PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.
This PDF file contains the front matter associated with SPIE Proceedings Volume 9794, including the Title Page, Copyright information, Table of Contents, Introduction (if any), and Conference Committee listing.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In this paper, we introduce a new methodology of non-contact cardiac pulse rate estimation based on the imaging Photoplethysmography (iPPG) and blind source separation. This novel’s approach can be applied to color video recordings of the human face and is based on automatic face tracking along with blind source separation of the color channels into RGB three-channel component. First of all, we should do some pre-processings of the data which can be got from color video such as normalization and sphering. We can use spectrum analysis to estimate the cardiac pulse rate by Independent Component Analysis (ICA) and JADE algorithm. With Bland-Altman and correlation analysis, we compared the cardiac pulse rate extracted from videos recorded by a basic webcam to a Commercial pulse oximetry sensors and achieved high accuracy and correlation. Root mean square error for the estimated results is 2.06bpm, which indicates that the algorithm can realize the non-contact measurements of cardiac pulse rate.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The laser-acoustic method is an effective tool for important material properties test. In the present paper, the surface acoustic wave (SAW) is applied in the nondestructive detection of subsurface cracks in metal. The study focuses on the dispersion of surface acoustic wave propagating in the layer with cracks. The finite element method (FEM) is employed by establishing a series of subsurface cracks models and a more real-like displacement load function is proposed to excite the surface acoustic wave. The subsurface cracks models are divided into 3 groups in depth and 3 groups in the separation distance to analyze the propagation properties of surface acoustic wave and influences of subsurface cracks on the phase velocity. The relation of phase velocity with the dimension of cracks in the frequency domain is investigated in the simulation. It is found that the finite element results fit very well with the surface acoustic wave theory and the dispersion curves in the frequency domain are very suitable to evaluate the properties of subsurface cracks in metal.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The paper studied the literature on the detection of recreational facilities, and discussed the main contents of the literature from the aspects of the detection management system and the detection technology. There are some reference values for the detection and research of amusement facilities.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper introduces a intelligent environmental health worker’ signing system by internet of things based on RFID. It can realize the signing in of environmental health worker by internet of things. Then the information of workers will be uploaded to the management centers over a long distance, thus improve the work efficiency on real-time monitoring and resource integration of management centers.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Based on optical fiber transmission no dielectric loss test system, noise source and the inherent noise of the photoelectric detector are analyzed separately. System module of electronic device and the noise inherent in the system are analyzed at the same time. The noise characteristics and suppression method of the whole detection system are put forward finally.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Outlier detection in high dimensional data is one of the hot areas of data mining. The existing outlier detection methods are based on the distance in Euclidean space. In high-dimensional data, these methods are bound to deteriorate due to the notorious "dimension disaster" which leads to distance measure cannot express the original physical meaning and the low computational efficiency. This paper improves the method of angle-based outlier factor and proposes the method of variance of angle-based outlier factor outlier in mining high dimensional. It introduces the related theories to guarantee the reliability of the method. The empirical experiments on synthetic data sets show the method is efficiency and scalable to high-dimensional data sets.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Based on the Beer-Lambert law and the characteristic IR absorption spectrum of CO, a system for extracted type infrared gas analysis has been designed and manufactured, which utilizes different absorptive degrees infrared light gain under different concentration degrees of the gas to be measured to the value of detect CO concentration, including optical path, electric circuit and gas path. A forward and backward gas detection chamber equipped with a micro flow sensor has been used in the optical path as well as a multistage high precision amplifier and filter circuit has been used in the electric circuit. The experimental results accord with the testing standard.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Computer vision is an important tool for sports video processing. However, its application in badminton match analysis is very limited. In this study, we proposed a straightforward but robust histogram-based background estimation and player detection methods for badminton video clips, and compared the results with the naive averaging method and the mixture of Gaussians methods, respectively. The proposed method yielded better background estimation results than the naive averaging method and more accurate player detection results than the mixture of Gaussians player detection method. The preliminary results indicated that the proposed histogram-based method could estimate the background and extract the players accurately. We conclude that the proposed method can be used for badminton player tracking and further studies are warranted for automated match analysis.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The SERF atomic spin magnetometer, which can be used to measure the residual weak magnetic field in the magnetic shield due to its ultrahigh sensitivity, is elaborated in this paper. The method of using the SERF atomic spin magnetometer to measure the residual weak magnetic field in the magnetic shield was presented. The compensating coils, which were placed inside the magnetic shield, produced the uniform magnetic fields along the x, y and z directions, and they were reverse direction with the residual weak magnetic fields; via the cross modulation method, the residual weak magnetic fields could be counteracted. At this time, the magnetic fields producing by the compensating coils were equal to the residual weak magnetic fields in the magnetic shield. The experimental results showed that the residual weak magnetic fields were approximate 0.5 nT, 1.0 nT and 7.0 nT along the x, y and z directions, respectively; and the maximum measurement errors were approximate 0.0169, 0.0377, and 0.5071 along the x, y and z directions, respectively. Finally, the reasons of measurement error were analyzed.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Ship is a complex underwater volume source in shallow water; its raidated noise field has the spacial directivity, which results in an obvious difference of detecting pefrormance of passive sonar at different aspect angles. In this paper the multi-poles mathematical model of the ship radiated noise fiels is established in shallow water, and the method of detecting probability for ship is researched using passive sonar equation. The detected probalility is estimated at different aspect angles when the range between receiver and the source is given, at the same time the obtained results are compared. These simulated results are of particular importance for the safety of traveling ship in the sea.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Photovoltaic Islanding detection is a important function for grid-connected inverters. It is difficult to detect islanding when there is a power balance between the inverter and the load. The active frequency drift with positive feedback method (AFDPF) is able to detect the islanding by disturbing the frequency of inverter output current under the situation of power balance. This paper is dedicated to analyze the principle of AFDPF method and the parameters selection rules. The non-detection zone (NDZ) of AFDPF is also presented. The analysis results are verified by the simulation in MATLAB/Simulink. According to the technical specification of IEEE.Std.929-2000, the validity of the analysis is supported by the experimental results.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The high regularity of final state of track can be ensured by the fine adjustment of ballastless track. Currently the geometry data of track are measured by the inspecting instrument for static geometry parameter of track in static inspection. And according to the analogue adjustments of sleepers given by the special software packages of instruments for track fine adjustment, the rail can be adjusted by manual operation. The processing of adjusting track usually required several times for getting the rest of deviation, which meet the demands of regularity index of some standard. Usually the influence of subjective factors in manual operation, which leads the omission of some track inspecting points, overrun of the allowed adjustment and so on, and makes the work of analogue adjustments repeated again and again until the rest of deviation meet those requirements, can’t be ignored. This way of track fine adjustment is not only wasting time and energy, but also difficult to make sure the best adjustment of all inspecting points. For those disadvantages and the fact that analogue adjustments should to be multiples of 0.5 mm, this paper proposes a novel method adding two new constraints, which include the allowed adjustment of track fastener and the difference deviation of adjacent point, and using the integer programming for fine adjustment. The experimental results show that the proposed new method can complete the track fine adjustment without human intervention and give the optimal analogue adjustments more automatically and more accurately.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Industrial wireless networked control system has been widely used, and how to evaluate the performance of the wireless network is of great significance. In this paper, considering the shortcoming of the existing performance evaluation methods, a comprehensive performance evaluation method of networks multi-indexes fuzzy analytic hierarchy process (MFAHP) combined with the fuzzy mathematics and the traditional analytic hierarchy process (AHP) is presented. The method can overcome that the performance evaluation is not comprehensive and subjective. Experiments show that the method can reflect the network performance of real condition. It has direct guiding role on protocol selection, network cabling, and node setting, and can meet the requirements of different occasions by modifying the underlying parameters.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The paper describes the meaning of network public opinion and the network public opinion research of data acquisition technique. Designed and implemented a web crawler which oriented network public opinion data acquisition. Insufficient analysis of the generic web crawler, using asynchronous Socket, DNS cache, and queue downloads to improve its bottom story frame, increase the speed of collecting.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Locating the source of water pollution is of great significance to water environment protection. According to the concentration model, the localization problem only related to source location in wireless sensor networks is proposed. The Unscented Kalman Filter (UKF) method is used to solve the problem. In the simulation part, based on the simulation data the localization algorithm is tested. The results show that the estimates of the source location vary with the initial values in numerical calculation, and compared with the UKF and least square localization methods which estimate the parameters including pollution source location, initial diffusion time and mass flow rate, the localization method in this paper has higher accuracy and stability.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In order to determine the routing scheme of a line in city track traffic, with the alternative routing as variables, taking the optimal matching between the spatial characteristics of passenger demand and routing, as well as the minimization of operation cost as the objective functions, a nonlinear constrained multi-objective 0-1 programming model is established. With the minimum value of each objective, the weighted coefficient of each objective function is computed with α - method, and the multi-objective problem is transformed into a single objective problem to be solved. Taking Xi’an Rail Transit Line 2 as an example, a selectable routing scheme is calculated.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
