• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 348
  • 128
  • 49
  • 39
  • 12
  • 10
  • 9
  • 7
  • 5
  • 4
  • 3
  • 3
  • 2
  • 1
  • 1
  • Tagged with
  • 712
  • 183
  • 95
  • 88
  • 87
  • 76
  • 69
  • 54
  • 53
  • 53
  • 53
  • 51
  • 49
  • 43
  • 42
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
331

Integrated microarray analytics for the discovery of gene signatures for triple-negative breast cancer

Zaka, Masood-Ul-Hassan, Peng, Yonghong, Sutton, Chris W. January 2014 (has links)
No / Triple-negative breast cancers (TNBC) are clinically heterogeneous, an aggressive form of breast cancer with poor diagnosis and highly therapeutic resistant. It is urgently needed for identifying novel biomarkers with increased sensitivity and specificity for early detection and personalised therapeutic intervention. Microarray profiling offered significant advances in molecular classification but sample scarcity and cohort heterogeneity remains challenging areas. Here, we investigated diagnostics signatures derived from human triple-negative tissue. We applied REMARK criteria for the selection of relevant studies and compared the signatures gene lists directly as well as assessed their classification performance in predicting diagnosis using leave-one-out cross-validation. The cross-validation results shows excellent classification accuracy ratios using all data sets. A subset signature (17-gene) extracted from the convergence of eligible signatures have also achieved excellent classification accuracy of 89.37% across all data sets. We also applied gene ontology functional enrichment analysis to extract potentially biological process, pathways and network involved in TNBC disease progression. Through functional analysis, we recognized that these independent signatures have displayed commonalities in functional pathways of cell signaling, which play important role in the development and progression of TNBC. We have also identified five unique TNBC pathways genes (SYNCRIP, NFIB, RGS4, UGCG, LOX and NNMT), which could be important for therapeutic interventions as indicated by their close association with known drivers of TNBC and previously published experimental studies. / Yorkshire Cancer Research for the Supplementary ort of CWS (BPP049 and B209PG)
332

Testing of a Full-Scale Composite Floor Plate

Lam, Dennis, Dai, Xianghe, Sheehan, Therese 29 January 2019 (has links)
Yes / A full-scale composite floor plate was tested to investigate the flexural behavior and in-plane effects of the floor slab in a grillage of composite beams that reduces the tendency for longitudinal splitting of the concrete slab along the line of the primary beams. This is important in cases where the steel decking is discontinuous when it is orientated parallel to the beams. In this case, it is important to demonstrate that the amount of transverse reinforcement required to transfer local forces from the shear connectors can be reduced relative to the requirements of Eurocode 4. The mechanism under study involved in-plane compression forces being developed in the slab due to the restraining action of the floor plate, which was held in position by the peripheral composite beams; while the secondary beams acted as transverse ties to resist the forces in the floor plate that would otherwise lead to splitting of the slab along the line of the primary beams. The tendency for cracking along the center line of the primary beam and at the peripheral beams was closely monitored. This is the first large floor plate test that has been carried out under laboratory conditions since the Cardington tests in the early 1990s, although those tests were not carried out to failure. This floor plate test was designed so that the longitudinal force transferred by the primary beams was relatively high (i.e., it was designed for full shear connection), but the transverse reinforcement was taken as the minimum of 0.2% of the concrete area. The test confirmed that the primary beams reached their plastic bending resistance despite the discontinuous decking and transverse reinforcement at the minimum percentage given in Eurocode 4. Based on this test, a reduction factor due to shear connectors at edge beams without U-bars is proposed.
333

Detecting Deepfake Videos using Digital Watermarking

Qureshi, Amna, Megías, D., Kuribayashi, M. 18 March 2022 (has links)
Yes / Deepfakes constitute fake content -generally in the form of video clips and other media formats such as images or audio- created using deep learning algorithms. With the rapid development of artificial intelligence (AI) technologies, the deepfake content is becoming more sophisticated, with the developed detection techniques proving to be less effective. So far, most of the detection techniques in the literature are based on AI algorithms and can be considered as passive. This paper presents a proof-of-concept deepfake detection system that detects fake news video clips generated using voice impersonation. In the proposed scheme, digital watermarks are embedded in the audio track of a video using a hybrid speech watermarking technique. This is an active approach for deepfake detection. A standalone software application can perform the detection of robust and fragile watermarks. Simulations are performed to evaluate the embedded watermark's robustness against common signal processing and video integrity attacks. As far as we know, this is one of the first few attempts to use digital watermarking for fake content detection. / EIG CONCERT-Japan call to the project entitled “Detection of fake newS on SocIal MedIa pLAtfoRms” (DISSIMILAR) through grants PCI2020-120689-2 (Ministry of Science and Innovation, Spain) and JPMJSC20C3 (JST SICORP, Japan). In addition, the work of the first two authors was partly funded by the Spanish Government through RTI2018-095094-B-C22 “CONSENT”
334

Gate Driver for Phase Leg of Parallel Enhancement-Mode Gallium-Nitride (GaN) Transistors

