Search Results
Results 1 - 50 of 328
1 2 3 4 5 6 7 >
Casas Jérôme J Institut Universitaire de France IUF and Institut de Recherche sur la Biologie de l'Insecte, University of Tours, IRBI UMR CNRS 7261, Av. Monge, 37200 Tours, France - - 2014
Many prey species, from soil arthropods to fish, perceive the approach of predators, allowing them to escape just in time. Thus, prey capture is as important to predators as prey finding. We extend an existing framework for understanding the conjoint trajectories of predator and prey after encounters, by estimating the ...
Buscema Paolo Massimo PM 1Semeion Research Centre of Sciences of Communication Via Sersale 117, Rome, 00128, - - 2014
The Artificial Adaptive Systems (AAS) are theories with which generative algebras are able to create artificial models simulating natural phenomenon. Artificial Neural Networks (ANNs) are the more diffused and best-known learning system models in the AAS. This article describes an overview of ANNs, noting its advantages and limitations for analyzing ...
Huertas J I JI Automotive Engineering Research Center- CIMA of Tecnológico de Monterrey, Eduardo Monroy Cárdenas, No 2000 Toluca, México. Electronic address: - - 2014
Particulate matter is the main air pollutant in open pit mining areas. Preferred models that simulate the dispersion of the particles have been used to assess the environmental impact of the mining activities. Results obtained through simulation have been compared with the particle concentration measured in several sites and a ...
Vorwerk Johannes J Institut für Biomagnetismus und Biosignalanalyse, Westfälische Wilhelms-Universität, Münster, Germany. Electronic address: - - 2014
For accurate EEG/MEG source analysis it is necessary to model the head volume conductor as realistic as possible. This includes the distinction of the different conductive compartments in the human head. In this study, we investigated the influence of modeling/not modeling the conductive compartments skull spongiosa, skull compacta, cerebrospinal fluid ...
Simoneschi Daniele D Department of Biology, Manhattanville College , Purchase, New - - 2014
Abstract Malathion, a common organophosphate insecticide, is a proven acetylcholinesterase inhibitor and is the most applied organophosphate insecticide in the United States. The use of zebrafish as a model to study the effects of pesticides on development is an innovative approach yielding relevant implications for determining the potential toxic effects ...
Castañeda Claudia - - 2014
This article explores the resonating figures of primate, child, and robot in contemporary technoscientific corporealizations of the 'almost human'. We take as our model (in)organism 'Lucy the Robot Orangutan', roboticist Steve Grand's project to create an artificial life form with a mind of its own. One aspect of Lucy's figuration ...
Groenenberg Jan E JE Alterra, Wageningen University, 6700 AA Wageningen, Netherlands; Department of Soil Quality, Wageningen University, Wageningen, - - 2014
The fate of trace elements in soils, sediments and surface waters is largely determined by their binding to reactive components of which organic matter, metal oxides and clays are considered most important. Assemblage models, combining separate mechanistic complexation models for each of the reactive components, can be used to predict ...
Wen Fengtong F School of Mathematical Sciences, University of Jinan, Jinan, 250022, China, - - 2014
Secure and efficient user mutual authentication is an essential task for integrated electronic patient record (EPR) information system. Recently, several authentication schemes have been proposed to meet this requirement. In a recent paper, Lee et al. proposed an efficient and secure password-based authentication scheme used smart cards for the integrated ...
Abazajian Kevork N KN Center for Cosmology, Department of Physics and Astronomy, University of California, Irvine, Irvine, California 92697, - - 2014
Sterile neutrinos produced through a resonant Shi-Fuller mechanism are arguably the simplest model for a dark matter interpretation of the origin of the recent unidentified x-ray line seen toward a number of objects harboring dark matter. Here, I calculate the exact parameters required in this mechanism to produce the signal. ...
Tsujino Masahiro M Research Core for Interdisciplinary Sciences, Okayama University, Tsushima-naka 3-1-1, Kita-ku, Okayama, 700-8530, - - 2014
Developmental stability, the ability of organisms to buffer their developmental processes against developmental noise is often evaluated with fluctuating asymmetry (FA). Natural genetic variation in FA has been investigated using Drosophila wings as a model system and the recent estimation of the heritability of wing shape FA was as large ...
