Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 14 de 14
Filtrar
1.
J Vis ; 21(2): 7, 2021 02 03.
Artigo em Inglês | MEDLINE | ID: mdl-33576764

RESUMO

We examined whether perception of color saturation and lightness depends on the three-dimensional (3D) shape and surface gloss of surfaces rendered to have different hues. In Experiment 1, we parametrically varied specular roughness of predominantly planar surfaces with different mesoscopic relief heights. The orientation of surfaces was varied relative to the light source and observer. Observers matched perceived lightness and chroma (effectively saturation) using spherical objects rendered using CIE LCH color space. We observed strong interactions between perceived saturation and lightness with changes in surface orientation and surface properties (specular roughness and 3D relief height). Declines in saturation and increases in lightness were observed with increasing specular roughness. Changes in relief height had greater effects on perceived saturation and lightness for blue hues compared with reddish and greenish hues. Experiment 2 found inverse correlations between perceived gloss and specular roughness across conditions. Experiment 3 estimated perceived specular coverage and found that a weighted combination of perceived gloss and specular coverage could account for perceived color saturation and lightness, with different coefficients accounting for the perceptual experience for each of the three hue conditions. These findings suggest that perceived color saturation and lightness depend on the separation of specular highlights from diffuse shading informative of chromatic surface reflectance.


Assuntos
Percepção de Cores/fisiologia , Propriedades de Superfície , Humanos , Imageamento Tridimensional , Luz , Orientação Espacial/fisiologia
2.
Sci Eng Ethics ; 22(1): 1-29, 2016 Feb.
Artigo em Inglês | MEDLINE | ID: mdl-25552240

RESUMO

The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. Two central ethical issues are addressed: those of privacy and those of autonomy. VRSNs pose threats to both privacy and autonomy. The threats to privacy can be broadly categorized as threats to informational privacy, threats to physical privacy, and threats to associational privacy. Each of these threats is further subdivided. The threats to autonomy can be broadly categorized as threats to freedom, to knowledge and to authenticity. Again, these three threats are divided into subcategories. Having categorized the main threats posed by VRSNs, a number of recommendations are provided so that policy-makers, developers, and users can make the best possible use of VRSNs.


Assuntos
Internet/ética , Autonomia Pessoal , Privacidade , Rede Social , Tecnologia/ética , Confidencialidade , Liberdade , Humanos , Relações Interpessoais , Pessoalidade
3.
Soc Sci Res ; 52: 253-69, 2015 Jul.
Artigo em Inglês | MEDLINE | ID: mdl-26004461

RESUMO

Though extensive research has explored the prevalence of educational assortative mating, what causes its variation across countries and over time is not well understood. Using data from the Luxembourg Income Study Database, I investigate the hypothesis that assortative mating by income is influenced by income inequality between educational strata. I find that in countries with greater returns to education, the odds of any sort of union that crosses educational boundaries is substantially reduced. However, I do not find substantial evidence of an effect of changes in returns to education on marital sorting within countries. Educational and labor market parity between males and females appear to be negatively related to marital sorting.


Assuntos
Comportamento de Escolha , Escolaridade , Renda , Casamento , Emprego , Feminino , Humanos , Luxemburgo , Masculino , Fatores Socioeconômicos
4.
Am J Physiol Renal Physiol ; 307(12): F1412-26, 2014 Dec 15.
Artigo em Inglês | MEDLINE | ID: mdl-25339699

