Texture pattern mapping is one of the most important techniques for high quality image syn- thesis. It can largely enhance the visual richness of raster-scan images. In this paper is presented a new method of mapping ...
详细信息
Texture pattern mapping is one of the most important techniques for high quality image syn- thesis. It can largely enhance the visual richness of raster-scan images. In this paper is presented a new method of mapping planar texture pattern onto beta-spline curved surfaces——bilinear mapping method which can map planar texture pattern onto curved surfaces with less distortion, and also can fulfill the geometric transformation of the texture pattern on the curved surfaces by operating the pattern win- dow. It is valuable to both CAD/CAM in artistic field and computer graphics.
A network system called Wireless Sensor Network is made up of wireless sensor node devices that are spread at random (WSN). WSNs are a critical paradigm for the Internet of Things' evolution (IoT). Strong security...
详细信息
A network system called Wireless Sensor Network is made up of wireless sensor node devices that are spread at random (WSN). WSNs are a critical paradigm for the Internet of Things' evolution (IoT). Strong security measures must be done to protect the network from security threats and malicious assaults in order to make it more efficient. To identify and isolate hostile sensor nodes in a cloud-assisted WSN-IoT system, the Trusted Anonymous Lightweight Attacker Detection (TALAD) scheme is presented. The TALAD strategy creates a routing path to the cloud with highly trusted nodes, subject to a desired path length limit. Using the binomial algebraic theorem, the node identities are formed with bogus identities, and the original identity is hidden from the other nodes in the network. If only the forward key and the reverse key string are matched, the nodes' original identities are exposed. The forward and reverse keys are mapped using a context-free grammar rule. Even when a major chunk of the network drops to forward packets, TALAD successfully avoids incursions, according to the simulation results.
It analyzed three troposphere mapping functions, Niell mapping function (NMF), Vienna mapping function 1 (VMF1) and Global mapping function (GMF), and its parameters selection and characteristics paralleled. Also it p...
详细信息
ISBN:
(纸本)9781510804166
It analyzed three troposphere mapping functions, Niell mapping function (NMF), Vienna mapping function 1 (VMF1) and Global mapping function (GMF), and its parameters selection and characteristics paralleled. Also it presented the thumb rule in troposphere mapping function and designed a two way time transfer method based on troposphere mapping functions. Besides it studied the station height errors based on troposphere gradients. It analyzed the above methods in four GPS stations in mid latitude northeast Asian areas. It could conclude from the studies that the station height errors distribute in cosine distribution with a yearly period and the maximum and minimum display in ad-jacency of summer & autumn and winter & spring. The chosen stations' height errors are in mm precision. And the station height errors increase with the two way transfer distance's length.
This paper establishes that absolute optical air mass and hydrostatic atmospheric delay of electromagnetic waves are proportional magnitudes, and, consequently, their respective obliquity ratios are identical dimensio...
详细信息
This paper establishes that absolute optical air mass and hydrostatic atmospheric delay of electromagnetic waves are proportional magnitudes, and, consequently, their respective obliquity ratios are identical dimensionless quantities. This means that a potential source for developing new models for relative optical air mass can be found in the formulae for the atmospheric delay in electromagnetic signals (and vice versa). In this respect, for estimating relative optical air mass, we demonstrate that Herring's (1992) family of mapping functions for modeling atmospheric delay is more accurate than functional forms devised expressly for the purpose, such as that of Kasten (1965).
Computer-based simulation has been an important method in human linkage analysis for a long time. Typically, such analyses have been performed by simulating a set of linked markers according to the intermarker recombi...
详细信息
Computer-based simulation has been an important method in human linkage analysis for a long time. Typically, such analyses have been performed by simulating a set of linked markers according to the intermarker recombination fractions, under the assumption of no genetic interference. A novel approach is proposed in which such simulations can be performed using chromosome-based methods, rather than traditional recombination fraction-based methods. We propose simulating pedigree data using a crossover formation (CF) process to generate the number of crossovers and their locations in Morgans along the entire length of a chromosome. By this method, one can generate simulated multilocus data for any number of loci on a chromosome much more efficiently than with the currently available methods like those used in the SLINK or SIMLINK programs. Further, interference can be incorporated directly in this method, which is not possible with existing packages. (C) 1993 Wiley-Liss, Inc.
This paper proposed a new method of image registration based on EM algorithm. It adopted EM algorithm to optimize the parameters and algorithm. Experimental result shows that the proposed image registration method is ...
详细信息
ISBN:
(纸本)9781424458219;9781424458240
This paper proposed a new method of image registration based on EM algorithm. It adopted EM algorithm to optimize the parameters and algorithm. Experimental result shows that the proposed image registration method is effective.
With the development of image process technology, camera-based eye gaze estimation methods make a possible nonintrusive way of human computer interaction (HCI). Most of them base on Pupil-Cornea Reflection Techniq...
详细信息
With the development of image process technology, camera-based eye gaze estimation methods make a possible nonintrusive way of human computer interaction (HCI). Most of them base on Pupil-Cornea Reflection Technique (PCRT) which uses extra light sources and estimates gaze point on screen by a polynomial mapping function. In this paper, the input vector of classical PCRT is adjusted to a new one which can be precisely extracted in the system using only one camera. The adjusted PCRT is called PupilCorner Technique (PCT). Meanwhile, a novel simple 2D Geometric Model (GM) is proposed. It bases on the geometric relationship of eyeballs and screen and simulates the movement of eyeballs when user looks through the screen with his head still. Furthermore, a fitting method is used to promote the accuracy of GM. At last, the combined technique called Geometric Fitting Technique (GFT) is compared with PCT in experiments and the results show that GFT has an acceptable accuracy which can be applied in HO applications and future geometric model is suggested by the guide concluded from the paper to promote accuracy.
The models of three-dimensional point-radiate and axis-radiate 8-node infinite element are presented. The pole is set as the origin of the coordinate system or one of the coordinate axes, and the artificial boundary i...
详细信息
The models of three-dimensional point-radiate and axis-radiate 8-node infinite element are presented. The pole is set as the origin of the coordinate system or one of the coordinate axes, and the artificial boundary is regarded as a sphere or a cylinder. The coordinate and displacement of any point within the infinite element are expressed by those of the nodes located on the artificial boundary. The concise mapping functions can easily describe the attenuation character of the displacement field within the infinite domain. In the numerical calculation, the infinite element mesh is performed only on the artificial boundary and the general solution gets unnecessary. The results of the examples show the accuracy.
暂无评论