84,453 research outputs found

    Periodically Controlled Hybrid Systems: Verifying A Controller for An Autonomous Vehicle

    Get PDF
    This paper introduces Periodically Controlled Hybrid Automata (PCHA) for describing a class of hybrid control systems. In a PCHA, control actions occur roughly periodically while internal and input actions, may occur in the interim changing the discrete-state or the setpoint. Based on periodicity and subtangential conditions, a new sufficient condition for verifying invariance of PCHAs is presented. This technique is used in verifying safety of the planner-controller subsystem of an autonomous ground vehicle, and in deriving geometric properties of planner generated paths that can be followed safely by the controller under environmental uncertainties

    Development and validation of 'AutoRIF': Software for the automated analysis of radiation-induced foci

    Get PDF
    Copyright @ 2012 McVean et al; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.This article has been made available through the Brunel Open Access Publishing Fund.Background: The quantification of radiation-induced foci (RIF) to investigate the induction and subsequent repair of DNA double strands breaks is now commonplace. Over the last decade systems specific for the automatic quantification of RIF have been developed for this purpose, however to ask more mechanistic questions on the spatio-temporal aspects of RIF, an automated RIF analysis platform that also quantifies RIF size/volume and relative three-dimensional (3D) distribution of RIF within individual nuclei, is required. Results: A java-based image analysis system has been developed (AutoRIF) that quantifies the number, size/volume and relative nuclear locations of RIF within 3D nuclear volumes. Our approach identifies nuclei using the dynamic Otsu threshold and RIF by enhanced Laplacian filtering and maximum entropy thresholding steps and, has an application ‘batch optimisation’ process to ensure reproducible quantification of RIF. AutoRIF was validated by comparing output against manual quantification of the same 2D and 3D image stacks with results showing excellent concordance over a whole range of sample time points (and therefore range of total RIF/nucleus) after low-LET radiation exposure. Conclusions: This high-throughput automated RIF analysis system generates data with greater depth of information and reproducibility than that which can be achieved manually and may contribute toward the standardisation of RIF analysis. In particular, AutoRIF is a powerful tool for studying spatio-temporal relationships of RIF using a range of DNA damage response markers and can be run independently of other software, enabling most personal computers to perform image analysis. Future considerations for AutoRIF will likely include more complex algorithms that enable multiplex analysis for increasing combinations of cellular markers.This article is made available through the Brunel Open Access Publishing Fund

    Mid-femoral and mid-tibial muscle cross-sectional area as predictors of tibial bone strength in middle-aged and older men

    Full text link
    While it is widely acknowledged that bones adapt to the site-specific prevalent loading environment, reasonable ways to estimate skeletal loads are not necessarily available. For long bone shafts, muscles acting to bend the bone may provide a more appropriate surrogate of the loading than muscles expected to cause compressive loads. Thus, the aim of this study was to investigate whether mid-thigh muscle cross-sectional area (CSA) was a better predictor of tibial mid-shaft bone strength than mid-tibia muscle CSA in middle aged and older men. 181 Caucasian men aged 50–79 years (mean±SD; 61±7 years) participated in this study. Mid-femoral and mid-tibial bone traits cortical area , density weighted polar moment of area and muscle CSA [cm²] were assessed with computed tomography. Tibial bone traits were positively associated with both the mid-femur (r=0.44 to 0.46, P<0.001) and the mid-tibia muscle CSA (r=0.35 to 0.37, P<0.001). Multivariate regression analysis, adjusting for age, weight, physical activity and femoral length, indicated that mid-femur muscle CSA predicted tibial mid-shaft bone strength indices better thn mid-tibia muscle CSA. In conclusion, the association between a given skeletal site and functionally adjacent muscles may provide a meaningful probe of the site-specific effect of loading on bone

    Observational study of the effects of age, diabetes mellitus, cirrhosis and chronic kidney disease on sublingual microvascular flow.