Gui, Yingying 11 June 2018 (has links)
With a higher power rating and broader application, Gallium nitride (GaN) is a promising next-generation power switch. The current four GaN HEMTs in paralleled phase leg that can block 400 V and conduct 200 A current is very beneficial, thus making the protection method on a GaN phase leg an urgent topic. This thesis starts with an overview of shortcircuit robustness among silicon (Si), silicon carbide (SiC) and GaN devices. An approximately safe operation area (SOA) for a GaN power switch will also be determined. The various common shortcircuit protection methods are mentioned. Additionally, current research on a GaN semiconductor is summarized. Among all of the protection methods, desaturation detection is selected and analyzed through simulation and then implemented in a parallel enhancement-mode high-electron-mobility transistor (E-HEMT) GaN phase leg. With this desaturation detection feature, the GaN E-HEMT can be turned off as quickly as 200 ns, and in the worst case, 500 ns, during a shortcircuit test. The phase leg survived a series of shortcircuit tests with shortcircuit protection. For the proposed protection scheme, the best-case reaction time (200 ns) is similar to others in the literature, while the shortcircuit peak current and peak energy are higher. The worst-case performance of this design is limited by both the gate driver and the device shortcircuit robustness. Due to the fast switching speed of the GaN HEMT, the false turn-on phenomenon caused by the Miller effect can be a problem. A shoot through may occur with one switch false turn on. The Miller clamp is added to the phase leg to improve its reliability. After the hardware was implemented, the Miller clamp was tested and verified through a double pulse test (DPT). Compared to the phase leg without the Miller clamp, the gate is better protected from gate voltage overshoot and undershoot. The switching loss is reduced by 20 percent by using a new gate driver IC with higher current driving capability. The degradation effect of GaN power switches in different shortcircuit pulses was also studied. The device passes through the shortcircuit tests, but any degradation effect that may change its parameters and influence its normal operation characteristic need to be addressed. Several GaN devices were selected and characterized after several shortcircuit tests to observe any degradation effect caused by the shortcircuit. The degradation test results reveal a "recovery effect" of the GaN HEMT used in this project. The parameter variations on threshold voltage and on-resistance recover to the original state, several hours after the shortcircuit test. The test results match with the conclusion drawn in degradation test conducts by other research groups that the parameter variation during shortcircuit test is negligible. Also, repetitively fast shortcircuit tests on the GaN HEMT show that the shortcircuit protection limit for this device under 400 V bus should be limited to 300 ns. / Master of Science / A phase leg consists of two power switches: a top switch and a bottom switch. As a result of a wrong gate signal or the Miller effect, shoot through problems may occur that lead to a shortcircuit current running through the channel. The excessive heat brought by the shortcircuit current will kill the device if not turned off in time. The failure of the phase leg may also have a hazardous impact on the rest of the system. To improve the overall system stability, a shortcircuit protection feature can be added on the gate-drive level. The shortcircuit protection turns off the device when it runs into shortcircuit mode, and before device failure. In this thesis, desaturation detection is selected to implement on a paralleled Gallium nitride (GaN) phase leg based on the device characteristic and configuration. Desaturation detection takes the device under test (DUT) as a current sensing component. By sensing the voltage across the DUT, the desaturation detection decides whether the DUT is operating under shortcircuit. If it is, a signal is sent to the gate driver to turn off the DUT when high voltage is sensed. A series of shortcircuit tests were conducted to verify the function of shortcircuit protection. A Miller clamp is also implemented and tested on the same phase leg to prevent a false turn on problem and to protect the gate. Both the Miller clamp and desaturation v detection features are tested on the same phase leg. The GaN devices survive the shortcircuit tests, with shortcircuit protection times between 200 ns to 500 ns. The design is successfully validated. Along with the implemented protection features, device degradation and shortcircuit robustness tests are also included in this work. The test results show that 300 ns shortcircuit time under 400 V bus is a safe turn off goal for this device.
335

Contrôle adaptatif robuste. Application au contrôle d'attitude de satellites / Robust adaptive control. Application to satellite attitude control

Leduc, Harmonie 22 September 2017 (has links)
Cette thèse porte sur la commande adaptative directe robuste et son application au contrôle d’attitude des satellites de la filière Myriade du CNES. Après avoir présenté les différents types de commande variant dans le temps, nous rappelons les caractéristiques d’un contrôleur adaptatif direct, en particulier le fait que la seule connaissance d’un retour de sortie stabilisant le système à contrôler suffit pour concevoir un contrôleur adaptatif direct. Parallèlement, nous présentons la théorie des systèmes descripteurs. Modéliser un système sous forme descripteur est non conventionnel mais présente de nombreux avantages dans le contexte de la commande adaptative directe robuste. A l’aide des résultats existants sur la commande adaptative directe d’une part, et de la théorie des systèmes descripteurs d’autre part, nous fournissons une méthode permettant de calculer, connaissant un retour de sortie constant, les paramètres d’un contrôleur adaptatif direct robuste stabilisant. Cette méthode repose sur la résolution d’inégalités matricielles linéaires. Le contrôleur adpatatif est plus robuste que le contrôleur constant, mais on ne peut prouver que la stabilité globale que vers un voisinage du point d’équilibre. Nous présentons ensuite une méthode, également basée sur la résolution d’inégalités matricielles linéaires, permettant de concevoir un contrôleur adaptatif direct robuste de meilleur niveau de rejet des perturbations extérieures que le contrôleur constant à partir duquel il est construit. L’ensemble de ces résultats théoriques est ensuite appliqué au contrôle d’attitude des satellites de la filière Myriade du CNES. En particulier, nous concevons un contrôleur d’attitude stabilisant le satellite quelle que soit la valeur de son inertie. Ce contrôleur d’attitude est également capable d’éviter aux roues à réaction du satellite de saturer. Nous concevons ensuite un contrôleur d’attitude adaptatif, robuste, et qui rejette mieux les perturbations extérieures que le contrôleur constant à partir duquel il est construit. Ce contrôleur constant est d’ailleurs actuellement implémenté à bord des satellites de la filière Myriade du CNES. Enfin, nous validons l’ensemble des résultats de cette thèse à l’aide d’un simulateur SCAO du CNES, où nous simulons le déploiement des mâts d’un satellite, ainsi que des scénarii de sauts de guidage. / This manuscript deals with robust direct adaptive control, and its application to CNES microsatellites attitude control. After listing the different types of time-varying controllers, we recall the characteristics of direct adaptive control. In particular, we recall that the knowledge of a stabilizing static output feedback is sufficient to design a direct adaptive controller. In parallel, we introduce the descriptor system theory. Modelizing a system into descriptor form is not usual but fits well with robust direct adaptive control. Starting from existing results about adaptive control and descriptor system theory, we provide an LMI based method which allows to compute, with the knowledge of a stabilizing static output feedback, the parameters of a stabilizing direct adaptive controller. A first result proves that the adaptive controller is at least as robust as the static output feedback. The second result allows to prove improved robustness at the expense of relaxing stability of the equilibrium point to practical stability, that is convergence to a neighborhood of the equilibrium. Then, we provide a method, LMI based as well, which allows to design a robust direct adaptive controller which has a better level of rejection of the perturbations than the static output feedback from which it is designed. All these theoretical results are applied to the attitude control of CNES microsatellites. We design a controller which stabilizes the attitude of the satellite whatever the value of its inertia. This attitude controller can also avoid the satellite reaction wheels to saturate. We design another robust adaptive attitude controller which has a better level of rejection of the perturbations than the static controller which is currently implemented aboard CNES satellites. Finally, we validate all the results of this manuscript by simulating on a AOCS CNES simulator the deployment of the satellite masts and some guiding jumps.
336