For mobile IPv6, home agent (HA) plays an important role. Each mobile node (MN) has a home IP address, it will be not changeable. Also, the home agent (HA) of MN is not changeable. This rule provides the convenient for the ongoing communication without interruption. But it has some obvious drawbacks. Here, the new variable HA scheme is proposed. Every MN has a dynamic cache table, recording the information such as its home address, care-of address, and history address etc. If the accumulated time in one region exceeds that in the hometown, the foreign agent (FA) could become home agent (HA), the home agent could become history agent. Later, the performance of the new protocol is simulated with OPNET software, whose result shows the performance of the new protocol works better than that of the traditional protocol.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A novel probabilistic broadcasting strategy (PBS) for UUV (Underwater Unmanned Vehicles) Ad Hoc Networks is proposed in this paper. The main objective is to increase the efficiency of broadcasting in UUV Ad Hoc Networks. The UUV nodes closer to the vector from the last hop node to the destination participate in broadcasting with higher probability. We describe PBS, implement it and evaluate its performance using NS-2 network simulator. Simulation results reveal that the proposed algorithm achieves better performance in terms of the average packet delivery fraction, average end-to-end delay and average energy consumption of each received packet, which is respectively compared with VBF.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The wireless sensor networks, which nodes prone to premature death, with unbalanced energy consumption and a short life time, influenced the promotion and application of this technology in internet of things in agriculture. This paper proposes a clustering routing protocol based on the residual energy level (RELCP). RELCP includes three stages: the selection of cluster head, establishment of cluster and data transmission. RELCP considers the remaining energy level and distance to base station, while election of cluster head nodes and data transmitting. Simulation results demonstrate that the protocol can efficiently balance the energy dissipation of all nodes, and prolong the network lifetime.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper presents a novel method to solve the obstacle avoidance path planning of mobile robots based on global probability density function (PDFs). Combining Fourier transform for the group of rigid-body motion in the plane, the resulting convolution theorem, and the particular single-step PDFs of a cart, we obtained global PDFs for describing the movement probability of a mobile robot. The iterative algorithm based on global PDFs takes into full account the information of target position and position of obstacles, which avoids collision between mobile robots and obstacles to obtain an optimal or near-optimal collision-free path. Simulations are carried out to demonstrate the effectiveness of the algorithm.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The algorithm based on the beacon node localization is a research hotspot in the field of wireless sensor network. For circular distribution beacon group, we found that the optimal number of beacon is 5, and one is located in the centre of the circle, the remaining four evenly distributed on the circumference of a circle; For rectangular ROI, take advantage of the beacon group can pinpoint areas for the square, the whole network is divided into a grid, use a traveling salesman algorithm to get the beacon for optimal moving path; Based on five beacon node localization model in this paper, we put forward a novel region segmentation centroid localization algorithm (RDCLA), by comparing three groups of RSSI values, the node is locked into a triangle area, using centroid algorithm to locate the node; The algorithm principle is simple and has low computing complexity and has nothing to do with the network topology; The simulation results show that compared with TCLA and WCLA positioning accuracy has large improvement, and are suitable for all kinds of the size of the wireless sensor network.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Wireless sensor networks are widely deployed in the internet of things to monitor valuable objects. Once the object is monitored, the sensor nearest to the object which is known as the source informs the base station about the object’s information periodically. It is obvious that attackers can capture the object successfully by localizing the source. Thus, many protocols have been proposed to secure the source location. However, in this paper, we examine that typical source location protection protocols generate not only near but also highly localized phantom locations. As a result, attackers can trace the source easily from these phantom locations. To address these limitations, we propose a protocol to enhance the source location protection (SLE). With phantom locations far away from the source and widely distributed, SLE improves source location anonymity significantly. Theory analysis and simulation results show that our SLE provides strong source location privacy preservation and the average safety period increases by nearly one order of magnitude compared with existing work with low communication cost.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In the basic PMIPv6 (Proxy Mobile IPv6), the MN (Mobile Node) is assigned with a 64-bit HNP (Home Network Prefix) during the initial attachment for the HoA (Home Address) configuration. During the movements of MN, this prefix is assumed to be unchanged and then the upper layer applications do not have to use the reconfigured HoA and then the handover is transparent at the IP and above layers. However, the current protocol does not specify the related operation to support the MN to timely receive the new HNP and configure the new HoA when its HNP is renumbered. In this paper, this problem is discussed and a possible solution is proposed based on some simple extensions of the basic PMIPv6. Our analysis demonstrates that the proposed scheme can effectively discover the HNP renumbering and keep lower signaling cost, compared with the basic PMIPv6.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The paper provides an intelligent distributed antenna system (DAS) which can improve performance of indoor LTE wireless system. The DAS has following features: centralized control to the antenna units, specific precoding methods, user equipments (UEs) grouping and TDMA based scheduling.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Compared with the traditional frequency-coding mode, steady-state visual evoked potential (SSVEP)-based braincomputer interfaces (BCIs) will obtain some good aspects by using phase-coding mode. Phase-coding mode should play an important role in SSVEP-based BCIs. But current research is only involved in a particular aspect of phase-coding mode or a particular method. In this situation, it makes researchers difficult to compare the various techniques described in the literature and hinders the development of the phase-coding study. In response to this situation, a common framework is suitable for the research. This paper proposes a general framework for phase-coding mode using in SSVEP-based BCIs. To validate the proposed idea, we design a SSVEP-based BCI in the light of the framework. It is shown that our framework proposed is suitable for the research of SSVEP-based BCIs.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In order to improve the accuracy of network node localization in wireless sensor networks, based on focus on analysis Centroid localization algorithm, Proposing to improve program, and prove that node localization algorithm to verify the improved positioning error is reduced by 10%, improve the accuracy of 4% by computer simulation.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Video security has become more and more important with the widespread use of videos. The encryption algorithm developed to protect text data may not be suitable to encrypt videos because of large data size and high real-time demand. Light weight algorithms, especially selective encryption algorithms, are attractive. However, existing algorithms can’t meet requirements in cryptography security, encryption efficiency and compression efficiency at the same time. We propose a fast selective encryption algorithm in this paper. Our algorithm selects data randomly instead of selecting key information. This is achieved by generating several pseudo-random sequences using RC4 with separate keys. The sequences are labeled with ‘0’ and ‘1’, and whether one bit in video data is encrypted is determined by the corresponding bit in the sequences. Our algorithm is at least as safe as naive algorithm for ciphertext-only attack, knownplaintext attack and chosen-plaintext attack. On the other hand, our computational cost is less than 7 percent compared with naive algorithm. Furthermore, our algorithm doesn’t enlarge video size and keeps video codec and video format compliant.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The Internet of Things (IoT) is gradually entering the industrial stage. Web applications in IoT such as monitoring, instant messaging, real-time quote system changes need to be transmitted in real-time mode to client without client constantly refreshing and sending the request. These applications often need to be as fast as possible and provide nearly real-time components. Real-time data updating is becoming the core part of application layer visualization technology in IoT. With support of data push in server-side, running state of "Things" in IoT could be displayed in real-time mode. This paper discusses several current real-time data updating method and explores the advantages and disadvantages of each method. We explore the use of WebSocket in a new approach for real-time data updating in IoT, since WebSocket provides low delay, low network throughput solutions for full-duplex communication.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Optical Code Division Multiplex Access, OCDMA, is a kind of new technology which is combined the wireless CDMA technology and the optical fiber communication technology together. The address coding technology in OCDMA system has been researched. Besides, the principle of the codec based on optical fiber delay line and non-coherent spectral domain encoding and decoding has been introduced and analysed, and the results was verified by experiment.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
