999 resultados para physiological constraint


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Stereo vision is a method of depth perception, in which depth information is inferred from two (or more) images of a scene, taken from different perspectives. Practical applications for stereo vision include aerial photogrammetry, autonomous vehicle guidance, robotics and industrial automation. The initial motivation behind this work was to produce a stereo vision sensor for mining automation applications. For such applications, the input stereo images would consist of close range scenes of rocks. A fundamental problem faced by matching algorithms is the matching or correspondence problem. This problem involves locating corresponding points or features in two images. For this application, speed, reliability, and the ability to produce a dense depth map are of foremost importance. This work implemented a number of areabased matching algorithms to assess their suitability for this application. Area-based techniques were investigated because of their potential to yield dense depth maps, their amenability to fast hardware implementation, and their suitability to textured scenes such as rocks. In addition, two non-parametric transforms, the rank and census, were also compared. Both the rank and the census transforms were found to result in improved reliability of matching in the presence of radiometric distortion - significant since radiometric distortion is a problem which commonly arises in practice. In addition, they have low computational complexity, making them amenable to fast hardware implementation. Therefore, it was decided that matching algorithms using these transforms would be the subject of the remainder of the thesis. An analytic expression for the process of matching using the rank transform was derived from first principles. This work resulted in a number of important contributions. Firstly, the derivation process resulted in one constraint which must be satisfied for a correct match. This was termed the rank constraint. The theoretical derivation of this constraint is in contrast to the existing matching constraints which have little theoretical basis. Experimental work with actual and contrived stereo pairs has shown that the new constraint is capable of resolving ambiguous matches, thereby improving match reliability. Secondly, a novel matching algorithm incorporating the rank constraint has been proposed. This algorithm was tested using a number of stereo pairs. In all cases, the modified algorithm consistently resulted in an increased proportion of correct matches. Finally, the rank constraint was used to devise a new method for identifying regions of an image where the rank transform, and hence matching, are more susceptible to noise. The rank constraint was also incorporated into a new hybrid matching algorithm, where it was combined a number of other ideas. These included the use of an image pyramid for match prediction, and a method of edge localisation to improve match accuracy in the vicinity of edges. Experimental results obtained from the new algorithm showed that the algorithm is able to remove a large proportion of invalid matches, and improve match accuracy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the recent regulatory reforms in a number of countries, railways resources are no longer managed by a single party but are distributed among different stakeholders. To facilitate the operation of train services, a train service provider (SP) has to negotiate with the infrastructure provider (IP) for a train schedule and the associated track access charge. This paper models the SP and IP as software agents and the negotiation as a prioritized fuzzy constraint satisfaction (PFCS) problem. Computer simulations have been conducted to demonstrate the effects on the train schedule when the SP has different optimization criteria. The results show that by assigning different priorities on the fuzzy constraints, agents can represent SPs with different operational objectives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND AND PURPOSE It has been proposed that BRL37344, SR58611 and CGP12177 activate b3-adrenoceptors in human atrium to increase contractility and L-type Ca2+ current (ICa-L). b3-adrenoceptor agonists are potentially beneficial for the treatment of a variety of diseases but concomitant cardiostimulation would be potentially harmful. It has also been proposed that (-)-CGP12177 activates the low affinity binding site of the b1-adrenoceptor in human atrium. We therefore used BRL37344, SR58611 and (-)-CGP12177 with selective b-adrenoceptor subtype antagonists to clarify cardiostimulant b-adrenoceptor subtypes in human atrium. EXPERIMENTAL APPROACH Human right atrium was obtained from patients without heart failure undergoing coronary artery bypass or valve surgery. Cardiomyocytes were prepared to test BRL37344, SR58611 and CGP12177 effects on ICa-L. Contractile effects were determined on right atrial trabeculae. KEY RESULTS BRL37344 increased force which was antagonized by blockade of b1- and b2-adrenoceptors but not by blockade of b3-adrenoceptors with b3-adrenoceptor-selective L-748,337 (1 mM). The b3-adrenoceptor agonist SR58611 (1 nM–10 