965 resultados para tensor voting
Resumo:
The thesis is related to the topic of image-based characterization of fibers in pulp suspension during the papermaking process. Papermaking industry is focusing on process control optimization and automatization, which makes it possible to manufacture highquality products in a resource-efficient way. Being a part of the process control, pulp suspension analysis allows to predict and modify properties of the end product. This work is a part of the tree species identification task and focuses on analysis of fiber parameters in the pulp suspension at the wet stage of paper production. The existing machine vision methods for pulp characterization were investigated, and a method exploiting direction sensitive filtering, non-maximum suppression, hysteresis thresholding, tensor voting, and curve extraction from tensor maps was developed. Application of the method to the microscopic grayscale pulp images made it possible to detect curves corresponding to fibers in the pulp image and to compute their morphological characteristics. Performance of the method was evaluated based on the manually produced ground truth data. An accuracy of fiber characteristics estimation, including length, width, and curvature, for the acacia pulp images was found to be 84, 85, and 60% correspondingly.
Resumo:
We study the noncommutative massless Kalb-Ramond gauge field coupled to a dynamical U(1) gauge field in the adjoint representation together with a compensating vector field. We derive the Seiberg-Witten map and obtain the corresponding mapped action to first order in theta. The (emergent) gravity structure found in other situations is not present here. The off-shell dual scalar theory is derived and it does not coincide with the Seiberg-Witten mapped scalar theory. Dispersion relations are also discussed. The p-form generalization of the Seiberg-Witten map to order theta is also derived.
Resumo:
We have obtained nonperturbative one-loop expressions for the mean-energy-momentum tensor and current density of Dirac's field on a constant electriclike back-round. One of the goals of this calculation is to give a consistent description of backreaction in such a theory. Two cases of initial states are considered: the vacuum state and the thermal equilibrium state. First, we perform calculations for the vacuum initial state. In the obtained expressions, we separate the contributions due to particle creation and vacuum polarization. The latter contribution,, are related to the Heisenberg-Euler Lagrangian. Then, we Study the case of the thermal initial state. Here, we separate the contributions due to particle creation, vacuum polarization, and the contributions due to the work of the external field on the particles at the initial state. All these contributions are studied in detail, in different regimes of weak and strong fields and low and high temperatures. The obtained results allow us to establish restrictions on the electric field and its duration under which QED with a strong constant electric field is consistent. Under such restrictions, one can neglect the backreaction of particles created by the electric field. Some of the obtained results generalize the calculations of Heisenberg-Euler for energy density to the case of arbitrary strong electric fields.
Resumo:
We have performed MRI examinations to determine the water diffusion tensor in the brain of six patients who were admitted to the hospital within 12 h after the onset of cerebral ischemic symptoms. The examinations have been carried out immediately after admission, and thereafter at varying intervals up to 90 days post admission. Maps of the trace of the diffusion tensor, the fractional anisotropy and the lattice index, as well as maps of cerebral blood perfusion parameters, were generated to quantitatively assess the character of the water diffusion tensor in the infarcted area. In patients with significant perfusion deficits and substantial lesion volume changes, four of six cases, our measurements show a monotonic and significant decrease in the diffusion anisotropy within the ischemic lesion as a function of time. We propose that retrospective analysis of this quantity, in combination with brain tissue segmentation and cerebral perfusion maps, may be used in future studies to assess the severity of the ischemic event. (C) 1999 Elsevier Science Inc.
Resumo:
Using tryptophan C-13-enriched at the C-4 (C epsilon(3)) of the indole, the orientation of the C epsilon(3) chemical shift tensor relative to the C epsilon(3)-H dipolar axis was determined from the C-13 chemical shift/C-13-H-1 dipolar 2D NMR powder pattern. The principal values obtained were 208, 137 and 15 ppm with sigma(33) perpendicular to the indole plane, and sigma(11) (least shielded direction) 5 degrees off the C epsilon(3)-H bond toward C xi(3). The side off the C epsilon(3)-H bond was determined by comparing the reduced chemical shift anisotropies obtained by solid-state NMR and from molecular dynamics calculations of [4-C-13] tryptophans in gramicidin A aligned in phospholipid membranes. (C) 1999 Elsevier Science B.V. All rights reserved.