Demšar Jure J University of - - 2014
Abstract It is not exactly known why birds aggregate in coordinated flocks. The most common hypothesis proposes that the reason is protection from predators. Most of the currently developed examples of individual-based predator-prey models assume predators are attracted to the center of a highly coordinated flock. This proposed attraction of ...
Firth Louise B LB School of Ocean Sciences, Bangor University, Menai Bridge, Anglesey LL59 5AB, United Kingdom. Electronic address: - - 2014
Coastal defence structures are proliferating to counter rising and stormier seas. With increasing concern about the ecological value of built environments, efforts are being made to create novel habitat to increase biodiversity. Rock pools are infrequent on artificial structures. We compared biodiversity patterns between rock pools and emergent rock and ...
Bulbert Matthew W MW Department of Biological Sciences, Macquarie University North Ryde, NSW 2109, Australia. Electronic address: - - 2014
Predators use many different strategies to capture prey, including ambushing, active pursuit and luring [1]. No matter the strategy used, predators usually attempt to make the first physical contact with prey. This is not surprising, as prey, regardless how dangerous, can damage or kill a predator if they initiate contact ...
Accorsi Alice A Department of Life Sciences, University of Modena and Reggio Emilia, Modena, - - 2014
Pomacea canaliculata is a freshwater gastropod considered an invasive pest by several European, North American and Asiatic countries. This snail presents a considerable resistance to pollutants and may successfully face stressful events. Thanks to the unusual possibility to perform several hemolymph collections without affecting its survival, P. canaliculata is a ...
Xu Shuchang S Department of Information Science and Engineering, Hangzhou Normal University, Hangzhou, 311121, China ; Center for Bioimage Informatics, Department of Biomedical Engineering, Carnegie Mellon University, Pittsburgh, 15213, - - 2014
We describe a simple but robust algorithm for estimating the heart rate pulse from video sequences containing human skin in real time. Based on a model of light interaction with human skin, we define the change of blood concentration due to arterial pulsation as a pixel quotient in log space, ...
Wartzek Tobias - - 2014
Contactless vital sign measurement technologies often have the drawback of severe motion artifacts and periods in which no signal is available. However, using several identical or physically different sensors, redundancy can be used to decrease the error in noncontact heart rate estimation, while increasing the time period during which reliable ...
Binder Harald H Institute of Medical Biostatistics, Epidemiology and Informatics, University Medical Center, Johannes Gutenberg University Mainz, 55101 Mainz, - - 2014
This is a discussion of the following papers: "Probability estimation with machine learning methods for dichotomous and multicategory outcome: Theory" by Jochen Kruppa, Yufeng Liu, Gérard Biau, Michael Kohler, Inke R. König, James D. Malley, and Andreas Ziegler; and "Probability estimation with machine learning methods for dichotomous and multicategory outcome: ...
Harrop Wayne - - 2014
This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of ...
Oishi Koji K 1] Department of Applied Physics, Graduate School of Engineering, The University of Tokyo, 7-3-1 Hongo, Bunkyo, Tokyo 113-8656, Japan [2] CREST, JST, 4-1-8 Honcho, Kawaguchi, Saitama 332-0012, - - 2014
The Internet has enabled the emergence of collective problem solving, also known as crowdsourcing, as a viable option for solving complex tasks. However, the openness of crowdsourcing presents a challenge because solutions obtained by it can be sabotaged, stolen, and manipulated at a low cost for the attacker. We extend ...
Kumar Pardeep P Centre for Wireless Communication, University of Oulu, P.O. Box 4500, FI 90014, Finland. - - 2014
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The ...
Al-Momani Orobah O Yarmouk University, Irbid 21163, - - 2014
This paper aims to study the performance of support vector machine (SVM) classification in detecting asthma attacks in a wireless remote monitoring scenario. The effect of wireless channels on decision making of the SVM classifier is studied in order to determine the channel conditions under which transmission is not recommended ...
Zhao Wei W Computer Department, Nanjing University of Science and Technology, Jiangsu 210094, - - 2014
This paper presents a searching control approach for cooperating mobile sensor networks. We use a density function to represent the frequency of distress signals issued by victims. The mobile nodes' moving in mission space is similar to the behaviors of fish-swarm in water. So, we take the mobile node as ...
