963 resultados para Convex spherical mirrors


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The complete nucleotide sequence of rice tungro spherical virus (RTSV) strain Vt6, originally from Mindanao, the Philippines, with higher virulence to resistant rice cultivars, was determined and compared with the published sequence for the Philippine-type strain A (RTSV-A-Shen). It was reported that RTSV-A was not able to infect a rice resistant cultivar TKM 6 (10). RTSV-Vt6 and RTSV-A-Shen share 90% and 95% homology at nucleotide and amino-acid levels, respectively. The N-terminal leader sequence of RTSV-Vt6 contained a 39-amino acids-region (positions 65 to 103) which was totally different from that of RTSV-A-Shen; the difference resulted from frame shifting by nucleotide insertions and deletions. To confirm the amino-acid sequence differences of the leader polypeptide, the same region was cloned and sequenced using a newly obtained variant of RTSV-type 6, which had been collected in the field of IRRI, and seven field isolates from Mindanao, the Philippines. Since all the sequences of the target region are identical to that of the Vt6 leader polypeptide, the sequence difference in the leader region seems not to correlate with the virulence of Vt6.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The two adjacent genes of coat protein 1 and 2 of rice tungro spherical virus (RTSV) were amplified from total RNA extracts of serologically indistinguishable field isolates from the Philippines and Indonesia, using reverse transcriptase polymerase chain reaction (RT-PCR). Digestion with HindIII and BstYI restriction endonucleases differentiated the amplified DNA products into eight distinct coat protein genotypes. These genotypes were then used as indicators of virus diversity in the field. Inter- and intra-site diversities were determined over three cropping seasons. At each of the sites surveyed, one or two main genotypes prevailed together with other related minor or mixed genotypes that did not replace the main genotype over the sampling time. The cluster of genotypes found at the Philippines sites was significantly different from the one at the Indonesia sites, suggesting geographic isolation for virus populations. Phylogenetic studies based on the nucleotide sequences of 38 selected isolates confirm the spatial distribution of RTSV virus populations but show that gene flow may occur between populations. Under the present conditions, rice varieties do not seem to exert selective pressure on the virus populations. Based on the selective constraints in the coat protein amino acid sequences and the virus genetic composition per site, a negative selection model followed by random-sampling events due to vector transmissions is proposed to explain the inter-site diversity observed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resistance to rice virus diseases is an important requirement in many Southeast Asian rice breeding programs. Inheritance of resistance to rice tungro spherical virus (RTSV) in TW5, a near-isogenic line derived from Indonesian rice cultivar Utri Merah, was compared to that in TKM6, an Indian rice cultivar. Both TKM6 and Utri Merah are cultivars resistant to RTSV infections. Crosses were made between TKM6 and TN1, a susceptible cultivar, and between TW5 and TN1, and F3 lines were evaluated for their resistance to RTSV using two RTSV inoculum sources and a serological assay (ELISA). In TKM6, the resistance to the mixture of RTSV-V + RTBV inoculum source was controlled by a single recessive gene, whereas in TW5, the resistance was controlled by two recessive genes. A single recessive gene, however, controlled the resistance in TW5 when another RTSV variant, RTSV-VI, was used, suggesting that the resistance in TW5 depends on the nature of the RTSV inoculum used. RT-PCR, sequence, and phylogenetic analyses confirmed that RTSV-VI inoculum differs from RTSV-V inoculum and accurate phenotyping of the resistance to RTSV requires the use of a genetic marker.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is known that the depth of focus (DOF) of the human eye can be affected by the higher order aberrations. We estimated the optimal combinations of primary and secondary Zernike spherical aberration to expand the DOF and evaluated their efficiency in real eyes using an adaptive optics system. The ratio between increased DOF and loss of visual acuity was used as the performance indicator. The results indicate that primary or secondary spherical aberration alone shows similar effectiveness in extending the DOF. However, combinations of primary and secondary spherical aberration with different signs provide better efficiency for expanding the DOF. This finding suggests that the optimal combinations of primary and secondary spherical aberration may be useful in the design of optical presbyopic corrections. © 2011 Elsevier Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A number of learning problems can be cast as an Online Convex Game: on each round, a learner makes a prediction x from a convex set, the environment plays a loss function f, and the learner’s long-term goal is to minimize regret. Algorithms have been proposed by Zinkevich, when f is assumed to be convex, and Hazan et al., when f is assumed to be strongly convex, that have provably low regret. We consider these two settings and analyze such games from a minimax perspective, proving minimax strategies and lower bounds in each case. These results prove that the existing algorithms are essentially optimal.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We develop a new analytical solution for a reactive transport model that describes the steady-state distribution of oxygen subject to diffusive transport and nonlinear uptake in a sphere. This model was originally reported by Lin (Journal of Theoretical Biology, 1976 v60, pp449–457) to represent the distribution of oxygen inside a cell and has since been studied extensively by both the numerical analysis and formal analysis communities. Here we extend these previous studies by deriving an analytical solution to a generalized reaction-diffusion equation that encompasses Lin’s model as a particular case. We evaluate the solution for the parameter combinations presented by Lin and show that the new solutions are identical to a grid-independent numerical approximation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a reactive collision avoidance method for small unmanned rotorcraft using spherical image-based visual servoing. Only a single point feature is used to guide the aircraft in a