• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 12
  • 7
  • 2
  • 1
  • 1
  • Tagged with
  • 27
  • 27
  • 10
  • 9
  • 9
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 4
  • 4
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Detection of species by laser resonant spectroscopy

Duckworth, A. January 1989 (has links)
No description available.
2

Detection of Staphylococcus aureus by DNA hybridization

Wilson, Ian Gerald January 1990 (has links)
No description available.
3

Seismic Analysis Using Wavelet Transform for Hydrocarbon Detection

Cai, Rui 2010 December 1900 (has links)
Many hydrocarbon detection techniques have been developed for decades and one of the most efficient techniques for hydrocarbon exploration in recent years is well known as amplitude versus offset analysis (AVO). However, AVO analysis does not always result in successful hydrocarbon finds because abnormal seismic amplitude variations can sometimes be caused by other factors, such as alternative lithology and residual hydrocarbons in certain depositional environments. Furthermore, not all gas fields are associated with obvious AVO anomalies. Therefore, new techniques should be applied to combine with AVO for hydrocarbon detection. In my thesis, I, through case studies, intend to investigate and validate the wave decomposition technique as a new tool for hydrocarbon detection which decomposes seismic wave into different frequency contents and may help identify better the amplitude anomalies associated with hydrocarbon occurrence for each frequency due to seismic attenuation. The wavelet decomposition analysis technique has been applied in two geological settings in my study: clastic reservoir and carbonate reservoir. Results from both cases indicate that the wavelet decomposition analysis technique can be used for hydrocarbon detection effectively if the seismic data quality is good. This technique can be directly applied to the processed 2D and 3D pre-stack/post-stack data sets (1) to detect hydrocarbon zones in both clastic and carbonate reservoirs by analyzing the low frequency signals in the decomposed domain and (2) to identify thin beds by analyzing the high frequency signals in the decomposed domain. In favorable cases, the method may possibly help separate oil from water in high-porosity and high-permeability carbonate reservoirs deeply buried underground. Therefore, the wavelet analysis would be a powerful tool to assist geological interpretation and to reduce risk for hydrocarbon exploration.
4

Real Time Driver Safety System

Cho, Gyuchoon 01 May 2009 (has links)
The technology for driver safety has been developed in many fields such as airbag system, Anti-lock Braking System or ABS, ultrasonic warning system, and others. Recently, some of the automobile companies have introduced a new feature of driver safety systems. This new system is to make the car slower if it finds a driver’s drowsy eyes. For instance, Toyota Motor Corporation announced that it has given its pre-crash safety system the ability to determine whether a driver’s eyes are properly open with an eye monitor. This paper is focusing on finding a driver’s drowsy eyes by using face detection technology. The human face is a dynamic object and has a high degree of variability; that is why face detection is considered a difficult problem in computer vision. Even with the difficulty of this problem, scientists and computer programmers have developed and improved the face detection technologies. This paper also introduces some algorithms to find faces or eyes and compares algorithm’s characteristics. Once we find a face in a sequence of images, the matter is to find drowsy eyes in the driver safety system. This system can slow a car or alert the user not to sleep; that is the purpose of the pre-crash safety system. This paper introduces the VeriLook SDK, which is used for finding a driver’s face in the real time driver safety system. With several experiments, this paper also introduces a new way to find drowsy eyes by AOI,Area of Interest. This algorithm improves the speed of finding drowsy eyes and the consumption of memory use without using any object classification methods or matching eye templates. Moreover, this system has a higher accuracy of classification than others.
5

CFT-tool : ferramenta configurável para aplicação de técnicas de detecção de falhas em processadores por software / CFT-tool: configurable tool to application of faults detection techniques in processors by software

