12,500 research outputs found

    Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition

    Full text link
    This paper presents a robust and dynamic face recognition technique based on the extraction and matching of devised probabilistic graphs drawn on SIFT features related to independent face areas. The face matching strategy is based on matching individual salient facial graph characterized by SIFT features as connected to facial landmarks such as the eyes and the mouth. In order to reduce the face matching errors, the Dempster-Shafer decision theory is applied to fuse the individual matching scores obtained from each pair of salient facial features. The proposed algorithm is evaluated with the ORL and the IITK face databases. The experimental results demonstrate the effectiveness and potential of the proposed face recognition technique also in case of partially occluded faces.Comment: 8 pages, 2 figure

    United States Trade Flows for Selected Categories of Specialty Crops

    Get PDF
    Nationally, Florida ranked second in farm cash receipt from all crops and second, based on value, in vegetable production (USDA, 2003). It also ranked fourteenth out of all the states with respect to agricultural exports with its top exports, fruits and vegetables, falling within the category of specialty crops. According to the USDA (2003), Florida's agricultural exports helped to boost farm prices and income and supported approximately 17,000 jobs both on and off farm in 2001. As such, its agricultural exports are important to Florida's agricultural and statewide economy. From a Florida farm cash receipts perspective, increased imports could undermine revenue earnings from specialty crop production, especially if there is not a comparable growth in the exports of these crops. This report covered the period 1991 to 2002 and examined trade flows for selected specialty crops deemed important to Florida's agriculture. Overall, the US had a relatively high import level of the selected specialty crops. This was apparent from the widening trade gaps and the declining surpluses experienced by all commodities, with the exception of oranges and strawberries. CANMEX was the dominant supplier of vegetables, and growing imports from this group drove the growing vegetable trade deficit. With respect to fruits, CANMEX was also a dominant supplier and affected trade balances however, many of the declining fruit trade balances were due to declining exports to markets such as Asia and the Europe. CANMEX played a major role in the trade of foliage and floriculture but did not dominate the trade. Over the period 1991 to 2002 there were changes in the trade flows of the selected vegetables, fruits and foliage and floriculture. Two noticeable trends were the concentration of trade with CANMEX, especially with respect to vegetable exports and declining exports to Asia and Europe. Also noticeable were declining trade balances experienced by the majority of the commodities in this study. With free trade agreements, an increased inflow of goods is expected as trade barriers are lowered. Preparing for additional imports resulting from expanded regional free trade agreements in the western hemisphere requires the commitment of additional resources toward the expansion of existing markets and the development of potentially new markets.Crop Production/Industries, International Relations/Trade,

    Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    Get PDF
    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples

    Remote sensing in Michigan for land resource management

    Get PDF
    The Environmental Research Institute of Michigan is conducting a program whose goal is the large-scale adoption, by both public agencies and private interests in Michigan, of NASA earth-resource survey technology as an important aid in the solution of current problems in resource management and environmental protection. During the period from June 1975 to June 1976, remote sensing techniques to aid Michigan government agencies were used to achieve the following major results: (1) supply justification for public acquisition of land to establish the St. John's Marshland Recreation Area; (2) recommend economical and effective methods for performing a statewide wetlands survey; (3) assist in the enforcement of state laws relating to sand and gravel mining, soil erosion and sedimentation, and shorelands protection; (4) accomplish a variety of regional resource management actions in the East Central Michigan Planning and Development Region. Other tasks on which remote sensing technology was used include industrial and school site selection, ice detachment in the Soo Harbor, grave detection, and data presentation for wastewater management programs

    Deduction with XOR Constraints in Security API Modelling

    Get PDF
    We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module. We also show how our technique can be applied to standard security protocols

    The effects of different alcoholic drinks on lipids, insulin and haemostatic and inflammatory markers in older men

    Get PDF
    Light to moderate drinking is associated with lower risk of coronary heart (CHD) than non-drinkers. We have examined the relationships between total alcohol intake and type of alcoholic beverage and several potential biological mechanisms. We carried out the study in 3158 men aged 60-79 years drawn from general practices in 24 British towns with no history of myocardial infarction, stroke or diabetes and who were not on warfarin. Total alcohol consumption showed a significant positive dose-response relationship with high density lipoprotein cholesterol (HDL-C), coagulation factor IX, haematocrit, blood viscosity, and tissue plasminogen (t-PA) antigen, and an inverse dose-response relationship with insulin, fibrinogen, von Wille- brand factor (vWF) and triglycerides after adjustment for possible confounders. Total alcohol consumption showed weak associations with plasma viscosity and fibrin D-dimer, and no association with factors VII,VIII, or C-reactive protein (CRP). Wine was specifically associated with lower CRP, plasma viscosity, factor VIII and triglycerides. The findings are consistent with the suggestion that HDL-C in particular but also insulin and haemostatic factors may contribute to the beneficial effect of light to moderate drinking on risk of CHD. Wine has effects that may confer greater protection than other alcoholic beverages

    Feature-Guided Black-Box Safety Testing of Deep Neural Networks

    Full text link
    Despite the improved accuracy of deep neural networks, the discovery of adversarial examples has raised serious safety concerns. Most existing approaches for crafting adversarial examples necessitate some knowledge (architecture, parameters, etc.) of the network at hand. In this paper, we focus on image classifiers and propose a feature-guided black-box approach to test the safety of deep neural networks that requires no such knowledge. Our algorithm employs object detection techniques such as SIFT (Scale Invariant Feature Transform) to extract features from an image. These features are converted into a mutable saliency distribution, where high probability is assigned to pixels that affect the composition of the image with respect to the human visual system. We formulate the crafting of adversarial examples as a two-player turn-based stochastic game, where the first player's objective is to minimise the distance to an adversarial example by manipulating the features, and the second player can be cooperative, adversarial, or random. We show that, theoretically, the two-player game can con- verge to the optimal strategy, and that the optimal strategy represents a globally minimal adversarial image. For Lipschitz networks, we also identify conditions that provide safety guarantees that no adversarial examples exist. Using Monte Carlo tree search we gradually explore the game state space to search for adversarial examples. Our experiments show that, despite the black-box setting, manipulations guided by a perception-based saliency distribution are competitive with state-of-the-art methods that rely on white-box saliency matrices or sophisticated optimization procedures. Finally, we show how our method can be used to evaluate robustness of neural networks in safety-critical applications such as traffic sign recognition in self-driving cars.Comment: 35 pages, 5 tables, 23 figure
    • 

    corecore