Top PDF Means and method of camera space manipulation

Means and method of camera space manipulation

Means and method of camera space manipulation

Means and method of camera space manipulation Abstract A means and method for camera space manipulation includes a manipulator arm extending from a base to an outward end. The arm is movable through a workspace to accomplish various tasks. One or more cameras are movably oriented towards the arm and work space to capture the arm and work space in what will be called camera space or camera vision. A visual cue is associated with the outward end of the manipulator arm.

20 Read more

Means and method for soil testing

Means and method for soil testing

Means and method for soil testing Abstract An inexpensive device which is easily operated to accurately measure the Coulomb parameters of the soil. The Coulomb parameters are used in Coulomb's equation to calculate the shearing stresses along a failure surface of the soil. The device includes an instrument to test soil shear strength to which several weights have been added. To obtain the Coulomb parameters, the instrument is placed on the soil to be tested and weights are incrementally added to it. The instrument is rotated at each weight increment and the shearing stresses are read from its calibrated dial. The stresses are plotted on a graph from which the Coulomb parameters are determined. The shearing stress of the soil with any known force applied to it can then be determined.
Show more

8 Read more

Method and means for testing soil samples

Method and means for testing soil samples

Method and means for testing soil samples Abstract A device for testing soil samples is comprised of a closed container having an interior compartment with upper and lower portions. A valve is provided for introducing into the closed container a liquid having the general properties of butane, and a second valve is provided in the container for allowing gas in the closed container to exit therefrom. A soil sample filter container is suspended within the container above the bottom portion thereof. A condensation element is mounted in the closed container and positioned above the filter container to cause gas evaporating from the liquid in the container to liquefy as condensate on the
Show more

7 Read more

II. THE K-MEANS CLUSTERING METHOD

II. THE K-MEANS CLUSTERING METHOD

A Wireless Sensor Network (WSN) is a network of small sensor nodes which are energy constraint devices and have limited data transmission and computational power. Clustering is an important mechanism in large multi-hop wireless sensor networks for obtaining scalability, reducing energy consumption and achieving better network performance. Most of the research in this area has focused on energy-efficient solutions, but has not thoroughly analyzed the network performance, e.g. in terms of data collection rate and time. In this paper we are presenting the clustering of wireless sensor network by using k-means approach, over a large dynamic network. As it is the oldest and simplest method of clustering. This method requires only local communication and synchronization. Due to growing in area of peer to peer and mobile sensor networks, data analysis in large, dynamic network in large garner importance in the near future. Our algorithm shows best result for the large dynamic network. We tested our algorithm in a simulated environment up to 100 nodes in a dynamic environment and analyze its behavior with good accuracy.
Show more

5 Read more

Method and means for gravity table automation

Method and means for gravity table automation

Method and means for gravity table automation Abstract A system for gravity table separation including a gravity table for separating materials and a detector operatively associated with the gravity table for detecting the movement of control particles with respect to the gravity table during its operation. The control particles are of a known characteristic. By calibrating the desired movement of the control particles through the table, any misalignment or deviance of that movement during operation is detected, and adjustments can be made to the operation of the table to bring the control particles back to the desired movement. The separation process can then be controlled to bring about optimum efficiency. Also, the detector can be interfaced with a control component which can automatically adjust the operation of the table in response to whether the control particles are following the desired movement through the table.
Show more

22 Read more

A Smoothed Analysis of the k-means Method

A Smoothed Analysis of the k-means Method

6. CONCLUDING REMARKS In this paper, we settled the smoothed running time of the k-means method for ar- bitrary k and d. The exponents in our smoothed analysis are constant but large. We did not make a huge effort to optimize the exponents as the arguments are intricate enough even without trying to optimize constants. Furthermore, we believe that our approach, which is essentially based on bounding the smallest possible improvement in a single step, is too pessimistic to yield a bound that matches experimental obser- vations. A similar phenomenon occurred already in the smoothed analysis of the 2-opt heuristic for the TSP [Englert et al. 2007]. There it was possible to improve the bound for the number of iterations by analyzing sequences of consecutive steps rather than single steps. It is an interesting question if this approach also leads to an improved smoothed analysis of k-means.
Show more

