261 resultados para IKONOS II images
Resumo:
A natural single-crystal specimen of the kröhnkite from Chuquicamata, Chile, with the general formula Na2Cu(SO4)2 · 2H2O, was investigated by Raman and infrared spectroscopy. The mineral kröhnkite is found in many parts of the world's arid areas. Kröhnkite crystallizes in the monoclinic crystal system with point group 2/m and space group P21/c. It is an uncommon secondary mineral formed in the oxidized zone of copper deposits, typically in very arid climates. The Raman spectrum of kröhnkite dominated by a very sharp intense band at 992 cm−1 is assigned to the ν1 symmetric stretching mode and Raman bands at 1046, 1049, 1138, 1164, and 1177 cm−1 are assigned to the ν3 antisymmetric stretching vibrations. The infrared spectrum shows an intense band at 992 cm−1. The Raman bands at 569, 582, 612, 634, 642, 655, and 660 cm−1 are assigned to the ν4 bending modes. Three Raman bands observed at 429, 445, and 463 cm−1 are attributed to the ν2 bending modes. The observation that three or four bands are seen in the ν4 region of kröhnkite is attributed to the reduction of symmetry to C2v or less.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
The present study focused on simulating a trajectory point towards the end of the first experimental heatshield of the FIRE II vehicle, at a total flight time of 1639.53s. Scale replicas were sized according to binary scaling and instrumented with thermocouples for testing in the X1 expansion tube, located at The University of Queensland. Correlation of flight to experimental data was achieved through the separation, and independent treatment of the heat modes. Preliminary investigation indicates that the absolute value of radiant surface flux is conserved between two binary scaled models, whereas convective heat transfer increases with the length scale. This difference in the scaling techniques result in the overall contribution of radiative heat transfer diminishing to less than 1% in expansion tubes from a flight value of approximately 9-17%. From empirical correlation's it has been shown that the St √Re number decreases, under special circumstances, in expansion tubes by the percentage radiation present on the flight vehicle. Results obtained in this study give a strong indication that the relative radiative heat transfer contribution in the expansion tube tests is less than that in flight, supporting the analysis that the absolute value remains constant with binary scaling.
Resumo:
Robust facial expression recognition (FER) under occluded face conditions is challenging. It requires robust algorithms of feature extraction and investigations into the effects of different types of occlusion on the recognition performance to gain insight. Previous FER studies in this area have been limited. They have spanned recovery strategies for loss of local texture information and testing limited to only a few types of occlusion and predominantly a matched train-test strategy. This paper proposes a robust approach that employs a Monte Carlo algorithm to extract a set of Gabor based part-face templates from gallery images and converts these templates into template match distance features. The resulting feature vectors are robust to occlusion because occluded parts are covered by some but not all of the random templates. The method is evaluated using facial images with occluded regions around the eyes and the mouth, randomly placed occlusion patches of different sizes, and near-realistic occlusion of eyes with clear and solid glasses. Both matched and mis-matched train and test strategies are adopted to analyze the effects of such occlusion. Overall recognition performance and the performance for each facial expression are investigated. Experimental results on the Cohn-Kanade and JAFFE databases demonstrate the high robustness and fast processing speed of our approach, and provide useful insight into the effects of occlusion on FER. The results on the parameter sensitivity demonstrate a certain level of robustness of the approach to changes in the orientation and scale of Gabor filters, the size of templates, and occlusions ratios. Performance comparisons with previous approaches show that the proposed method is more robust to occlusion with lower reductions in accuracy from occlusion of eyes or mouth.
Resumo:
This paper describes a novel system for automatic classification of images obtained from Anti-Nuclear Antibody (ANA) pathology tests on Human Epithelial type 2 (HEp-2) cells using the Indirect Immunofluorescence (IIF) protocol. The IIF protocol on HEp-2 cells has been the hallmark method to identify the presence of ANAs, due to its high sensitivity and the large range of antigens that can be detected. However, it suffers from numerous shortcomings, such as being subjective as well as time and labour intensive. Computer Aided Diagnostic (CAD) systems have been developed to address these problems, which automatically classify a HEp-2 cell image into one of its known patterns (eg. speckled, homogeneous). Most of the existing CAD systems use handpicked features to represent a HEp-2 cell image, which may only work in limited scenarios. We propose a novel automatic cell image classification method termed Cell Pyramid Matching (CPM), which is comprised of regional histograms of visual words coupled with the Multiple Kernel Learning framework. We present a study of several variations of generating histograms and show the efficacy of the system on two publicly available datasets: the ICPR HEp-2 cell classification contest dataset and the SNPHEp-2 dataset.
