223 resultados para Homography constraint


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The cybernetic modeling framework provides an interesting approach to model the regulatory phenomena occurring in microorganisms. In the present work, we adopt a constraints based approach to analyze the nonlinear behavior of the extended equations of the cybernetic model. We first show that the cybernetic model exhibits linear growth behavior under the constraint of no resource allocation for the induction of the key enzyme. We then quantify the maximum achievable specific growth rate of microorganisms on mixtures of substitutable substrates under various kinds of regulation and show its use in gaining an understanding of the regulatory strategies of microorganisms. Finally, we show that Saccharomyces cerevisiae exhibits suboptimal dynamic growth with a long diauxic lag phase when growing on a mixture of glucose and galactose and discuss on its potential to achieve optimal growth with a significantly reduced diauxic lag period. The analysis carried out in the present study illustrates the utility of adopting a constraints based approach to understand the dynamic growth strategies of microorganisms. (C) 2015 Elsevier Ireland Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A range constraint method viz. centroid method is proposed to fuse the navigation information of dual (right and left) foot-mounted Zero-velocity-UPdaTe (ZUPT)-aided Inertial Navigation Systems (INSs). Here, the range constraint means that the distance of separation between the position estimates of right and left foot ZUPT-aided INSs cannot be greater than a quantity known as foot-to-foot maximum separation. We present the experimental results which illustrate the applicability of the proposed method. The results show that the proposed method significantly enhances the accuracy of the navigation solution when compared to using two uncoupled foot-mounted ZUPT-aided INSs. Also, we compare the performance of the proposed method with the existing data fusion methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider near-optimal policies for a single user transmitting on a wireless channel which minimize average queue length under average power constraint. The power is consumed in transmission of data only. We consider the case when the power used in transmission is a linear function of the data transmitted. The transmission channel may experience multipath fading. Later, we also extend these results to the multiuser case. We show that our policies can be used in a system with energy harvesting sources at the transmitter. Next we consider data users which require minimum rate guarantees. Finally we consider the system which has both data and real time users. Our policies have low computational complexity, closed form expression for mean delays and require only the mean arrival rate with no queue length information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Image inpainting is the process of filling the unwanted region in an image marked by the user. It is used for restoring old paintings and photographs, removal of red eyes from pictures, etc. In this paper, we propose an efficient inpainting algorithm which takes care of false edge propagation. We use the classical exemplar based technique to find out the priority term for each patch. To ensure that the edge content of the nearest neighbor patch found by minimizing L-2 distance between patches, we impose an additional constraint that the entropy of the patches be similar. Entropy of the patch acts as a good measure of edge content. Additionally, we fill the image by considering overlapping patches to ensure smoothness in the output. We use structural similarity index as the measure of similarity between ground truth and inpainted image. The results of the proposed approach on a number of examples on real and synthetic images show the effectiveness of our algorithm in removing objects and thin scratches or text written on image. It is also shown that the proposed approach is robust to the shape of the manually selected target. Our results compare favorably to those obtained by existing techniques

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we study sum secrecy rate in multicarrier decode-and-forward relay beamforming. We obtain the optimal source power and relay weights on each subcarrier which maximize the sum secrecy rate. For a given total power on a given subcarrier k, P-0(k), we reformulate the optimization problem by relaxing the rank-1 constraint on the complex positive semidefinite relay weight matrix, and solve using semidefinite programming. We analytically prove that the solution to the relaxed optimization problem is indeed rank 1. We show that the subcarrier secrecy rate, R-s (P-0(k)), is a concave function in total power P-0(k) if R-s (P-0(k)) > 0 for any P-0(k) > 0. Numerical results show that the sum secrecy rate with optimal power allocation across subcarriers is more than the sum secrecy rate with equal power allocation. We also propose a low complexity suboptimal power allocation scheme which outperforms equal power allocation scheme.