Systemeigenschaft Robustheit: Ein Ansatz zur Bewertung und Maximierung von Robustheit eingebetteter Systeme

Heller, Ariane 28 October 2013 (has links)
In die Infrastruktur unserer Gesellschaft sind komplexe IT-Systeme fest eingebettet. Die Verbreitung und Verstetigung von IT-Systemen betrifft zentrale Bereiche unserer Gesellschaft beispielsweise Verkehrs-, Finanz- oder Gesundheitssystem. Lange Zeit standen funktionale Aspekte bei der Entwicklung informationstechnischer Systeme im Vordergrund. In den letzten Jahren haben sich jedoch nichtfunktionale Eigenschaften von IT-Systemen wie Robustheit zu unverzichtbaren Schlüsseleigenschaften in einer Vielzahl von Anwendungsfeldern entwickelt. Systeme während der Betriebsphase sind Veränderungen der gegebenen Einsatz- und Betriebsbedingungen durch Störungen der Umgebung oder auch Verschleißerscheinungen ausgesetzt. Ziel der Forschungsarbeit ist es ein Konzept für die Systemeigenschaft Robustheit zu entwickeln. Für ein gegebenes System mit einem definierten Funktionsziel ist zu analysieren, inwieweit es robust hinsichtlich Störungen der Einsatzbedingungen, verursacht durch Ereignisse der Umgebung, ist und folglich trotzdem das Funktionsziel erfüllt. Das vorgestellte Konzept umfasst dabei zwei wesentliche Problemstellungen: Bewertung der Robustheit Methode für robuste Systeme zur Laufzeit In Abhängigkeit der technischen Kennzahl, Robustheit, wird eine optimale Entscheidungsstrategie gewählt und so das Systemverhalten gesteuert. Mit der Integration eines Robustheitskonzepts insbesondere für den Systembetrieb soll anhand der Berücksichtigung der Systemeigenschaft Robustheit zur Laufzeit ein Beitrag zum Qualitätszuwachs bei Systemen geleistet werden. / Complex IT-systems are deeply embedded in the infrastructure of the society. The integration of these systems is important for plenty of areas such as the transportation system, the financial system or the health care system. For a long time, the functional aspects of the invention had been put forward. But lately the non-functional characteristics of IT-systems such as robustness have developed to essential key factors in many fields. A lot of systems are being exposed to environmental disturbances are showing during the stage of operation. This research work purpose is to develop a concept of robustness to increase system robustness. The robustness of embedded systems is supposed to be analyzed towards disturbances and terms of usage that were caused by the environment. Thereby the concept targets two main issues: measurement of the robustness and methods for robust systems concerning its duration. Depending on the value of robustness a proper decision is made in order to control the behavior of the system. Through an integration of the above mentioned concept, a rise of quality regarding the robustness of the system is pursued respecting its period of operation.
337

Systemeigenschaft Robustheit: Ein Ansatz zur Bewertung und Maximierung von Robustheit eingebetteter Systeme

