94 resultados para Mobile mapping

em Indian Institute of Science - Bangalore - Índia


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper addresses the problem of localizing the sources of contaminants spread in the environment, and mapping the boundary of the affected region using an innovative swarm intelligence based technique. Unlike most work in this area the algorithm is capable of localizing multiple sources simultaneously while also mapping the boundary of the contaminant spread. At the same time the algorithm is suitable for implementation using a mobile robotic sensor network. Two types of agents, called the source localization agents (or S-agents) and boundary mapping agents (or B-agents) are used for this purpose. The paper uses the basic glowworm swarm optimization (GSO) algorithm, which has been used only for multiple signal source localization, and modifies it considerably to make it suitable for both these tasks. This requires the definition of new behaviour patterns for the agents based on their terminal performance as well as interactions between them that helps the swarm to split into subgroups easily and identify contaminant sources as well as spread along the boundary to map its full length. Simulations results are given to demonstrate the efficacy of the algorithm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Over the last few decades, there has been a significant land cover (LC) change across the globe due to the increasing demand of the burgeoning population and urban sprawl. In order to take account of the change, there is a need for accurate and up-to-date LC maps. Mapping and monitoring of LC in India is being carried out at national level using multi-temporal IRS AWiFS data. Multispectral data such as IKONOS, Landsat-TM/ETM+, IRS-ICID LISS-III/IV, AWiFS and SPOT-5, etc. have adequate spatial resolution (similar to 1m to 56m) for LC mapping to generate 1:50,000 maps. However, for developing countries and those with large geographical extent, seasonal LC mapping is prohibitive with data from commercial sensors of limited spatial coverage. Superspectral data from the MODIS sensor are freely available, have better temporal (8 day composites) and spectral information. MODIS pixels typically contain a mixture of various LC types (due to coarse spatial resolution of 250, 500 and 1000 in), especially in more fragmented landscapes. In this context, linear spectral unmixing would be useful for mapping patchy land covers, such as those that characterise much of the Indian subcontinent. This work evaluates the existing unmixing technique for LC mapping using MODIS data, using end-members that are extracted through Pixel Purity Index (PPI), Scatter plot and N-dimensional visualisation. The abundance maps were generated for agriculture, built up, forest, plantations, waste land/others and water bodies. The assessment of the results using ground truth and a LISS-III classified map shows 86% overall accuracy, suggesting the potential for broad-scale applicability of the technique with superspectral data for natural resource planning and inventory applications. Index Terms-Remote sensing, digital

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A single-step solid-phase RIA (SS-SPRIA) developed in our laboratory using hybridoma culture supernatants has been utilised for the quantitation of epitope-paratope interactions. Using SS-SPRIA as a quantitative tool for the assessment of epitope stability, it was found that several assembled epitopes of human chorionic gonadotropin (hCG) are differentially stable to proteolysis and chemical modification. Based on these observations an approach has been developed for identifying the amino acid residues constituting an epitopic region. This approach has now been used to map an assembled epitope at/near the receptor binding region of the hormone. The mapped site forms a part of the seat belt region and the cystine knot region (C34-C38-C88-C90-H106). The carboxy terminal region of the alpha-subunit forms a part of the epitope indicating its proximity to the receptor binding region. These results are in agreement with the reported receptor binding region identified through other approaches and the X-ray crystal structure of hCG.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A defect-selective photothermal imaging system for the diagnostics of optical coatings is demonstrated. The instrument has been optimized for pump and probe parameters, detector performance, and signal processing algorithm. The imager is capable of mapping purely optical or thermal defects efficiently in coatings of low damage threshold and low absorbance. Detailed mapping of minor inhomogeneities at low pump power has been achieved through the simultaneous action of a low-noise fiber optic photothermal beam defection sensor and a common-mode-rejection demodulation (CMRD) technique. The linearity and sensitivity of the sensor have been examined theoretically and experimentally, and the signal to noise ratio improvement factor is found to be about 110 compared to a conventional bicell photodiode. The scanner is so designed that mapping of static or shock sensitive samples is possible. In the case of a sample with absolute absorptance of 3.8 x 10(-4), a change in absorptance of about 0.005 x 10(-4) has been detected without ambiguity, ensuring a contrast parameter of 760. This is about 1085% improvement over the conventional approach containing a bicell photodiode, at the same pump power. The merits of the system have been demonstrated by mapping two intentionally created damage sites in a MgF2 coating on fused silica at different excitation powers. Amplitude and phase maps were recorded for thermally thin and thick cases, and the results are compared to demonstrate a case which, in conventional imaging, would lead to a deceptive conclusion regarding the type and location of the damage. Also, a residual damage profile created by long term irradiation with high pump power density has been depicted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Eighteen temperature-sensitive mutants of mycobacteriophage I3 have been isolated and partially characterized. All the mutants were defective in vegetative replication. Based on temperature shift experiments with the temperature sensitive mutants, the thermosensitive phase of the phage development period has been characterized for each mutant. The genes have been mapped by recombination analysis. The early, continuous and middle genes seem to cluster on the genetic map

Relevância:

20.00% 20.00%

Publicador:

Resumo:

his paper presents identification and mapping of vulnerable and safe zones for liquefaction hazard. About 850 bore logs data collected from geotechnical investigation reports have been used to estimate the liquefaction factor of safety for Bangalore Mahanagara palike (BMP) area of about 220 km(2). Liquefaction factor of safety is arrived based on surface level peak ground acceleration presented by Anbazhagan and Sitharam(5) and liquefaction resistance, using corrected standard penetration test (SPT) N values. The estimated factor of safety against liquefaction is used to estimate liquefaction potential index and liquefaction severity index. These values are mapped using Geographical information system (GIS) to identify the vulnerable and safe zones in Bangalore. This study shows that more than 95% of the BMP area is safe against liquefaction potential. However the western part of the BMP is not safe against liquefaction, as it may be subjected to liquefaction with probability of 35 to 65%. Three approaches used in this study show that 1) mapping least factor of safety irrespective of depth may be used to find liquefiable area for worst case. 2) mapping liquefaction potential index can be used to assess the liquefaction severity of the area by considering layer thickness and factor of safety and 3) mapping of liquefaction severity index can be used to access the probability of liquefaction of area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A comparison of the DNase I digestion products of the 32P-5’-end-labeled pachytene nucleosome core particles (containing histones H2A, TH2A, X2, H2B, THPB, H3a, nd H4) and liver nucleosome core particles (containing somatic histones H2A, H2B, H3, and H4) revealed that the cleavage sites that are 30, 40, and 110 nucleotidesa way from the 5’-enda re significantly more accessiblei n the pachytene core particles than in the liver core particles. These cleavage sites correspond to the region wherein H2B interacts with the nucleosome core DNA. These results, therefore, suggest that the histone-DNA interactiona t these sites in the pachytene core particles is weaker, possibly because of the presence of the histone variant THBB interacting at similar topological positions in the nucleosome core as that of its somatic counterpart H2B. Such a loosened structumrea y also be maintainede ven in the native pachytene chromatin since micrococcal nuclease digestion of pachytene nuclei resulted in a higher ratio of subnucleosomes (SN4 + SN?) to mononucleosomes than that observed liinv er chromatin

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Location management problem that arise in mobile computing networks is addressed. One method used in location management is to designate sonic of the cells in the network as "reporting cells". The other cells in the network are "non-reporting cells". Finding an optimal set of reporting cells (or reporting cell configuration) for a given network. is a difficult combinatorial optimization problem. In fact this is shown to be an NP-complete problem. in an earlier study. In this paper, we use the selective paging strategy and use an ant colony optimization method to obtain the best/optimal set of reporting cells for a given a network.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three overlapping assembled epitopes of beta hCG have been mapped using MAb probes and a single step solid phase radioimmunoassay. These epitopes have been shown to be at receptor binding region comprising of the loop region beta Cys93-Cys100. Importance of disulphide bonds in maintaining integrity of these epitopes is assessed. Two MAbs (INN 58 and INN 22) interact with the beta region as well as the alpha C-terminal peptide, while the other MAb INN 24 interacts with only the beta region. Cross-reactivity pattern with beta hCG and hLH as web as the reported crystal structure of hCG substantiates the epitope identification. The results demonstrate utility of MAbs as probes in investigations on three-dimensional structure of gonadatropins.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Identification of epitopes by modification studies has been reported by us recently. The method requires milligram quantities of antigen and since several proteins are not available in large quantities they are not amenable for such an investigation. One such protein is human follicle stimulating hormone (hFSH) whose mapping of epitopes is of importance in reproductive biology. Here we report a method that uses microgram quantities of hFSH to map a beta-specific epitope located at the receptor binding region. This identification has also been validated by the chemical modification method using heterologous antigen ovine follicle stimulating hormone (oFSH).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An epitope scan analysis of the whole sequence of avidin and core streptavidin using polyclonal antibodies to these two antigens reveal the presence of multiple common epitopes in both the proteins. These antigenic determinants consist mostly of either identical or similar residues. The antibody recognition sites in both antigens are shown to be localized to homologous regions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a new numerical integration technique oil arbitrary polygonal domains. The polygonal domain is mapped conformally to the unit disk using Schwarz-Christoffel mapping and a midpoint quadrature rule defined oil this unit disk is used. This method eliminates the need for a two-level isoparametric mapping Usually required. Moreover, the positivity of the Jacobian is guaranteed. Numerical results presented for a few benchmark problems in the context of polygonal finite elements show that the proposed method yields accurate results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rural population of India constitutes about 70% of the total population and traditional fuels account for 75% of the rural energy needs. Depletion of woodlands coupled with the persistent dependency on fuel wood has posed a serious problem for household energy provision in many parts. This study highlights that the traditional fuels still meet 85-95% of fuel needs in rural areas of Kolar district: people prefer fuel wood for cooking and agriculture residues for water heating and other purposes. However, rapid changes in land cover and land use in recent times have affected these traditional fuels availability necessitating inventorying, mapping and monitoring of bioresources for sustainable management of bioresources. Remote sensing data (Multispectal and Panchromatic), Geographic Information System (GIS), field surveys and non-destructive sampling were used to assess spatially the availability and demand of energy. Field surveys indicate that rural household depends on species such as Prosopis juliflora, Acacia nilotica, Acacia auriculiformis to meet fuel wood requirement for domestic activities. Hence, to take stock of fuel wood availability, mapping was done at species level (with 88% accuracy) considering villages as sampling units using fused multispectral and panchromatic data. (C) 2009 Elsevier Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abuses in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as Activity-Event-Symptoms(AES) model for detecting fraud and intrusion attacks which appears during payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs during mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.