According to the design of block cipher algorithm thought the current mainstream, DES block cipher algorithm based on compressed sensing, combined with the design idea of OMP algorithm, proposed a design of the block cipher MOMP¬DES. We discussed the design of MOMPDES algorithm, the whole process, and encryption and decryption algorithms. It introduces the security of MOMPDES briefly and is simulated by the experiment, the results prove the recovery error is very small after decryption, and we can get a complete plaintext.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In view of the problem of saving effectively energy and energy management in home, this paper designs a home energy intelligent control system based on power line carrier communication and wireless ZigBee sensor networks. The system is based on ARM controller, power line carrier communication and wireless ZigBee sensor network as the terminal communication mode, and realizes the centralized and intelligent control of home appliances. Through the combination of these two technologies, the advantages of the two technologies complement each other, and provide a feasible plan for the construction of energy-efficient, intelligent home energy management system.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A set of remote car anti-theft system based on ZigBee and GPRS with ARM11 built-in chip S3C6410 as the controller is designed. This system can detect the alarm information of the car with vibration sensor, pyroelectric sensor and infrared sensor. When the sensor detects any alarm signal, the ZigBee node in sleep will be awakened and then directly send the alarm signal to the microcontroller chip S3C6410 in the control room of the parking lot through ZigBee wireless transceiver module. After S3C6410 processes and analyzes the alarm signal, when any two sensors of the three collect the alarm signal, the LCD will display and generate an alarm and meanwhile it will send the alarm signal to the phone of the user in a wireless manner through the form of short message through GPRS module. Thus, the wireless remote monitoring of the system is realized.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The velocity estimation of UE (User Equipment) is very important for LTE (Long Term Evolution) system, in this paper a joint velocity estimation algorithm is proposed based on LTE system. In the proposed algorithm, the velocity is judged roughly by normalized standard deviation of the received power, and then channel auto-correlation function method is used in low or middle velocity condition and frequency offset estimation method is used in high velocity condition. The simulation results show the proposed algorithm has good estimation accuracy in low, middle or high velocity condition and has better performance than channel auto-correlation function method or frequency offset estimation method.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Considering there exists defects for Huffman coding to compress files, this paper presents a general algorithm to predict the vality of compressed files with variable-length coding. Through the pre-sentence of the prior estimate method of the average code length and the estimation method after file compressed, It implements a compressed file is no longer compressed. The algorithm includes character encoding and file encoding two stages, and it uses variable-length coding technique and compression rate information of the target file. First, it obtains the file code table from character probability statistics and the variable length encoding technique. Second, it uses the character probability and character code length to calculate the average code long. Finally, it determines whether the file is actually compressed according to the average code length of characters or the file compression ratio. Algorithm tests show: it can accurately pre-judge whether any type file can be compressed so that it only compresses the file that can be compressed.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
We have investigated the modulation instability (MI) in a nonlinear optical coupler using a generalized model describing the pulse propagation of two-core fiber. In particular, we discuss some influence of the MI of two-core fiber coupler. The results show that the dispersion influences the MI bandwidth, but not the maximum value of the MI gain, and the maximum value of the MI gain, as well as its bandwidth, has been also affected by input power, the ratio of power of two cores and nonlinear coefficient.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The most important function of a network is for transporting traffic. Due to the low traffic capacity of network systems under the shortest path routing algorithm, plenty of heuristic routing algorithms are emerging. In this paper, we propose a dual-routing algorithm model for network system. The overall traffic capacity of a network system can be evaluated by the critical packet generating rate. When this routing algorithm is adopted on BA scale-free networks with an appropriate parameter p, it can achieve larger traffic capacity compared with the single-routing algorithm.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Automatic modulation classification has become an important issue in various application areas such as civil and military domains. Fractal theory has been widely used for signal analysis and can provide effectiveness features such as fractal dimension for automatic modulation classification. However, most of the signals are not critical self-similar fractals; the traditional single fractal dimension can’t reveal the fractal characteristics of modulation signals. In this work, we explore the capacity of the multi-scale fractal dimensions to represent the complexity of modulation signals. The morphological covering (MC) method is selected to calculate the multi-scale fractal dimensions. Four typical modulation signals, mean the ASK, PSK, FSK and QAM signals, are simulated to evaluate the effectiveness of the presented method. Experimental results demonstrated that the multi-scale fractal dimensions calculated by morphological covering can satisfactorily distinguish the four modulation types. They can be further utilized as features for automatic modulation classification tasks.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In order to solve the problem of over temperature tube-burst caused by oxide scale shedding and blocking tubes of high temperature reheater of a 200MW super high pressure power plant boiler, this paper expounds the mechanism of scale forming and shedding, and analyzes the probable causes of the tube-burst failure. The results show that the root cause of scale forming is that greater steam extraction flow after reforming of the second extraction leads to less steam flow into reheater, which causes over temperature to some of the heated tubes; and the root cause of scale shedding is that long term operation in AGC-R mode brings about great fluctuations of unit load, steam temperature and pressure, accelerating scale shedding. In conclusion, preventive measures are drawn up considering the operation mode of the unit.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
For the multisensor linear stochastic descriptor system with correlated noises, the fused measurement can be obtained based on the weighted least square method and the fused descriptor system can be transformed into a new canonical form applying singular value decomposition (SVD) method. Then, the measurement fusion information filter of the original multisensor descriptor system is presented. The obtained measurement fusion information filter has global optimality, and can avoid computing these cross-variances of the local Kalman filters. A simulation example about 3-sensors stochastic descriptor system verifies the effectiveness.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper presents a target type recognition method based on local mean decomposition (LMD) and support vector machine (SVM) using the seismic signal caused by the ground-moving target. The wavelet packet filter is used for improving signal noise ratio (SNR). Then, the seismic signal is decomposed into several production function (PF) components. The feature vector is composed of the energy of each principal PF. SVM is used as classifier which discriminate the human, car and truck. The experiment result shows that, the average discrimination accuracy of proposed method is over 92.0%.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Considering the travel time and transfer frequency, transit passengers will choose to walk between two bus stops within an acceptable distance, which was rarely discussed by previous research on transit shortest path problem. This paper proposes a practical shortest path algorithm taking walking behavior into consideration. The algorithm can describe passengers’ behavior when they select travel routes. The feasibility and efficiency of this algorithm has also been preliminarily tested through an example by comparing with the existing shortest path algorithms.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Based on the requirement of using photoelectric equipment on the battlefield, the subject settings, implementation and evaluation criteria of the operational suitability are proposed in this paper. An operational suitability evaluation method combined with interval number, grey system theory and Analytic Hierarchy Process (AHP) is implemented to evaluate the test data. The simulation results show that this method can evaluate the operational suitability of different reconnaissance photoelectric equipment properly, which provides reference for the improvement of the photoelectric reconnaissance equipment‟s operational capability.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper presents a novel ground surface seismic source location method based on time difference of arrival (TDOA) and local mean decomposition (LMD). The wavelet packet filter is used for environmental noise reduction of seismic signal. Because of the non-stationary and randomness of seismic signal, LMD is applied to analyze seismic signal. The production function (PF) components can be obtained after the local mean decomposition to the seismic signal. Then, the principal PF component is selected based on the cross correlation coefficients. The instantaneous frequency distribution of principal PF component can be acquired by taking a derivative of pure frequency modulated signal with respect to time. In frequency spectrum graph, the frequency corresponding to the maximum of amplitude is selected as characteristic frequency. Finally, the time difference of arrival can be got according to the moment of characteristic frequency first appearance in instantaneous frequency distribution. The results of experiment show that the proposed method is effective.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Conventional phased array radar is to delay the signal between arrays by means of controlling signal phase indirectly in order to realize broadband and wide-angle scanning. This method makes system more complex. This paper presents frequency-domain phase weighting method to achieve accurate delay for wideband digital signal, elaborates algorithm principle of the method .At the same time, FPGA implementation is proposed and the factors of affecting delay precision are analyzed. Experimental results show that this method can achieve high-accuracy time delay for wideband digital signal, making FPGA implementation easily and reducing the inherent delay of signal processing, thereby reducing the hardware resource consumption.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A novel method for impedance matching of broadband antenna is presented. The paper evaluates the network input reflectance based on minimum mismatching network. The matching networks are obtained in the form of rational polynomials via the simplified real frequency technique (SRFT).The proposed procedure was demonstrated through its application to the design of fourth-order minimum mismatching network over the frequency band of 28-40MHz. Simulation results showed that the VSWR of the low-pass antenna minimum mismatching network had the advantage of less sensitivity comparing with the unmatched network. It is proved the validity of this approach.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