Resumo:
A novel MRI method-diffusion tensor imaging-was used to compare the integrity of several white matter fibre tracts in patients with probable Alzheimer's disease. Relative to normal controls, patients with probable Alzheimer's disease showed a highly significant reduction in the integrity of the association white matter fibre tracts, such as the splenium of the corpus callosum, superior longitudinal fasciculus, and cingulum. By contrast, pyramidal tract integrity seemed unchanged. This novel finding is consistent with the clinical presentation of probable Alzheimer's disease, in which global cognitive decline is a more prominent feature than motor disturbance.
Resumo:
Recent research in Australian sociology and political science has debated the extent to which postmaterialist values and economic self-interest shape voting in federal elections. Some researchers have argued that postmaterialist values have partly displaced materialist concerns with physical security and economic well-being in Australian public life. This displacement, coupled with the adoption by major political parties of postmaterialist 'quality of life' issues such as the environment, has meant that voting in Australia has come to be more dependent on postmaterialist values than on perceptions of economic interest. Other research, however, has found no relationship between postmaterialist values and voting behaviour, while economic evaluations remain a strong determinant of voting behaviour. Part of the disagreement reflects methodological differences in the research. But different methodological problems compromise each of the previous studies. In this paper we use data from the 1990, 1993, 1996 and 1998 Australian Election Studies to investigate postmaterialist and economic voting in the Commonwealth House of Representatives and the Senate. Using various statistical methods, we first explore bivariate relationships between key variables and then use multivariate models of postmaterialist and economic voting to adjudicate between the contending positions.
Resumo:
A systematic method for constructing trigonometric R-matrices corresponding to the (multiplicity-free) tensor product of any two affinizable representations of a quantum algebra or superalgebra has been developed by the Brisbane group and its collaborators. This method has been referred to as the Tensor Product Graph Method. Here we describe applications of this method to untwisted and twisted quantum affine superalgebras.
Resumo:
One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus that changes the voter's vote to a predetermined vote on election's day. Another possible attack is the creation of a fake election web site where the voter uses a malicious vote program on the web site that manipulates the voter's vote (phishing/pharming attack). Such attacks may not disturb the election protocol, therefore can remain undetected in the eyes of the election auditors. We propose the use of Code Voting to overcome insecurity of the client platform. Code Voting consists in creating a secure communication channel to communicate the voter's vote between the voter and a trusted component attached to the voter's computer. Consequently, no one controlling the voter's computer can change the his/her's vote. The trusted component can then process the vote according to a cryptographic voting protocol to enable cryptographic verification at the server's side.
Resumo:
Mestrado em Radiações Aplicadas às Tecnologias da Saúde.
Resumo:
Traditionally, a country's electoral system requires the voter to vote at a specific day and place, which conflicts with the mobility usually seen in modern live styles. Thus, the widespread of Internet (mobile) broadband access can be seen as an opportunity to deal with this mobility problem, i.e. the adoption of an Internet voting system can make the live of voter's much more convenient; however, a widespread Internet voting systems adoption relies on the ability to develop trustworthy systems, i.e. systems that are verifiable and preserve the voter's privacy. Building such a system is still an open research problem. Our contribution is a new Internet voting system: EVIV, a highly sound End-to-end Verifiable Internet Voting system, which offers full voter's mobility and preserves the voter's privacy from the vote casting PC even if the voter votes from a public PC, such as a PC at a cybercafe or at a public library. Additionally, EVIV has private vote verification mechanisms, in which the voter just has to perform a simple match of two small strings (4-5 alphanumeric characters), that detect and protect against vote manipulations both at the insecure vote client platform and at the election server side. (c) 2012 Elsevier Ltd. All rights reserved.