7,735 research outputs found
A Big Bang–Big Crunch Type-2 Fuzzy Logic System for Machine-Vision-Based Event Detection and Summarization in Real-World Ambient-Assisted Living
The area of ambient-assisted living (AAL) focuses on developing new technologies, which can improve the quality of life and care provided to elderly and disabled people. In this paper, we propose a novel system based on 3-D RGB-D vision sensors and interval type-2 fuzzy-logic-based systems (IT2FLSs) employing the big bang-big crunch algorithm for the real-time automatic detection and summarization of important events and human behaviors from the large-scale data. We will present several real-world experiments, which were conducted for AAL-related behaviors with various users. It will be shown that the proposed BB-BC IT2FLSs outperform the type-1 fuzzy logic system counterparts as well as other conventional nonfuzzy methods, and the performance improves when the number of subjects increases
Design of 100 GHz-class Mach-Zehnder modulators in a generic indium phosphide platform
We propose a push-pull electrode design for a Mach-Zehnder modulator in a generic indium phosphide platform. We calculate the frequency response of the modulator for a range of mask design parameters. We propose the design parameters for a 50Ω, velocity matched MZM with 95GHz bandwidth
Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes
Cryptographic primitives are essential for constructing privacy-preserving
communication mechanisms. There are situations in which two parties that do not
know each other need to exchange sensitive information on the Internet. Trust
management mechanisms make use of digital credentials and certificates in order
to establish trust among these strangers. We address the problem of choosing
which credentials are exchanged. During this process, each party should learn
no information about the preferences of the other party other than strictly
required for trust establishment. We present a method to reach an agreement on
the credentials to be exchanged that preserves the privacy of the parties. Our
method is based on secure two-party computation protocols for set intersection.
Namely, it is constructed from private matching schemes.Comment: The material in this paper will be presented in part at the 8th DPM
International Workshop on Data Privacy Management (DPM 2013
Flexible and Robust Privacy-Preserving Implicit Authentication
Implicit authentication consists of a server authenticating a user based on
the user's usage profile, instead of/in addition to relying on something the
user explicitly knows (passwords, private keys, etc.). While implicit
authentication makes identity theft by third parties more difficult, it
requires the server to learn and store the user's usage profile. Recently, the
first privacy-preserving implicit authentication system was presented, in which
the server does not learn the user's profile. It uses an ad hoc two-party
computation protocol to compare the user's fresh sampled features against an
encrypted stored user's profile. The protocol requires storing the usage
profile and comparing against it using two different cryptosystems, one of them
order-preserving; furthermore, features must be numerical. We present here a
simpler protocol based on set intersection that has the advantages of: i)
requiring only one cryptosystem; ii) not leaking the relative order of fresh
feature samples; iii) being able to deal with any type of features (numerical
or non-numerical).
Keywords: Privacy-preserving implicit authentication, privacy-preserving set
intersection, implicit authentication, active authentication, transparent
authentication, risk mitigation, data brokers.Comment: IFIP SEC 2015-Intl. Information Security and Privacy Conference, May
26-28, 2015, IFIP AICT, Springer, to appea
The interaction between a sexually transferred steroid hormone and a female protein regulates oogenesis in the malaria mosquito anopheles gambiae
Molecular interactions between male and female factors during mating profoundly affect the reproductive behavior and physiology of female insects. In natural populations of the malaria mosquito Anopheles gambiae, blood-fed females direct nutritional resources towards oogenesis only when inseminated. Here we show that the mating-dependent pathway of egg development in these mosquitoes is regulated by the interaction between the steroid hormone 20-hydroxy-ecdysone (20E) transferred by males during copulation and a female Mating-Induced Stimulator of Oogenesis (MISO) protein. RNAi silencing of MISO abolishes the increase in oogenesis caused by mating in blood-fed females, causes a delay in oocyte development, and impairs the function of male-transferred 20E. Co-immunoprecipitation experiments show that MISO and 20E interact in the female reproductive tract. Moreover MISO expression after mating is induced by 20E via the Ecdysone Receptor, demonstrating a close cooperation between the two factors. Male-transferred 20E therefore acts as a mating signal that females translate into an increased investment in egg development via a MISO-dependent pathway. The identification of this male–female reproductive interaction offers novel opportunities for the control of mosquito populations that transmit malaria
Towards a Classification of Rough Set Bireducts
Size reduction mechanisms are very important in several mathematical fields. In rough set theory, bireducts arose to reduce simultaneously the set of attributes and the set of objects of the considered dataset, providing subsystems with the minimal sets of attributes that connect the maximum number of objects preserving the information of the original dataset. This paper presents the main properties of bireducts and how they can be used for removing inconsistencies. © 2020, Springer Nature Switzerland AG
Recommended from our members
Early Ultraviolet Observations of Type IIn Supernovae Constrain the Asphericity of Their Circumstellar Material
© 2020. The American Astronomical Society. All rights reserved.. We present a survey of the early evolution of 12 Type IIn supernovae (SNe IIn) at ultraviolet and visible light wavelengths. We use this survey to constrain the geometry of the circumstellar material (CSM) surrounding SN IIn explosions, which may shed light on their progenitor diversity. In order to distinguish between aspherical and spherical CSM, we estimate the blackbody radius temporal evolution of the SNe IIn of our sample, following the method introduced by Soumagnac et al. We find that higher-luminosity objects tend to show evidence for aspherical CSM. Depending on whether this correlation is due to physical reasons or to some selection bias, we derive a lower limit between 35% and 66% for the fraction of SNe IIn showing evidence for aspherical CSM. This result suggests that asphericity of the CSM surrounding SNe IIn is common - consistent with data from resolved images of stars undergoing considerable mass loss. It should be taken into account for more realistic modeling of these events
Indium phosphide photonic circuits on silicon electronics
The intimate integration of photonics and electronics in transceivers facilitates energy-efficiency, bandwidth acceleration and a route to radical miniaturization. We present and implement a wafer-to-wafer integration method which combines electronic and photonic foundry technologies
Representative Set of Objects in Rough Sets Based on Galois Connections
This paper introduces a novel definition, called representative set of objects of a decision class, in the framework of decision systems based on rough sets. The idea behind such a notion is to consider subsets of objects that characterize the different classes given by a decision system. Besides the formal definition of representative set of objects of a decision class, we present different mathematical properties of such sets and a relationship with classification tasks based on rough sets. © 2020, Springer Nature Switzerland AG
- …