This paper is focused on wrist localization which is an important step in recognizing hand gestures. While there are many methods for detecting hand feature points as well as for estimating the hand pose, the majority...
详细信息
This paper presents an application based on the the cloud-based S4I platform [1], which is called Mobile Asset Management System (MAMS). The application is able to monitor and control mobile assets anywhere in the wor...
详细信息
This paper presents an application based on the the cloud-based S4I platform [1], which is called Mobile Asset Management System (MAMS). The application is able to monitor and control mobile assets anywhere in the world with a PC and Internet connection. It is integrated in the Application Layer of the S4I platform. MAMS is a mobile asset management solution dedicated to locating and monitoring commercial fleets. The implementation of the MAMS application is a reliable proof of the flexibility and the scalability of the S4I platform, truly creating a unique cloud-based integration system for wireless radio communication.
In the post-9/11 world, fleet managers, government officials, public safety personnel, and other stakeholders have become concerned about the potential for attacks involving trucks, containers, or other elements of th...
详细信息
In the post-9/11 world, fleet managers, government officials, public safety personnel, and other stakeholders have become concerned about the potential for attacks involving trucks, containers, or other elements of the global transportation infrastructure. The current smart city trend focuses on providing an intelligent, interoperable and secure environment for all citizens. The cloud based Student Transportation Safety System presented in this paper is a location aware mobile asset management solution for operators of commercial fleets, having a cloud based platform at its core. The system focuses on improving all aspects related to transportation safety and it is based on a secure, global transportation infrastructure that is intelligent, interlinked and interactive.
In this paper a problem of fingerprint-based biometric technique for the use in cases when the fingertips surface has been seriously damaged, making it impossible or extremely difficult to form a conventional referenc...
详细信息
In this paper a problem of fingerprint-based biometric technique for the use in cases when the fingertips surface has been seriously damaged, making it impossible or extremely difficult to form a conventional reference pattern, is addressed. The optical coherence tomography (OCT) is considered as a method to acquire data enabling later reconstruction of the fingerprint pattern from the internal (mother) layer. A set of two procedures: the first converting the 3-dimensional data resulting from the OCT to the 2-dimensional raw fingerprint image and the second adapting this image to input data for simple, standard fingerprint recognition algorithms, are described. Both procedures make up a complete preprocessing tool. The data set consisted of 149 B-scans forming a 3-dimensional structure describing the surface and shallow internal layer of a part of a fingertip of a person with considerably damaged fingertip surface, making the recognition of the fingerprint with direct method impossible. The obtained results prove that the OCT technique can be efficiently used to solve the considered problem, and that the proposed algorithms form a tool that can be useful for larger databases.
One of the techniques which can be used to quantitatively evaluate images statistically is the so-called random-walk approach. The resulting Hurst exponent is a measure of the complexity of the picture. Especially lon...
One of the techniques which can be used to quantitatively evaluate images statistically is the so-called random-walk approach. The resulting Hurst exponent is a measure of the complexity of the picture. Especially long, fine elements in the image, such as fibres, influence the Hurst exponent significantly. Thus, determination of the Hurst exponent has been suggested as new method to measure the hairiness of yarns or knitted fabrics, since existing hairiness measurement instruments are based on different measurement principles which are not comparable. While the principal usability of this method for hairiness detection has been shown in former projects, the absolute value of the calculated Hurst exponents depends on the technique to take the photographic image of a sample, to transfer it into a monochrome picture, and on possible image processing steps. This article gives an overview of edge detection filters, possible definitions of the threshold value between black and white for the transformation into a monochrome image, etc. It shows how these parameters should be chosen in case of typical textile samples and correlates the challenges of this novel method with well-known problems of common techniques to measure yarn and fabric hairiness.
A novel athermal scheme utilizing resonance splitting of a dual-ring structure is *** design and simulation are presented,and a proof of concept structure is optimized to demonstrate an athermal resonator with resonan...
详细信息
A novel athermal scheme utilizing resonance splitting of a dual-ring structure is *** design and simulation are presented,and a proof of concept structure is optimized to demonstrate an athermal resonator with resonance wavelength variation lower than 5 pm∕K within 30 K temperature range.
To overcome problems caused by improper parameters selection when least mean square(LMS) or normalized LMS(NLMS)method is apphied to model second-order Volterra, based on the LMS method, a novel Davidon-Fletcher-Powel...
详细信息
Nowadays parallel manipulators are used widely in bioengineering applications;this leads to many exciting expectations as well as challenges. The kinematic analysis of parallel manipulators with their differential kin...
详细信息
We examine online sociality in Quora, a collaborative Q&A platform, through statistical analysis of 248 answers. Quora members interact through technology and with technology, creating different regimes of sociali...
详细信息
We examine online sociality in Quora, a collaborative Q&A platform, through statistical analysis of 248 answers. Quora members interact through technology and with technology, creating different regimes of sociality: a regime of visibility, in which users and technology assemble the ranked list of answers; a regime of recognition, in which members rely on answers and authors' identity to acknowledge value; a regime of interaction, in which members comment on posted answers. We classify answers in three clusters: Sympa, Inspire and Casual. Answer types are related to the socio-technical creation of sociality regimes.
For several decades, the power system protection relay has experienced many important changes, from purely electromechanical type to the mixture of electronic and electromechanical type, then to fully static and now f...
详细信息
For several decades, the power system protection relay has experienced many important changes, from purely electromechanical type to the mixture of electronic and electromechanical type, then to fully static and now fully numerical relays based on microprocessors. In the transformer protection area, similar changes can be seen. This new numerical technology had been developed so much that now the protection systems integrates in the same device, besides the protection function also the control functions, this kind of systems also being called as multifunctional protection system (MPS). The paper relieve the main features of the newly developed transformer protection and control systems, the positive impact on the faults clearance times and also the development trends in this domain .
暂无评论