55 research outputs found

    CoFeD: A visualisation framework for comparative quality evaluation

    Get PDF
    Evaluation for the purpose of selection can be a challenging task particularly when there is a plethora of choices available. Short-listing, comparisons and eventual choice(s) can be aided by visualisation techniques. In this paper we use Feature Analysis, Tabular and Tree Representations and Composite Features Diagrams (CFDs) for profiling user requirements and for top-down profiling and evaluation of items (methods, tools, techniques, processes and so on) under evaluation. The resulting framework CoFeD enables efficient visual comparison and initial short-listing. The second phase uses bottom-up quantitative evaluation which aids the elimination of the weakest items and hence the effective selection of the most appropriate item. The versatility of the framework is illustrated by a case study comparison and evaluation of two agile methodologies. The paper concludes with limitations and indications of further work

    Optical flow estimation via steered-L1 norm

    Get PDF
    Global variational methods for estimating optical flow are among the best performing methods due to the subpixel accuracy and the ‘fill-in’ effect they provide. The fill-in effect allows optical flow displacements to be estimated even in low and untextured areas of the image. The estimation of such displacements are induced by the smoothness term. The L1 norm provides a robust regularisation term for the optical flow energy function with a very good performance for edge-preserving. However this norm suffers from several issues, among these is the isotropic nature of this norm which reduces the fill-in effect and eventually the accuracy of estimation in areas near motion boundaries. In this paper we propose an enhancement to the L1 norm that improves the fill-in effect for this smoothness term. In order to do this we analyse the structure tensor matrix and use its eigenvectors to steer the smoothness term into components that are ‘orthogonal to’ and ‘aligned with’ image structures. This is done in primal-dual formulation. Results show a reduced end-point error and improved accuracy compared to the conventional L1 norm

    Efficient Certificateless Public Key Encryption

    Get PDF
    In [3] Al-Riyami and Paterson introduced the notion of Certificateless Public Key Cryptography and presented an instantiation. In this paper, we revisit the formulation of certificateless public key encryption and construct a more efficient scheme and then extend it to an authenticated encryption

    A review of hough transform and line segment detection approaches

    Get PDF
    In a wide range of image processing and computer vision problems, line segment detection is one of the most critical challenges. For more than three decades researchers have contributed to build more robust and accurate algorithms with faster performance. In this paper we review the main approaches and in particular the Hough transform and its extensions, which are among the most well-known techniques for the detection of straight lines in a digital image. This paper is based on extensive practical research and is organised into two main parts. In the first part, the HT and its major research directions and limitations are discussed. In the second part of the paper, state-of-the-art line segmentation techniques are reviewed and categorized into three main groups with fundamentally distinctive characteristics. Their relative advantages and disadvantages are compared and summarised in a table

    Adaptation of High-Throughput Screening in Drug Discovery—Toxicological Screening Tests

    Get PDF
    High-throughput screening (HTS) is one of the newest techniques used in drug design and may be applied in biological and chemical sciences. This method, due to utilization of robots, detectors and software that regulate the whole process, enables a series of analyses of chemical compounds to be conducted in a short time and the affinity of biological structures which is often related to toxicity to be defined. Since 2008 we have implemented the automation of this technique and as a consequence, the possibility to examine 100,000 compounds per day. The HTS method is more frequently utilized in conjunction with analytical techniques such as NMR or coupled methods e.g., LC-MS/MS. Series of studies enable the establishment of the rate of affinity for targets or the level of toxicity. Moreover, researches are conducted concerning conjugation of nanoparticles with drugs and the determination of the toxicity of such structures. For these purposes there are frequently used cell lines. Due to the miniaturization of all systems, it is possible to examine the compound’s toxicity having only 1–3 mg of this compound. Determination of cytotoxicity in this way leads to a significant decrease in the expenditure and to a reduction in the length of the study

    Functional Analysis of the Cathepsin-Like Cysteine Protease Genes in Adult Brugia malayi Using RNA Interference

    Get PDF
    Filarial nematodes are an important group of human pathogens, causing lymphatic filariasis and onchocerciasis, and infecting around 150 million people throughout the tropics with more than 1.5 billion at risk of infection. Control of filariasis currently relies on mass drug administration (MDA) programs using drugs which principally target the microfilarial life-cycle stage. These control programs are facing major challenges, including the absence of a drug with macrofilaricidal or permanent sterilizing activity, and the possibility of the development of drug-resistance against the drugs available. Cysteine proteases are essential enzymes which play important roles in a wide range of cellular processes, and the cathepsin-like cysteine proteases have been identified as potential targets for drug or vaccine development in many parasites. Here we have studied the function of several of the cathepsin-like enzymes in the filarial nematode, B. malayi, and demonstrate that these cysteine proteases are involved in the development of embryos, show similar functions to their counterparts in C. elegans, and therefore, provide an important target for future drug development targeted to eliminate filariasis

    Attacks on an ISO/IEC 11770-2 key establishment protocol

    No full text
    Abstract Two possible types of attack (a replay attack and a type attack) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two solutions are proposed
    corecore