The measurement of two-dimensional displacement is an essential aspect of ultra-precision manufacturing and product design. This paper introduces an innovative method that uses a four-reader probe and a group of check...
详细信息
The measurement of two-dimensional displacement is an essential aspect of ultra-precision manufacturing and product design. This paper introduces an innovative method that uses a four-reader probe and a group of check codes to achieve digital synchronous measurement of translational and rotational displacement. The measuring principle and two-dimensional coding method are modelled first, and several reader-code combinations are proposed. And then, the study conducts numerical simulations to investigate the effect of different factors on measurement accuracies, such as check code size, machining tolerance, and reader resolution, and the method's accuracy and performance are evaluated based on the error distribution to determine the optimal system parameters for various applications. A specialized lab experiment is conducted to validate the accuracy and reliability of the proposed method. In conclusion, the proposed method is innovative and practical, which realizes the synchronous measurement of two-dimensional in-plane displacement instead of a simple combination of two one-dimensional sensors.
In order to consider kinds of attacks faced by data transmission in wireless sensor networks, a new reliability of data protection algorithm(RDPA) was presented. With perceived data from source node, the corresponding...
详细信息
ISBN:
(纸本)9781479919802
In order to consider kinds of attacks faced by data transmission in wireless sensor networks, a new reliability of data protection algorithm(RDPA) was presented. With perceived data from source node, the corresponding important code is calculated by comparing with data signature. Source nodes get check number through check code algorithm, work out watermarking] using hash function, and embeds them into source data. After receiving the data, base station extracts kinds of information by the data separation algorithm. The extracted watermarking compares the recalculated., if they are equal, the source data are integral and reliable. Otherwise, the data credibility is captured by the credibility algorithm, if it better than the threshold value, we can restore data or abandon it. The experiments results show that RDPA has high sensitivity to kinds of attacks. RDPA using check code and watermarking, can accurately calculate the degree of influence, improves energy efficiency.
In order to consider kinds of attacks faced by data transmission in wireless sensor networks,a new reliability of data protection algorithm(RDPA) was *** perceived data from source node,the corresponding important cod...
详细信息
In order to consider kinds of attacks faced by data transmission in wireless sensor networks,a new reliability of data protection algorithm(RDPA) was *** perceived data from source node,the corresponding important code is calculated by comparing with data *** nodes get check number through check code algorithm,work out watermarking]using hash function,and embeds them into source *** receiving the data,base station extracts kinds of information by the data separation *** extracted watermarking compares the recalculated.,if they are equal,the source data are integral and ***,the data credibility is captured by the credibility algorithm,if it better than the threshold value,we can restore data or abandon *** experiments results show that RDPA has high sensitivity to kinds of *** using check code and watermarking,can accurately calculate the degree of influence,improves energy efficiency.
Speech recognition technology is designed to be used in the logistics picking system. Picking personnel start picking receive voice command from system, he feedbacks "check code" by voice, finish man-machine...
详细信息
ISBN:
(纸本)9783319745213;9783319745206
Speech recognition technology is designed to be used in the logistics picking system. Picking personnel start picking receive voice command from system, he feedbacks "check code" by voice, finish man-machine dialogue, choose terminal equipment to capture the "checksum" for identification. After successful verification, complete the sorting operation. When speech recognition technology is used in logistics picking system, walking time can be reduced, the work flow will simplified and the data transmission accuracy and picking efficiency will be improved, it is conducive to promote logistics service level, enhance the economic efficiency of logistics enterprises and customer satisfaction.
This paper presents an efficient combined bit-flipping (BF) and stochastic low-density parity-check decoder, where a BF decoder is used to achieve a reduction in decoding cycles. A nodewise probability tracer is adopt...
详细信息
This paper presents an efficient combined bit-flipping (BF) and stochastic low-density parity-check decoder, where a BF decoder is used to achieve a reduction in decoding cycles. A nodewise probability tracer is adopted at each variable node (VN) in order to achieve a BER performance comparable to the normalized min-sum algorithm, where check-to-variable (C2V) messages are used as inputs, rather than the variable-to-check (V2C) messages adopted in previous stochastic decoders. The complexity of the VN units is greatly reduced by sharing common units used in the generation of V2C messages together with a probability tracer. The C2V-based probability tracer enables the design of a decoder that provides a short critical path. The proposed methods are demonstrated by designing a (2048, 1723) decoder that is implemented in a 90 nm process. A total of 1460 K logic gates are integrated in a decoder that has an area of 4.12 mm2 and achieves a coded throughput of 39.3 Gb/s at a clock frequency of 749 MHz. To the best of the authors' knowledge, the proposed decoder achieves the best normalized throughput-to-area ratio among the stochastic decoders reported in the open literatures.
Database watermarking is an important branch of information hiding technology, and it is chiefly used to protect copyright. This paper creatively proposes a novel self-resilience digital watermarking technology which ...
详细信息
ISBN:
(纸本)9780769534886
Database watermarking is an important branch of information hiding technology, and it is chiefly used to protect copyright. This paper creatively proposes a novel self-resilience digital watermarking technology which can repair itsetf. It is the first time to use the theory of error resilience combined with triple compression theory to improve the quality of extracted digital watermark This paper chooses image which has more information as digital watermark source. In addition, this paper introduces certification authority. Besides to prevent from additive attack, the circuit generator code is also provided by certification authority to ensure the safety of watermark validation. Furthermore, this paper proposes an objective image contrast standard as evaluation basis for certification authority. Through the comparison of simulation experiment, the self-resilience technique performs a good invisibility, and could effectively resist all kinds of subset attacks.
暂无评论