Many facilities such as patient health care centers,data processing systems,critical telecommunication links,LAN servers,offices etc rely on uninterruptible power supplies(UPS)to maintain a continuous supply of power ...
详细信息
Many facilities such as patient health care centers,data processing systems,critical telecommunication links,LAN servers,offices etc rely on uninterruptible power supplies(UPS)to maintain a continuous supply of power in case of line *** addition to requiring continuous power,many critical nonlinear loads are sensitive to the incoming line transients and input harmonic voltage distortion. Conventional UPS systems operate to protect against such disturbances using complex filtering schemes, often employing large passive *** the various UPS systems online UPS provides maximum protection to such loads against any power *** of multiple power conversion stages,online UPSs have been the most complex and expensive type of ***'s low cost,high performance Digital signal Processors(DSPs)provide an improved and cost-effective solution for online UPS design, making them software controllable,adding some facilities like remote configuration and monitoring and other network management facilities. This paper presents the basic design and merits of using real time digital signal processing(DSP)control of UPS systems.
With the explosion of networks and the huge amount of data transmitted along, securing data content is becoming more and more important. Data encryption is widely used to ensure security in open networks such as the i...
详细信息
With the explosion of networks and the huge amount of data transmitted along, securing data content is becoming more and more important. Data encryption is widely used to ensure security in open networks such as the internet. This paper presents the implementation of stream cipher, where the key stream is generated based on the properties of Linear Feedback Shift Register and cyclic Elliptic Curve over a finite prime field. In this paper we illustrate the process of encryption/decryption of an image in spatial domain and also encrypt key file parameters needed for generating the key stream to other parties using Elliptic Curve Cryptography. Therefore the encrypted key file parameters are only transmitted and not the entire full length key. Since Elliptic Curve Cryptography is replacing RSA for key exchange and Elliptic Curve based stream cipher offers a good choice for encryption in real time application. The strength of the proposed cipher lies in the generation of random sequence using Linear Feedback Shift Register over GF(p), difficulty of Elliptic Curve Discrete Logarithmic Problem and the entire key need not be transmitted in the encryption process. This paper also discusses the security aspects of the proposed cipher which is secure against all kinds of attacks.
MPEG-4 is one of the most important and influential international standard for multimedia data compression coding in the commercial world, its full name is generic coding of audio and visual objects. It defines the au...
详细信息
MPEG-4 is one of the most important and influential international standard for multimedia data compression coding in the commercial world, its full name is generic coding of audio and visual objects. It defines the audio, video and other multimedia syntax and decoding process, the transmission on the internet and a whole set of framework about the interaction between human and media, which covering the vast majority of multimedia applications. Its object-based thought enables it a high compression ratio, good flexibility, scalability and interactivity, and other advantages. This paper combines the practical application background of mobile communications, and carries out a key research on the core part of MPEG-4 standard - video compression coding, on basis of a comprehensive understanding of MPEG-4 standard. Firstly, an in-depth study on the basic principles and algorithm of MPEG-4 digital video standard has been done.
Existing snake-like robot is controlled by the handle and joystick. Autonomous movement can not be achieved. The system uses two robot cars as a carrier, making the two robot cars through the metal shaft as a whole to...
详细信息
Existing snake-like robot is controlled by the handle and joystick. Autonomous movement can not be achieved. The system uses two robot cars as a carrier, making the two robot cars through the metal shaft as a whole to imitate a snake-like robot and the snake-like curve trajectory were studied. Using S3C2410 based on ARM920T core as processor core, process the image which is captured by the USB camera, then send the resulting signal to the ARM microprocessor, Using ARM microprocessor to control the snake-like robot completing tracking capabilities, achieve autonomous movement.
A gradient vector flow (GVF) snake is proposed in this paper for the segmentation of skin cancer images. In order to make the snake insensitive to noise and be able to remove the hairs, an Adaptive Filter (Wiener and ...
详细信息
A gradient vector flow (GVF) snake is proposed in this paper for the segmentation of skin cancer images. In order to make the snake insensitive to noise and be able to remove the hairs, an Adaptive Filter (Wiener and Median filters) is proposed. After the noise and hairs are removed, GVF snake will be used to segment the skin cancer region. The GVF snake extends the single direction and allows it to still be able to track the boundary of the skin cancer even if there are other objects near the skin cancer region. We have proposed new operators to find better edge map in a restored grey scale image. Subjective method has been used by comparing the performance of the proposed gradient vector flow (GVF) snake with other recommended operators of first derivative like Sobel, Prewitt, Roberts and second derivative like Laplacian. The root mean square error and root mean square of signal to noise ratio have been used for objective evaluation. Finally, to validate the efficiency of the filtering schemes different algorithms are proposed and the simulation study has been carried out. Experiments performed on 8(eight) cancer images show the effectiveness of the proposed algorithm.