Heller, Ariane 15 October 2013 (has links)
In die Infrastruktur unserer Gesellschaft sind komplexe IT-Systeme fest eingebettet. Die Verbreitung und Verstetigung von IT-Systemen betrifft zentrale Bereiche unserer Gesellschaft beispielsweise Verkehrs-, Finanz- oder Gesundheitssystem. Lange Zeit standen funktionale Aspekte bei der Entwicklung informationstechnischer Systeme im Vordergrund. In den letzten Jahren haben sich jedoch nichtfunktionale Eigenschaften von IT-Systemen wie Robustheit zu unverzichtbaren Schlüsseleigenschaften in einer Vielzahl von Anwendungsfeldern entwickelt. Systeme während der Betriebsphase sind Veränderungen der gegebenen Einsatz- und Betriebsbedingungen durch Störungen der Umgebung oder auch Verschleißerscheinungen ausgesetzt. Ziel der Forschungsarbeit ist es ein Konzept für die Systemeigenschaft Robustheit zu entwickeln. Für ein gegebenes System mit einem definierten Funktionsziel ist zu analysieren, inwieweit es robust hinsichtlich Störungen der Einsatzbedingungen, verursacht durch Ereignisse der Umgebung, ist und folglich trotzdem das Funktionsziel erfüllt. Das vorgestellte Konzept umfasst dabei zwei wesentliche Problemstellungen: Bewertung der Robustheit und Methode für robuste Systeme zur Laufzeit. In Abhängigkeit der technischen Kennzahl, Robustheit, wird eine optimale Entscheidungsstrategie gewählt und so das Systemverhalten gesteuert. Mit der Integration eines Robustheitskonzepts insbesondere für den Systembetrieb soll anhand der Berücksichtigung der Systemeigenschaft Robustheit zur Laufzeit ein Beitrag zum Qualitätszuwachs bei Systemen geleistet werden. / Complex IT-systems are deeply embedded in the infrastructure of the society. The integration of these systems is important for plenty of areas such as the transportation system, the financial system or the health care system. For a long time, the functional aspects of the invention had been put forward. But lately the non-functional characteristics of IT-systems such as robustness have developed to essential key factors in many fields. A lot of systems are being exposed to environmental disturbances are showing during the stage of operation. This research work purpose is to develop a concept of robustness to increase system robustness. The robustness of embedded systems is supposed to be analyzed towards disturbances and terms of usage that were caused by the environment. Thereby the concept targets two main issues: measurement of the robustness and methods for robust systems concerning its duration. Depending on the value of robustness a proper decision is made in order to control the behavior of the system. Through an integration of the above mentioned concept, a rise of quality regarding the robustness of the system is pursued respecting its period of operation.
338

Robust Identification of Topological Defects in Discrete Vector Fields with Applications to Biological Image Data