RESUMO

Mesenchymal stem cells (MSCs) suppress T helper (Th)17 cell differentiation and are being clinically pursued for conditions associated with aberrant Th17 responses. Whether such immunomodulatory effects are enhanced by coadministration of MSCs with other agents is not well known. In the present study, individual and combined effects of MSCs and the vitamin D receptor (VDR) agonist paricalcitol on Th17 induction were investigated in vitro and in a mouse model of sterile kidney inflammation (unilateral ureteral obstruction). In vitro, MSCs and paricalcitol additively suppressed Th17 differentiation, although only MSCs suppressed expression of Th17-associated transcriptions factors. Combined administration of MSCs and paricalcitol resulted in an early (day 3) reduction of intrarenal CD4(+) and CD8(+) T cells, CD11b(+)/lymphocyte antigen 6G(+) neutrophils, and inflammatory (lymphocyte antigen 6C(hi)) monocytes as well as reduced transcript for IL-17 compared with untreated animals. Later (day 8), obstructed kidneys of MSC/paricalcitol double-treated mice, but not mice treated with either intervention alone, had reduced tubular injury and interstitial fibrosis as well as lower numbers of neutrophils and inflammatory monocytes and an increase in the ratio between M2 (CD206(+)) and M1 (CD206(-)) macrophages compared with control mice. Adjunctive therapy with VDR agonists may enhance the immunosuppressive properties of MSCs in the setting of pathogenic Th17-type immune responses and related inflammatory responses.


Assuntos
Anti-Inflamatórios/farmacologia , Ergocalciferóis/farmacologia , Imunossupressores/farmacologia , Rim/efeitos dos fármacos , Transplante de Células-Tronco Mesenquimais , Nefrite/prevenção & controle , Receptores de Calcitriol/agonistas , Células Th17/efeitos dos fármacos , Animais , Biomarcadores/metabolismo , Células Cultivadas , Modelos Animais de Doenças , Feminino , Fibrose , Interleucina-17/genética , Interleucina-17/metabolismo , Rim/imunologia , Rim/metabolismo , Rim/patologia , Macrófagos/efeitos dos fármacos , Macrófagos/imunologia , Macrófagos/metabolismo , Camundongos Endogâmicos C57BL , Nefrite/etiologia , Nefrite/imunologia , Nefrite/metabolismo , Nefrite/patologia , Infiltração de Neutrófilos/efeitos dos fármacos , Receptores de Calcitriol/metabolismo , Células Th17/imunologia , Células Th17/metabolismo , Fatores de Tempo , Obstrução Ureteral/complicações
5.
Biochem Biophys Res Commun ; 443(2): 761-7, 2014 Jan 10.
Artigo em Inglês | MEDLINE | ID: mdl-24333448

RESUMO

Anisomycin was identified in a screen of clinical compounds as a drug that kills breast cancer cells (MDA16 cells, derived from the triple negative breast cancer cell line, MDA-MB-468) that express high levels of an efflux pump, ABCB1. We show the MDA16 cells died by a caspase-independent mechanism, while MDA-MB-468 cells died by apoptosis. There was no correlation between cell death and either protein synthesis or JNK activation, which had previously been implicated in anisomycin-induced cell death. In addition, anisomycin analogues that did not inhibit protein synthesis or activate JNK retained the ability to induce cell death. These data suggest that either a ribosome-ANS complex is a death signal in the absence of JNK activation or ANS kills cells by binding to an as yet unidentified target.


Assuntos
Anisomicina/farmacologia , Apoptose/efeitos dos fármacos , Neoplasias da Mama/metabolismo , Neoplasias da Mama/patologia , MAP Quinase Quinase 4/metabolismo , Biossíntese de Proteínas/efeitos dos fármacos , Inibidores da Síntese de Proteínas/farmacologia , Anisomicina/análogos & derivados , Linhagem Celular Tumoral , Ativação Enzimática/efeitos dos fármacos , Humanos
6.
Sensors (Basel) ; 13(4): 5317-37, 2013 Apr 19.
Artigo em Inglês | MEDLINE | ID: mdl-23604031

RESUMO

In this paper we present a framework that allows for the automatic identification of sporting activities using commonly available smartphones. We extract discriminative informational features from smartphone accelerometers using the Discrete Wavelet Transform (DWT). Despite the poor quality of their accelerometers, smartphones were used as capture devices due to their prevalence in today's society. Successful classification on this basis potentially makes the technology accessible to both elite and non-elite athletes. Extracted features are used to train different categories of classifiers. No one classifier family has a reportable direct advantage in activity classification problems to date; thus we examine classifiers from each of the most widely used classifier families. We investigate three classification approaches; a commonly used SVM-based approach, an optimized classification model and a fusion of classifiers. We also investigate the effect of changing several of the DWT input parameters, including mother wavelets, window lengths and DWT decomposition levels. During the course of this work we created a challenging sports activity analysis dataset, comprised of soccer and field-hockey activities. The average maximum F-measure accuracy of 87% was achieved using a fusion of classifiers, which was 6% better than a single classifier model and 23% better than a standard SVM approach.