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we consider the problem of power allocation in MIMO wiretap channel for secrecy in the presence of multiple eavesdroppers. Perfect knowledge of the destination channel state information (CSI) and only the statistical knowledge of the eavesdroppers CSI are assumed. We first consider the MIMO wiretap channel with Gaussian input. Using Jensen's inequality, we transform the secrecy rate max-min optimization problem to a single maximization problem. We use generalized singular value decomposition and transform the problem to a concave maximization problem which maximizes the sum secrecy rate of scalar wiretap channels subject to linear constraints on the transmit covariance matrix. We then consider the MIMO wiretap channel with finite-alphabet input. We show that the transmit covariance matrix obtained for the case of Gaussian input, when used in the MIMO wiretap channel with finite-alphabet input, can lead to zero secrecy rate at high transmit powers. We then propose a power allocation scheme with an additional power constraint which alleviates this secrecy rate loss problem, and gives non-zero secrecy rates at high transmit powers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The inverted pendulum is a popular model for describing bipedal dynamic walking. The operating point of the walker can be specified by the combination of initial mid-stance velocity (v(0)) and step angle (phi(m)) chosen for a given walk. In this paper, using basic mechanics, a framework of physical constraints that limit the choice of operating points is proposed. The constraint lines thus obtained delimit the allowable region of operation of the walker in the v(0)-phi(m) plane. A given average forward velocity v(x,) (avg) can be achieved by several combinations of v(0) and phi(m). Only one of these combinations results in the minimum mechanical power consumption and can be considered the optimum operating point for the given v(x, avg). This paper proposes a method for obtaining this optimal operating point based on tangency of the power and velocity contours. Putting together all such operating points for various v(x, avg,) a family of optimum operating points, called the optimal locus, is obtained. For the energy loss and internal energy models chosen, the optimal locus obtained has a largely constant step angle with increasing speed but tapers off at non-dimensional speeds close to unity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nonequilibrium calculations in the presence of an electric field are usually performed in a gauge, and need to be transformed to reveal the gauge-invariant observables. In this work, we discuss the issue of gauge invariance in the context of time-resolved angle-resolved pump/probe photoemission. If the probe is applied while the pump is still on, one must ensure that the calculations of the observed photocurrent are gauge invariant. We also discuss the requirement of the photoemission signal to be positive and the relationship of this constraint to gauge invariance. We end by discussing some technical details related to the perturbative derivation of the photoemission spectra, which involve processes where the pump pulse photoemits electrons due to nonequilibrium effects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this work, spectrum sensing for cognitive radios is considered in the presence of multiple Primary Users (PU) using frequency-hopping communication over a set of frequency bands. The detection performance of the Fast Fourier Transform (FFT) Average Ratio (FAR) algorithm is obtained in closed-form, for a given FFT size and number of PUs. The effective throughput of the Secondary Users (SU) is formulated as an optimization problem with a constraint on the maximum allowable interference on the primary network. Given the hopping period of the PUs, the sensing duration that maximizes the SU throughput is derived. The results are validated using Monte Carlo simulations. Further, an implementation of the FAR algorithm on the Lyrtech (now, Nutaq) small form factor software defined radio development platform is presented, and the performance recorded through the hardware is observed to corroborate well with that obtained through simulations, allowing for implementation losses. (C) 2015 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work deals with the transient analysis of flexible multibody systems within a hybrid finite element framework. Hybrid finite elements are based on a two-field variational formulation in which the displacements and stresses are interpolated separately yielding very good coarse mesh accuracy. Most of the literature on flexible multibody systems uses beam-theory-based formulations. In contrast, the use of hybrid finite elements uses continuum-based elements, thus avoiding the problems associated with rotational degrees of freedom. In particular, any given three-dimensional constitutive relations can be directly used within the framework of this formulation. Since the coarse mesh accuracy as compared to a conventional displacement-based formulation is very high, the scheme is cost effective as well. A general formulation is developed for the constrained motion of a given point on a line manifold, using a total Lagrangian method. The multipoint constraint equations are implemented using