989 resultados para segmentazione immagini mediche algoritmo Canny algoritmo watershed edge detection
Resumo:
Brief Project Summary (no greater than this space allows): Leisure Lake is a 20 acre water body located in northwest Jackson County with a 2,581 acre drainage area. This portion of the Maquoketa Watershed including the lake is a tributary to Lytle Creek which drains into the North Fork Maquoketa River and into the Maquoketa Watershed. Portions of the Lytle Creek and North Fork Maquoketa River are on the 303(d) impaired waterbodies list. The project area includes a community of 370 residential properties and one business that currently has no central waste water collection and treatment system. The County Sanitarian estimates at least 225 of these properties do not have properly operating septic systems and ultimately drain their wastewater into the lake. The purpose of this project is to construct a wastewater collection and treatment facility to improve water quality in the creek and river. The project will eliminate the non-permitted septic systems and construct a new wastewater system to properly treat wastewater prior to its discharge into the waterways.
Resumo:
Pavement and shoulder edge drop-offs commonly occur in work zones as the result of overlays, pavement replacement, or shoulder construction. The depth of these elevation differentials can vary from approximately one inch when a flexible pavement overlay is applied to several feet where major reconstruction is undertaken. The potential hazards associated with pavement edge differentials depend on several factors including depth of the drop-off, shape of the pavement edge, distance from traveled way, vehicle speed, traffic mix, volume, and other factors. This research was undertaken to review current practices in other states for temporary traffic control strategies addressing lane edge differentials and to analyze crash data and resultant litigation related to edge drop-offs. An objective was to identify cost-effective practices that would minimize the potential for and impacts of edge drop crashes in work zones. Considerable variation in addressing temporary traffic control in work zones with edge drop-off exposure was found among the states surveyed. Crashes related to pavement edge drop-offs in work zones do not commonly occur in the state of Iowa, but some have resulted in significant tort claims and settlements. The use of benefit/cost analysis may provide guidance in selection of an appropriate mitigation and protection of edge drop-off conditions. Development and adoption of guidelines for design of appropriate traffic control for work zones that include edge drop-off exposure, particularly identifying effective use of temporary barrier rail, may be beneficial in Iowa.
Resumo:
O objetivo deste trabalho foi avaliar uma nova metodologia para mapeamento da cultura da soja no Estado de Mato Grosso, por meio de imagens Modis e de diferentes abordagens de classificação de imagens. Foram utilizadas imagens diárias e imagens de 16 dias. As imagens diárias foram diretamente classificadas pelo algoritmo Isoseg. As duas séries de imagens de 16 dias, referentes ao ciclo total e à metade do ciclo da cultura da soja, foram transformadas pela análise de componentes principais (ACP), antes de serem classificadas. Dados de referência, obtidos por interpretação visual de imagens do sensor TM/Landsat-5, foram utilizados para a avaliação da exatidão das classificações. Os melhores resultados foram obtidos pela classificação das imagens do ciclo total da soja, transformadas pela ACP: índice global de 0,83 e Kappa de 0,63. A melhor classificação de imagens diárias mostrou índice global de 0,80 e Kappa de 0,55. AACP aplicada às imagens do ciclo total da soja permitiu o mapeamento das áreas de soja com índices de exatidão melhores do que os obtidos pela classificação derivada das imagens de data única.
Resumo:
O objetivo deste trabalho foi avaliar parâmetros biofísicos de superfície do Bioma Pantanal com a aplicação de geotecnologias. Foram utilizados o algoritmo Sebal ("surface energy balance algorithm for land"), imagens do sensor Modis ("moderate‑resolution imaging spectroradiometer") e o mapa de classes de uso e cobertura da terra. Os resultados obtidos para NDVI, temperatura da superfície, albedo, fluxo de calor sensível diário, saldo de radiação diário e evapotranspiração real diária foram consistentes com dados de literatura para os diferentes usos e cobertura da terra, e corroboram a eficiência da capacidade analítica e sinóptica das estimativas do Sebal. Tais resultados mostram o potencial de geotecnologias na implementação de modelos ou algoritmos voltados para a compreensão da dinâmica de processos biofísicos de interação solo‑planta‑atmosfera do Pantanal.