LMS algorithm based on the S-function has a small amount of calculation, faster convergence rate and good tracking properties for time-varying systems. But when the signal’s error is small, the step factor changes too fast, system identification is not quick enough and the controllable variables are few. To solve the shortcomings, an improved S-function algorithm has been proposed. Simulation results show that the convergence rate of the algorithm is superior to other improved algorithms, and the tracking property for the time-varying system is better than the improved normalized LMS algorithms. The algorithm proposed in this paper not only overcomes the discrepancy between the signal’s error and step factor, but also makes the algorithm more flexible by introducing a new controllable variable.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This article gives a method of space transformation. The method of space transformation not only can improve simulation accuracy of grey mathematical model of the experimental data sequence, but also can maintain the merit of simple computation for conventional modeling method of grey system. An example was used to demonstrate the use of techniques of this method, at the same time; the example had proved that the method of space transformation was effective.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This article gives a modeling method of grey system GM(1,1) model based on reusing information and the grey system theory. This method not only extremely enhances the fitting and predicting accuracy of GM(1,1) model, but also maintains the conventional routes’ merit of simple computation. By this way, we have given one syphilis trend forecast method based on reusing information and the grey system GM(1,1) model.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Track data of vessels is usually sampled by radar and AIS devices. The accuracy of data and sample cycle of radar systems are different from AIS’s. Track fusion of radar and AIS data can improve the accuracy and reliability of vessel tracks. This paper researches the fusion method of vessel tracks based on the radar and AIS data. The track fusion architecture model, coordinate transformation, time alignment, track correlation and weighted fusion algorithm are studied. The simulation experiment is done to validate this method and the results show position error of fused track is reduced and the fusion method is feasible.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Aiming at secure analog speech communication, a homology sound-based algorithm for speech signal interference is proposed in this paper. We first split speech signal into phonetic fragments by a short-term energy method and establish an interference noise cache library with the phonetic fragments. Then we implement the homology sound interference by mixing the randomly selected interferential fragments and the original speech in real time. The computer simulation results indicated that the interference produced by this algorithm has advantages of real time, randomness, and high correlation with the original signal, comparing with the traditional noise interference methods such as white noise interference. After further studies, the proposed algorithm may be readily used in secure speech communication.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Nowadays, intelligent transportation system (ITS) has already become the new direction of transportation development. Traffic data, as a fundamental part of intelligent transportation system, is having a more and more crucial status. In recent years, video observation technology has been widely used in the field of traffic information collecting. Traffic flow information contained in video data has many advantages which is comprehensive and can be stored for a long time, but there are still many problems, such as low precision and high cost in the process of collecting information. This paper aiming at these problems, proposes a kind of traffic target detection method with broad applicability. Based on three different ways of getting video data, such as aerial photography, fixed camera and handheld camera, we develop a kind of intelligent analysis software which can be used to extract the macroscopic, microscopic traffic flow information in the video, and the information can be used for traffic analysis and transportation planning. For road intersections, the system uses frame difference method to extract traffic information, for freeway sections, the system uses optical flow method to track the vehicles. The system was applied in Nanjing, Jiangsu province, and the application shows that the system for extracting different types of traffic flow information has a high accuracy, it can meet the needs of traffic engineering observations and has a good application prospect.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
LDA is a probabilistic topic model to discover the hidden thematic structure in large archives of documents. LDA-Col model is an extended model based on LDA model. In this paper, we introduced LDA-Col model in detail, including the plate notation, generative process and inference. Finally, we present experiment in topic words discovery to show the discovery performance differences between the LDA model and LDA-Col model.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In a cross-docking system, truck scheduling problem involves determining the sequence of inbound and/or outbound trucks at the dock doors. It is very important for realizing rapid transshipment of cargos and has attracted the attention of many researchers. This paper presents a review of existing literature and then identifies several future research opportunities. Finally, a mathematical model is developed for one unexplored area, which is the truck scheduling problem with the requirement of cargo loading/unloading sequences.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Modular fixture is a standardized, serialization, a high degree of common technological equipment; fixture is an important direction of technology development. Based on modular fixture design repeat problem, Established modular fixture standard parts by using Pro/ENGINEER software parametric technology, through the Pro/ENGINEER secondary development module of Pro/TOOLKIT and vs2010 programming language, achieved modular fixture element to browse, query, design, etc. Provided the aided design software of modular fixture for technican, improved design efficiency.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Due to the shake of the monitor camera, the positioning accuracy for the forest fire will be degraded. In this paper, we propose a fuzzy C-mean cluster based image processing method to eliminate the counteractive effect caused by camera shaking. The simulation result proves that the positioning error of our algorithm is significantly reduced, compared to the average algorithm. We also provide the overall system hardware platform design and its verified result in this paper.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The radiated noise of underwater targets apparently consists of non-Gaussian ingredients. In the paper, based on plenty of radiated noise data, non-Gaussian feature of target signals is studied via high-order cumulates. Then, from Bispectrum estimation and WALSH dimensionality reduction, 65 dimensional Bispectrum feature from different kind of targets is extracted. The results show that the approach can efficiently classify underwater targets, and the colored Gaussian noise is restrained. The ration of recognition can arrive 92% toward three different kinds of underwater targets.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In order to simulate the whole procedure of the production of radar echo clearly, the paper firstly starts with the mathematical models of radar signals, and then deduces and sets up the mathematical expression for echo signals of targets. Also, general way to design simulation of echo is discussed in this paper and Simulink software is used to simulate the whole procedure of the generation and processing of signals. Finally, the paper obtains the simulative echo signals of certain missile-borne PD radar, which lays the foundation of simulation for clutter signals in future.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Judgment and identification based on single fire characteristic parameter information in fire detection is subject to environmental disturbances, and accordingly its detection performance is limited with the increase of false positive rate and false negative rate. The compound fire detector employs information fusion technology to judge and identify multiple fire characteristic parameters in order to improve the reliability and accuracy of fire detection. The D-S evidence theory is applied to the multi-sensor data-fusion: first normalize the data from all sensors to obtain the normalized basic probability function of the fire occurrence; then conduct the fusion processing using the D-S evidence theory; finally give the judgment results. The results show that the method meets the goal of accurate fire signal identification and increases the accuracy of fire alarm, and therefore is simple and effective.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Tetrolets are Haar-type wavelets whose supports are tetrominoes which are shapes made by connecting four equal-sized squares. A fusion method for polarization images based on tetrolet transform is proposed. Firstly, the magnitude of polarization image and angle of polarization image can be decomposed into low-frequency coefficients and high-frequency coefficients with multi-scales and multi-directions using tetrolet transform. For the low-frequency coefficients, the average fusion method is used. According to edge distribution differences in high frequency sub-band images, for the directional high-frequency coefficients are used to select the better coefficients by region spectrum entropy algorithm for fusion. At last the fused image can be obtained by utilizing inverse transform for fused tetrolet coefficients. Experimental results show that the proposed method can detect image features more effectively and the fused image has better subjective visual effect