Recognizing handwritten mathematical content is a challenging problem, and more so when such content appears in classroom videos. However, given the fact that in such videos the handwritten text and the accompanying a...
详细信息
Recognizing handwritten mathematical content is a challenging problem, and more so when such content appears in classroom videos. However, given the fact that in such videos the handwritten text and the accompanying audio refer to the same content, a combination of a video and an audio based recognizer has the potential to significantly improve the content recognition accuracy. In this paper, using a combination of video and audio based recognizers, we focus on improving the character recognition accuracy in such videos and propose: (1) synchronization techniques for establishing a correspondence between the handwritten and the spoken content, and (2) combination techniques for combining the outputs of the video and audio based recognizers. The current implementation of the system makes use of a modified open source text recognizer and a commercially available phonetic word-spotter. For evaluation purposes, we use videos recorded in a classroom-like environment and our experiments demonstrate the significant improvements (≈ 24% relative increase as compared to the baseline video based recognizer) in character recognition accuracy that can be achieved using our techniques.
In this paper, we describe a visual odometry algorithm based on a novel 3D range data registration approach for mobile robot. Considering traditional range image's limited adaptability in outdoor environment repre...
详细信息
ISBN:
(纸本)9781457708879
In this paper, we describe a visual odometry algorithm based on a novel 3D range data registration approach for mobile robot. Considering traditional range image's limited adaptability in outdoor environment representation, a Bearing Angle model is used in this paper so that local SIFT (Scale-invariant feature transform) features can be extracted and matched effectively. According to the one-to-one correspondence between Bearing Angle image and raw 3D laser data, we can obtain a group of matching pairs between any two successive laser scans, which can be used to accomplish the 3D range data registration. Compared to the conventional ICP (Iterative Closest Point) algorithm, this approach can greatly improve the performance of scan registration both in computation time and accuracy. Furthermore, no initial rough pose estimation is needed in the registration. The frame-to-frame motion estimate can be performed by using the relative pose estimations resulting from the registration. Finally, experimental results are provided to demonstrate the effectiveness of the proposed visual odometry algorithm during the wheel odometry is unavailable or GPS (Global Positioning System) signal outages.
As an information of combining RFID and wireless data communication technologies,internet of Things is making things all over the world *** (Radio Frequency Identification) technology is the most basic key technology ...
详细信息
As an information of combining RFID and wireless data communication technologies,internet of Things is making things all over the world *** (Radio Frequency Identification) technology is the most basic key technology in internet of Things,which combines signal processing,wireless communication,embedded calculation and data *** technology is being widely used in various areas,such as object tracking systems,supply chain management,quick disbursement and so ***,deducing semantic relationships of objects in RFID applications has caught worldwide attention,such as inferring an event reminder "somebody lost things" according to the containmentrelationship of ***,there are rarely any concrete solutions applied to our practical *** this paper,we study and implement an RFID based object-relationship recognition system to efficiently retrieve the group-relationship and containment-relationship between objects in ***,we give a real scenario to implement our research.
Query suggestion is an effective human-computer interaction (HCI) approach in information *** to human vision system,the retrieval method based on visual query suggestion (VQS) can provide a friendly query interface t...
详细信息
Query suggestion is an effective human-computer interaction (HCI) approach in information *** to human vision system,the retrieval method based on visual query suggestion (VQS) can provide a friendly query interface to solve the query ambiguity *** this paper,the content-basedimage retrieval (CBIR) system is realized ***-computer interaction used VQS to obtain users' *** this step,user submitted a query keyword to the *** utilized it to provide a list of suggestions,each containing a keyword and a collection of representative *** the user selects one of the image suggestions,this image will be viewed as the key *** CBIR system will retrieve the image sets to return the similar images based on the similarity of image *** relevance feedback,user scored each returned image to optimize retrieval *** result shows the proposed method can improve the average recall and precision efficiently.
A passive universal image steganalysis method is proposed that is shown to be of higher detection accuracy than existing truly blind steganalysis methods including Farid's and the WAM. This is achieved by improvin...
详细信息
A passive universal image steganalysis method is proposed that is shown to be of higher detection accuracy than existing truly blind steganalysis methods including Farid's and the WAM. This is achieved by improving some weaknesses of Farid's steganalysis scheme in feature extraction, that is, instead of deriving an over-determined equation system for each sub band of the wavelet decomposition, the sub bands are divided into overlapping blocks and an over-determined equation system is constructed for each block. To guarantee the existence of finite answers, the over-determined equation systems are solved in a way different from Farid's by using Moore-Penrose pseudo-inverse concept. Further improvement to the performance is achieved by adding diagonal directions and increasing the number of moments. The comparative evaluations confirm the superiority of the proposed method over prevalent blind steganalysis schemes.
暂无评论