73 resultados para Line and edge detection


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Downy mildew pathogen of pearl millet in India is associated with the spread of the highly virulent Sclerospora graminicola pathotype-1. Twenty-seven S. graminicola isolates were screened using 20 intersimple sequence repeats (ISSR). Dinucleotide repeat primer [17898A-(CA)(6) AC] amplified a similar to 600 bp fragment specific to five isolates of pathotype-1 (Sg 048, Sg 153, Sg 212, DM-11 and DM-90). The ISSR fragment linked with pathotype-1 was cloned successfully and sequenced. To convert ISSR fragments into pathotype-specific sequence characterised amplified region (SCAR) markers, PCR primers were designed using a sequence of the cloned DNA fragment. PCR amplification using SCAR primer pair (UOM3-Sg-Path1-F/R) amplified a single 284 bp band only in isolates of S. graminicola pathotype-1. This SCAR primer pair did not amplify the 284 bp product from the other five S. graminicola pathotypes or a negative control, which demonstrates primer specificity for pathotype-1. The SCAR primer pair (UOM3-Sg-Path1-F/R) obtained in this study will provide a valuable tool for rapid identification and specific detection of S. graminicola pathotype-1.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The concept of orbital compatibility is used to explain the relative energies of different macropolyhedral structural patterns such as closo-closo, closo-nido, and nido-nido. A large polyhedral borane condenses preferentially with a smaller polyhedron owing to orbital compatibility. Calculations carried out at the B3LYP/6-31G* level show that the macropolyhedron closo(12)-closo(6) is the most preferred structural pattern among the face-sharing closo-closo systems. The relative stabilities of four-shared-atom closo-closo, three-shared-atom closo-closo, three-shared-atom closo-nido, edge-sharing closo-nido, and edge-sharing nido-nido structures are in accordance with the difference in the number of vertices of the individual polyhedra of the macropolyhedra. When the difference in the number of vertices of the individual polyhedra is large, the stability of the macropolyhedra is also large. Calculations further show that the orbital compatibility plays an important role in deciding the stability of the macropolyhedral boranes with more than two polyhedral units. The dependence of the orbital compatibility on the relative stability of the macropolyhedron varies with other factors such as inherent stability of the individual polyhedron and steric factors.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper a nonlinear control has been designed using the dynamic inversion approach for automatic landing of unmanned aerial vehicles (UAVs), along with associated path planning. This is a difficult problem because of light weight of UAVs and strong coupling between longitudinal and lateral modes. The landing maneuver of the UAV is divided into approach, glideslope and flare. In the approach UAV aligns with the centerline of the runway by heading angle correction. In glideslope and flare the UAV follows straight line and exponential curves respectively in the pitch plane with no lateral deviations. The glideslope and flare path are scheduled as a function of approach distance from runway. The trajectory parameters are calculated such that the sink rate at touchdown remains within specified bounds. It is also ensured that the transition from the glideslope to flare path is smooth by ensuring C-1 continuity at the transition. In the outer loop, the roll rate command is generated by assuring a coordinated turn in the alignment segment and by assuring zero bank angle in the glideslope and flare segments. The pitch rate command is generated from the error in altitude to control the deviations from the landing trajectory. The yaw rate command is generated from the required heading correction. In the inner loop, the aileron, elevator and rudder deflections are computed together to track the required body rate commands. Moreover, it is also ensured that the forward velocity of the UAV at the touch down remains close to a desired value by manipulating the thrust of the vehicle. A nonlinear six-DOF model, which has been developed from extensive wind-tunnel testing, is used both for control design as well as to validate it.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Along with useful microorganisms, there are some that cause potential damage to the animals and plants. Detection and identification of these harmful organisms in a cost and time effective way is a challenge for the researchers. The future of detection methods for microorganisms shall be guided by biosensor, which has already contributed enormously in sensing and detection technology. Here, we aim to review the use of various biosensors, developed by integrating the biological and physicochemical/mechanical properties (of tranducers), which can have enormous implication in healthcare, food, agriculture and biodefence. We have also highlighted the ways to improve the functioning of the biosensor.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abuses in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as Activity-Event-Symptoms(AES) model for detecting fraud and intrusion attacks which appears during payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs during mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As is well known, when monochromatic light scattered by a liquid is examined under high resolution it exhibits a fine structure: an undisplaced central line and two lines on either side with wavelengths slightly different from that of the incident light. The appearance of the displaced components was first predicted by Brillouin1. On the basis of his theory, the observed displacements of frequency are regarded as a Doppler effect arising from the reflexion of the light wave by the progressive sound waves of thermal origin in the scattering medium. The frequency shift of the so-called Brillouin components is given by the formula where nu and c are the velocities of sound and light in the medium and theta is the angle of scattering. That the effect contemplated by Brillouin does arise in liquids and crystals is now a well-established experimental fact.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