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper proposes a method of image seam line based on the combination of Dijkstra algorithm and morphology. First, the method determines the differential images of the overlap part of two images. And then, morphological expansion processing is implemented based on the differential images and the eight-neighborhood sparse matrix is constructed according to the sparse matrix. Finally, the seam line with the optimal path can be obtained by automatic search of seam line on the differential images by Dijkstra algorithm. The experimental results show that compared to the Dijkstra method that is not subject to morphological processing, the improved algorithm can avoid the high brightness area as housing under the circumstance of less time (3.72s) in the process of automatic research seam line.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The cellular neural/nonlinear network (CNN) is a powerful tool for image and video signal processing, as well as robotic and biological visions. The designs for CNN templates are one of the important issues for the practical applications of CNNs. This paper combines two CNN to implement the Dilation CNNs and Erosion CNN for gray scale images and proposes two theorems of robustness designs. The parameters of the templates can range between a hyper plane and a hyper surface in the first quartile. The simulations have been given. The results show the effectiveness of the theoretical results to be implemented in computer simulations.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Medical ultrasound imaging is one of the most effective methods for lesion early detection. However, the segmentation of lesions such as breast cancers from ultrasound images is still a challenging task due to the variance in shape of the lesions and interference from speckle noise. In this paper, a novel approach using a generalized adaptive magnetostatic bidirectional balloon snake (AMBBS) model is adopted for lesion segmentation. Experimental results show that the generalized adaptive magnetostatic bidirectional balloon snake is robust to speckle noise and can converge to complex geometries and weak edges successfully.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The unmanned aerial vehicle needs an effective visual odometry system intask of indoor. The sparse visual odometry of RGB-D sensor is difficult to extractor enough color image features in darkness environment of indoor, which results in the failure of matching. We present a method that extract 2D features from the depth image directly. The paper discussed the matching performance of ORB, FREAK and SURF descriptor to the depth image. The results of the experiments show that it is feasible extractor 2D features from the depth image to matching in visual odometry, the ORB descriptor is better than other methods suitable for this kind of application.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Region-based fusion rule is adopted in research on multi-sensor image fusion because of its better accuracy than pixel based and widow-based fusion rules. Background subtraction is a simple technique to divided image into object region and background region but its uses are limited because a set of continuous images is needed. Moreover, it’s difficult to distinguish objects from visible image without continuous images when objects are pretended. A region-based fusion rule using K-means clustering is proposed to overcome the limit stated earlier. In the proposed scheme, low frequency images produced by DT-CWT (Dual-Tree Complex Wavelet Transform) were clustered into different regions to obtain a joint map. According to local energy ratio (LER) and the size of regions, average gradient of window or ratio of region sharpness (RS) are adopted as measures respectively to fuse low frequency coefficients of different regions in joint map. The experimental result shows that the proposed approach performs better than pixel-based and window-based fusion rules in entropy, spatial frequency, average frequency and QAB/F.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Several types of defects in the LED chips may be caused from the manufacturing environments, these defects can result in the degradations of the parameters and performance. Hence it is very necessary to perform the defect detection of LED chips for effectively enhancing the production quality. In this paper, a new method is presented for the defect inspection of LED chips. The method makes use of both the support vector machine and the image segmentation based on level set to acquire the features of LED chip images and to carry out the inspection. First of all, the support vector machine is used to perform the clustering for the original LED images, the margin of region clustering is used as the initial contour curve. Secondly, the segmentation using level set is implemented for the LED images. The features of LED images are extracted, then the database of features is constructed. Therefore, an automatic inspection system for LED chip is built, the system can recognize the defective LED chips. The experimental results demonstrate that the presented method in this paper is able to detect the defects in the LED chips accurately.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Color quality plays an important role in imaging and displaying. For the Low-quality image, we propose a new method in this paper that is based on gamma mapping to improve color contrast and restore color expression of real world scene. The main idea of the proposed approach is that according to human vision characteristics uses logarithm transformation to extend luminance response of image so; meanwhile, adopts the gamma mapping to enhance the contrast of highlight and dark regions. To approve the proposed method, two well-known algorithms are selected and their contrast results are also presented. The results show that the proposed approach performs better than other traditional methods for color restoration which is of good robustness.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A fragile watermark algorithm is proposed, based on SPIHT coding, which can recover the primary image itself. The novelty of the algorithm is that it can tamper location and Self-restoration. The recovery has been very good effect. The first, utilizing the zero-tree structure, the algorithm compresses and encodes the image itself, and then gained self correlative watermark data, so as to greatly reduce the quantity of embedding watermark. Then the watermark data is encoded by error correcting code, and the check bits and watermark bits are scrambled and embedded to enhance the recovery ability. At the same time, by embedding watermark into the latter two bit place of gray level image's bit-plane code, the image after embedded watermark can gain nicer visual effect. The experiment results show that the proposed algorithm may not only detect various processing such as noise adding, cropping, and filtering, but also recover tampered image and realize blind-detection. Peak signal-to-noise ratios of the watermark image were higher than other similar algorithm. The attack capability of the algorithm was enhanced.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper presents an efficient algorithm to segment Synthetic Aperture Radar (SAR) image. Multi-direction ratio edge detector is used to capture the locally directional variation information of a SAR image and construct ratio edge strength map (RESM) of the SAR image. An efficient hierarchical region merging procedure based on the region adjacency graph (RAG) representation of the image regions is proposed. Experimental results show that the proposed method is outperforming a widely used SAR image segmentation approach.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Terrain aided navigation is a supplement to inertial navigation system for vehicles in long-time missions. By matching real-time data with a known reference digital terrain map, the vehicle’s position can be estimated. This paper proposes a novel underwater terrain matching method involving image processing techniques. Traditional gray-scale histogram of images is upgraded by introducing spatial information into it. Edge corner pixel is defined in order to represent the distribution complexity of pixels in the same gray level. This concept is used to calculate the correlation between the real-time data and the reference map. Simulations show that the matching process can give robust estimation of underwater platform’s position in noise background. Accuracy of the results can reach less than 10 pixels with the image resolution at 1 meter/pixel and with various areas of real-time images.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The transfer function design is important for medical image visualization. Through the analysis of current transfer function design method, we propose a clustering algorithm with the help of gradation-gradient colored histogram to realize the classification for volume data, which is convenient to highlight the tissues of interest. Additionally, the number of these combined clusterings and the clustering centers can be determined rapidly through the color distribution of the gradation-gradient colored histogram. Of course, the method makes the clustering algorithm more effective and more reasonable. Currently, the transformation of three-dimensional data field from data attributes to optical attributes using the transfer function is carried out in the RGB color space. In this paper, combining the advantages of HSL color mode, we map the identifying information to HSL color space firstly. Through the method, it’s easy and intuitive for us to adjust the visual quality. Based on the method of transfer function design for volume rendering given in this paper, we conduct an experiment with the program of OpenGL/GLSL to realize the medical image visualization using ray-casting volume rendering algorithm. The experimental results show that this method is effective and corrective.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In order to avoid dependence on hardware devices and realize rapid vision detection of medicine defects on packing machine, a vision-based inspection method was proposed by the combination of kalman filter and image processing techniques. A kalman filter model was established to predict medicine movement and used to control the TV camera. The image detection results were adopted to update the kalman filter measurement in real-time inspection process. In this way, the images for medicines packed in the form of aluminum-plastic blister were achieved at a fixed position of the transferring platform. Experimental results indicate that the estimation approach was accurate enough to be capable of triggering vision inspection without proximity sensors used in traditional vision inspection systems.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Analytical simulation is an important method to study CT reconstruction algorithm, which can quickly and effectively demonstrate the effectiveness and accuracy of the reconstruction algorithm. According to the basic process of CT detection and the main frame, which includes model generation, parallel beam scan projection data acquisition, common analytic algorithm of image reconstruction and image post-processing and analysis, the parallel beam CT analytical simulation software platform is developed by C++ language. The setup interfaces for main parameters of each link are reserved, so the key items of the simulation process can be selected and adjusted, which carries out a flexible simulation study based on the CT platform. Finally, an example of reconstruction simulation for tubular object based on angle sparse projection data from parallel beam CT is given, which verifies the practicability of the simulation software platform.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The physical principles for the transmission characteristics of the one-dimensional voltage-controlled photonic crystals (VCPC) had demonstrated thanks to the transfer matrix method. It has been shown that we can control the voltage to change the lattice constant, a great impact on photonic band gap, to design the one-dimensional photonic band-gap width (PBW). The relationship between PBW migration and voltage has been obtained. According to different situations, we can design different photonic crystal waveguide filter based on VCPC characteristic.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper using the STB-700 tester and the three kinds of soybean seed metering device speed and the relationship between the seeding effect experiment, explore the impact of the metering device speed on the working performance of the seed metering device. With inclined disk scoop metering device as an example, through the study found that the rotation speed of the metering device effect on seeding performance and the law. And use the FMINBND function to solve the MATLAB to determine the minimum replay of the seeding rate value is 44.05 r/min, the minimum value of the leakage sowing rate for 40.71r/min, 39.65r/min minimum spacing variation coefficient. In order to find the best set of declined disc scoop type soybean seed metering device installed in the soybean on no tillage planter speed range is 4 ~ 5km/h, increased soybean planter installation of the metering device in the Huang-huai-hai region adaptability.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper firstly discussed on the mathematical model of GPS pseudo-range positioning for code observations. Based on IGS tracking data, taking the L2C code and L1 C/A code observations that can be viewed constantly in one hour from 5~6 GPS modernization satellites as the analysis object, the satellites were tracked by IGS tracking stations that can capture L2C code observation, such as WUHN station, KIT3 station and SUTM station. Then compare the result of surveying and positioning between L2C code and L1 C/A code. It shows the main difference that C/A code is slightly better in x- and H-directions but worse than L2C code in y-direction, these was probably associated with the internal characteristics of ranging codes.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In photovoltaic parallel inverters, the harmonic circulating currents caused by factors like the difference between the output voltage waveform, the dead time dispersion settings or nonlinear load have gained more importance. Based on the traditional droop and decoupling control method, the harmonic power control method which decoupling harmonic power from the total apparent power is proposed in this paper. And we add the harmonic power regulator to reduce harmonic power, so as to restrain the harmonic circulating currents. The experiment results demonstrate that harmonic power control can effectively suppress the harmonic circulating current between parallel inverters with nonlinear load, which ensure the stable operation of parallel system.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