safe spiral like trajectory around the target, whilst a spherical camera model ensures the target always remains visible. A decision strategy to stop the avoidance control is derived based on the properties of spiral like motion, and the effect of accurate range measurements on the control scheme is discussed. We show that using a poor range estimate does not significantly degrade the collision avoidance performance, thus relaxing the need for accurate range measurements. We present simulated and experimental results using a small quad rotor to validate the approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present experimental results that demonstrate that the wavelength of the fundamental localised surface plasmon resonance for spherical gold nanoparticles on glass can be predicted using a simple, one line analytical formula derived from the electrostatic eigenmode method. This allows the role of the substrate in lifting mode degeneracies to be determined, and the role of local environment refractive indices on the plasmon resonance to be investigated. The effect of adding silica to the casting solution in minimizing nanopaticle agglomeration is also discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents practical vision-based collision avoidance for objects approximating a single point feature. Using a spherical camera model, a visual predictive control scheme guides the aircraft around the object along a conical spiral trajectory. Visibility, state and control constraints are considered explicitly in the controller design by combining image and vehicle dynamics in the process model, and solving the nonlinear optimization problem over the resulting state space. Importantly, range is not required. Instead, the principles of conical spiral motion are used to design an objective function that simultaneously guides the aircraft along the avoidance trajectory, whilst providing an indication of the appropriate point to stop the spiral behaviour. Our approach is aimed at providing a potential solution to the See and Avoid problem for unmanned aircraft and is demonstrated through a series.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A nanoparticles size is one of their key physical characteristics that can affect their fate in a human’s respiratory tract (in case of inhalation) and also in the environment. Hence, measuring the size distribution of nanoparticles is absolutely essential and contributes greatly to their characterization. For years, Scanning Mobility Particle Sizers (SMPS), which rely on measuring the electrical mobility diameter of particles, have been used as one of the most reliable real-time instruments for the size distribution measurement of nanoparticles. Despite its benefits, this instrument has some drawbacks, including equivalency problems for non-spherical particles (i.e. assuming a non-spherical particle is equal to a spherical particle of diameter d due to the same electrical mobility), as well as limitations in terms of its use in workplaces, because of its large size and the complexity of its operation...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Scaffolding is an essential issue in tissue engineering and scaffolds should answer certain essential criteria: biocompatibility, high porosity, and important pore interconnectivity to facilitate cell migration and fluid diffusion. In this work, a modified solvent castingparticulate leaching out method is presented to produce scaffolds with spherical and interconnected pores. Sugar particles (200–300 lm and 300–500 lm) were poured through a horizontal Meker burner flame and collected below the flame. While crossing the high temperature zone, the particles melted and adopted a spherical shape. Spherical particles were compressed in plastic mold. Then, poly-L-lactic acid solution was cast in the sugar assembly. After solvent evaporation, the sugar was removed by immersing the structure into distilled water for 3 days. The obtained scaffolds presented highly spherical interconnected pores, with interconnection pathways from 10 to 100 lm. Pore interconnection was obtained without any additional step. Compression tests were carried out to evaluate the scaffold mechanical performances. Moreover, rabbit bone marrow mesenchymal stem cells were found to adhere and to proliferate in vitro in the scaffold over 21 days. This technique produced scaffold with highly spherical and interconnected pores without the use of additional organic solvents to leach out the porogen.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An investigation of the drying of spherical food particles was performed, using peas as the model material. In the development of a mathematical model for drying curves, moisture diffusion was modelled using Fick’s second law for mass transfer. The resulting partial differential equation was solved using a forward-time central-space finite difference approximation, with the assumption of variable effective diffusivity. In order to test the model, experimental data was collected for the drying of green peas in a fluidised bed at three drying temperatures. Through fitting three equation types for effective diffusivity to the data, it was found that a linear equation form, in which diffusivity increased with decreasing moisture content, was most appropriate. The final model accurately described the drying curves of the three experimental temperatures, with an R2 value greater than 98.6% for all temperatures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a long-term experiment where a mobile robot uses adaptive spherical views to localize itself and navigate inside a non-stationary office environment. The office contains seven members of staff and experiences a continuous change in its appearance over time due to their daily activities. The experiment runs as an episodic navigation task in the office over a period of eight weeks. The spherical views are stored in the nodes of a pose graph and they are updated in response to the changes in the environment. The updating mechanism is inspired by the concepts of long- and short-term memories. The experimental evaluation is done using three performance metrics which evaluate the quality of both the adaptive spherical views and the navigation over time.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. In this paper we show two efficient probabilistic attacks on this protocol which reveal the user’s secret after the observation of only a handful of authentication sessions. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values which cross the threshold of usability.