253 research outputs found

    Remote sensing applications: an overview

    Get PDF
    Remote Sensing (RS) refers to the science of identification of earth surface features and estimation of their geo-biophysical properties using electromagnetic radiation as a medium of interaction. Spectral, spatial, temporal and polarization signatures are major characteristics of the sensor/target, which facilitate target discrimination. Earth surface data as seen by the sensors in different wavelengths (reflected, scattered and/or emitted) is radiometrically and geometrically corrected before extraction of spectral information. RS data, with its ability for a synoptic view, repetitive coverage with calibrated sensors to detect changes, observations at different resolutions, provides a better alternative for natural resources management as compared to traditional methods. Indian Earth Observation (EO) programme has been applications-driven and national development has been its prime motivation. From Bhaskara to Cartosat, India's EO capability has increased manifold. Improvements are not only in spatial, spectral, temporal and radiometric resolutions, but also in their coverage and value-added products. Some of the major operational application themes, in which India has extensively used remote sensing data are agriculture, forestry, water resources, land use, urban sprawl, geology, environment, coastal zone, marine resources, snow and glacier, disaster monitoring and mitigation, infrastructure development, etc. The paper reviews RS techniques and applications carried out using both optical and microwave sensors. It also analyses the gap areas and discusses the future perspectives

    Tuberculosis-diabetes mellitus bidirectional screening at a tertiary care centre, South India

    Get PDF
    Supported by the TB Union/MSF Course on Operational Researc

    A new foundation for control-dependence and slicing for modern program structures.

    Get PDF
    The notion of control dependence underlies many program analysis and transformation techniques. Despite being widely used, existing definitions and approaches to calculating control dependence are difficult to apply directly to modern program structures because these make substantial use of exception processing and increasingly support reactive systems designed to run indefinitely. This article revisits foundational issues surrounding control dependence, and develops definitions and algorithms for computing several variations of control dependence that can be directly applied to modern program structures. To provide a foundation for slicing reactive systems, the article proposes a notion of slicing correctness based on weak bisimulation, and proves that some of these new definitions of control dependence generate slices that conform to this notion of correctness. This new framework of control dependence definitions, with corresponding correctness results, is even able to support programs with irreducible control flow graphs. Finally, a variety of properties show that the new definitions conservatively extend classic definitions. These new definitions and algorithms form the basis of the Indus Java slicer, a publicly available program slicer that has been implemented for full Java. Permission to make digital or hard copies part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or direct commercial advantage and that copies show this notice on the first page or initial screen of a display along with the full citation. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, to redistribute to lists, or to use any component of this work in other works requires prior specific permission and/or a fee. Permissions may be requested from Publications Dept., ACM, Inc., 2 Penn Plaza, Suite 701, New York, NY 10121-0701 USA, fax +

    Remaining life assessment of service exposed reheater and superheater tubes in a boiler of a thermal power plant

    Get PDF
    This paper presents the high temperature tensile and the stress rupture properties of 150,000 hours service-exposed superheater and reheater tubes made of 2.25Cr-1 Mo steels in a 120 MW boiler of a thermal power plant. These were used to estimate the remaining life for safety. Experimentally determined yield strength and ultimate tensile strength as well as estimated 10,000 hours - 100000 hours rupture strength as obtained from experimental data in the temperature range of 793 to 853K exhibit a decreasing trend with increasing temperature. Microstructural study did not reveal any significant degradation in terms of creep cavities, cracks, graphitization etc. In general, analysis of tensile and stress rupture data reveal that the service exposed superheater and reheater tubes can remain in service for a length of more than ten years at the operating hoop stress level 40 MPa / 813K, provided no localised damage in the form of cracks or dents has been developed. It is recommended that a similar health check should be carried out after 50,000 hours of service exposure at 813K

    Short-term changes on MRI predict long-term changes on radiography in rheumatoid arthritis: an analysis by an OMERACT Task Force of pooled data from four randomised controlled trials