Hoffmann, Karl B. 02 June 2023 (has links)
Topological defects are distinguished objects in vector fields that occur in a wide range of applications, ranging from material sciences to cosmology to bio-medical imaging and fingerprint recognition. This thesis considers topological point defects, also known as singular points, of two-dimensional vector fields. Besides Euclidean vectors as representation of modulus and direction, this also includes nematic vectors that equally have a modulus but direction is replaced with a head-to-tail symmetric orientation. In both case, a singular point or topological defect is an isolated discontinuity in an otherwise continuous vector field. It is characterized by its index or topological charge, which attains integer values for polar and half-integer values for nematic vector fields. There are different yet equivalent approaches to define the index. They either base on homology groups and the Brouwer degree, or on the first fundamental group and the mapping degree, or relatedly on lifting of a loop path enclosing the singular point. The definition by lift used here translates changes in the vector field along a path into a summed change in orientation angle. This translates to topological defects in discretized vector fields, where topological charge is calculated as sum of finite angle differences along a loop path between discretization points. On closer inspection, this calculation is an estimation, and is guaranteed to yield the correct estimate only with additional assumptions, for example when the underlying continuous-domain vector field is smooth and sampled at sufficiently high spatial resolution. Otherwise, arbitrary locations and charges of topological defects are possible, which yield exactly the same discretized vectors by the periodicity of representative orientation angles. Besides, the estimated topological charge depends discontinuously on each of the discrete input vectors and exhibits discrete jumps. As application data typically is subject to noise and uncertainty, this raises the question how reliable are topological defects identified in it. The present thesis quantifies, how large perturbations of a vector field are admissible without alteration of topological defects and charges. To that end, it introduces a robustness measure for each edge in a discretization grid that are combined along loop paths. Replacing critical edges of minimal robustness within a loop path by other path segments around a minimally larger area allows targeted increase of robustness. This data-dependent method called expansion over the critical edge is iterated until a user-set robustness is satisfied. The final areas of this algorithm are shown to have minimal size and therefore maximal spatial resolution, which also adapts to the local quality of data. The areas are also given as the faces in the graph of sufficiently robust edges after deleting all vertices of degree 1 (leaves) and all their connected edges. The minimal robust areas turn out to be nested by inclusion according to their robustness threshold. This allows to tradeoff detection robustness of topological charges versus their localization accuracy, both within a selection of pre-defined loop path shapes, and for free data-dependent expansion over the critical edge. Differently from defect identification by pattern matching, there is no restriction on the charge detectable. Besides, the robustness is shown to detect the size of unordered cores of defects. Robust defect areas indicate possible defect dynamics comprising motion, defect pair generation and annihilation already from single time point data. The robustness is also applicable to irregular discretization grids thanks to its graph theoretic characterization, and an extension to curved surfaces is foreseeable. The robust data-dependent defect identification is exemplified on microscopy images of the fruit fly Drosophila melanogaster. During Dorsal Closure, a developmental process, a cell sheet called amnioserosa contracts in highly regulated manner, whereby forces are actively generated and propagated along filamentous proteins like actin. Thereby, activity level and visco-elastic properties of the tissue are linked to the topological defects in the actin orientation field. Robust detection of these reveals that the sum over robust charges is clearly positive in the hundreds, whereas the overall sum of charge without robustness consideration fluctuates around zero. Numerous charges are observed, but $\pm 1/2$ dominate and confirm the amnioserosa as nematic material despite polar molecular constituents like actin. The sizes of robust defects span three orders of magnitude, and the largest defects follow the shapes of biological cells. The size distribution decays by a power law with the power for positive defects being more negative. Time courses show slightly higher speed of motion for +1/2 defects than for -1/2 defects, an order of magnitude above material flow velocity. Experiments with a genetic modification in the protein Crumbs had shown excess contraction of the amnioserosa cell layer during development. Comparing defect velocity of these embryos to wildtype suggests that viscosity and rotational viscosity increase stronger than activity level. This hypothesis remains to be tested in a combination of experiments and simulations, yet it would not have been generated in the first place without consideration of robust defects. More generally, the presented robustness measure and optimal data-dependent identification of topological defects could benefit the analysis of defects in discretized vector fields in a variety of disciplines. The optimal data-dependent identification allows for example to calculate error distributions for charge and localization of defects. The size, shape, and nested inclusion of robust defects constitute new observables, that generate numerous follow-up questions already for the fruit fly and enable novel analyses.:1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Application fields of topological defects . . . . . . . . . . . . . . . . . . . . . 1 1.2 Challenges of noisy, discretized vector fields . . . . . . . . . . . . . . . . . . 2 1.3 Thesis contribution and outline . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Mathematical background . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.1 Polar and nematic vectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.1.1 Isomorphism between polar and nematic vectors in two dimensions . 9 2.2 Homotopy, and (universal) covering . . . . . . . . . . . . . . . . . . . . . . . 19 2.2.1 Homotopies and the degree of mappings in the sense of homotopies . 19 2.2.2 Lifting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 3 Defect identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 3.1 Index and topological charge in continuous domains . . . . . . . . . . . . . 32 3.1.1 Definition of topological charge by lift . . . . . . . . . . . . . . . . . 39 3.1.2 Differential expressions for topological charge . . . . . . . . . . . . . 46 3.2 Topological charge in discrete domains . . . . . . . . . . . . . . . . . . . . . 48 3.2.1 Correct discretization by sufficiently fine discretization . . . . . . . . 53 3.3 Topological charge estimate . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 3.4 Comparison: defect identification by loop paths . . . . . . . . . . . . . . . . 61 3.4.1 ... equals fixed-size stencils . . . . . . . . . . . . . . . . . . . . . . . 61 3.4.2 ... equals convolution . . . . . . . . . . . . . . . . . . . . . . . . . . 62 3.4.3 ... resembles “diffusive topological charge” . . . . . . . . . . . . . . . 65 3.4.4 ... does not improve by larger stencil size . . . . . . . . . . . . . . . 66 3.4.5 ... is linked to local maxima of azimuthal change . . . . . . . . . . . 68 3.4.6 ... differs from nematic order parameter thresholds . . . . . . . . . . 