为实现工业产品的可追溯性,直接将条码加工在零件表面的直接零件标识(Direct Part Marking,DPM)技术,在国内外受到了越来越多的关注。对于金属零件,由于其具有较高的反光性,由相机捕获的金属表面的条码图像常常产生局部高光现象,影响条...为实现工业产品的可追溯性,直接将条码加工在零件表面的直接零件标识(Direct Part Marking,DPM)技术,在国内外受到了越来越多的关注。对于金属零件,由于其具有较高的反光性,由相机捕获的金属表面的条码图像常常产生局部高光现象,影响条码的正确读取。为此,针对金属表面激光标刻二维条码出现的局部高光现象,提出了基于五步重构模型的条码重构法,以重构高光区域的条码信息。对获得的条码图像进行倾斜校正,使"L"型实线边界位于图像左下角,对条码进行网格划分实现各个模块的定位。基于Modified Specular-Free(MSF)图像对高光区域进行检测。采用五步重构模型对条码的各个模块进行数值填充,对条码进行读取。实验表明,该算法能达到去除金属表面上条码局部高光的目的,并取得了较高的识读正确率。展开更多
In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chanc...In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering m ost of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of "Identity Trust" relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the "Behavior Trust" relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the d elivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.展开更多
文摘为实现工业产品的可追溯性,直接将条码加工在零件表面的直接零件标识(Direct Part Marking,DPM)技术,在国内外受到了越来越多的关注。对于金属零件,由于其具有较高的反光性,由相机捕获的金属表面的条码图像常常产生局部高光现象,影响条码的正确读取。为此,针对金属表面激光标刻二维条码出现的局部高光现象,提出了基于五步重构模型的条码重构法,以重构高光区域的条码信息。对获得的条码图像进行倾斜校正,使"L"型实线边界位于图像左下角,对条码进行网格划分实现各个模块的定位。基于Modified Specular-Free(MSF)图像对高光区域进行检测。采用五步重构模型对条码的各个模块进行数值填充,对条码进行读取。实验表明,该算法能达到去除金属表面上条码局部高光的目的,并取得了较高的识读正确率。
基金supported by the Program for Changjiang Scholars and Innovative Research Team in University (IRT1078)the Key Program of NSFC-Guangdong Union Foundation (U1135002)+3 种基金the Major national S&T program(2012ZX03002003)the Fundamental Research Funds for the Central Universities(JY10000903001)the National Natural Sci ence Foundation of China (Grant No. 61363068, 61100233)the Natural Science Foundation of Shaanxi Province (Grant No. 2012JM8030, 2011JQ8003)
文摘In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering m ost of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of "Identity Trust" relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the "Behavior Trust" relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the d elivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.