    Get PDF
    Objective: In rheumatoid arthritis (RA), MRI provides earlier detection of structural damage than radiography (X-ray) and more sensitive detection of intra-articular inflammation than clinical examination. This analysis was designed to evaluate the ability of early MRI findings to predict subsequent structural damage by X-ray. Methods: Pooled data from four randomised controlled trials (RCTs) involving 1022 RA hands and wrists in early and established RA were analysed. X-rays were scored using van der Heijde-modified or Genant-modified Sharp methods. MRIs were scored using Outcome Measures in Rheumatology (OMERACT) RA MRI Score (RAMRIS). Data were analysed at the patient level using multivariable logistic regression and receiver operating characteristic curve analyses. Results: Progression of MRI erosion scores at Weeks 12 and 24 predicted progression of X-ray erosions at Weeks 24 and 52, with areas under the curve (AUCs) of 0.64 and 0.74, respectively. 12-week and 24-week changes in MRI osteitis scores were similarly predictive of 24-week and 52-week X-ray erosion progressions; pooled AUCs were 0.78 and 0.77, respectively. MRI changes in synovitis at Weeks 12 and 24 also predicted progression of X-ray joint damage (erosion and joint-space narrowing) at Weeks 24 and 52 (AUCs=0.72 and 0.65, respectively). Conclusions: Early changes in joint damage and inflammation detected with MRI predict changes in joint damage evident on subsequent X-rays. These findings support the use of MRI as a valid method for monitoring structural damage in short-duration RCTs

    Explicit processing of verbal and spatial features during letter-location binding modulates oscillatory activity of a fronto-parietal network.

    Get PDF
    The present study investigated the binding of verbal and spatial features in immediate memory. In a recent study, we demonstrated incidental and asymmetrical letter-location binding effects when participants attended to letter features (but not when they attended to location features) that were associated with greater oscillatory activity over prefrontal and posterior regions during the retention period. We were interested to investigate whether the patterns of brain activity associated with the incidental binding of letters and locations observed when only the verbal feature is attended differ from those reflecting the binding resulting from the controlled/explicit processing of both verbal and spatial features. To achieve this, neural activity was recorded using magnetoencephalography (MEG) while participants performed two working memory tasks. Both tasks were identical in terms of their perceptual characteristics and only differed with respect to the task instructions. One of the tasks required participants to process both letters and locations. In the other, participants were instructed to memorize only the letters, regardless of their location. Time–frequency representation of MEG data based on the wavelet transform of the signals was calculated on a single trial basis during the maintenance period of both tasks. Critically, despite equivalent behavioural binding effects in both tasks, single and dual feature encoding relied on different neuroanatomical and neural oscillatory correlates. We propose that enhanced activation of an anterior–posterior dorsal network observed in the task requiring the processing of both features reflects the necessity for allocating greater resources to intentionally process verbal and spatial features in this task

    Using Relational Verification for Program Slicing

    Get PDF
    Program slicing is the process of removing statements from a program such that defined aspects of its behavior are retained. For producing precise slices, i.e., slices that are minimal in size, the program\u27s semantics must be considered. Existing approaches that go beyond a syntactical analysis and do take the semantics into account are not fully automatic and require auxiliary specifications from the user. In this paper, we adapt relational verification to check whether a slice candidate obtained by removing some instructions from a program is indeed a valid slice. Based on this, we propose a framework for precise and automatic program slicing. As part of this framework, we present three strategies for the generation of slice candidates, and we show how dynamic slicing approaches - that interweave generating and checking slice candidates - can be used for this purpose. The framework can easily be extended with other strategies for generating slice candidates. We discuss the strengths and weaknesses of slicing approaches that use our framework

    Optimizing investments in cyber hygiene for protecting healthcare users

    Get PDF
    Cyber hygiene measures are often recommended for strengthening an organization’s security posture, especially for protecting against social engineering attacks that target the human element. However, the related recommendations are typically the same for all organizations and their employees, regardless of the nature and the level of risk for different groups of users. Building upon an existing cybersecurity investment model, this paper presents a tool for optimal selection of cyber hygiene safeguards, which we refer as the Optimal Safeguards Tool (OST). The model combines game theory and combinatorial optimization (0-1 Knapsack) taking into account the probability of each user group to being attacked, the value of assets accessible by each group, and the efficacy of each control for a particular group. The model considers indirect cost as the time employees could require for learning and trainning against an implemented control. Utilizing a game-theoretic framework to support the Knapsack optimization problem permits us to optimally select safeguards’ application levels minimizing the aggregated expected damage within a security investment budget. We evaluate OST in a healthcare domain use case. In particular, on the Critical Internet Security (CIS) Control group 17 for implementing security awareness and training programs for employees belonging to the ICT, clinical and administration personnel of a hospital. We compare the strategies implemented by OST against alternative common-sense defending approaches for three different types of attackers: Nash, Weighted and Opportunistic. Our results show that Nash defending strategies are consistently better than the competing strategies for all attacker types with a minor exception where the Nash defending strategy, for a specific game, performs at least as good as other common-sense approaches. Finally, we illustrate the alternative investment strategies on different Nash equilibria (called plans) and discuss the optimal choice using the framework of 0-1 Knapsack optimization
    corecore