Resumo:
In this paper we describe the approaches adopted to generate the runs submitted to ImageCLEFPhoto 2009 with an aim to promote document diversity in the rankings. Four of our runs are text based approaches that employ textual statistics extracted from the captions of images, i.e. MMR [1] as a state of the art method for result diversification, two approaches that combine relevance information and clustering techniques, and an instantiation of Quantum Probability Ranking Principle. The fifth run exploits visual features of the provided images to re-rank the initial results by means of Factor Analysis. The results reveal that our methods based on only text captions consistently improve the performance of the respective baselines, while the approach that combines visual features with textual statistics shows lower levels of improvements.
Resumo:
As a sequel to a paper that dealt with the analysis of two-way quantitative data in large germplasm collections, this paper presents analytical methods appropriate for two-way data matrices consisting of mixed data types, namely, ordered multicategory and quantitative data types. While various pattern analysis techniques have been identified as suitable for analysis of the mixed data types which occur in germplasm collections, the clustering and ordination methods used often can not deal explicitly with the computational consequences of large data sets (i.e. greater than 5000 accessions) with incomplete information. However, it is shown that the ordination technique of principal component analysis and the mixture maximum likelihood method of clustering can be employed to achieve such analyses. Germplasm evaluation data for 11436 accessions of groundnut (Arachis hypogaea L.) from the International Research Institute of the Semi-Arid Tropics, Andhra Pradesh, India were examined. Data for nine quantitative descriptors measured in the post-rainy season and five ordered multicategory descriptors were used. Pattern analysis results generally indicated that the accessions could be distinguished into four regions along the continuum of growth habit (or plant erectness). Interpretation of accession membership in these regions was found to be consistent with taxonomic information, such as subspecies. Each growth habit region contained accessions from three of the most common groundnut botanical varieties. This implies that within each of the habit types there is the full range of expression for the other descriptors used in the analysis. Using these types of insights, the patterns of variability in germplasm collections can provide scientists with valuable information for their plant improvement programs.
Resumo:
Macrophonics II presents new Australian work emerging from the leading edge of performance interface research. The program addresses the emerging dialogue between traditional media and emerging digital media, as well as dialogues across a broad range of musical traditions. Recent technological developments are causing a complete reevaluation of the relationships between media and genres in art, and Macrophonics II presents a cross-section of responses to this situation. Works in the program foreground an approach to performance that integrates sensors with novel performance control devices, and/or examine how machines can be made musical in performance. The program presents works by Australian artists Donna Hewitt, Julian Knowles and Wade Marynowsky, with choreography by Avril Huddy and dance performance by Lizzie and Zaimon Vilmanis. From sensor-based microphones and guitars, through performance a/v, to post-rock dronescapes, movement inspired works and experimental electronica, Macrophonics II provides a broad and engaging survey of new performance approaches in mediatised environments. Initial R&D for the work was supported by a range of institutions internationally, including the Australia Council for the Arts, Arts Queensland, STEIM (Holland) and the Nes Artist Residency (Iceland).
Resumo:
This report studies an algebraic equation whose solution gives the image system of a source of light as seen by an observer inside a reflecting spherical surface. The equation is looked at numerically using GeoGebra. Under the hypothesis that our galaxy is enveloped by a reflecting interface this becomes a possible model for many mysterious extra galactic observations.
Resumo:
Using the advanced radio-frequency plasma-assisted magnetron deposition system, various nanostructures such as nanoflowers of carbon nanotubes, ZnO nanobelts, and silicon nanotrees were successfully synthesized. In this paper, we present the photographs of ICP and magnetron discharges, the photograph of a complex plasma structure, and the SEM images of various nanostructures synthesized in the system with magnetron and ICP sources operating simultaneously.