Chielle, Eduardo January 2012 (has links)
Este trabalho apresenta uma ferramenta configurável, denominada de CFT-tool, capaz de aplicar automaticamente técnicas de detecção de erros em software com o objetivo de proteger processadores com diferentes arquiteturas e organizações contra falhas transientes no hardware. As técnicas baseadas em redundância e comparação são aplicadas pela CFT-tool no código assembly de um programa desprotegido, compilado para a arquitetura alvo. A ferramenta desenvolvida foi validada utilizando dois processadores distintos: miniMIPS e LEON3. O processador miniMIPS foi utilizado para verificar a eficiência, em termos de taxa de detecção de erros, tempo de execução e ocupação de memória, das técnicas de detecção em software aplicadas pela CFT-tool, comparando os resultados obtidos com os presentes na literatura. O processador LEON3 foi selecionado por ser amplamente utilizado em aplicações espaciais e por ser baseado em uma arquitetura diferente da arquitetura do processador miniMIPS. Com o processador LEON3 é verificada a configurabilidade da CFT-tool, isto é, a capacidade dela de aplicar técnicas de detecção em software em um código compilado para um diferente processador, o mantendo funcional e sendo capaz de detectar erros. A CFT-tool pode ser utilizada para proteger programas para outras arquiteturas e organizações através da modificação dos arquivos de configuração da ferramenta. A configuração das técnicas é definida segundo as especificações da aplicação, recursos do processador e seleções do usuário. Programas foram protegidos e falhas foram injetadas em nível lógico em ambos os processadores. Para o processador miniMIPS, as taxas de detecção de erros, os tempos de execução e as ocupações de memórias dos programas protegidos se mostraram compatíveis com os resultados presentes na literatura. Resultados semelhantes foram encontrados para o processador LEON3. Diferenças entre os resultados ocorrem devido às características da arquitetura. A ferramenta CFT-tool por ser configurável pode proteger o código na integralidade ou selecionar partes do código e registradores que serão redundantes e protegidos. A vantagem de proteger parte do código é reduzir o custo final em termos de tempo de processamento e ocupação de memória. Uma análise do impacto da seleção seletiva de registradores na taxa de detecção de erros é apresentada. E diretivas de alcançar um comprometimento ótimo entre quantidade de registradores protegidos, taxa de detecção de erros e custo são discutidas. / This work presents a configurable tool, called CFT-tool, capable of automatically applying software-based error detection techniques aiming to protect processors with different architectures and organizations against transient faults in the hardware. The techniques are based on redundancy and comparison. They are applied by CFT-tool in the assembly code of an unprotected program, compiled to the target architecture. The developed tool was validated using two distinct processors: miniMIPS and LEON3. The miniMIPS processor has been utilized to verify the efficiency of the software-based techniques applied by CFT-tool in the assembly code of unprotected programs in terms of error detection rate, runtime and memory occupation, comparing the obtained results with those presented in the literature. The LEON3 processor was selected because it is largely adopted in space applications and because it is based on a different architecture that miniMIPS processor. The configurability of the CFT-tool is verified with the LEON3 processor, that is, the capability of the tool at applying software-based detection techniques in a code compiled to a different processor, maintaining it functional and capable of detecting errors. The CFT-tool can be utilized to protect programs compiled to other architectures and organizations by modifying the configuration files of the tool. The configuration of the techniques is defined by the specifications of the application, processor resources and selections of the user. Programs were protected and faults were injected in logical level in both processors. When using the miniMIPS processor, the error detection rates, runtimes and memory occupations of the protected programs are comparable to the results presents in the literature. Similar results are reached with the LEON3 processor. Differences between the results are due to architecture features. The CFT-tool can be configurable to protect the entire code or to select portions of the code or registers that will be redundant and protected. The advantage of protecting portions of the code is to reduce the final cost in terms of runtime and memory occupation. An analysis of the impact of selective selection of registers in the error detection rate is also presented. And policies to reach an optimum committal between amount of protected registers, error detection rate and cost are discussed.
6

CFT-tool : ferramenta configurável para aplicação de técnicas de detecção de falhas em processadores por software / CFT-tool: configurable tool to application of faults detection techniques in processors by software