Chen Tinggui T College of Computer Science & Information Engineering, Zhejiang Gongshang University, Zhejiang Province, Hangzhou 310018, - - 2014
Artificial bee colony (ABC) algorithm, inspired by the intelligent foraging behavior of honey bees, was proposed by Karaboga. It has been shown to be superior to some conventional intelligent algorithms such as genetic algorithm (GA), artificial colony optimization (ACO), and particle swarm optimization (PSO). However, the ABC still has some ...
Li Bai B 0000-0002-8966-8992 School of Control Science and Engineering, Zhejiang University, Hangzhou 310027, - - 2014
Unmanned combat aerial vehicles (UCAVs) have been of great interest to military organizations throughout the world due to their outstanding capabilities to operate in dangerous or hazardous environments. UCAV path planning aims to obtain an optimal flight route with the threats and constraints in the combat field well considered. In ...
Chen Chien-Ming CM 0000-0002-6502-472X School of Computer Science and Technology, Harbin Institute of Technology Shenzhen Graduate School, Shenzhen 518055, China ; Shenzhen Key Laboratory of Internet Information Collaboration, Shenzhen 518055, - - 2014
RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced ...
Nam Junghyun J Department of Computer Engineering, Konkuk University, 268 Chungwondaero, Chungju, Chungcheongbukdo 380-701, Republic of - - 2014
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles ...
Ho Peng Foong PF Faculty of Computer Science and Information Technology, University of Malaya, 50603 Lembah Pantai, Kuala Lumpur, - - 2014
Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to "shoulder-surfing" attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing ...
Zhang Yanxue Y College of Mathematics and Information Science, Hebei Normal University, Shijiazhuang 050000, - - 2014
The biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov model (HMM) and support ...
Wood Nathan A NA The Robotics Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania - - 2013
This paper presents a framework for localizing a miniature epicardial crawling robot, HeartLander, on the beating heart using only 6-degree-of-freedom position measurements from an electromagnetic position tracker and a dynamic surface model of the heart. Using only this information, motion and observation models of the system are developed such that ...
Jimenez Julie - - 2013
Advanced dynamic anaerobic digestion models, such as ADM1, require both detailed organic matter characterisation and intimate knowledge of the involved metabolic pathways. In the current study, a methodology for municipal sludge characterization is investigated to describe two key parameters: biodegradability and bioaccessibility of organic matter. The methodology is based on ...
Borsook David - - 2013
Error awareness or detection is the conscious and subconscious processing to evaluate physiological signals that are different from a baseline or homeostatic level. Migraine is a unique neurological disorder in which there are repeated attacks interspersed by attack-free periods. These attacks are dynamic and multidimensional in the sense that sensory, ...
Wilson Laura C - - 2013
Low resting heart rate is a well-replicated biological correlate of aggression, and sensation seeking is frequently cited as the underlying causal explanation. However, little empirical evidence supports this mediating relationship. Furthermore, the biosocial model of violence and social push theory suggest sensation seeking may moderate the relationship between heart rate ...
Tucker Susan L - - 2013
Background. The goal of the present study was to determine, in a large clinical cohort, whether incidental radiation exposure to the heart during definitive radiotherapy of inoperable non-small cell lung cancer (NSCLC) detectably increased the risk of radiation pneumonitis (RP) beyond that resulting from radiation exposure to lung. Material and ...
Khalilian Hanieh - - 2013
A new method for video watermarking is presented in this paper. In the proposed method, data are embedded in the LL subband of wavelet coefficients, and decoding is performed based on the comparison among the elements of the first principal component resulting from empirical principal component analysis (PCA). The locations ...
Strohm S - - 2013
Pattern formation occurs in a wide range of biological systems. This pattern formation can occur in mathematical models because of diffusion-driven instability or due to the interaction between reaction, diffusion, and chemotaxis. In this paper, we investigate the spatial pattern formation of attack clusters in a system for Mountain Pine ...
Beloufa Fayssal - - 2013
In this study, diagnosis of diabetes disease, which is one of the most important diseases, is conducted with artificial intelligence techniques. We have proposed a novel Artificial Bee Colony (ABC) algorithm in which a mutation operator is added to an Artificial Bee Colony for improving its performance. When the current ...
Ma Lijia - - 2013
The community structure and the robustness are two important properties of networks for analyzing the functionality of complex systems. The community structure is crucial to understand the potential functionality of complex systems, while the robustness is indispensable to protect the functionality of complex systems from malicious attacks. When a network ...