As the increase of circuit density and switching speed, the crosstalk faults may arise in the adjacent signal lines of VLSI circuits, which are the interference effects caused by parasitic inductance and capacitance coupling. The crosstalk delay fault is one of the crosstalk faults, it may create the additional delay in the circuit, thus it may result in the unexpected time sequence and logic function errors. In this paper, a new approach is presented for the testability analysis of crosstalk delay faults, the approach can decide whether there are test vectors for a crosstalk delay fault in a circuit. First of all, several binary decision diagrams of a circuit are constructed. Secondly, the testability analysis of crosstalk delay faults is carried out by performing a lot of operations on these binary decision diagrams. One advantage of the approach in this paper is that the test vectors of crosstalk faults can be generated quickly after the testability analysis has been carried out, therefore the approach is able to cut down the test time in comparison with generating the test vectors directly.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The current century is the era of rapid development of information technology, and status of integrated navigation which depends on the development of information technology will further accelerate significant, which leads to more and more requirement in comprehensive application of integrated navigation .The performance of tracking loop will downgrade in platform with high-dynamic, which will reduce accuracy of navigation even brings intense error. Loose coupling and tight coupling will demonstrate error accumulate and heavy calculation respectively in high-dynamic, in the paper we introduce ultra-tight integration feature, and demonstrate model and calculate process in high-dynamic. We will demonstrate several models of ultra-tight integrated with problem in high-dynamic.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper firstly in detail presents the operating principle and structural design of the new offshore hydration separator. This device can be used to separate hydration and liquid form natural gas without using chemicals, and there are some benefits including compact structure, small floor space, no chemical pollution and high separating efficiency. The swirl characteristics and the resistance characteristics of cyclone have the important impact on the dehydration performance of wet-gas recycling supersonic separator, two experimental rig of the cyclone separator A and B were constructed and systematic dehydration performance experimental investigations of wet-gas separator individual with cyclone A and B were carried out. To find the better cyclone design with small flow resistance, high swirl strength, high separation efficiency. The experimental results showed that the recycling separator with cyclone A has the higher separation efficiency, so comparing with the resistance characteristic, the swirl characteristics has the greater impact on the dehydration performance of the recycling separator. With the better swirl characteristics of the cyclone, the better dehydration performance of the recycling separator. The recycling separator has the better dehydration performance with the better swirl characteristics cyclone.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Based on movement principle of electric shoegear, its FEM model can be built according to parameters measured in vibration test. Meanwhile it is not difficult to obtain the FEM model of conductor rail. Then vibration of the system according to practical parameters can be solved by numerical integration method. Through the analysis of contact force, it is realized that when speed is over 120km/h, the contact condition gets worse sharply which indicates that the recommended speed for electric shoegear and conductor rail system is 120km/h in the case of the practical operating parameters.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Due to the invisibility of underground engineering, characteristic of uncertainty and variability, poses great risks for underground construction and construction difficulties. Although scholars at home and abroad in the underground engineering information management has done a lot of research work, but so far is far from meeting the needs of construction safety management level. This paper introduces the development of construction information management software. It includes the back-end database, collecting and processing system and front-end display of three parts. It can monitor real-time data acquisition, real-time processing and analysis of timely prediction and automatically generates industry standard reports provided. Therefore, it is of great practical value and theoretical significance.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
It is very necessary that Implement information monitoring and dynamic construction because of Complex geological environment and lack of basic information in the process of tunnel construction. The monitoring results show that 3 d laser scanning technology and information management system has important theoretical significance and application value to ensure the safety of tunnel construction, rich construction theory and technology. It can be known in real time the deformation information and the construction information in near tunnel workplace and the whole tunnel section in real time. In the meantime, it can be known the deformation regularity in the tunnel excavation process and the early warning and forecasting in the form of graphic and data. In order to determine the reasonable time and provide basis for supporting parameters and lining.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Galvanic corrosion is a very destructive localized corrosion. The research on galvanic corrosion could determine equipment corrosion and prevent the accidents occurrence. Steel corrosion had been studied by COMSOL software with mathematical modeling. The galvanic corrosion of steel-aluminum submerged into 10% sodium chloride solution had been on-line detected by PIC-2 acoustic emission system. The results show that the acoustic emission event counts detected within unit time can qualitative judge galvanic corrosion rate and further erosion trend can be judged by the value changes.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
At present, a lot of companies at home and abroad have researched and produced a batch of specialized monitoring instruments for acoustic emission (AE). Most of them cost highly and the system function exists in less stable and less portability for the testing environment and transmission distance and other aspects. Depending on the research background and the status quo, a dual channel intelligent acoustic emission monitoring system was designed based on Microsoft Foundation Classes in Visual Studio C++ to solve some of the problems in the acoustic emission research and meet the needs of actual monitoring task. It contains several modules such as main module, acquisition module, signal parameters setting module and so on. It could give out corrosion AE waveform and signal parameters results according to the main menu selected parameters. So the needed information could be extracted from the experiments datum to solve the problem deeply. This soft system is the important part of AE detection g system.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Powdery mildew is one of the major diseases of facilities vegetables. In order to achieve early, fast, and accurate diagnosis of powdery mildew, with TCS3200 color sensor and infrared sensor as detecting port and 12864 dot matrix LCD as display, the system explores the external change such as the color change of the blade in health and disease stage and change of reflection spectra. Through tracking experiment of different stages of cucumber leaves infected, the results show that the system can identify change of optical frequency values and the RGB values in the health cucumber leaves and infected cucumber leaves and thus provides effective warning alarm for controlling early disease occurrence.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
On the basis of equal-accuracy frequency measurement principle, this paper takes AT89S52 microcontroller as core and designs a high-accuracy multi-function dual-path frequency meter which can measure the frequency of two circuits of signal with a range of frequency of 1Hz-10MHz at the same time, and be equipped with storage and query function as well provide two circuits (1K and 1M) of square wave signal source. This paper adopts modular design: the hardware module consists of control module, amplification and shaping module, display module, storage module, and standard square wave signal source module, etc., while the software module consists of frequency range judgment, frequency measurement, and display of frequency value. The experiment shows that this instrument has low cost, high accuracy, and strong function, with good application prospect.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The electronic structure and optical properties of orthorhombic CaTiO3 have been investigated using the first principle projector-augmented wave (PAW) pseudopotential method. Exchange–correlation effects are treated by the generalized gradient approximation (GGA). The band structure and density of states (DOS) show that orthorhombic CaTiO3 has direct band gap of 2.43 eV at gamma point, and O-2p to Ti-3d states are predominant in the top of valence band and the bottom of conduction band. Furthermore, the optical properties form complex dielectric function has been presented. The static dielectric function and the peaks position distribution of imaginary part of complex dielectric function has been discussed, which shows the optical transitions based on the electronic structure. These results suggest orthorhombic CaTiO3 may have special optical applications.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Background: The rapid growth of mobile internet has driven the rapid popularity of smart mobiles. iOS device is chosen by more and more people for its humanity, stability and excellent industrial design, and the data security problem that followed it has gradually attracted the researchers’ attention.
