7,735 research outputs found

    A Big Bang–Big Crunch Type-2 Fuzzy Logic System for Machine-Vision-Based Event Detection and Summarization in Real-World Ambient-Assisted Living

    Get PDF
    The area of ambient-assisted living (AAL) focuses on developing new technologies, which can improve the quality of life and care provided to elderly and disabled people. In this paper, we propose a novel system based on 3-D RGB-D vision sensors and interval type-2 fuzzy-logic-based systems (IT2FLSs) employing the big bang-big crunch algorithm for the real-time automatic detection and summarization of important events and human behaviors from the large-scale data. We will present several real-world experiments, which were conducted for AAL-related behaviors with various users. It will be shown that the proposed BB-BC IT2FLSs outperform the type-1 fuzzy logic system counterparts as well as other conventional nonfuzzy methods, and the performance improves when the number of subjects increases

    Design of 100 GHz-class Mach-Zehnder modulators in a generic indium phosphide platform

    Get PDF
    We propose a push-pull electrode design for a Mach-Zehnder modulator in a generic indium phosphide platform. We calculate the frequency response of the modulator for a range of mask design parameters. We propose the design parameters for a 50Ω, velocity matched MZM with 95GHz bandwidth

    Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes

    Full text link
    Cryptographic primitives are essential for constructing privacy-preserving communication mechanisms. There are situations in which two parties that do not know each other need to exchange sensitive information on the Internet. Trust management mechanisms make use of digital credentials and certificates in order to establish trust among these strangers. We address the problem of choosing which credentials are exchanged. During this process, each party should learn no information about the preferences of the other party other than strictly required for trust establishment. We present a method to reach an agreement on the credentials to be exchanged that preserves the privacy of the parties. Our method is based on secure two-party computation protocols for set intersection. Namely, it is constructed from private matching schemes.Comment: The material in this paper will be presented in part at the 8th DPM International Workshop on Data Privacy Management (DPM 2013

    Flexible and Robust Privacy-Preserving Implicit Authentication

    Full text link
    Implicit authentication consists of a server authenticating a user based on the user's usage profile, instead of/in addition to relying on something the user explicitly knows (passwords, private keys, etc.). While implicit authentication makes identity theft by third parties more difficult, it requires the server to learn and store the user's usage profile. Recently, the first privacy-preserving implicit authentication system was presented, in which the server does not learn the user's profile. It uses an ad hoc two-party computation protocol to compare the user's fresh sampled features against an encrypted stored user's profile. The protocol requires storing the usage profile and comparing against it using two different cryptosystems, one of them order-preserving; furthermore, features must be numerical. We present here a simpler protocol based on set intersection that has the advantages of: i) requiring only one cryptosystem; ii) not leaking the relative order of fresh feature samples; iii) being able to deal with any type of features (numerical or non-numerical). Keywords: Privacy-preserving implicit authentication, privacy-preserving set intersection, implicit authentication, active authentication, transparent authentication, risk mitigation, data brokers.Comment: IFIP SEC 2015-Intl. Information Security and Privacy Conference, May 26-28, 2015, IFIP AICT, Springer, to appea

    The interaction between a sexually transferred steroid hormone and a female protein regulates oogenesis in the malaria mosquito anopheles gambiae

    Get PDF
    Molecular interactions between male and female factors during mating profoundly affect the reproductive behavior and physiology of female insects. In natural populations of the malaria mosquito Anopheles gambiae, blood-fed females direct nutritional resources towards oogenesis only when inseminated. Here we show that the mating-dependent pathway of egg development in these mosquitoes is regulated by the interaction between the steroid hormone 20-hydroxy-ecdysone (20E) transferred by males during copulation and a female Mating-Induced Stimulator of Oogenesis (MISO) protein. RNAi silencing of MISO abolishes the increase in oogenesis caused by mating in blood-fed females, causes a delay in oocyte development, and impairs the function of male-transferred 20E. Co-immunoprecipitation experiments show that MISO and 20E interact in the female reproductive tract. Moreover MISO expression after mating is induced by 20E via the Ecdysone Receptor, demonstrating a close cooperation between the two factors. Male-transferred 20E therefore acts as a mating signal that females translate into an increased investment in egg development via a MISO-dependent pathway. The identification of this male–female reproductive interaction offers novel opportunities for the control of mosquito populations that transmit malaria

    Towards a Classification of Rough Set Bireducts

    Get PDF
    Size reduction mechanisms are very important in several mathematical fields. In rough set theory, bireducts arose to reduce simultaneously the set of attributes and the set of objects of the considered dataset, providing subsystems with the minimal sets of attributes that connect the maximum number of objects preserving the information of the original dataset. This paper presents the main properties of bireducts and how they can be used for removing inconsistencies. © 2020, Springer Nature Switzerland AG

    Indium phosphide photonic circuits on silicon electronics

    Get PDF
    The intimate integration of photonics and electronics in transceivers facilitates energy-efficiency, bandwidth acceleration and a route to radical miniaturization. We present and implement a wafer-to-wafer integration method which combines electronic and photonic foundry technologies

    Representative Set of Objects in Rough Sets Based on Galois Connections

    Get PDF
    This paper introduces a novel definition, called representative set of objects of a decision class, in the framework of decision systems based on rough sets. The idea behind such a notion is to consider subsets of objects that characterize the different classes given by a decision system. Besides the formal definition of representative set of objects of a decision class, we present different mathematical properties of such sets and a relationship with classification tasks based on rough sets. © 2020, Springer Nature Switzerland AG
    corecore