Assuntos
Acelerometria/instrumentação , Telefone Celular/instrumentação , Esportes/classificação , Algoritmos , Futebol Americano , Hóquei , Humanos , Futebol , Análise de Ondaletas
7.
Res High Educ ; 63(3): 425-452, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-34456455

RESUMO

Community colleges have been under pressure for years to improve retention rates. Considering well-publicized reductions in state funding during and after the Great Recession, progress in this area is unexpected. And yet this is precisely what we find. Using the Integrated Postsecondary Education Data System (IPEDS), we find an average increase in retention of nearly 5 percentage points, or 9 percent, across the sector from 2004 to 2017. Over 70% of institutions posted retention gains, and average improvement occurred yearly over the period excepting a reversal at the height of the Great Recession. Gains were smaller on average at schools with higher tuition and that serve more disadvantaged populations, and larger at institutions with lower student-faculty ratios and higher per-student instructional spending. Fixed-effects regression and Oaxaca decomposition analyses demonstrate that these gains were not caused by observable changes in student body composition or in institutional characteristics such as increased per-student instructional spending.

8.
Front Psychol ; 11: 485, 2020.
Artigo em Inglês | MEDLINE | ID: mdl-32265792

RESUMO

This study examined perceptual differentiation of specular from diffuse shading for the recovery of surface color and gloss. In Experiment 1, we parametrically varied the mesoscale relief height of globally planar surfaces, specular sharpness and the orientation of the surface relative to the light source. We obtained psychophysical matches for perceived color saturation and value (HSV), but also considered whether the main effects could be influenced by color space used when transforming data to perceptually-uniform CIE LCH space. Results revealed strong interactions between perceived color attributes and the lighting conditions, the structure of specular reflections, and surface relief. Declines in saturation were observed with increasing specular roughness (using an HSV color representation), but no similar decline was observed in chroma (using a CIE LCH color representation). Experiment 2 found strong negative correlations between perceived gloss and specular roughness. Perceived gloss also depended on mesoscopic relief height and orientation of the surface relative to the light source. Declines in perceived gloss moderately accounted for the variability in color saturation and value matches obtained in Experiment 1. We found information about perceived specular coverage could further improve the model's accountability of perceived color saturation and lightness (Experiment 3). These findings together suggest that perceived color saturation and color value depends on the visual system's ability to distinguish the underlying diffuse shading from specular highlights in images.

9.
Opt Lett ; 34(23): 3610-2, 2009 Dec 01.
Artigo em Inglês | MEDLINE | ID: mdl-19953136

RESUMO

A method to numerically remove the twin image for inline digital holography, using multiple digital holograms, is discussed. Each individual hologram is recorded by using a statistically independent speckle field to illuminate the object. If the holograms are recorded in this manner and then numerically reconstructed, the twin image appears as a different speckle pattern in each of the reconstructions. By performing speckle-reduction techniques the presence of the twin image can be greatly reduced. A theoretical model is developed, and experimental results are presented that validate this approach. We show experimentally that the dc object intensity term can also be removed by using this technique.

10.
Appl Opt ; 47(21): 3808-16, 2008 Jul 20.
Artigo em Inglês | MEDLINE | ID: mdl-18641750

RESUMO

We perform a numerical analysis of the double random phase encryption-decryption technique to determine how, in the case of both amplitude and phase encoding, the two decryption keys (the image- and Fourier-plane keys) affect the output gray-scale image when they are in error. We perform perfect encryption and imperfect decryption. We introduce errors into the decrypting keys that correspond to the use of random distributions of incorrect pixel values. We quantify the effects that increasing amounts of error in the image-plane key, the Fourier-plane key, and both keys simultaneously have on the decrypted image. Quantization effects are also examined.