For active contour modeling (ACM), we propose a novel self-organizing map (SOM)-based approach, called the batch-SOM (BSOM), that attempts to integrate the advantages of SOM- and snake-based ACMs in order to extract the desired contours from images. We employ feature points, in the form of ail edge-map (as obtained from a standard edge-detection operation), to guide the contour (as in the case of SOM-based ACMs) along with the gradient and intensity variations in a local region to ensure that the contour does not "leak" into the object boundary in case of faulty feature points (weak or broken edges). In contrast with the snake-based ACMs, however, we do not use an explicit energy functional (based on gradient or intensity) for controlling the contour movement. We extend the BSOM to handle extraction of contours of multiple objects, by splitting a single contour into as many subcontours as the objects in the image. The BSOM and its extended version are tested on synthetic binary and gray-level images with both single and multiple objects. We also demonstrate the efficacy of the BSOM on images of objects having both convex and nonconvex boundaries. The results demonstrate the superiority of the BSOM over others. Finally, we analyze the limitations of the BSOM.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

New protonated layered oxides, HMWO6·1.5H2O (M=Nb or Ta), have been synthesized by topotactic exchange of lithium in trirutile LiMWO6 with protons by treatment with dilute HNO3. The tetragonal cell constants are a=4.71 (2) and c=25.70 (8)Å for HNbWO6·1.5H2O and a=4.70 (2) and c=25.75 (9) Å for HTaWO6·1.5H2O. Partially hydrated compounds, HMWO6·0.5H2O and anhydrous compounds, HMWO6 retain the layered structure. The structure of these oxides consists of MWO6 sheets built up of M/W-oxygen octahedra with rutile type corner- and edge-sharing. Interlayer protons in HMWO6 are exchanged with Li+, Na+, K+ and Tl+. HMWO6 exhibit Brønsted acidity intercalating n-alkylamines and pyridine.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The design and analysis of a coplanar capacitive fed microstrip antenna suspended above the ground plane is presented. It is demonstrated that the proposed approach can be used for designing antennas with impedance bandwidth of about 50% and a good gain to operate in various microwave bands. The model of the antenna incorporates the capacitive feed strip which is fed by a coaxial probe using equivalent circuit approach, and matches simulation and experimental results. The capacitive feed strip used here is basically a rectangular microstrip capacitor formed from a truncated microstrip transmission line and all its open ends are represented by terminal or edge capacitances. The error analysis was carried out for validity of the model for different design parameters. The antenna configuration can be used where unidirectional radiation patterns are required over a wide bandwidth.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Digoxigenin (DIG)-labeled DNA probe was developed for a sensitive and rapid detection of the Tobacco streak virus (TSV) isolates in India by dot-blot and tissue print hybridization techniques. DIG-labeled DNA probe complementary to the coat protein (CP) region of TSV sunflower isolate was designed and used to detect the TSV presence at field levels. Dot-blot hybridization was used to check a large number of TSV isolates with a single probe. In addition, a sensitivity of the technique was examined with the different sample extraction methods. Another technique, the tissue blot hybridization offered a simple, reliable procedure and did not require a sample processing. Thus, both non-radioactively labeled probe techniques could facilitate the sample screening during TSV outbreaks and offer an advantage in quarantine services.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Let G be a simple, undirected, finite graph with vertex set V(G) and edge set E(C). A k-dimensional box is a Cartesian product of closed intervals a(1), b(1)] x a(2), b(2)] x ... x a(k), b(k)]. The boxicity of G, box(G) is the minimum integer k such that G can be represented as the intersection graph of k-dimensional boxes, i.e. each vertex is mapped to a k-dimensional box and two vertices are adjacent in G if and only if their corresponding boxes intersect. Let P = (S, P) be a poset where S is the ground set and P is a reflexive, anti-symmetric and transitive binary relation on S. The dimension of P, dim(P) is the minimum integer l such that P can be expressed as the intersection of t total orders. Let G(P) be the underlying comparability graph of P. It is a well-known fact that posets with the same underlying comparability graph have the same dimension. The first result of this paper links the dimension of a poset to the boxicity of its underlying comparability graph. In particular, we show that for any poset P, box(G(P))/(chi(G(P)) - 1) <= dim(P) <= 2box(G(P)), where chi(G(P)) is the chromatic number of G(P) and chi(G(P)) not equal 1. The second result of the paper relates the boxicity of a graph G with a natural partial order associated with its extended double cover, denoted as G(c). Let P-c be the natural height-2 poset associated with G(c) by making A the set of minimal elements and B the set of maximal elements. We show that box(G)/2 <= dim(P-c) <= 2box(G) + 4. These results have some immediate and significant consequences. The upper bound dim(P) <= 2box(G(P)) allows us to derive hitherto unknown upper bounds for poset dimension. In the other direction, using the already known bounds for partial order dimension we get the following: (I) The boxicity of any graph with maximum degree Delta is O(Delta log(2) Delta) which is an improvement over the best known upper bound of Delta(2) + 2. (2) There exist graphs with boxicity Omega(Delta log Delta). This disproves a conjecture that the boxicity of a graph is O(Delta). (3) There exists no polynomial-time algorithm to approximate the boxicity of a bipartite graph on n vertices with a factor of O(n(0.5-epsilon)) for any epsilon > 0, unless NP=ZPP.