Chielle, Eduardo January 2012 (has links)
Este trabalho apresenta uma ferramenta configurável, denominada de CFT-tool, capaz de aplicar automaticamente técnicas de detecção de erros em software com o objetivo de proteger processadores com diferentes arquiteturas e organizações contra falhas transientes no hardware. As técnicas baseadas em redundância e comparação são aplicadas pela CFT-tool no código assembly de um programa desprotegido, compilado para a arquitetura alvo. A ferramenta desenvolvida foi validada utilizando dois processadores distintos: miniMIPS e LEON3. O processador miniMIPS foi utilizado para verificar a eficiência, em termos de taxa de detecção de erros, tempo de execução e ocupação de memória, das técnicas de detecção em software aplicadas pela CFT-tool, comparando os resultados obtidos com os presentes na literatura. O processador LEON3 foi selecionado por ser amplamente utilizado em aplicações espaciais e por ser baseado em uma arquitetura diferente da arquitetura do processador miniMIPS. Com o processador LEON3 é verificada a configurabilidade da CFT-tool, isto é, a capacidade dela de aplicar técnicas de detecção em software em um código compilado para um diferente processador, o mantendo funcional e sendo capaz de detectar erros. A CFT-tool pode ser utilizada para proteger programas para outras arquiteturas e organizações através da modificação dos arquivos de configuração da ferramenta. A configuração das técnicas é definida segundo as especificações da aplicação, recursos do processador e seleções do usuário. Programas foram protegidos e falhas foram injetadas em nível lógico em ambos os processadores. Para o processador miniMIPS, as taxas de detecção de erros, os tempos de execução e as ocupações de memórias dos programas protegidos se mostraram compatíveis com os resultados presentes na literatura. Resultados semelhantes foram encontrados para o processador LEON3. Diferenças entre os resultados ocorrem devido às características da arquitetura. A ferramenta CFT-tool por ser configurável pode proteger o código na integralidade ou selecionar partes do código e registradores que serão redundantes e protegidos. A vantagem de proteger parte do código é reduzir o custo final em termos de tempo de processamento e ocupação de memória. Uma análise do impacto da seleção seletiva de registradores na taxa de detecção de erros é apresentada. E diretivas de alcançar um comprometimento ótimo entre quantidade de registradores protegidos, taxa de detecção de erros e custo são discutidas. / This work presents a configurable tool, called CFT-tool, capable of automatically applying software-based error detection techniques aiming to protect processors with different architectures and organizations against transient faults in the hardware. The techniques are based on redundancy and comparison. They are applied by CFT-tool in the assembly code of an unprotected program, compiled to the target architecture. The developed tool was validated using two distinct processors: miniMIPS and LEON3. The miniMIPS processor has been utilized to verify the efficiency of the software-based techniques applied by CFT-tool in the assembly code of unprotected programs in terms of error detection rate, runtime and memory occupation, comparing the obtained results with those presented in the literature. The LEON3 processor was selected because it is largely adopted in space applications and because it is based on a different architecture that miniMIPS processor. The configurability of the CFT-tool is verified with the LEON3 processor, that is, the capability of the tool at applying software-based detection techniques in a code compiled to a different processor, maintaining it functional and capable of detecting errors. The CFT-tool can be utilized to protect programs compiled to other architectures and organizations by modifying the configuration files of the tool. The configuration of the techniques is defined by the specifications of the application, processor resources and selections of the user. Programs were protected and faults were injected in logical level in both processors. When using the miniMIPS processor, the error detection rates, runtimes and memory occupations of the protected programs are comparable to the results presents in the literature. Similar results are reached with the LEON3 processor. Differences between the results are due to architecture features. The CFT-tool can be configurable to protect the entire code or to select portions of the code or registers that will be redundant and protected. The advantage of protecting portions of the code is to reduce the final cost in terms of runtime and memory occupation. An analysis of the impact of selective selection of registers in the error detection rate is also presented. And policies to reach an optimum committal between amount of protected registers, error detection rate and cost are discussed.
7

CFT-tool : ferramenta configurável para aplicação de técnicas de detecção de falhas em processadores por software / CFT-tool: configurable tool to application of faults detection techniques in processors by software