Resumo:
The mechanisms and the reaction products for the oxidation of sulfide ions in the presence of pyrite have been established. When the leach solution contains free sulfide ions, oxidation occurs via electron transfer from the sulfide ion to dissolved oxygen on the pyrite mineral surface, with polysulfides being formed as an intermediate oxidation product. In the absence of cyanide, the polysulfides are further oxidised to thiosulfate, whilst with cyanide present, thiocyanate and sulfite are also formed from the reaction of polysulfides with cyanide and dissolved oxygen. Polysulfide chain length has been shown to affect the final reaction products of polysulfide oxidation by dissolved oxygen. The rate of pyrite catalysed sulfide ion oxidation was found to be slower in cyanide solutions compared to cyanide free solutions. Mixed potential measurements indicated that the reduction of oxygen at the pyrite surface is hindered in the presence of cyanide. The presence of sulfide ions was also found to activate the pyrite surface, increasing its rate of oxidation by oxygen. This effect was particularly evident in the presence of cyanide; in the presence of sulfide the increase in total sulfur from pyrite oxidation was 2.3 mM in 7 h, compared to an increase of <1 mM in the absence of sulfide over 24 h.
Resumo:
The proliferation of news reports published in online websites and news information sharing among social media users necessitates effective techniques for analysing the image, text and video data related to news topics. This paper presents the first study to classify affective facial images on emerging news topics. The proposed system dynamically monitors and selects the current hot (of great interest) news topics with strong affective interestingness using textual keywords in news articles and social media discussions. Images from the selected hot topics are extracted and classified into three categorized emotions, positive, neutral and negative, based on facial expressions of subjects in the images. Performance evaluations on two facial image datasets collected from real-world resources demonstrate the applicability and effectiveness of the proposed system in affective classification of facial images in news reports. Facial expression shows high consistency with the affective textual content in news reports for positive emotion, while only low correlation has been observed for neutral and negative. The system can be directly used for applications, such as assisting editors in choosing photos with a proper affective semantic for a certain topic during news report preparation.
Resumo:
RNA polymerase II (pol II) transcription termination requires co‐transcriptional recognition of a functional polyadenylation signal, but the molecular mechanisms that transduce this signal to pol II remain unclear. We show that Yhh1p/Cft1p, the yeast homologue of the mammalian AAUAAA interacting protein CPSF 160, is an RNA‐binding protein and provide evidence that it participates in poly(A) site recognition. Interestingly, RNA binding is mediated by a central domain composed of predicted β‐propeller‐forming repeats, which occurs in proteins of diverse cellular functions. We also found that Yhh1p/Cft1p bound specifically to the phosphorylated C‐terminal domain (CTD) of pol II in vitro and in a two‐hybrid test in vivo. Furthermore, transcriptional run‐on analysis demonstrated that yhh1 mutants were defective in transcription termination, suggesting that Yhh1p/Cft1p functions in the coupling of transcription and 3′‐end formation. We propose that direct interactions of Yhh1p/Cft1p with both the RNA transcript and the CTD are required to communicate poly(A) site recognition to elongating pol II to initiate transcription termination.
Resumo:
The effects of acid treatment, vapor grown carbon fiber (VGCF) interlayer and the angle, i.e., 0° and 90°, between the rolling stripes of an aluminum (Al) plate and the fiber direction of glass fiber reinforced plastics (GFRP) on the mode II interlaminar mechanical properties of GFRP/Al laminates were investigated. The experimental results of an end notched flexure test demonstrate that the acid treatment and the proper addition of VGCF can effectively improve the critical load and mode II fracture toughness of GFRP/Al laminates. The specimens with acid treatment and 10 g m−2 VGCF addition possess the highest mode II fracture toughness, i.e., 269% and 385% increases in the 0° and 90° specimens, respectively compared to those corresponding pristine ones. Due to the induced anisotropy by the rolling stripes on the aluminum plate, the 90° specimens possess 15.3%–73.6% higher mode II fracture toughness compared to the 0° specimens. The improvement mechanisms were explored by the observation of crack propagation path and fracture surface with optical, laser scanning and scanning electron microscopies. Moreover, finite element analyses were carried out based on the cohesive zone model to verify the experimental fracture toughness and to predict the interface shear strength between the aluminum plates and GFRP laminates.