68 3.4.7 ... differs from matching with template patterns . . . . . . . . . . . 70 3.4.8 ... extends to irregular and unstructured data . . . . . . . . . . . . . 71 3.5 Discontinuous dependence of defects on discretized vector fields . . . . . . . 72 4 Robustness of defect identification and topological charge estimation in discrete domains . . . 75 4.1 Robustness between two discretization points . . . . . . . . . . . . . . . . . 76 4.2 Robustness of a discrete loop path . . . . . . . . . . . . . . . . . . . . . . . 84 4.3 Magnitude-aware robustness for non-normalized vector fields . . . . . . . . 102 4.4 Robustness for fixed path shapes . . . . . . . . . . . . . . . . . . . . . . . . 116 4.4.1 Robustness of fixed-shape identification for noise-free defects . . . . 117 4.4.2 Robustness of fixed-shape identification for noisy defects . . . . . . . 120 4.5 Data-dependent path shapes . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 4.5.1 Expansion over the critical edge . . . . . . . . . . . . . . . . . . . . 126 4.5.2 Graph-theoretic characterization . . . . . . . . . . . . . . . . . . . . 128 4.5.3 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 4.5.4 Detection of defect core size . . . . . . . . . . . . . . . . . . . . . . . 135 4.5.5 Estimation of defect motion from still images . . . . . . . . . . . . . 143 4.5.6 Estimation of defect pair annihilation and generation, respectively, from still images . . . 145 4.5.7 Application to irregular grids . . . . . . . . . . . . . . . . . . . . . . 146 4.6 Comparison of defect identification methods from a robustness point of view 148 4.7 Extensions of the robustness measure . . . . . . . . . . . . . . . . . . . . . . 154 4.7.1 ... to two-dimensional manifolds . . . . . . . . . . . . . . . . . . . . 155 4.7.2 ... to higher dimensions . . . . . . . . . . . . . . . . . . . . . . . . . 160 5 Application to Dorsal Closure in Drosophila embryos . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 5.1 Dorsal Closure in the fruit fly Drosophila melanogaster . . . . . . . . . . . . 164 5.1.1 Cytoskeleton, motor proteins, and cell junctions . . . . . . . . . . . 164 5.1.2 Active gel models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 5.1.3 Image acquisition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 5.1.4 Orientation estimation . . . . . . . . . . . . . . . . . . . . . . . . . . 172 5.2 Topological charge analysis by robustness . . . . . . . . . . . . . . . . . . . 173 5.2.1 Robustness threshold of edges . . . . . . . . . . . . . . . . . . . . . . 173 5.2.2 Sizes of robust areas . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 5.2.3 Total topological charge in the field of view . . . . . . . . . . . . . . 181 5.2.4 Sum of robust charges . . . . . . . . . . . . . . . . . . . . . . . . . . 186 5.3 Further observables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 5.4 Comparison of robust defects . . . . . . . . . . . . . . . . . . . . . . . . . . 194 5.4.1 ... to microscopic defects . . . . . . . . . . . . . . . . . . . . . . . . . 196 5.4.2 ... to image preprocessing . . . . . . . . . . . . . . . . . . . . . . . . 201 5.5 Towards parameter estimation from defect dynamics . . . . . . . . . . . . . 202 5.5.1 The amnioserosa as an active nematic material . . . . . . . . . . . . 202 5.5.2 Defect tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 5.5.3 Hypothesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 6 Conclusions and discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 / Topologische Defekte sind abgegrenzte Objekte in Vektorfeldern, die in einer großen Bandbreite von Anwendungsfeldern auftreten. Diese reichen von den Materialwissenschaften über Kosmologie und bio-medizinische Bildgebung bis zur Erkennung von Fingerabdrücken. Die vorliegende Dissertation beschäftigt sich mit topologischen Punkt-Defekten, auch bekannt als singuläre Punkte, in zwei-dimensionalen Vektorfeldern. Neben Euklidischen Vektoren als Darstellung von Betrag und Richtung umfasst das auch nematische Vektoren, die genauso einen Betrag haben, aber deren Richtungsinformation symmetrisch zwischen “vorn” und “hinten” ist. In beiden Fällen ist ein singulärer Punkt oder topologischer Defekt als isolierte Unstetigkeit in einem ansonsten stetigen Vektorfeld definiert. Er wird durch seinen Index oder die topologische Ladung charakterisiert, die ganzzahlige Werte für polare Felder annimmt, und halb-zahlige in nematischen Feldern. Es gibt verschiedene, jedoch äquivalente Weisen, den Index zu definieren. Sie basieren entweder auf Homologiegruppen und dem Brouwer'schen Abbildungsgrad, oder auf der Fundamentalgruppe und deren Abbildungsgrad, oder damit verbunden auf der Hochhebung eines geschlossenen Pfades um den singulären Punkt. Hier wird die Definition mittels Hochhebung verwendet, welche die Änderung des Vektorfeldes entlang eines Pfades in eine summierte Änderung des Orientierungswinkels übersetzt. Dies überträgt sich zu diskretisierten Vektorfeldern, wo die topologische Ladung als Summe über endliche Winkeldifferenzen entlang eines Pfades zwischen Diskretisierungspunkten berechnet wird. Diese Berechungsweise ist bei genauer Betrachtung eine Schätzung, und ihre Korrektheit nur unter zusätzlichen Bedingungen garantiert, zum Beispiel wenn ein zugrundeliegendes Vektorfeld mit kontinuierlichem Definitionsbereich glatt ist und mit hinreichender räumlicher Auflösung abgetastet wurde. Aufgrund der periodischen Darstellung jedes Vektors durch Orientierungswinkel sind andernfalls beliebige Positionen und Ladungen von topologischen Defekten möglich, die zu exakt den gleichen diskretisierten Vektoren führen. Außerdem hängt der Schätzwert der topologischen Ladung nicht kontinuierlich von jedem einzelnen der diskreten Vektoren ab, sondern weist diskrete Sprünge auf. Da Anwendungsdaten meist mit Messunsicherheiten behaftet oder verrauscht sind, steht die Frage, wie verlässlich die darin identifizierten Defekte sind. Die vorliegende Dissertation quantifiziert, wie groß die Störungen eines Vektorfeldes sein dürfen, ohne dass sich topologische Defekte und Ladungen ändern. Dafür wird ein Robustheitsmaß eingeführt, zunächst für jede Kante in einem Diskretisierungsgitter, und darauf basierend für Pfade. Das ermöglicht, die Robustheit der Defekt-Identifizierung gezielt zu erhöhen: Kritische Kanten mit der kleinsten Robustheit innerhalb eines Pfades werden durch andere Pfadstücke ersetzt, die eine minimal größere Fläche begrenzen. Diese datenabhängige “Erweiterung über die kritische Kante” (expansion over the critical edge) wird wiederholt, bis eine benutzerdefinierte Robustheit erreicht ist. Es wird gezeigt, dass die finalen Flächen dieses iterativen Algorithmus minimale Größe und damit höchste räumliche Auflösung haben, die sich zudem lokal an die Qualität der Daten anpasst. Die Flächen ergeben sich auch aus dem Graphen aller hinreichend robusten Kanten durch Löschen aller Knoten vom Grad 1 (Blätter) und der damit verbundenen Kanten. Es stellt sich damit heraus, dass die minimalen robusten Flächen je nach Robustheitsgrenze per Inklusion verkettet sind. Das erlaubt, die Robustheit für die Identifizierung topologischer Ladungen gegen die räumliche Genauigkeit abzuwägen, sowohl innerhalb von vorgegebenen Pfadformen, als auch für die freie, datenabhängige Erweiterung über die kritische Kante. Dabei gibt es — anders als bei Methoden der Defekt-Identifizierung mittels Muster-Erkennung — keine Beschränkung für die detektierbare Ladung. Außerdem wird gezeigt, dass man mit dem Robustheitsmaß die Größe von ungeordneten Kernen der Defekte bestimmen kann. Sogar die mögliche Dynamik von Defekten mit Bewegung, Paarbildung und -auslöschung wird aus den robusten Flächen eines einzelnen Zeitpunktes erkennbar. Die graphentheoretische Darstellung erlaubt dabei auch die Anwendung auf unstrukturierten Diskretisierungsgitter, und eine Erweiterung