Chielle, Eduardo January 2012 (has links)
Este trabalho apresenta uma ferramenta configurável, denominada de CFT-tool, capaz de aplicar automaticamente técnicas de detecção de erros em software com o objetivo de proteger processadores com diferentes arquiteturas e organizações contra falhas transientes no hardware. As técnicas baseadas em redundância e comparação são aplicadas pela CFT-tool no código assembly de um programa desprotegido, compilado para a arquitetura alvo. A ferramenta desenvolvida foi validada utilizando dois processadores distintos: miniMIPS e LEON3. O processador miniMIPS foi utilizado para verificar a eficiência, em termos de taxa de detecção de erros, tempo de execução e ocupação de memória, das técnicas de detecção em software aplicadas pela CFT-tool, comparando os resultados obtidos com os presentes na literatura. O processador LEON3 foi selecionado por ser amplamente utilizado em aplicações espaciais e por ser baseado em uma arquitetura diferente da arquitetura do processador miniMIPS. Com o processador LEON3 é verificada a configurabilidade da CFT-tool, isto é, a capacidade dela de aplicar técnicas de detecção em software em um código compilado para um diferente processador, o mantendo funcional e sendo capaz de detectar erros. A CFT-tool pode ser utilizada para proteger programas para outras arquiteturas e organizações através da modificação dos arquivos de configuração da ferramenta. A configuração das técnicas é definida segundo as especificações da aplicação, recursos do processador e seleções do usuário. Programas foram protegidos e falhas foram injetadas em nível lógico em ambos os processadores. Para o processador miniMIPS, as taxas de detecção de erros, os tempos de execução e as ocupações de memórias dos programas protegidos se mostraram compatíveis com os resultados presentes na literatura. Resultados semelhantes foram encontrados para o processador LEON3. Diferenças entre os resultados ocorrem devido às características da arquitetura. A ferramenta CFT-tool por ser configurável pode proteger o código na integralidade ou selecionar partes do código e registradores que serão redundantes e protegidos. A vantagem de proteger parte do código é reduzir o custo final em termos de tempo de processamento e ocupação de memória. Uma análise do impacto da seleção seletiva de registradores na taxa de detecção de erros é apresentada. E diretivas de alcançar um comprometimento ótimo entre quantidade de registradores protegidos, taxa de detecção de erros e custo são discutidas. / This work presents a configurable tool, called CFT-tool, capable of automatically applying software-based error detection techniques aiming to protect processors with different architectures and organizations against transient faults in the hardware. The techniques are based on redundancy and comparison. They are applied by CFT-tool in the assembly code of an unprotected program, compiled to the target architecture. The developed tool was validated using two distinct processors: miniMIPS and LEON3. The miniMIPS processor has been utilized to verify the efficiency of the software-based techniques applied by CFT-tool in the assembly code of unprotected programs in terms of error detection rate, runtime and memory occupation, comparing the obtained results with those presented in the literature. The LEON3 processor was selected because it is largely adopted in space applications and because it is based on a different architecture that miniMIPS processor. The configurability of the CFT-tool is verified with the LEON3 processor, that is, the capability of the tool at applying software-based detection techniques in a code compiled to a different processor, maintaining it functional and capable of detecting errors. The CFT-tool can be utilized to protect programs compiled to other architectures and organizations by modifying the configuration files of the tool. The configuration of the techniques is defined by the specifications of the application, processor resources and selections of the user. Programs were protected and faults were injected in logical level in both processors. When using the miniMIPS processor, the error detection rates, runtimes and memory occupations of the protected programs are comparable to the results presents in the literature. Similar results are reached with the LEON3 processor. Differences between the results are due to architecture features. The CFT-tool can be configurable to protect the entire code or to select portions of the code or registers that will be redundant and protected. The advantage of protecting portions of the code is to reduce the final cost in terms of runtime and memory occupation. An analysis of the impact of selective selection of registers in the error detection rate is also presented. And policies to reach an optimum committal between amount of protected registers, error detection rate and cost are discussed.
8

The incidence of hepatitis a virus in selected water sources and associated risk of infection in South Africa