mM) did not affect atrial force. BRL37344 and SR58611 did not increase ICa-L at 37°C, but did at 24°C which was prevented by L-748,337. (-)-CGP12177 increased force and ICa-L at both 24°C and 37°C which was prevented by (-)-bupranolol (1–10 mM), but not L-748,337. CONCLUSIONS AND IMPLICATIONS We conclude that the inotropic responses to BRL37344 are mediated through b1- and b2-adrenoceptors. The inotropic and ICa-L responses to (-)-CGP12177 are mediated through the low affinity site b1L-adrenoceptor of the b1-adrenoceptor. b3-adrenoceptor-mediated increases in ICa-L are restricted to low temperatures. Human atrial b3-adrenoceptors do not change contractility and ICa-L at physiological temperature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper addresses the issue of providing access control via delegation and constraint management across multiple security domains. Specifically, this paper proposes a novel Delegation Constraint Management model to manage and enforce delegation constraints across security domains. An algorithm to trace the authority of delegation constraints is introduced as well as an algorithm to form a delegation constraint set and detect/prevent potential conflicts. The algorithms and the management model are built upon a set of formal definitions of delegation constraints. In addition, a constraint profile based on XACML is proposed as a means to express the delegation constraint. The paper also includes a protocol to exchange delegation constraints (in the form of user commitments) between the involved entities in the delegation process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces a model to facilitate delegation, including ad-hoc delegation, in cross security domain activities. Specifically, this paper proposes a novel delegation constraint management model to manage and track delegation constraints across security domains. An algorithm to trace the authority of delegation constraints is introduced as well as an algorithm to form a delegation constraint set and detect/prevent potential conflicts. The algorithms and the management model are built upon a set of formal definitions of delegation constraints.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Intelligent agents are an advanced technology utilized in Web Intelligence. When searching information from a distributed Web environment, information is retrieved by multi-agents on the client site and fused on the broker site. The current information fusion techniques rely on cooperation of agents to provide statistics. Such techniques are computationally expensive and unrealistic in the real world. In this paper, we introduce a model that uses a world ontology constructed from the Dewey Decimal Classification to acquire user profiles. By search using specific and exhaustive user profiles, information fusion techniques no longer rely on the statistics provided by agents. The model has been successfully evaluated using the large INEX data set simulating the distributed Web environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Physiological pulsatile flow in a 3D model of arterial double stenosis, using the modified Power-law blood viscosity model, is investigated by applying Large Eddy Simulation (LES) technique. The computational domain has been chosen is a simple channel with biological type stenoses. The physiological pulsation is generated at the inlet of the model using the first four harmonics of the Fourier series of the physiological pressure pulse. In LES, a top-hat spatial grid-filter is applied to the Navier-Stokes equations of motion to separate the large scale flows from the subgrid scale (SGS). The large scale flows are then resolved fully while the unresolved SGS motions are modelled using the localized dynamic model. The flow Reynolds numbers which are typical of those found in human large artery are chosen in the present work. Transitions to turbulent of the pulsatile non-Newtonian along with Newtonian flow in the post stenosis are examined through the mean velocity, wall shear stress, mean streamlines as well as turbulent kinetic energy and explained physically along with the relevant medical concerns.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The management of models over time in many domains requires different constraints to apply to some parts of the model as it evolves. Using EMF and its meta-language Ecore, the development of model management code and tools usually relies on the meta- model having some constraints, such as attribute and reference cardinalities and changeability, set in the least constrained way that any model user will require. Stronger versions of these constraints can then be enforced in code, or by attaching additional constraint expressions, and their evaluations engines, to the generated model code. We propose a mechanism that allows for variations to the constraining meta-attributes of metamodels, to allow enforcement of different constraints at different lifecycle stages of a model. We then discuss the implementation choices within EMF to support the validation of a state-specific metamodel on model graphs when changing states, as well as the enforcement of state-specific constraints when executing model change operations.