30 Read more

How Fast is the k-means Method

How Fast is the k-means Method

We present polynomial upper and lower bounds on the number of iterations per- formed by the k-means method (a.k.a. Lloyd’s method) for k-means clustering. Our upper bounds are polynomial in the number of points, number of clusters, and the spread of the point set. We also present a lower bound, showing that in the worst case the k-means heuristic needs to perform Ω(n) iterations, for n points on the real line and two centers. Surprisingly, the spread of the point set in this construction is poly- nomial. This is the first construction showing that the k-means heuristic requires more than a polylogarithmic number of iterations. Furthermore, we present two alternative algorithms, with guaranteed performance, which are simple variants of the k-means method. Results of our experimental studies on these algorithms are also presented.
Show more

18 Read more

EBK Means: A Clustering Technique based on Elbow Method and K Means in WSN

EBK Means: A Clustering Technique based on Elbow Method and K Means in WSN

WSN consist of hundreds of thousands of small and cost effective sensor nodes. Sensor nodes are used to sense the environmental or physiological parameters like temperature, pressure, etc. For the connectivity of the sensor nodes, they use wireless transceiver to send and receive the inter-node signals. Sensor nodes, because connect their selves wirelessly, use routing process to route the packet to make them reach from source to destination. These sensor nodes run on batteries and they carry a limited battery life. Clustering is the process of creating virtual sub-groups of the sensor nodes, which helps the sensor nodes to lower routing computations and to lower the size routing data. There is a wide space available for the research on energy efficient clustering algorithms for the WSNs. LEACH, PEGASIS and HEED are the popular energy efficient clustering protocols for WSNs. In this research, we are working on the development of a hybrid model using LEACH based energy efficient and K-means based quick clustering algorithms to produce a new cluster scheme for WSNs with dynamic selection of the number of the clusters automatically. In the proposed method, finding an optimum „k‟ value is performed by Elbow method and clustering is done by k-means algorithm, hence routing protocol LEACH which is a traditional energy efficient protocol takes the work ahead of sending data from the cluster heads to the base station. The results of simulation show that at the end of some certain part of running the proposed algorithm, at some point the marginal gain will drop dramatically and gives an angle in the graph. The correct „k‟
Show more

8 Read more

Improved smoothed analysis of the $k$-means method

Improved smoothed analysis of the $k$-means method

The goal of this paper is to bound the smoothed running-time of the k-means method. There are ba- sically two reasons why the smoothed running-time of the k-means method is a more realistic measure than its worst-case running-time: First, data obtained from measurements is inherently noisy. So even if the original data were a bad instance for k-means, the data mea- sured is most likely a slight perturbation of it. Second, if the data possesses a meaningful k-clustering, then slightly perturbing the data should preserve this clus- tering. Thus, smoothed analysis might help to obtain a faster k-means method: We take the data measured, perturb it slightly, and then run k-means on the per-
Show more

10 Read more

Means and method of detection in chemical separation procedures

Means and method of detection in chemical separation procedures

Means and method of detection in chemical separation procedures Abstract A means and method for indirect detection of constituent components of a mixture separated in a chemical separation process. Fluorescing ions are distributed across the area in which separation of the mixture will occur to provide a generally uniform background fluorescence intensity. For example, the mixture is

