2,315 research outputs found

    An efficient technique of texture representation in segmentation-based image coding schemes

    Get PDF
    In segmentation-based image coding techniques the image to be compressed is first segmented. Then, the information is coded describing the shape and the interior of the regions. A new method to encode the texture obtained in segmentation-based coding schemes is presented. The approach combines 2-D linear prediction and stochastic vector quantization. To encode a texture, a linear predictor is computed first. Next, a codebook following the prediction error model is generated and the prediction error is encoded with VQ. In the decoder, the error image is decoded first and then filtered as a whole, using the prediction filter. Hence, correlation between pixels is not lost from one block to another and a good reproduction quality can be achieved.Peer ReviewedPostprint (published version

    Photodegradation Mechanisms of Tetraphenyl Butadiene Coatings for Liquid Argon Detectors

    Get PDF
    We report on studies of degradation mechanisms of tetraphenyl butadiene (TPB) coatings of the type used in neutrino and dark matter liquid argon experiments. Using gas chromatography coupled to mass spectrometry we have detected the ultraviolet-blocking impurity benzophenone (BP). We monitored the drop in performance and increase of benzophenone concentration in TPB plates with exposure to ultraviolet (UV) light, and demonstrate the correlation between these two variables. Based on the presence and initially exponential increase in the concentration of benzophenone observed, we propose that TPB degradation is a free radical-mediated photooxidation reaction, which is subsequently confirmed by displaying delayed degradation using a free radical inhibitor. Finally we show that the performance of wavelength-shifting coatings of the type envisioned for the LBNE experiment can be improved by 10-20%, with significantly delayed UV degradation, by using a 20% admixture of 4-tert-Butylcatechol.Comment: 12 pages, 9 figures. Submitted to JINS

    Snake Venomics and Antivenomics of Bothrops diporus, a Medically Important Pitviper in Northeastern Argentina

    Get PDF
    Snake species within genus Bothrops are responsible for more than 80% of the snakebites occurring in South America. The species that cause most envenomings in Argentina, B. diporus, is widely distributed throughout the country, but principally found in the Northeast, the region with the highest rates of snakebites. The venom proteome of this medically relevant snake was unveiled using a venomic approach. It comprises toxins belonging to fourteen protein families,be ing dominated by PI- and PIII-SVMPs, PLA2 molecules, BPP-like peptides, L-amino acid oxidase and serine proteinases. This toxin profile largely explains the characteristic pathophysiological effects of bothropic snakebites observed in patients envenomed by B. diporus. Antivenomic analysis of the SAB antivenom (Instituto Vital Brazil) against the venom of B. diporus showed that this pentabothropic antivenom efficiently recognized all the venom proteins and exhibited poor affinity towards the small peptide (BPPs and tripeptide inhibitors of PIII-SVMPs) components of the venom.Fil: Gay, Claudia Carolina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Nordeste. Instituto de Química Básica y Aplicada del Nordeste Argentino. Universidad Nacional del Nordeste. Facultad de Ciencias Exactas Naturales y Agrimensura. Instituto de Química Básica y Aplicada del Nordeste Argentino; ArgentinaFil: Sanz, Libia. Instituto de Biomedicina de Valencia; EspañaFil: Calvete, Juan J.. Instituto de Biomedicina de Valencia; EspañaFil: Pla, Davinia. Instituto de Biomedicina de Valencia; Españ

    Per la pau de les nacions : una pàgina d'història

    Get PDF
    Abstract not availabl

    Statistical Analysis of Genealogical Trees for Polygamic Species

    Full text link
    Repetitions within a given genealogical tree provides some information about the degree of consanguineity of a population. They can be analyzed with techniques usually employed in statistical physics when dealing with fixed point transformations. In particular we show that the tree features strongly depend on the fractions of males and females in the population, and also on the offspring probability distribution. We check different possibilities, some of them relevant to human groups, and compare them with simulations.Comment: 2 eps figs, Fig.2 changed to meet cond-mat size criteri

    Exploring quantum chaos with a single nuclear spin

    Full text link
    Most classical dynamical systems are chaotic. The trajectories of two identical systems prepared in infinitesimally different initial conditions diverge exponentially with time. Quantum systems, instead, exhibit quasi-periodicity due to their discrete spectrum. Nonetheless, the dynamics of quantum systems whose classical counterparts are chaotic are expected to show some features that resemble chaotic motion. Among the many controversial aspects of the quantum-classical boundary, the emergence of chaos remains among the least experimentally verified. Time-resolved observations of quantum chaotic dynamics are particularly rare, and as yet unachieved in a single particle, where the subtle interplay between chaos and quantum measurement could be explored at its deepest levels. We present here a realistic proposal to construct a chaotic driven top from the nuclear spin of a single donor atom in silicon, in the presence of a nuclear quadrupole interaction. This system is exquisitely measurable and controllable, and possesses extremely long intrinsic quantum coherence times, allowing for the observation of subtle dynamical behavior over extended periods. We show that signatures of chaos are expected to arise for experimentally realizable parameters of the system, allowing the study of the relation between quantum decoherence and classical chaos, and the observation of dynamical tunneling.Comment: revised and published versio

    Seawater intrusion and coastal groundwater resources management. Examples from two Mediterranean regions: Catalonia and Sardinia

    Get PDF
    Seawater intrusion is a natural phenomenon that allows the encroachment of saline water into aquifers. Nevertheless, many human actions along the coastline, in particular groundwater withdrawal, enhance this process and finally cause the salinization of groundwater resources. Here we review the hydrogeological basis of seawater intrusion and describe specific cases in Catalonia and Sardinia, as examples of environmental problems and water management actions. We emphasize the origin of salinization and the hydrogeological details of each case, as well as the solutions that have been implemented to prevent groundwater salinization

    Organized crime behavior of shell-company networks in procurement: prevention insights for policy and reform

    Full text link
    In recent years, the analysis of economic crime and corruption in procurement has benefited from integrative studies that acknowledge the interconnected nature of the procurement ecosystem. Following this line of research, we present a networks approach for the analysis of shell-companies operations in procurement that makes use of contracting and ownership data under one framework to gain knowledge about the organized crime behavior that emerges in this setting. In this approach, ownership and management data are used to identify connected components in shell-company networks that, together with the contracting data, allows to develop an alternative representation of the traditional buyer-supplier network: the module-component bipartite network, where the modules are groups of buyers and the connected components are groups of suppliers. This is applied to two documented cases of procurement corruption in Mexico characterized by the involvement of large groups of shell-companies in the misappropriation of millions of dollars across many sectors. We quantify the economic impact of single versus connected shell-companies operations. In addition, we incorporate metrics for the diversity of operations and favoritism levels. This paper builds into the quantitative organized crime in the private sector studies and contributes by proposing a networks approach for preventing fraud and understanding the need for legal reforms.Comment: Corruption; fraud; public procurement; shell-companies; ownership; organized crime; network analysi
    corecore