Venter, Johanna Margaretha Elizabeth 13 August 2008 (has links)
Hepatitis A virus (HAV) is a non-enveloped, positively charged single stranded RNA hepatotropic agent from the family Picornaviridae, and the sole member of the genus Hepatovirus. There is only one HAV serotype but there are seven genotypes. Hepatitis A (HA) infection is usually self-limiting and the severity of the illness is age dependant. In children, infection with HAV is usually asymptomatic, while most adults and immunocompromised patients develop moderate to severe clinical disease. HA is endemic in South Africa (SA) with 100% of children from the lower socio-economic population acquiring immunity before the age of 10. With the current trends in urbanisation, a change in the epidemic vulnerability of the SA population can be expected. HAV is predominantly transmitted by the faecal-oral route and contaminated food and water are important sources of infection. However, the contribution of waterborne HAV to the burden of HA disease in SA is unknown. The aims of this investigation were to assess techniques for the recovery, isolation and detection of HAV from water sources. Thereafter these techniques were applied to estimate the potential risk of infection posed to communities using the water sources for recreational and domestic purposes. This would elucidate whether or not water plays a role in the spread of HAV infection in SA. An effective and sensitive concentration method is fundamental to the successful detection of HAV in water sources. Three primary recovery and two secondary concentration techniques were investigated in this study. An in-house modified glass wool technique, using 15g of glass wool and with the addition of three metal gauze grids at 5g intervals, proved to be the most sufficient and cost effective technique for the primary recovery of HAV from water sources. The packing density of the glass wool and positioning of the grids proved to be essential for efficient HAV recovery. A polyethylene glycol/sodium chloride secondary concentration technique proved to be more cost effective than commercial centrifugal devices. Combinations of cell cultures, propagation conditions, RNA extraction protocols and detection techniques were assessed for the isolation and detection of HAV. A combination of FRhK-4R cell culture propagation and reverse transcription-polymerase chain reaction-oligonucleotide probe assay was demonstrated to be the simple, most efficient technique for the detection of HAV. The nucleotide sequences of HAV strains from water sources and clinical specimens were compared to ascertain whether the strains from water were a potential source of infection. Although the majority of clinical strains clustered seperately from the water strains, one strain from an asymptomatic patient was identical to a number of strains from water. This suggests that HAV in the environment is a potential source of infection in SA. To assess the potential risk of infection constituted by HAV to persons using surface dam and river water for domestic and recreational purposes, a deterministic exponential risk assessment model which works with mean values and conservative assumptions was applied. Results indicated a minimal risk of infection to the higher socio-economic, non-immune population using the water for recreational purposes, if 100 ml of water was ingested per day. No risk was identified for the lower socio-economic, predominantly immune, population who uses the same water sources for domestic and drinking purposes. This study represents the first comprehensive data on risk of infection constituted by waterborne HAV in SA. / Dissertation (MSc)--University of Pretoria, 2008. / Medical Virology / unrestricted
9

Quaternary CLB a falul tolerant quaternary FPGA

Rhod, Eduardo Luis January 2012 (has links)
A diminuição no tamanho dos transistores vem aumentando cada vez mais o número de funções que os dispositivos eletrônicos podem realizar. Apesar da diminuição do tamanho mínimo dos transistores, a velocidade máxima dos circuitos não consegue seguir a mesma taxa de aumento. Um dos grandes culpados apontados pelos pesquisadores são as interconexões entre os transistores e também entre os componentes. O aumento no número de interconexões dos circuitos traz consigo um significativo aumento do cosumo de energia, aumento do atraso de propagação dos sinais, além de um aumento da complexidade e custo do projeto dos circuitos integrados. Como uma possível solução a este problema é proposta a utilização de lógica multivalorada, mais especificamente, a lógica quaternária. Os dispositivos FPGAs são caracterizados principalmente pela grande flexibilidade que oferecem aos projetistas de sistemas digitais. Entretanto, com o avanço nas tecnologias de fabricação de circuitos integrados e diminuição das dimensões de fabricação, os problemas relacionados ao grande número de interconexões são uma preocupação para as próximas tecnologias de FPGAs. As tecnologias menores que 90nm possuem um grande aumento na taxa de erros dos circuitos, na lógica combinacional e sequencial. Apesar de algumas potenciais soluções começara a ser investigadas pela comunidade, a busca por circuitos tolerantes a erros induzidos por radiação, sem penalidades no desempenho, área ou potência, ainda é um assunto de pesquisa em aberto. Este trabalho propõe o uso de circuitos quaternários com modificações para tolerar falhas provenientes de eventos transientes. Como principal contribuição deste trabalho destaca-se o desenvolvimento de uma CLB (do inglês Configurable Logic Block) quaternária capaz de suportar eventos transientes e, na possibilidade de um erro, evitá-lo ou corrigi-lo. / The decrease in transistor size is increasing the number of functions that can be performed by the electronic devices. Despite this reduction in the transistors minimum size, the circuit’s speed does not follow the same rate. One of the major reasons pointed out by researchers are the interconnections between the transistors and between the components. The increase in the number of circuit interconnections brings a significant increase in energy consumption, propagation delay of signals, and an increase in the complexity and cost of new technologies IC designs. As a possible solution to this problem the use of multivalued logic is being proposed, more specifically, the quaternary logic. FPGA devices are characterized mainly by offering greater flexibility to designers of digital systems. However, with the advance in IC manufacturing technologies and the reduced size of the minimum fabricated dimensions, the problems related to the large number of interconnections are a concern for future technologies of FPGAs. The sub 90nm technologies have a large increase in the error rate of its functions for the combinational and sequential logic. Although potential solutions are being investigated by the community, the search for circuits tolerant to radiation induced errors, without performance, area, or power penalties, is still an open research issue. This work proposes the use of quaternary circuits with modifications to tolerate faults from transient events. The main contribution of this work is the development of a quaternary CLB (Configurable Logic Block) able to withstand transient events and the occurrence of soft errors.
10