Method & Result: This thesis focuses on the analysis of current situation of data security on iOS platform, from both security mechanism and data risk, and proposes countermeasures.
Conclusion: From practical work, many problems of data security mechanism on iOS platform still exist. At present, the problem of malicious software towards iOS system has not been severe, but how to ensure the security of data on iOS platform will inevitably become one of the directions for our further study.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper proposes a modular tensor sparsity preserving projection (MTSPP) algorithm. This algorithm uniformly partitions the high-dimensional matrix data and builds third order tensor data, determines the weight of sparse reconstruction of all samples and applies it to the sparsity preserving projection of the third order tensor. Experiments finally indicate that MTSPP improves the robust performance of the global sparse representation-based dimension reduction algorithm by weighted sparse representation and spatial relationship of characteristics within the module and between modules.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Based on the original formula of the Newton's Second Law, this paper establish a more accurate heaving line projectile motorial physical model which in the way of dropping line-throwing process. It was not only regard the quality of the rope as a variable and considered the influence of resistance that movement in the process, but also discussed the solution of the physical model. What is more, it also analyzed and simulated the trajectory of the line-throwing model by Matlab software. It was lay the theoretical foundation for the precise design of the line-throwing appliance and improved the heaving line precision.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In order to better grasp the maturity of vegetables, this paper proposes a method which makes full use of external morphological characteristics of vegetables to infer the maturity of vegetables. Especially extracting the morphological features of the root and combine them with the ground morphological features. In this paper, firstly, vegetable images are disposed by threshold segmentation and feature extraction using the image processing toolbox of Matlab. Through this way, the value of leaf crown projected area, plant height, root length and root side area will be got. Secondly, Features of ground part and underground part can be used as training samples for corresponding neural network maturity detection models. Ultimately, Bayesian theory is utilized to process information fusion with obtained values of each neural network. The results show that this method improved the accuracy of detection.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Based on the status of the center location algorithm, firstly this paper proposed the grid space-based multi-source shortest path algorithm by the use of the network data model in grid points set space. Secondly at the basis of the algorithm P center algorithm was proposed. Finally data bottlenecks brought by the vector data in network analysis were solved. The experiment of center location regional analysis is established for the interpretation of our research.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Since the construction of metro system generally lags behind the development of urban land use, sites of metro stations should adapt to their surrounding situations, which was rarely discussed by previous research on station layout. This paper proposes a new site selection model to find the best location for a metro station, establishing the indicator system based on land use and combining AHP with entropy weight method to obtain the schemes’ ranking. The feasibility and efficiency of this model has been validated by evaluating Nanjing Shengtai Road station and other potential sites.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In recent years, people's ability to collect music got enhanced greatly. Many people who prefer listening music offline even stored thousands of music on their local storage or portable device. However, their ability to deal with music information has not been improved accordingly, which results in two problems. One is how to find out the favourite songs from large music dataset and satisfy different individuals. The other one is how to compose a play list quickly. To solve these problems, the authors proposed a content and user-based music visual analysis approach. We first developed a new recommendation algorithm based on the content of music and user's behaviour, which satisfy individual's preference. Then, we make use of visualization and interaction tools to illustrate the relationship between songs and help people compose a suitable play list. At the end of this paper, a survey is mentioned to show that our system is available and effective.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
With the development of internet technologies and the wide application of robots, there is a prospect (trend/tendency) of integration between network and robots. A cloud-based robot remote control system over networks for smart factory is proposed, which enables remote users to control robots and then realize intelligent production. To achieve it, a three-layer system architecture is designed including user layer, service layer and physical layer. Remote control applications running on the cloud server is developed on Microsoft Azure. Moreover, DIV+ CSS technologies are used to design human-machine interface to lower maintenance cost and improve development efficiency. Finally, an experiment is implemented to verify the feasibility of the program.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Urban rail transit ridership prediction has some guide meaning to urban rail transit planning and rail transit construction. In this paper, we use four-step method for rail transit ridership prediction. By considering Changchun GDP, land utilization rate, population and other factors, we use regression analysis method to predict trip generation, gravity model to predict trip distribution, logit model for model split and equilibrium model for traffic assignment. Finally, built the bus network model to obtain cross-sectional transit ridership of Changchun light rail line 3.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper first analyzes the concept of smart technology, the relationship between wisdom technology and smart city, and discusses the practical application of IOT(Internet of things) in smart city to explore a better way to realize smart city; then Introduces the basic concepts of cloud computing and smart city, and explains the relationship between the two; Discusses five advantages of cloud computing that applies to smart city construction: a unified and highly efficient, large-scale infrastructure software and hardware management, service scheduling and resource management, security control and management, energy conservation and management platform layer, and to promote modern practical significance of the development of services, promoting regional social and economic development faster. Finally, a brief description of the wisdom technology and smart city management is presented.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
At present, ARINC653 specification has become main industry standard adopted by modern integrated modular avionics software. In this standard, spatial and temporal partitioning must be mandated so as to assure the safety isolation among different application partitions. This paper proposes a model-level approach to validate the safety requirement conformance for partitioned avionics software in early time. First, the spatial and temporal partitioning is modeled by the extended Architecture Analysis and Design Language (AADL). Then, the partitioning validation algorithm is respectively proposed in space and time dimensions based on the above models. Finally, a validation tool is developed and a flight example is as a case study to demonstrate the feasibility of our approach.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Recent years, management consulting industry has been rapidly developing worldwide. Taking a big management consulting company as research object, this paper established an index system of service quality of consulting, based on customer satisfaction survey, evaluated service quality of the consulting company by AHP and fuzzy comprehensive evaluation methods.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Current researches on the picking route modeling of logistics handling AGV are reviewed, and an overview of the main problems existing in the current study are made, then the final conclusion is presented: "goods to person" AGV route picking modeling is our targeted research, combined with qualitative simulation study on logistics handling AGV route picking qualitative modeling, the research for the development of complex systems modeling like AGV system has some theoretical significance and practical value.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This work investigates the important properties related to adjacent structure of enhanced hypercube Qn,k . It is observed that for any two vertices u, v in, Qn,k (2 ≤ k ≤ n − 1, k ≠ n − 2) , if the distance d(u, v) = 2 , then there exactly exist two paths of length 2 joining u and v for n ≥ 5 . In other words, if u and v have a common neighbor, they exactly share two common neighbors. The result is very important to its diagnosability.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Location awareness has become one of the most popular areas for mobile internet applications. Normally, the method of maximum likelihood estimation (MLE) can be used to estimate the position of the unknown nodes. However, when the number of anchor nodes is small within the communication range, the traditional methods cannot work very well. This paper provides a novel location approach to estimate the position by selecting valuable neighbors (both anchor and regular nodes) with Minimized Error Propagation Location method based on Error estimation (MEPLE). The simulation results show that the MEPLE outperforms the MLE overall, especially when the number of anchor node is relatively small such as between 10 and 20, MEPLE can reduce 50% to 80% estimation error on average.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