Postolache Octavian A - - 2013
In this paper we describe and compared method of heart rate estimation from cardiac signal acquired with EMFIT, FMCW Doppler radar and Finapres based technology, in the same context, and briefly investigated their similarities and differences. Study of processing of acquired cardiac signal for accurate peak detection using Wavelet Transform ...
Chang Kenneth - - 2013
Generating expression constructs for artificial microRNAs (miRNAs) is relatively straightforward. This protocol describes the creation of miR-30-based short hairpin RNA (shRNA) cassettes that are compatible with a number of standard vector systems. The principles outlined here can also be easily applied to other miRNA scaffolds or to simple snapback shRNAs. ...
Kumar Supriya S Department of Epidemiology, Graduate School of Public Health, University of Pittsburgh, Pittsburgh, PA, USA. - - 2013
We examined the impact of access to paid sick days (PSDs) and stay-at-home behavior on the influenza attack rate in workplaces. We used an agent-based model of Allegheny County, Pennsylvania, with PSD data from the US Bureau of Labor Statistics, standard influenza epidemic parameters, and the probability of staying home ...
O'Donnell Lauren J LJ Golby Lab, Department of Neurosurgery, Brigham and Women's Hospital, Boston MA, USA. - - 2013
We compare two strategies for modeling the connections of the brain's white matter: fiber clustering and the parcellation-based connectome. Both methods analyze diffusion magnetic resonance imaging fiber tractography to produce a quantitative description of the brain's connections. Fiber clustering is designed to reconstruct anatomically-defined white matter tracts, while the parcellation-based ...
García Roberto - - 2013
This work proposes a 25min-last thermogravimetric method as a tool to determine biomass sample's proximate analysis data (moisture, ash, volatile matter and fixed carbon contents) just by direct measure of weight changes on each sample's TG chart. Compared with international standards commonly used to that aim, TG is a faster ...
Ross Stephanie - - 2013
I applaud and elaborate on the contextualism at the heart of Bullot & Reber's (B&R's) theory, challenge two aspects of the appreciative structure they posit (the causal reasoning that allegedly underlies the design stance and the segregation of the component stages), suggest that expert and novice appreciators operate differently, and ...
Atmanspacher Harald - - 2013
We present a typology of mind-matter correlations embedded in a dual-aspect monist framework as proposed by Pauli and Jung. They conjectured a picture in which the mental and the material arise as two complementary aspects of one underlying psychophysically neutral reality to which they cannot be reduced and to which ...
Huan Yanfu - - 2013
In this paper, a novel chemometric method was developed for rapid, accurate, and quantitative analysis of cefalexin in samples. The experiments were carried out by using the short near-infrared spectroscopy coupled with artificial neural networks. In order to enhancing the predictive ability of artificial neural networks model, a modified genetic ...
Liu Jian-Yong - - 2013
A silicon(iv) phthalocyanine with two axial p-phenylene-linked boron dipyrromethene and monostyryl boron dipyrromethene moieties has been prepared. The resulting pentad absorbs strongly in most of the UV-visible region and serves as an artificial photosynthetic antenna-reaction centre model.
Okamoto Eiji - - 2013
We developed a new transcutaneous communication system (TCS) that uses the human body as a conductive medium for monitoring and controlling artificial hearts and other artificial organs in the body.In this study, the physiological effect of data current discharged into the body during data transmission was evaluated by an animal ...
Lucarotti Chiara - - 2013
This paper reviews the state of the art of artificial tactile sensing, with a particular focus on bio-hybrid and fully-biological approaches. To this aim, the study of physiology of the human sense of touch and of the coding mechanisms of tactile information is a significant starting point, which is briefly ...
Prabhu H R Aravinda - - 2013
Study of mind and consciousness through established scientific methods is often difficult due to the observed-observer dichotomy. Cartesian approach of dualism considering the mind and matter as two diverse and unconnected entities has been questioned by oriental schools of Yoga and Vedanta as well as the recent quantum theories of ...
De Livera Alysha M - - 2013
Statistical matters form an integral part of a metabolomics experiment. In this chapter we describe several important aspects in the analysis of metabolomics data such as the removal of unwanted variation and the identification of differentially abundant metabolites, along with a number of other essential statistical considerations.
1 2 3 4 5 6 7 >