Lagrange multipliers. Various kinds of joints such as cylindrical, prismatic, and screw joints are implemented within this general framework. Hinge joints such as spherical, universal, and revolute joints are obtained simply by using shared nodes between the bodies. In addition to joints, the formulation and implementation details for a DC motor actuator and for prescribed relative rotation are also presented. Several example problems illustrate the efficacy of the developed formulation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two-dimensional magnetic recording 2-D (TDMR) is a promising technology for next generation magnetic storage systems based on a systems-level framework involving sophisticated signal processing at the core. The TDMR channel suffers from severe jitter noise along with electronic noise that needs to be mitigated during signal detection and recovery. Recently, we developed noise prediction-based techniques coupled with advanced signal detectors to work with these systems. However, it is important to understand the role of harmful patterns that can be avoided during the encoding process. In this paper, we investigate the Voronoi-based media model to study the harmful patterns over multitrack shingled recording systems. Through realistic quasi-micromagnetic simulation studies, we identify 2-D data patterns that contribute to high media noise. We look into the generic Voronoi model and present our analysis on multitrack detection with constrained coded data. We show that the 2-D constraints imposed on input patterns result in an order of magnitude improvement in the bit-error rate for the TDMR systems. The use of constrained codes can reduce the complexity of 2-D intersymbol interference (ISI) signal detection, since the lesser 2-D ISI span can be accommodated at the cost of a nominal code rate loss. However, a system must be designed carefully so that the rate loss incurred by a 2-D constraint does not offset the detector performance gain due to more distinguishable readback signals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cooperative relaying combined with selection exploits spatial diversity to significantly improve the performance of interference-constrained secondary users in an underlay cognitive radio network. We present a novel and optimal relay selection (RS) rule that minimizes the symbol error probability (SEP) of an average interference-constrained underlay secondary system that uses amplify-and-forward relays. A key point that the rule highlights for the first time is that, for the average interference constraint, the signal-to-interference-plus-noise-ratio (SINR) of the direct source-to-destination (SI)) link affects the choice of the optimal relay. Furthermore, as the SINR increases, the odds that no relay transmits increase. We also propose a simpler, more practical, and near-optimal variant of the optimal rule that requires just one bit of feedback about the state of the SD link to the relays. Compared to the SD-unaware ad hoc RS rules proposed in the literature, the proposed rules markedly reduce the SEP by up to two orders of magnitude.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Collective cell migrations are essential in several physiological processes and are driven by both chemical and mechanical cues. The roles of substrate stiffness and confinement on collective migrations have been investigated in recent years, however few studies have addressed how geometric shapes influence collective cell migrations. Here, we address the hypothesis that the relative position of a cell within the confinement influences its motility. Monolayers of two types of epithelial cells-MCF7, a breast epithelial cancer cell line, and MDCK, a control epithelial cell line-were confined within circular, square, and cross-shaped stencils and their migration velocities were quantified upon release of the constraint using particle image velocimetry. The choice of stencil geometry allowed us to investigate individual cell motility within convex, straight and concave boundaries. Cells located in sharp, convex boundaries migrated at slower rates than those in concave or straight edges in both cell types. The overall cluster migration occurred in three phases: an initial linear increase with time, followed by a plateau region and a subsequent decrease in cluster speeds. An acto-myosin contractile ring, present in the MDCK but absent in MCF7 monolayer, was a prominent feature in the emergence of leader cells from the MDCK clusters which occurred every similar to 125 mu m from the vertex of the cross. Further, coordinated cell movements displayed vorticity patterns in MDCK which were absent in MCF7 clusters. We also used cytoskeletal inhibitors to show the importance of acto-myosin bounding cables in collective migrations through translation of local movements to create long range coordinated movements and the creation of leader cells within ensembles. To our knowledge, this is the first demonstration of how bounding shapes influence long-term migratory behaviours of epithelial cell monolayers. These results are important for tissue engineering and may also enhance our understanding of cell movements during developmental patterning and cancer metastasis.