For self-balancing two-wheeled vehicle position and angle control implementation issues, propose a control algorithm of self-balanced two-wheeled vehicle based on PID neural network. The algorithm overcomes the problem of PID controller generalization is weak, and can avoid over fitting and the BP neural network controller into a local optimum. The algorithm of the controller is constituted by a three-tier network, the first floor is the input layer, which receives two-wheel self-balancing vehicle position and Angle feedback information; a second layer of PID neuron layer, which is connected to the input layer, the state transition function respectively proportional function, integral function and the differential function; the third layer is the output layer, by weight in various proportions hidden layer output, the final composition of the control output of the controller. Control system fusion using kalman filter algorithm to get the self-balanced vehicle's attitude information. Through self-balancing two-wheeled vehicle actual experimental platform to verify the effectiveness of the control algorithm implementation.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper propose online identification method of regional frequency deviation coefficient based on the analysis of interconnected grid AGC adjustment response mechanism of regional frequency deviation coefficient and the generator online real-time operation state by measured data through PMU, analyze the optimization method of regional frequency deviation coefficient in case of the actual operation state of the power system and achieve a more accurate and efficient automatic generation control in power system. Verify the validity of the online identification method of regional frequency deviation coefficient by establishing the long-term frequency control simulation model of two-regional interconnected power system.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The development of evaluating a correlation is a critical element in the assessment of correlation between different objects. This study proposes a new method to measure the correlation between a possible factor with an object and give a interpretation from the perspective of principal components. To test this, some water quality data was used to analyze, the result demonstrates the effectiveness of theoretical description and formula we provided.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Transit route choice model is the key technology of public transit systems planning and management. Traditional route choice models are mostly based on expected utility theory which has an evident shortcoming that it cannot accurately portray travelers’ subjective route choice behavior for their risk preferences are not taken into consideration. Cumulative prospect theory (CPT), a brand new theory, can be used to describe travelers’ decision-making process under the condition of uncertainty of transit supply and risk preferences of multi-type travelers. The method to calibrate the reference point, a key parameter to CPT-based transit route choice model, determines the precision of the model to a great extent. In this paper, a new method is put forward to obtain the value of reference point which combines theoretical calculation and field investigation results. Comparing the proposed method with traditional method, it shows that the new method can promote the quality of CPT-based model by improving the accuracy in simulating travelers’ route choice behaviors based on transit trip investigation from Nanjing City, China. The proposed method is of great significance to logical transit planning and management, and to some extent makes up the defect that obtaining the reference point is solely based on qualitative analysis.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The biggest difficulty for Program trading IT risk measures lies in the loss of data, in view of this situation, the current scholars approach is collecting court, network and other public media such as all kinds of accident of IT both at home and abroad for data collection, and the loss of IT risk quantitative analysis based on this database. However, the IT risk loss database established by this method can only fuzzy reflect the real situation and not for real to make fundamental explanation. In this paper, based on the study of the concept and steps of the MC simulation, we use computer simulation method, by using the MC simulation method in the “Program trading simulation system” developed by team to simulate the real programming trading and get the IT risk loss of data through its IT failure experiment, at the end of the article, on the effectiveness of the experimental data is verified. In this way, better overcome the deficiency of the traditional research method and solves the problem of lack of IT risk data in quantitative research. More empirically provides researchers with a set of simulation method are used to study the ideas and the process template.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Through analysis of the electromagnetic occultation algorithm in which Facets are grouping by the overlapping area of facets projection and grid, and occultation is judged among the facets in the same group. The paper puts forward facets grouping electromagnetic occultation algorithm based on mesh size. In the algorithm, the facets are grouping by the location of the grid which facet central points project into, so the calculation of the overlapping area between facet projection and grid is abridged; occultation is judged by the overlap and the depth of field along the direction of the incident wave, the search domain is extended by the mesh size in order to avoid the absence of sheltered facets located in the edge of grids. Finally, the article takes 2 typical examples to analyse the efficiency of the algorithm, the results indicate that the algorithm is efficient.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Anisotropic Total variation (ATV) based super resolution method is a state-of-the-art method, which is popularly used. However, the traditional ATV based method is a kind of local method, which is just considered its 4 or 8 neighborhood of each pixel, without considering a larger region. In this paper, we proposed a non-local based ATV method (NLATV), which considers a larger region of each pixel. The experimental results show that the proposed method is much better than the original ATV method in peak signal-to-noise radio and visual quality.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In the test and evaluation of operation, the test benefits may be greatly reduced because no useful conclusions may be obtained from test data due to missing or incompleteness of test information records. Based on the characteristics of gun firing and by separating firing errors, this paper proposes an idea using for analyzing firing accuracy in case of incomplete test data records, establishes a method for analyzing chi-square distribution-based firing accuracy data, and conducts test data analysis on test data of a certain type of weapon. The effectiveness of this method is proven by analysis results which have offered effective method for conducting test data analysis.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Since more and more advertisements swarm into radios, it is necessary to establish an audio advertising dataset which could be used to analyze and classify the advertisement. A method of how to establish a complete audio advertising dataset is presented in this paper. The dataset is divided into four different kinds of advertisements. Each advertisement’s sample is given in *.wav file format, and annotated with a txt file which contains its file name, sampling frequency, channel number, broadcasting time and its class. The classifying rationality of the advertisements in this dataset is proved by clustering the different advertisements based on Principal Component Analysis (PCA). The experimental results show that this audio advertisement dataset offers a reliable set of samples for correlative audio advertisement experimental studies.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
PKI achieves the management of public key by certificates. It combines the user’s public key and his or her identification formation through a trusted third-party organization CA, in order to authenticate the user’s identity on the Internet, thus ensuring the authenticity, integrity, confidentiality, and non- repudiation of the information transmitted on the Internet. CA is the most critical agency in the PKI system, mainly responsible for issuing and managing certificates. On the basis of the actual needs of an enterprise, in this paper the author designs and develops a small-sized PKI-based Certification Authority equipped with the functions of root CA initialization, certificate application, certificate issuance, certificate revocation, and the generation of certificate revocation list. The author also points out the problems that need to be mentioned in the design and development.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In order to extend the connections between the (classical) Sylvester resultant matrix and Bezout matrix to the circumstance for the Bernstein polynomials basis, a kind of generalized Sylvester resultant matrix and Bezout matrix with respect to the Bernstein polynomials basis are defined. They have not only theoretical interest, but also preserve the original similar relations between these two kinds of matrices when the power basis is replaced by Bernstein polynomials basis. Since the transformation matrix between the Bernstein and power polynomials bases is ill-conditioned, so the paper mainly focuses on the theoretical research instead of the computational consideration.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper presents a new method, called the transfer matrix method for obtaining transfer functions among the state variables of a linear time- invariant (LTI) system defined in either a block diagram or the corresponding signal flow graph. The procedures introduced in this paper for obtaining the transfer function require only knowledge on matrix operations, which are easy to explain and remember. Advanced control engineers can automate the symbolic matrix operation by using existing software such as Mathematica.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
XML data is widely used in the information exchange field of Internet, and XML document data clustering is the hot research topic. In the XML document clustering process, measure differences between two XML documents is time costly, and impact the efficiency of XML document clustering. This paper proposed an XML documents clustering method based on frequent patterns of XML document dataset, first proposed a coding tree structure for encoding the XML document, and translate frequent pattern mining from XML documents into frequent pattern mining from string. Further, using the cosine similarity calculation method and cohesive hierarchical clustering method for XML document dataset by frequent patterns. Because of frequent patterns are subsets of the original XML document data, so the time consumption of XML document similarity measure is reduced. The experiment runs on synthetic dataset and the real datasets, the experimental result shows that our method is efficient.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper is based on the analysis for theory and key technologies of contact communication, contactless communication card and STK menu, and proposes complete software and hardware solution for achieving convenience and secure mobile payment system on SIM card.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In this paper, we analyze the impact of fault attacks on the operand stack, provide experiments of attacks based on the operand stack, and describe two approaches to protect the operand stack, and finally quantize the impact of these countermeasures on the performance of virtual machine.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Ultrasonic CT is a new technique to measure temperature distribution in air. Based on the principle of ultrasonic CT technique, and the Maximum-Likelihood Expectation-Maximization (ML-EM) iteration algorithm, a novel method of temperature distribution imaging is proposed. In this method, Gaussian distribution model is applied instead of the traditional Poisson distribution model to the ML-EM iteration algorithm. And with Gaussian distribution, a new kind of ML-EM iteration algorithm is proposed. Using this method, the ultrasonic speed matrix can be calculated from projection data on a number of fixed propagation paths. And the 3D temperature distribution is obtained from the speed information. The simulation results prove the correctness and the validity of the proposed method.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper introduces a 3D city simulation system which is based on geographic information system (GIS), covering all commercial housings of the city. A regional- scale, GIS-based approach is used to capture, describe, and track the geographical attributes of each house in the city. A sorting algorithm of “Benchmark + Parity Rate” is developed to cluster houses with similar spatial and construction attributes. This system is applicable for digital city modeling, city planning, housing evaluation, housing monitoring, and visualizing housing transaction. Finally, taking Jingtian area of Shenzhen as an example, the each unit of 35,997 houses in the area could be displayed, tagged, and easily tracked by the GIS-based city modeling and simulation system. The match market real conditions well and can be provided to house buyers as reference.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.