11 Read more

Means and method for ultrasonic measurement of material properties

Means and method for ultrasonic measurement of material properties

Means and method for ultrasonic measurement of material properties Abstract The system for field measurement of texture, stress and related material properties such as formability parameters using ultrasonic velocity measurements through crystalline plate or sheet. Electromagnetic acoustic transducers are utilized to generate, transmit, and receive ultrasonic bursts through the plate at different angular orientations with respect to the plane of the plate. Two of the transducers are driven in series when generating the ultrasonic bursts. Time measurements between transmission and reception of the bursts are precisely derived and converted into velocities. Information regarding stress, texture, and other related material properties such as formability parameters can be derived from these velocity measurements. The system is adjustable to be used for both ferrous and nonferrous crystalline plate. Alteration of the types of ultrasonic waves utilized, and the methods of generating the waves allows different properties such as texture and stress to be derived.
Show more

15 Read more

Detection of exoplanets by means of the Bump Detection Method

Detection of exoplanets by means of the Bump Detection Method

The scope of this paper is to determine how a transit of an exoplanet can be detected by means of the Bump Detection Method, given the light curve of its host star. First of all, a statistical model will be provided, whereafter the Bump Detection Method will be applied based on statistical significance testing. Second, performance simulations will be investigated, before applying the Bump Detection Method on the Kepler data. To en- hance the detection of exoplanets a linear filter will be applied to the data. Finally, the paper concludes with an analysis of the results retrieved from the application of the Bump Detection method in the Kepler data and recommendations for further research.
Show more

39 Read more

Method of Light Beam Orbital Angular Momentum
Evaluation by Means of Space-Angle Intensity Moments

Method of Light Beam Orbital Angular Momentum Evaluation by Means of Space-Angle Intensity Moments

,Q WKLV ZRUN D QHZ DSSURDFK LV SURSRVHG WKDWLVJURXQGHGRQWKHVWUDLJKWGHWHUPLQDWLRQRI WKHOLJKWEHDP VSDWLDO VWUXFWXUH UHVSRQVLEOH IRU LWV 2$0 5HFHQWO\ LW KDV EHHQ VKRZQ >@ WKDW WKH SUHVHQ[r]

9 Read more

On a method of construction of new means with applications

On a method of construction of new means with applications

However, the extension of the logarithm, identric and Seiffert means from two to three or more variables does not appear to be obvious from the above expressions of these means. In this sense, we refer the reader to [, –] for some extensions about the logarithmic and identric means. Here, we will derive other extensions of these latter means from our above study. In fact, the above transformation for means with two variables can be imme- diately stated in a similar manner for means involving several variables. For instance, we can define
Show more

18 Read more

A NEW METHOD OF INTEGRATION BY MEANS OF ORTHOGONALITY FOCI*

A NEW METHOD OF INTEGRATION BY MEANS OF ORTHOGONALITY FOCI*

A. A. POPOFF Automechanical Institute, Moscow, U.S.S.R. 1. Introduction. This paper contains a new method of integration which is partly graphical, partly analytical.1 It permits a simple determination of integrals of the form J<t>i{x)<t>k{x)dx, where 4>i(x) is given graphically and tf>k(x) is given either graphi- cally or analytically. The method requires the construction of certain diagrams, called scales, showing the abscissae of the centroids of certain areas associated with <t>kix), and is based on some properties of the so-called orthogonality foci. Finally, the method is applied to interpolation, Fourier analysis, and the evaluation of Mohr in- tegrals in the theory of structures.
Show more

