2,187 research outputs found

    Fictitious Play with Time-Invariant Frequency Update for Network Security

    Full text link
    We study two-player security games which can be viewed as sequences of nonzero-sum matrix games played by an Attacker and a Defender. The evolution of the game is based on a stochastic fictitious play process, where players do not have access to each other's payoff matrix. Each has to observe the other's actions up to present and plays the action generated based on the best response to these observations. In a regular fictitious play process, each player makes a maximum likelihood estimate of her opponent's mixed strategy, which results in a time-varying update based on the previous estimate and current action. In this paper, we explore an alternative scheme for frequency update, whose mean dynamic is instead time-invariant. We examine convergence properties of the mean dynamic of the fictitious play process with such an update scheme, and establish local stability of the equilibrium point when both players are restricted to two actions. We also propose an adaptive algorithm based on this time-invariant frequency update.Comment: Proceedings of the 2010 IEEE Multi-Conference on Systems and Control (MSC10), September 2010, Yokohama, Japa

    Optimal trajectory generation in ocean flows

    Get PDF
    In this paper it is shown that Lagrangian Coherent Structures (LCS) are useful in determining near optimal trajectories for autonomous underwater gliders in a dynamic ocean environment. This opens the opportunity for optimal path planning of autonomous underwater vehicles by studying the global flow geometry via dynamical systems methods. Optimal glider paths were computed for a 2-dimensional kinematic model of an end-point glider problem. Numerical solutions to the optimal control problem were obtained using Nonlinear Trajectory Generation (NTG) software. The resulting solution is compared to corresponding results on LCS obtained using the Direct Lyapunov Exponent method. The velocity data used for these computations was obtained from measurements taken in August, 2000, by HF-Radar stations located around Monterey Bay, CA

    Lateral orbital wall approach to the cavernous sinus: laboratory investigation

    Get PDF
    Journal ArticleObject. Lesions of the cavernous sinus remain a technical challenge. The most common surgical approaches involve some variation of the standard frontotemporal craniotomy. Here, the authors describe a surgical approach to access the cavernous sinus that involves the removal of the lateral orbital wall. Methods. To achieve exposure of the cavernous sinus, a lateral canthal incision is performed, and the lateral orbital rim and anterior lateral wall are removed, for later replacement at closure. The posterior lateral orbital wall is removed to the region of the superior and inferior orbital fissures. With reflection of the dural covering of the lateral cavernous sinus and removal of the anterior clinoid process, the cavernous sinus is exposed. Results. Exposure and details of the procedure were derived from anatomical study in cadavers. After the approach, with removal of the anterior clinoid process, the entire cavemous sinus from the superior orbital fissure anteriorly to the Meckel cave posteriorly is exposed. More exposure to the lateral middle fossa, foramen spinosum, and petrous carotid artery is obtained by further removal of the lateral sphenoid wing. An illustrative case example for approaching a cavernous sinus meningioma is presented. Conclusions. The translateral orbital wall approach provides a simple, rapid approach for lesions with primary or secondary involvement of the cavernous sinus. Advantages of this simple, extradural approach include the lack of brain retraction and no interruption of the temporalis muscle

    Thermoactive cellulase-free xylanase production from alkaliphilic Bacillus strains using various agro-residues and their potential in biobleaching of kraft pulp