Resumo:
O objetivo deste trabalho foi avaliar a exatidão do cálculo da obstrução do horizonte, a partir de um modelo digital de elevação (MDE), em diferentes situações topográficas. O material utilizado incluiu um MDE disponível para a região da Serra Gaúcha, RS, receptores GPS, câmera digital, lente grande‑angular e os programas Idrisi, Arcview/ArcGIS e Solar Analyst. Foram adquiridas fotografias hemisféricas, e coletadas as coordenadas de 16 locais na área de estudo. As coordenadas e o MDE foram utilizados para calcular a obstrução do horizonte com uso do algoritmo Solar Analyst. Foram comparadas a fração aberta do céu calculada e a obtida pelas fotografias hemisféricas. O coeficiente de determinação foi de 0,8428, tendo-se observado superestimativa média de 5,53% da fração aberta do céu. Os erros são atribuídos principalmente à obstrução pela vegetação, que não pode ser identificada pelo MDE. A obstrução do horizonte, causada pelo relevo na Serra Gaúcha, pode ser calculada satisfatoriamente pelo Solar Analyst, a partir de um MDE interpolado de cartas topográficas na escala 1:50.000.
Resumo:
Many audio watermarking schemes divide the audio signal into several blocks such that part of the watermark is embedded into each of them. One of the key issues in these block-oriented watermarking schemes is to preserve the synchronisation, i.e. to recover the exact position of each block in the mark recovery process. In this paper, a novel time domain synchronisation technique is presented together with a new blind watermarking scheme which works in the Discrete Fourier Transform (DFT or FFT) domain. The combined scheme provides excellent imperceptibility results whilst achieving robustness against typical attacks. Furthermore, the execution of the scheme is fast enough to be used in real-time applications. The excellent transparency of the embedding algorithm makes it particularly useful for professional applications, such as the embedding of monitoring information in broadcast signals. The scheme is also compared with some recent results of the literature.
Resumo:
Peer-reviewed
Resumo:
Peer-reviewed
Resumo:
This paper describes an audio watermarking scheme based on lossy compression. The main idea is taken from an image watermarking approach where the JPEG compression algorithm is used to determine where and how the mark should be placed. Similarly, in the audio scheme suggested in this paper, an MPEG 1 Layer 3 algorithm is chosen for compression to determine the position of the mark bits and, thus, the psychoacoustic masking of the MPEG 1 Layer 3compression is implicitly used. This methodology provides with a high robustness degree against compression attacks. The suggested scheme is also shown to succeed against most of the StirMark benchmark attacks for audio.
Resumo:
Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS. This paper will investigate how end-to-end security impacts on QoS in Voice over Internet Protocol (VoIP). The QoS is measured in terms of lost packet ratio, latency and jitter using different encryption algorithms, no security and just the use of IP firewalls in Local and Wide Area Networks (LAN and WAN). The results of laboratory tests indicate that the impact on the overall performance of VoIP depends upon the bandwidth availability and encryption algorithm used. The implementation of any encryption algorithm in low bandwidth environments degrades the voice quality due to increased loss packets and packet latency, but as bandwidth increases encrypted VoIP calls provided better service compared to an unsecured environment.
Resumo:
Manet security has a lot of open issues. Due to its character-istics, this kind of network needs preventive and corrective protection. Inthis paper, we focus on corrective protection proposing an anomaly IDSmodel for Manet. The design and development of the IDS are consideredin our 3 main stages: normal behavior construction, anomaly detectionand model update. A parametrical mixture model is used for behav-ior modeling from reference data. The associated Bayesian classi¯cationleads to the detection algorithm. MIB variables are used to provide IDSneeded information. Experiments of DoS and scanner attacks validatingthe model are presented as well.
Resumo:
Este trabajo presenta un Algoritmo Genético (GA) del problema de secuenciar unidades en una línea de producción. Se tiene en cuenta la posibilidad de cambiar la secuencia de piezas mediante estaciones con acceso a un almacén intermedio o centralizado. El acceso al almacén además está restringido, debido al tamaño de las piezas.AbstractThis paper presents a Genetic Algorithm (GA) for the problem of sequencing in a mixed model non-permutation flowshop. Resequencingis permitted where stations have access to intermittent or centralized resequencing buffers. The access to a buffer is restricted by the number of available buffer places and the physical size of the products.
Resumo:
NK cell self-tolerance is maintained by inhibitory receptors specific for MHC class I molecules. Inhibitory NK receptors are also expressed on memory CD8 T cells but their biological relevance on T cells is unclear. In this study, we describe the expression of the Ly49A receptor on a subset of autoreactive T cells which persist in mice double-transgenic for the lymphocytic choriomeningitis virus-derived peptide gp33 and a TCRalphabeta specific for the gp33. No Ly49A-expressing cells are found in TCRalphabeta single-transgenic mice, indicating that the presence of the autoantigen is required for Ly49A induction. Direct evidence for an Ag-specific initiation of Ly49A expression has been obtained in vitro after stimulation of autoreactive TCRalphabeta T cells with the cognate self-Ag. This expression of Ly49A substantially reduces Ag-specific activation of autoreactive T cells. These findings thus suggest that autoantigen-specific induction of inhibitory NK cell receptors on T cells may contribute to peripheral self-tolerance.