Learn More
The topography of a phase plate is recovered from the phase reconstruction by solving the transport intensity equation (TIE). The TIE is solved using two different approaches: (a) the classical solution of solving the Poisson differential equation and (b) an algebraic approach with Zernike functions. In this paper we present and compare the topography(More)
A detection and tracking algorithm for ferromagnetic objects based on a two stage Levenberg Marquardt Algorithm (LMA) is presented. The procedure is applied to localization and magnetic moment estimation of ferromagnetic objects moving in the vicinity of an array of two to four 3-axis magnetometers arranged as a check point configuration. The algorithms(More)
The purpose of this paper is to present a system developed for detection and accurate mapping of ferro-metallic objects buried below the seabed in shallow waters. The system comprises a precise magnetic gradiometer and navigation subsystem, both installed on a non-magnetic catamaran towed by a low-magnetic interfering boat. In addition we present the(More)
This document surveys deployed and experimental in-network storage systems and describes their applicability for the DECADE (DECoupled Application Data Enroute) architecture. (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not(More)
A dedicated Genetic Algorithm (GA) has been developed to localize the trajectory of ferromagnetic moving objects within a bounded perimeter. Localization of moving ferromagnetic objects is an important tool because it can be employed in situations when the object is obscured. This work is innovative for two main reasons: first, the GA has been tuned to(More)
Applications using the Internet already have access to some topology information of Internet Service Provider (ISP) networks. For example, views to Internet routing tables at Looking Glass servers are available and can be practically downloaded to many network application clients. What is missing is knowledge of the underlying network topologies from the(More)
  • 1