    Get PDF
    The four bacterial strains were isolated on media containing xylan and screened for xylanase activity. The bacterial strains (Ag12, Ag13, Ag20 and Ag32) were characterized based on morphological, biochemical and physiological characters and identified as belonging to the genus Bacillus. The effects of different factors such as pH (7.0 – 10.0), temperature (25.0 – 50.0°C) and inexpensive agro-residues (wheat straw, wheat bran and corncob) on xylanase production of strains were studied under shakeflask conditions. Maximal enzyme activities were obtained by cultivation in birch-wood xylan, but high enzyme production was also obtained on wheat straw and corncob when cultivated at pH 8.5. Under optimized fermentation conditions, no cellulolytic activity were detected on the crude extracts. Theeffects of temperature (40.0 – 80.0°C), pH (6.0 – 10.0) and salt concentration (1.0, 5.0 and 10.0%) on the xylanases activity were determined. The maximum activity was obtained temperature 60.0°C and pH at 9.0. The enzyme was stable at 60.0°C for more than 60 min, suggesting that the xylanases of Bacillus strains are thermoactive and being of interests for biobleaching processes. The effectiveness of crudexylanases from the strains Ag12, Ag20 and Ag32 on kraft pulp were carried out at pH 9.0 at 60.0°C. Biobleaching studies of kraft pulp with xylanases and its subsequent treatment with 1.0% EDTA (30 min at 50.0°C) and peroxide (80 min at 70.0°C), showed that the enzymes reduced the kappa number by 27.4, 61.7 and 75.3% and enhanced the brightness by 1.0, 1.5 and 3.0% from xylanases produced by strains Ag12, Ag20 and Ag32, respectively. These results suggest that the application of this xylanases to the paper and pulp industry may be very promising

    Prevalence of HCV NS3 pre-treatment resistance associated amino acid variants within a Scottish cohort

    Get PDF
    Background: Protease inhibitors (PI) including boceprevir, telaprevir and simeprevir have revolutionised HCV genotype 1 treatment since their introduction. A number of pre-treatment resistance associated amino acid variants (RAVs) and polymorphisms have been associated with reduced response to treatment. Objectives: We measured the prevalence of RAVs/polymorphisms in a PI treatment-naĂŻve HCV genotype 1 Scottish cohort using Sanger sequencing. Study design: Chronically infected, treatment-naĂŻve, HCV genotype 1 patients (n = 146) attending NHS Greater Glasgow and Clyde clinics were investigated for RAVs/polymorphisms to the PIs boceprevir, telaprevir and simeprevir. The NS3/4A region was amplified by nested polymerase chain reaction. The 1.4 kb amplified product was sequenced using an ABI 3710XL DNA sequencer. Sequence analysis was performed using web-based ReCall (beta 2.10). Amino acid positions 36, 41, 43, 54, 55, 80, 109, 122, 155, 156, 168 and 170 were analysed for RAVs/polymorphisms. Results: Overall, 23.29% (34/146) of patients had an RAV or polymorphism detected. Overall, 13.69% (20/146) of patients had HCV virus that contained the Q8 K polymorphism. Other RAVs detected were: V36 M 0.70% (1/146), V36L 0.70% (1/146), T54S 6.85% (10/146), V55A 3.42% (5/146) and V/I170A 0.68% (1/146). Four patients had dual combinations of mutations (T54S + V36L; T54S + V55A and 2 patients with T54S + Q80K). Conclusions: Q80K was the most prevalent baseline polymorphism detected in the Scottish cohort. Simeprevir treatment is not recommended in patients infected with the Q80K genotype 1a variant. This highlights the need for baseline sequencing prior to administration of this drug in this population

    Characterization of Vehicle Behavior with Information Theory

    Get PDF
    This work proposes the use of Information Theory for the characterization of vehicles behavior through their velocities. Three public data sets were used: i.Mobile Century data set collected on Highway I-880, near Union City, California; ii.Borl\"ange GPS data set collected in the Swedish city of Borl\"ange; and iii.Beijing taxicabs data set collected in Beijing, China, where each vehicle speed is stored as a time series. The Bandt-Pompe methodology combined with the Complexity-Entropy plane were used to identify different regimes and behaviors. The global velocity is compatible with a correlated noise with f^{-k} Power Spectrum with k >= 0. With this we identify traffic behaviors as, for instance, random velocities (k aprox. 0) when there is congestion, and more correlated velocities (k aprox. 3) in the presence of free traffic flow

    Demographic Prediction of Mobile User from Phone Usage

    Get PDF
    In this paper, we describe how we use the mobile phone usage of users to predict their demographic attributes. Using call log, visited GSM cells information, visited Bluetooth devices, visited Wireless LAN devices, accelerometer data, and so on, we predict the gender, age, marital status, job and number of people in household of users. The accuracy of developed classifiers for these classification problems ranges from 45-87% depending upon the particular classification problem
    • 

    corecore