    Get PDF
    BACKGROUND: Sidestream dark field (SDF) imaging has been used to demonstrate microcirculatory abnormalities in a variety of critical illnesses. The microcirculation is also affected by advancing age and chronic comorbidities. However, the effect of these conditions on SDF microcirculatory parameters has not been well described. METHODS: SDF images were obtained from five groups of 20 participants: healthy volunteers under the age of 25, healthy volunteers over the age of 55, and clinic patients over the age of 55 with one of diabetes mellitus, cirrhosis and stage 5 chronic kidney disease. Microcirculatory parameters between the groups were then compared for significance using analysis of variance for parametric and the Kruskal-Wallis test for non-parametric data. RESULTS: Median microvascular flow index was 2.85 (interquartile range 2.75 to 3.0) for participants aged 55, 2.88 (2.75 to 3.0) for those with diabetes mellitus, 3.0 (2.83 to 3.0) for those with cirrhosis and 3.0 (2.78 to 3.0) for those with chronic kidney disease (P for difference between groups = 0.14). Similarly, there were no significant differences in the proportion of perfused vessels and perfused vessel density between the groups. CONCLUSIONS: Older age, diabetes, and chronic kidney and liver disease need not be considered confounding factors for comparison of SDF microcirculatory parameters in the critically ill

    Adding New Tasks to a Single Network with Weight Transformations using Binary Masks

    Full text link
    Visual recognition algorithms are required today to exhibit adaptive abilities. Given a deep model trained on a specific, given task, it would be highly desirable to be able to adapt incrementally to new tasks, preserving scalability as the number of new tasks increases, while at the same time avoiding catastrophic forgetting issues. Recent work has shown that masking the internal weights of a given original conv-net through learned binary variables is a promising strategy. We build upon this intuition and take into account more elaborated affine transformations of the convolutional weights that include learned binary masks. We show that with our generalization it is possible to achieve significantly higher levels of adaptation to new tasks, enabling the approach to compete with fine tuning strategies by requiring slightly more than 1 bit per network parameter per additional task. Experiments on two popular benchmarks showcase the power of our approach, that achieves the new state of the art on the Visual Decathlon Challenge

    Stellar Dynamics and Black Holes

    Full text link
    Chandrasekhar's most important contribution to stellar dynamics was the concept of dynamical friction. I briefly review that work, then discuss some implications of Chandrasekhar's theory of gravitational encounters for motion in galactic nuclei.Comment: Talk presented at the "Chandrasekhar Centenary Conference" (2010

    Cybersecurity awareness platform with virtual coach and automated challenge assessment

    Get PDF
    Over the last years, the number of cyber-attacks on industrial control systems has been steadily increasing. Among several factors, proper software development plays a vital role in keeping these systems secure. To achieve secure software, developers need to be aware of secure coding guidelines and secure coding best practices. This work presents a platform geared towards software developers in the industry that aims to increase awareness of secure software development. The authors also introduce an interactive game component, a virtual coach, which implements a simple artificial intelligence engine based on the laddering technique for interviews. Through a survey, a preliminary evaluation of the implemented artifact with real-world players (from academia and industry) shows a positive acceptance of the developed platform. Furthermore, the players agree that the platform is adequate for training their secure coding skills. The impact of our work is to introduce a new automatic challenge evaluation method together with a virtual coach to improve existing cybersecurity awareness training programs. These training workshops can be easily held remotely or off-line.info:eu-repo/semantics/acceptedVersio

    Cybersecurity Awareness Platform with Virtual Coach and Automated Challenge Assessment

    Get PDF
    Over the last years, the number of cyber-attacks on industrial control systems has been steadily increasing. Among several factors, proper software development plays a vital role in keeping these systems secure. To achieve secure software, developers need to be aware of secure coding guidelines and secure coding best practices. This work presents a platform geared towards software developers in the industry that aims to increase awareness of secure software development. The authors also introduce an interactive game component, a virtual coach, which implements a simple artificial intelligence engine based on the laddering technique for interviews. Through a survey, a preliminary evaluation of the implemented artifact with real-world players (from academia and industry) shows a positive acceptance of the developed platform. Furthermore, the players agree that the platform is adequate for training their secure coding skills. The impact of our work is to introduce a new automatic challenge evaluation method together with a virtual coach to improve existing cybersecurity awareness training programs. These training workshops can be easily held remotely or off-line.Comment: Preprint accepted for publication at the 6th Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2020

    Gravitational Chern-Simons Lagrangians and black hole entropy

    Get PDF
    We analyze the problem of defining the black hole entropy when Chern-Simons terms are present in the action. Extending previous works, we define a general procedure, valid in any odd dimensions both for purely gravitational CS terms and for mixed gauge-gravitational ones. The final formula is very similar to Wald's original formula valid for covariant actions, with a significant modification. Notwithstanding an apparent violation of covariance we argue that the entropy formula is indeed covariant.Comment: 39 page
    corecore