Harmful Algal Blooms of the West Florida Shelf and Campeche Bank: Visualization and Quantification using Remote Sensing Methods

Soto Ramos, Inia Mariel 01 January 2013 (has links)
Harmful Algal Blooms (HABs) in the Gulf of Mexico (GOM) are natural phenomena that can have negative impacts on marine ecosystems on which human health and the economy of some Gulf States depends. Many of the HABs in the GOM are dominated by the toxic dinoflagellate Karenia brevis. Non-toxic phytoplankton taxa such as Scrippsiella sp. also form intense blooms off the Mexican coast that result in massive fish mortality and economic losses, particularly as they may lead to anoxia. The main objectives of this dissertation were to (1) evaluate and improve the techniques developed for detection of Karenia spp. blooms on the West Florida Shelf (WFS) using satellite remote sensing methods, (2) test the use of these methods for waters in the GOM, and (3) use the output of these techniques to better understand the dynamics and evolution of Karenia spp. blooms in the WFS and off Mexico. The first chapter of this dissertation examines the performance of several Karenia HABs detection techniques using Moderate Resolution Imaging Spectroradiometer (MODIS) satellite images and historical ground truth observations collected on the WFS from August 2002 to December 2011. A total of 2323 in situ samples collected by the Florida Fish and Wildlife Research Institute to test for Karenia spp. matched pixels with valid ocean color satellite observations over this period. This dataset was used to systematically optimize variables and coefficients used in five published HAB detection methods. Each technique was tested using a set of metrics that included the F-Measure (FM). Before optimization, the average FM for all techniques was 0.47. After optimization, the average FM increased to 0.59, and false positives decreased ~50%. The addition of a Fluorescence Line Height (FLH) criterion improved the performance of every method. A new practical method was developed using a combination of FLH and Remote Sensing Reflectance at 555 nm (Rrs555-FLH). The new method resulted in an FM of 0.62 and 3% false negatives, similar to those from more complex techniques. The first chapter concludes with a series of recommendations on how to improve the detection techniques and how to take these results a step further into a Gulf wide observing systems for HABs. In chapter two, ocean color techniques were used to examine the extension, evolution and displacement of four Karenia spp. events that occurred in the WFS between 2004 and 2011. Blooms were identified in the imagery using the new Rrs-FLH method and validated using in situ phytoplankton cell counts. The spatial extension of each event was followed in time by delineating the blooms. In 2004 and 2005, the WFS was affected by a series of hurricanes that led to high river discharge and intense sediment resuspension events. Both processes had an impact on HAB occurrence. For example, I tracked a Karenia spp. bloom found in late December 2004 approximately 40-80 km offshore Saint Petersburg, which then expanded reaching an extension of >8000 km2 in February 2005. The bloom weakened in spring 2005 and intensified again in summer reaching >42,000 km2 after the passage of hurricane Katrina in August 2005. This bloom covered the WFS from Charlotte Harbor to the Florida Panhandle. Two other cases were studied in the WFS. The results of the Hybrid Coordinate Ocean Model from the U.S. Navy aid understanding the dispersal of the blooms. During fall 2011, three field campaigns to study HABs in Mexico were conducted to do an analysis of optical properties and explore the possibility of using ocean color techniques to distinguish between the main phytoplankton blooms in that region. Three main bloom scenarios were observed in the Campeche Bank region: massive diatom blooms, blooms dominated by Scrippsiella spp., and Karenia spp. blooms. The normalized specific phytoplankton absorption spectra were found to be different for Karenia spp. and Scrippsiella sp. blooms. A new technique that combines phytoplankton absorption derived from MODIS data and the new technique developed in Chapter One showed potential for a detection technique that can distinguish between Karenia and Scrippsiella blooms. Additional work is needed to improve the new technique developed for Mexican waters, but results show potential for detection techniques that can be used Gulf-wide. This will help better understand the dynamic and possible connectivity of phytoplankton blooms in the GOM.

Page generated in 0.1247 seconds