11.
Opt Express ; 14(8): 3181-6, 2006 Apr 17.
Artigo em Inglês | MEDLINE | ID: mdl-19516459

RESUMO

The Fourier plane encryption algorithm is subjected to a known-plaintext attack. The simulated annealing heuristic algorithm is used to estimate the key, using a known plaintext-ciphertext pair, which decrypts the ciphertext with arbitrarily low error. The strength of the algorithm is tested by using this estimated key to decrypt a different ciphertext which was also encrypted using the same original key. We assume that the plaintext is amplitude-encoded real-valued image, and analyze only the mathematical algorithm rather than a real optical system that can be more secure. The Fourier plane encryption algorithm is found to be susceptible to a known-plaintext heuristic attack.

12.
J Opt Soc Am A Opt Image Sci Vis ; 26(9): 2033-42, 2009 Sep.
Artigo em Inglês | MEDLINE | ID: mdl-19721689

RESUMO

The amplitude-encoding case of the double random phase encoding technique is examined by defining a cost function as a metric to compare an attempted decryption against the corresponding original input image. For the case when a cipher-text pair has been obtained and the correct decryption key is unknown, an iterative attack technique can be employed to ascertain the key. During such an attack the noise in the output field for an attempted decryption can be used as a measure of a possible decryption key's correctness. For relatively small systems, i.e., systems involving fewer than 5x5 pixels, the output decryption of every possible key can be examined to evaluate the distribution of the keys in key space in relation to their relative performance when carrying out decryption. However, in order to do this for large systems, checking every single key is currently impractical. One metric used to quantify the correctness of a decryption key is the normalized root mean squared (NRMS) error. The NRMS is a measure of the cumulative intensity difference between the input and decrypted images. We identify a core term in the NRMS, which we refer to as the difference parameter, d. Expressions for the expected value (or mean) and variance of d are derived in terms of the mean and variance of the output field noise, which is shown to be circular Gaussian. These expressions assume a large sample set (number of pixels and keys). We show that as we increase the number of samples used, the decryption error obeys the statistically predicted characteristic values. Finally, we corroborate previously reported simulations in the literature by using the statistically derived expressions.

13.
Appl Opt ; 46(22): 5257-62, 2007 Aug 01.
Artigo em Inglês | MEDLINE | ID: mdl-17676139

RESUMO

The security of the encryption and verification techniques with significant output images is examined by a known-plaintext attack. We introduce an iterative phase-retrieval algorithm based on multiple intensity measurements to heuristically estimate the phase key in the Fourier domain by several plaintext-cyphertext pairs. We obtain correlation output images with very low error by correlating the estimated key with corresponding random phase masks. Our studies show that the convergence behavior of this algorithm sensitively depends on the starting point. We also demonstrate that this algorithm can be used to attack the double random phase encoding technique.

14.
Appl Opt ; 46(26): 6641-7, 2007 Sep 10.
Artigo em Inglês | MEDLINE | ID: mdl-17846658

RESUMO

We perform a numerical analysis on the double random phase encryption/decryption technique. The key-space of an encryption technique is the set of possible keys that can be used to encode data using that technique. In the case of a strong encryption scheme, many keys must be tried in any brute-force attack on that technique. Traditionally, designers of optical image encryption systems demonstrate only how a small number of arbitrary keys cannot decrypt a chosen encrypted image in their system. However, this type of demonstration does not discuss the properties of the key-space nor refute the feasibility of an efficient brute-force attack. To clarify these issues we present a key-space analysis of the technique. For a range of problem instances we plot the distribution of decryption errors in the key-space indicating the lack of feasibility of a simple brute-force attack.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA