDF
    Microsoft, Motorola, Siemens, Hitachi, IAPR, NICI, IUF This paper presents a perturbation­based approach useful to select the best combination method for a multi­classifier system. The basic idea is to simulate small variations in the performance of the set of classifiers and to evaluate to what extent they influence the performance of the combined classifier. In the experimental phase, the Behavioural Knowledge Space and the Dempster­Shafer combination methods have been considered. The experimental results, carried out in the field of hand­written numeral recognition, demonstrate the effectiveness of the new approach

    ZONING DESIGN FOR HAND­WRITTEN NUMERAL RECOGNITION

    Get PDF
    Microsoft, Motorola, Siemens, Hitachi, IAPR, NICI, IUF In the field of Optical Character Recognition (OCR), zoning is used to extract topological information from patterns. In this paper zoning is considered as the result of an optimisation problem and a new technique is presented for automatic zoning. More precisely, local analysis of feature distribution based on Shannon's entropy estimation is performed to determine "core" zones of patterns. An iterative region­growing procedure is applied on the "core" zones to determine the final zoning

    One Time User Key: a user-based secret sharing XOR-ed model for multiple user cryptography in distributed systems

    Get PDF
    The generation of encrypted channels between more than two users is complex, as it is necessary to share information about the key of each user. This problem has been partially solved through the secret sharing mechanism that makes it possible to divide a secret among several participants, so that the secret can be reconstructed by a well-defined part of them. The proposed system represents an extension of this mechanism, since it is designed to be applied systematically: each user has his/her key, through which temporary keys (One Time User Keys) are generated and are used to divide the secret, corresponding to the real encryption key. The system also overcomes the concept of numerical threshold (i.e., at least n participants are required to reconstruct the secret), allowing the definition, for each encryption, of which users can access and which specific groups of users can access. The proposed model can be applied both in distributed user-based contexts and as an extension of cryptographic functions, without impacting the overall security of the system. It addresses some requirements of the European Union Council resolution on encryption and also provides a wide possibility of applications in user-based distributed systems

    Glutamine-Derived Aspartate Biosynthesis in Cancer Cells: Role of Mitochondrial Transporters and New Therapeutic Perspectives

    Get PDF
    Aspartate has a central role in cancer cell metabolism. Aspartate cytosolic availability is crucial for protein and nucleotide biosynthesis as well as for redox homeostasis. Since tumor cells display poor aspartate uptake from the external environment, most of the cellular pool of aspar-tate derives from mitochondrial catabolism of glutamine. At least four transporters are involved in this metabolic pathway: the glutamine (SLC1A5_var), the aspartate/glutamate (AGC), the as-partate/phosphate (uncoupling protein 2, UCP2), and the glutamate (GC) carriers, the last three belonging to the mitochondrial carrier family (MCF). The loss of one of these transporters causes a paucity of cytosolic aspartate and an arrest of cell proliferation in many different cancer types. The aim of this review is to clarify why different cancers have varying dependencies on metabolite transporters to support cytosolic glutamine-derived aspartate availability. Dissecting the precise metabolic routes that glutamine undergoes in specific tumor types is of upmost importance as it promises to unveil the best metabolic target for therapeutic intervention
    • …
    corecore