auf gekrümmte Flächen ist absehbar. Die robuste, datenabhängige Identifizierung von Defekten wird exemplarisch auf Mikroskopie-Bilder der Fruchtfliege Drosophila melanogaster angewendet. Während der Dorsal Closure, einem Entwicklungsprozess, zieht sich eine Zellschicht namens Amnioserosa auf genau regulierte Weise zusammen, wobei die wirkenden Kräfte entlang von Filamenten wie Aktin aktiv erzeugt und übertragen werden. Dabei sind der Aktivitätsgrad und viskoelastische Eigenschaften des Gewebes mit den topologischen Defekten im Orientierungsfeld des Aktins verknüpft. Deren robuste Identifizierung zeigt, dass die Summe der robusten Ladungen eindeutig positiv ist mit dreistelligen Werten, während die Gesamtladung ohne Beachtung der Robustheit um Null schwankt. Es werden zahlreiche Ladungen beobachtet; aber $\pm 1/2$ dominieren und bestätigen die Amnioserosa als nematisches Material, obwohl die molekularen Bestandteile wie Aktin polar sind. Die Größen von robusten Defekten umfassen drei Zehnerpotenzen, und die größten Defekte folgen der Form biologischer Zellen. Die Größenverteilung fällt nach einem Potenzgesetz ab, mit stärkerer negativer Potenz für positive Defekte. Zeitreihen zeigen geringfügig höhere Geschwindigkeit von +1/2 Defekten als von -1/2 Defekten, und deutlich über der Geschwindigkeit des Materialflusses. In Experimenten mit Modifikation im Gen des Proteins Crumbs wurde beobachtet, dass sich die Zellschicht der Amnioserosa in der Entwicklung übermäßig zusammenzieht. Ein Vergleich der Defektgeschwindigkeiten zwischen diesen Embryonen und Wildtyp führt zu der Hypothese, dass die Mutation die Viskosität und die Rotationsviskosität stärker steigen lässt als den Aktivitätsgrad. Diese Hypothese muss jedoch noch durch eine Kombination von Experimenten und Simulationen überprüft werden. Sie wäre aber ohne die Betrachtung von robusten Defekten gar nicht erst möglich gewesen. Das vorgestellte Robustheitsmaß könnte allgemein für vielfältige Disziplinen bei der Analyse topologischer Defekte in diskretisierten Vektorfeldern nützen. Auf Basis der optimalen datenabhängige Identifizierung kann zum Beispiele eine Fehlerrechnung für die Ladung und Lage von Defekten durchgeführt werden. Die Größen, Formen und Inklusionsketten von robusten Defekten bilden interessante neue Beobachtungsgrößen, die allein im Fall der Fruchtfliege zahlreiche weiterführende Fragen aufwerfen und bisher unbekannte Untersuchungen ermöglichen.:1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Application fields of topological defects . . . . . . . . . . . . . . . . . . . . . 1 1.2 Challenges of noisy, discretized vector fields . . . . . . . . . . . . . . . . . . 2 1.3 Thesis contribution and outline . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Mathematical background . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.1 Polar and nematic vectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.1.1 Isomorphism between polar and nematic vectors in two dimensions . 9 2.2 Homotopy, and (universal) covering . . . . . . . . . . . . . . . . . . . . . . . 19 2.2.1 Homotopies and the degree of mappings in the sense of homotopies . 19 2.2.2 Lifting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 3 Defect identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 3.1 Index and topological charge in continuous domains . . . . . . . . . . . . . 32 3.1.1 Definition of topological charge by lift . . . . . . . . . . . . . . . . . 39 3.1.2 Differential expressions for topological charge . . . . . . . . . . . . . 46 3.2 Topological charge in discrete domains . . . . . . . . . . . . . . . . . . . . . 48 3.2.1 Correct discretization by sufficiently fine discretization . . . . . . . . 53 3.3 Topological charge estimate . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 3.4 Comparison: defect identification by loop paths . . . . . . . . . . . . . . . . 61 3.4.1 ... equals fixed-size stencils . . . . . . . . . . . . . . . . . . . . . . . 61 3.4.2 ... equals convolution . . . . . . . . . . . . . . . . . . . . . . . . . . 62 3.4.3 ... resembles “diffusive topological charge” . . . . . . . . . . . . . . . 65 3.4.4 ... does not improve by larger stencil size . . . . . . . . . . . . . . . 66 3.4.5 ... is linked to local maxima of azimuthal change . . . . . . . . . . . 68 3.4.6 ... differs from nematic order parameter thresholds . . . . . . . . . . 68 3.4.7 ... differs from matching with template patterns . . . . . . . . . . . 70 3.4.8 ... extends to irregular and unstructured data . . . . . . . . . . . . . 71 3.5 Discontinuous dependence of defects on discretized vector fields . . . . . . . 72 4 Robustness of defect identification and topological charge estimation in discrete domains . . . 75 4.1 Robustness between two discretization points . . . . . . . . . . . . . . . . . 76 4.2 Robustness of a discrete loop path . . . . . . . . . . . . . . . . . . . . . . . 84 4.3 Magnitude-aware robustness for non-normalized vector fields . . . . . . . . 102 4.4 Robustness for fixed path shapes . . . . . . . . . . . . . . . . . . . . . . . . 116 4.4.1 Robustness of fixed-shape identification for noise-free defects . . . . 117 4.4.2 Robustness of fixed-shape identification for noisy defects . . . . . . . 120 4.5 Data-dependent path shapes . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 4.5.1 Expansion over the critical edge . . . . . . . . . . . . . . . . . . . . 126 4.5.2 Graph-theoretic characterization . . . . . . . . . . . . . . . . . . . . 128 4.5.3 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 4.5.4 Detection of defect core size . . . . . . . . . . . . . . . . . . . . . . . 135 4.5.5 Estimation of defect motion from still images . . . . . . . . . . . . . 143 4.5.6 Estimation of defect pair annihilation and generation, respectively, from still images . . . 145 4.5.7 Application to irregular grids . . . . . . . . . . . . . . . . . . . . . . 146 4.6 Comparison of defect identification methods from a robustness point of view 148 4.7 Extensions of the robustness measure . . . . . . . . . . . . . . . . . . . . . . 154 4.7.1 ... to two-dimensional manifolds . . . . . . . . . . . . . . . . . . . . 155 4.7.2 ... to higher dimensions . . . . . . . . . . . . . . . . . . . . . . . . . 160 5 Application to Dorsal Closure in Drosophila embryos . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 5.1 Dorsal Closure in the fruit fly Drosophila melanogaster . . . . . . . . . . . . 164 5.1.1 Cytoskeleton, motor proteins, and cell junctions . . . . . . . . . . . 164 5.1.2 Active gel models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 5.1.3 Image acquisition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 5.1.4 Orientation estimation . . . . . . . . . . . . . . . . . . . . . . . . . . 172 5.2 Topological charge analysis by robustness . . . . . . . . . . . . . . . . . . . 173 5.2.1 Robustness threshold of edges . . . . . . . . . . . . . . . . . . . . . . 173 5.2.2 Sizes of robust areas . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 5.2.3 Total topological charge in the field of view . . . . . . . . . . . . . . 181 5.2.4 Sum of robust charges . . . . . . . . . . . . . . . . . . . . . . . . . . 186 5.3 Further observables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 5.4 Comparison of robust defects . . . . . . . . . . . . . . . . . . . . . . . . . . 194 5.4.1 ... to microscopic defects . . . . . . . . . . . . . . . . . . . . . . . . . 196 5.4.2 ... to image preprocessing . . . . . . . . . . . . . . . . . . . . . . . . 201 5.5 Towards parameter estimation from defect dynamics . . . . . . . . . . . . . 202 5.5.1 The amnioserosa as an active nematic material . . . . . . . . . . . . 202 5.5.2 Defect tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 5.5.3 Hypothesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 6 Conclusions and discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
339

