20 resultados para spatiotemporal entropic thresholding
Resumo:
Understanding habitat selection and movement remains a key question in behavioral ecology. Yet, obtaining a sufficiently high spatiotemporal resolution of the movement paths of organisms remains a major challenge, despite recent technological advances. Observing fine-scale movement and habitat choice decisions in the field can prove to be difficult and expensive, particularly in expansive habitats such as wetlands. We describe the application of passive integrated transponder (PIT) systems to field enclosures for tracking detailed fish behaviors in an experimental setting. PIT systems have been applied to habitats with clear passageways, at fixed locations or in controlled laboratory and mesocosm settings, but their use in unconfined habitats and field-based experimental setups remains limited. In an Everglades enclosure, we continuously tracked the movement and habitat use of PIT-tagged centrarchids across three habitats of varying depth and complexity using multiple flatbed antennas for 14 days. Fish used all three habitats, with marked species-specific diel movement patterns across habitats, and short-lived movements that would be likely missed by other tracking techniques. Findings suggest that the application of PIT systems to field enclosures can be an insightful approach for gaining continuous, undisturbed and detailed movement data in unconfined habitats, and for experimentally manipulating both internal and external drivers of these behaviors.
Resumo:
Movement strategies of small forage fish (<8 cm total length) between temporary and permanent wetland habitats affect their overall population growth and biomass concentrations, i.e., availability to predators. These fish are often the key energy link between primary producers and top predators, such as wading birds, which require high concentrations of stranded fish in accessible depths. Expansion and contraction of seasonal wetlands induce a sequential alternation between rapid biomass growth and concentration, creating the conditions for local stranding of small fish as they move in response to varying water levels. To better understand how landscape topography, hydrology, and fish behavior interact to create high densities of stranded fish, we first simulated population dynamics of small fish, within a dynamic food web, with different traits for movement strategy and growth rate, across an artificial, spatially explicit, heterogeneous, two-dimensional marsh slough landscape, using hydrologic variability as the driver for movement. Model output showed that fish with the highest tendency to invade newly flooded marsh areas built up the largest populations over long time periods with stable hydrologic patterns. A higher probability to become stranded had negative effects on long-term population size, and offset the contribution of that species to stranded biomass. The model was next applied to the topography of a 10 km × 10 km area of Everglades landscape. The details of the topography were highly important in channeling fish movements and creating spatiotemporal patterns of fish movement and stranding. This output provides data that can be compared in the future with observed locations of fish biomass concentrations, or such surrogates as phosphorus ‘hotspots’ in the marsh.
Resumo:
Tumor functional volume (FV) and its mean activity concentration (mAC) are the quantities derived from positron emission tomography (PET). These quantities are used for estimating radiation dose for a therapy, evaluating the progression of a disease and also use it as a prognostic indicator for predicting outcome. PET images have low resolution, high noise and affected by partial volume effect (PVE). Manually segmenting each tumor is very cumbersome and very hard to reproduce. To solve the above problem I developed an algorithm, called iterative deconvolution thresholding segmentation (IDTS) algorithm; the algorithm segment the tumor, measures the FV, correct for the PVE and calculates mAC. The algorithm corrects for the PVE without the need to estimate camera’s point spread function (PSF); also does not require optimizing for a specific camera. My algorithm was tested in physical phantom studies, where hollow spheres (0.5-16 ml) were used to represent tumors with a homogeneous activity distribution. It was also tested on irregular shaped tumors with a heterogeneous activity profile which were acquired using physical and simulated phantom. The physical phantom studies were performed with different signal to background ratios (SBR) and with different acquisition times (1-5 min). The algorithm was applied on ten clinical data where the results were compared with manual segmentation and fixed percentage thresholding method called T50 and T60 in which 50% and 60% of the maximum intensity respectively is used as threshold. The average error in FV and mAC calculation was 30% and -35% for 0.5 ml tumor. The average error FV and mAC calculation were ~5% for 16 ml tumor. The overall FV error was ~10% for heterogeneous tumors in physical and simulated phantom data. The FV and mAC error for clinical image compared to manual segmentation was around -17% and 15% respectively. In summary my algorithm has potential to be applied on data acquired from different cameras as its not dependent on knowing the camera’s PSF. The algorithm can also improve dose estimation and treatment planning.
Resumo:
Continuous and reliable monitoring of contaminants in drinking water, which adversely affect human health, is the main goal of the Broward County Well Field Protection Program. In this study the individual monitoring station locations were used in a yearly and quarterly spatiotemporal Ordinary Kriging interpolation to create a raster network of contaminant detections. In the final analysis, the raster spatiotemporal nitrate concentration trends were overlaid with a pollution vulnerability index to determine if the concentrations are influenced by a set of independent variables. The pollution vulnerability factors are depth to water, recharge, aquifer media, soil, impact to vadose zone, and conductivity. The creation of the nitrate raster dataset had an average RMS Standardized error close to 1 at 0.98. The greatest frequency of detections and the highest concentrations are found in the months of April, May, June, July, August, and September. An average of 76.4% of the nitrate intersected with cells of the pollution vulnerability index over 100.
Resumo:
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.