9 Read more

Method for Effective PDF Files Manipulation Detection

Method for Effective PDF Files Manipulation Detection

But, what if the manipulations are done also digitally, and not by means of copying and scanning? A recent research focuses on using image processing tools to examine computer- manipulated documents [28]; they firstly manipulate several digital documents by means of Paint and Adobe Photoshop software tools, both deleting and adding text, and afterwards they investigate and examine the manipulated documents using Picasa and Adobe Photoshop software. They basically look for disturbances, such as irregular spacing, discrepancies in the font or the size of the text and uniformities in the background. The results of this study were described as encouraging and suggest ways to help examiners when trying to detect manipulations of digital documents. Nevertheless, this method could be bypassed with the copy-move forgery method, which consists of copying a region of the same document (a letter, for instance) and pasting it in another place within the document, so the result would be format consistent. Another recently proposed method aims to counteract this technique, combining copy-move forgery detection methods (CMFD) with optical character recognition methods (OCR) [29]. Firstly, a series of documents were tampered with different parameters, they were tested, also varying some testing parameters such as the block sizes, CMFD methods or metrics within the methods. The process of the analysis is divided in two branches which feed from each other; OCR process segments the document at one point, separating the background from the actual text. The background is examined separately, and the text is analysed to detect characters and classify them. This result becomes then an input for the CMFD process, which will extract the necessary features and analyse them. Finally, combining the final results from background and text examination, the decision about the authenticity and integrity of the document is made.
Show more

80 Read more

Object manipulation by a humanoid robot via single camera pose estimation

Object manipulation by a humanoid robot via single camera pose estimation

Any robot that is considered to be able to assist people in daily life must have the following features: Communication and interaction with living organisms, absolute safety for humans and environment, to be able to achieve high level tasks. Communication and interaction can be achieved with any robot with little modification such as a camera, microphone and speakers. But to be able to truly communicate with humans, robot must have the body language such as gestures, facial expressions and any part of body movements. The environment that we are living in mostly created by humans, which means the tools, equipments, vehicles etc. is designed for human use. To interact with our environment and to be able to communicate with us, robots require human body form. This is the main motivation behind humanoid robot research.
Show more

88 Read more

Focal Sweep Camera for Space-Time Refocusing

Focal Sweep Camera for Space-Time Refocusing

The following are the main contributions of our paper. An efficient depth range sampling strategy. Since scene motion and camera shake can lead to motion blur in the cap- tured images, it is important to capture the entire focal stack in the shortest possible time. We present a strategy of focal sweep imaging that samples a desired depth range in a com- plete and efficient manner. Completeness means the aggre- gate DOF of the focal stack covers the entire desired depth range, and efficiency means using the smallest number of images to cover the complete depth range. Given a desired depth range and the intrinsic parameters of a camera, the strategy can be used to compute the speed of sensor transla- tion and the number of images needed to cover the desired depth range.
Show more

13 Read more

Art as a Means to Disrupt Routine Use of Space

Art as a Means to Disrupt Routine Use of Space

We have seen that overt surveillance is often cited as a deterrent to hostile reconnaissance. Surveillance that encourages performance can be seen as an effective form of 'heating up' a location as discussed earlier. In art and architecture we find numerous examples of work that performatively draws attention to CCTV. The architects Diller and Scofidio (cited in Levin et al., 2002) write “Once considered invasive, electronic surveillance is now the accepted social contract in public space, a welcome assurance of security, and a performance vehicle” (p. 355). Diller and Scofidio (2000) explore this social contract in the video installation that forms part of their design for The Brasserie in the Seagram building, New York. In this intervention a snapshot is captured as customers enter the bar from a CCTV camera attached to the revolving door. The images are then displayed on a row of screens positioned above the bar. As a new customer enters their image is placed on the screen at one end of the bar and the oldest image is removed at the other. In this way surveillance
Show more

41 Read more

Mission and system design for the manipulation of PHOs with space-borne lasers

Mission and system design for the manipulation of PHOs with space-borne lasers

2. M ECHANICAL C OUPLING D URING THE A BLATION P ROCESS This section reviews the principle underlying the laser ab- lation deflection method. The general physics is explained in the first subsection while a numerical model is derived in the next subsection to demonstrate the reduced efficiency linked with the rotation of the target. The same model is then used to predict the efficiency of pulsed wave laser for space debris and is compared with existing experimental data for titanium and aluminium alloys. The last subsection details the contamination model and some parameters derived from previous experimental work carried in our lab using a 100W CW fiber-coupled laser and asteroid analogue samples [8].
Show more

12 Read more

Show all 10000 documents...