Characteristics of robust complex networks

Sydney, Ali January 1900 (has links)
Master of Science / Department of Electrical and Computer Engineering / Caterina M. Scoglio / In network theory, a complex network represents a system whose evolving structure and dynamic behavior contribute to its robustness. The study of complex networks, though young, spans diverse domains including engineering, science, biology, sociology, psychology, and business, to name a few. Regardless of the field of interest, robustness defines a network’s survivability in the advent of classical component failures and at the onset of cryptic malicious attacks. With increasingly ambitious initiatives such as GENI and FIND that seek to design future internets, it becomes imperative to define the characteristics of robust topologies, and to build future networks optimized for robustness. This thesis investigates the characteristics of network topologies that maintain a high level of throughput in spite of multiple attacks. To this end, we select network topologies belonging to the main network models and some real world networks. We consider three types of attacks: removal of random nodes, high degree nodes, and high betweenness nodes. We use elasticity as our robustness measure and, through our analysis, illustrate that different topologies can have different degrees of robustness. In particular, elasticity can fall as low as 0.8% of the upper bound based on the attack employed. This result substantiates the need for optimized network topology design. Furthermore, we implement a trade off function that combines elasticity under the three attack strategies and considers the cost of the network. Our extensive simulations show that, for a given network density, regular and semi-regular topologies can have higher degrees of robustness than heterogeneous topologies, and that link redundancy is a sufficient but not necessary condition for robustness.
340

Architectures adaptives et reconfigurables de fusion de données dans les sytèmes de positionnement pour la navigation / Adaptive and reconfigurable data fusion architectures in positioning navigation systems

Liu, Guopei January 2008 (has links)
Dans les systèmes de positionnement de véhicules, à tout moment, n'importe lequel des détecteurs peut, temporairement ou de manière permanente, tomber en panne ou cesser d'envoyer des informations. Il s'ensuit alors des répercussions sur la sécurité, la santé, ainsi que des informations financières ou même légales. Bien que les nouvelles pratiques de conception aient tendance à réduire au minimum les défaillances des détecteurs, il est reconnu que de tels évènements peuvent quand même souvenir. Dans un tel cas, le détecteur défectueux doit être identifié et isolé afin d'éviter de corrompre les évaluations globales et, finalement, le système doit être capable de se reconfigurer afin de surmonter le carence causée par la défaillance. En bref, un système de navigation doit être robuste et adaptatif. Cette thèse propose plusieurs architectures de fusion de données capables de s'adapter suite à des défaillances de détecteurs. Les diverses approches utilisent un filtre Kalman en combinaison avec la détection de défauts pour produire des modules de positionnement robuste. Les modules devront être capables de fonctionner dans des situations telles que l'entrée GPS est corrompue ou non disponible, ou bien qu'un plusieurs détecteurs de position sont défectueux ou bloqués. Le principe de travail vise la modification des gains du filtre Kalman en se basant sur les erreurs normalisées entre les états estimés et les observations. Pour évaluer l'architecture proposée, divers défauts de détecteurs et diverses dégradations de performance ont été mis en oeuvre et simulés. Les expériences démontrent que les solutions proposées peuvent compenser la plupart des erreurs associées aux défauts des détecteurs ou aux dégradations de performance, et que l'exactitude de positionnement qui en découle est améliorée significativement.

Page generated in 0.0631 seconds