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We present observations of the C270alpha carbon recombination line, 21 cm neutral hydrogen line and (CO)-C-12 (J = 1 --> 0) molecular line toward Cas A. A comparison of the distribution of recombination line optical depths over the face of Cas A with that of H I optical depths and molecular line emission favors the association of C270alpha regions with H I rather than molecular clouds. The association makes it possible to self-consistently determine several physical parameters of the clouds by combining the recombination line and 21 cm H I measurements.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tn the current set of investigations foam sandwich panels and some components of an aircraft comprising of two layer Glass Fiber Reinforced Plastic(GFRP) face sheets of thickness 1mm each with polyurethene foam as filler of thickness 8mm were examined for detection of debonds and defects. Known defects were introduced in the panels in the form of teflon insert, full foam removal,half foam removal and edge delamination by inserting a teflon and removing it after curing. Two such panels were subjected to acoustic impact and analysis was carried out in both time and frequency domains. These panels were ultrasonically scanned to obtain C-SCAN images as reference to evaluate Acoustic Impact Test (AIT) results. In addition both Fokker bond testing and AIT(woodpecker) were carried out on the same panels and also some critical joints on the actual component. The results obtained from these tests are presented and discussed in this paper.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We performed high resolution spectroscopy of the solar corona during the total solar eclipse of 22 July 2009 in two emission lines: the green line at 5303 due to Fe xiv and the red line at 6374 due to Fe x, simultaneously from Anji (latitude 30A degrees 28.1' N; longitude 119A degrees 35.4' E; elevation 890 m), China. A two-mirror coelostat with 100 cm focal length lens produced a 9.2 mm image of the Sun. The spectrograph using 140 cm focal length lens in Littrow mode and a grating with 600 lines per millimeter blazed at 2 mu m provided a dispersion of 30 m and 43 m per pixel in the fourth order around the green line and third order around the red line, respectively. Two Peltier cooled 1k x 1k CCD cameras, with a pixel size of 13 mu m square and 14-bit readout at 10 MHz operated in frame transfer mode, were used to obtain the time sequence spectra in two emission lines simultaneously. The duration of totality was 341 s, but we could get spectra for 270 s after a trial exposure at an interval of 5 s. We report here on the detection of intensity, velocity, and line width oscillations with periodicity in the range of 25 -50 s. These oscillations can be interpreted in terms of the presence of fast magnetoacoustic waves or torsional Alfv,n waves. The intensity ratios of green to red emission lines indicate the temperature of the corona to be 1.65 MK in the equatorial region and 1.40 MK in the polar region, relatively higher than the expected temperature during the low activity period. The width variation of the emission lines in different coronal structures suggests different physical conditions in different structures.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A link failure in the path of a virtual circuit in a packet data network will lead to premature disconnection of the circuit by the end-points. A soft failure will result in degraded throughput over the virtual circuit. If these failures can be detected quickly and reliably, then appropriate rerouteing strategies can automatically reroute the virtual circuits that use the failed facility. In this paper, we develop a methodology for analysing and designing failure detection schemes for digital facilities. Based on errored second data, we develop a Markov model for the error and failure behaviour of a T1 trunk. The performance of a detection scheme is characterized by its false alarm probability and the detection delay. Using the Markov model, we analyse the performance of detection schemes that use physical layer or link layer information. The schemes basically rely upon detecting the occurrence of severely errored seconds (SESs). A failure is declared when a counter, that is driven by the occurrence of SESs, reaches a certain threshold.For hard failures, the design problem reduces to a proper choice;of the threshold at which failure is declared, and on the connection reattempt parameters of the virtual circuit end-point session recovery procedures. For soft failures, the performance of a detection scheme depends, in addition, on how long and how frequent the error bursts are in a given failure mode. We also propose and analyse a novel Level 2 detection scheme that relies only upon anomalies observable at Level 2, i.e. CRC failures and idle-fill flag errors. Our results suggest that Level 2 schemes that perform as well as Level 1 schemes are possible.