In the video-based surveillance application, moving shadows can affect the correct localization and detection of moving objects. This paper aims to present a method for shadow detection and suppression used for moving...In the video-based surveillance application, moving shadows can affect the correct localization and detection of moving objects. This paper aims to present a method for shadow detection and suppression used for moving visual object detection. The major novelty of the shadow suppression is the integration of several features including photometric invariant color feature, motion edge feature, and spatial feature etc. By modifying process for false shadow detected, the averaging detection rate of moving object reaches above 90% in the test of Hall-Monitor sequence.展开更多
The Large Sky Area Multi-Object Fiber Spectroscopic Telescope (LAMOST, also called the Guo Shou Jing Telescope) is a special reflecting Schmidt telescope. LAMOST’s special design allows both a large aperture (effecti...The Large Sky Area Multi-Object Fiber Spectroscopic Telescope (LAMOST, also called the Guo Shou Jing Telescope) is a special reflecting Schmidt telescope. LAMOST’s special design allows both a large aperture (effective aperture of 3.6 m–4.9 m) and a wide field of view (FOV) (5°). It has an innovative active reflecting Schmidt configuration which continuously changes the mirror’s surface that adjusts during the observation process and combines thin deformable mirror active optics with segmented active optics. Its primary mirror (6.67m×6.05 m) and active Schmidt mirror (5.74m×4.40 m) are both segmented, and composed of 37 and 24 hexagonal sub-mirrors respectively. By using a parallel controllable fiber positioning technique, the focal surface of 1.75 m in diameter can accommodate 4000 optical fibers. Also, LAMOST has 16 spectrographs with 32 CCD cameras. LAMOST will be the telescope with the highest rate of spectral acquisition. As a national large scientific project, the LAMOST project was formally proposed in 1996, and approved by the Chinese government in 1997. The construction started in 2001, was completed in 2008 and passed the official acceptance in June 2009. The LAMOST pilot survey was started in October 2011 and the spectroscopic survey will launch in September 2012. Up to now, LAMOST has released more than 480 000 spectra of objects. LAMOST will make an important contribution to the study of the large-scale structure of the Universe, structure and evolution of the Galaxy, and cross-identification of multiwaveband properties in celestial objects.展开更多
Objective To compare the acute hemodynamic effects of five different pacing modes in patients with cardiac function NYHA class Ⅰ to Ⅱ without bundle branch block (BBB). Methods This study included 12 patients (SSS ...Objective To compare the acute hemodynamic effects of five different pacing modes in patients with cardiac function NYHA class Ⅰ to Ⅱ without bundle branch block (BBB). Methods This study included 12 patients (SSS 7, Ⅲ°AVB 5) undergoing pacemaker implantation. Right ventricular apex (RVA), right ventricular outflow tract (RVOT), right ventricular bifocal (RV-Bi), left ventricular base (LVB) and bi -ventricular (Bi-Ⅴ) pacing at 60 -80 ppm were done in VVI mode prior to implantation of DDD pacemaker. The cardiac index (CI), mean pulmonary artery pressure (mPAP) and pulmonary capillary wedge pressure (PCWP) were measured with Swan - Ganz thermodilution catheter after 5 minutes of each pacing mode. Results (1) Comparing to pacing at RVA (CI: 2. 41± 0. 38 L/min per m2, PCWP: 16. 7 ±3.3 mmHg), the CI increased and the PCWP decreased significantly in pacing at RVOT(CI: 2. 63 ± 0.46, PCWP: 13. 8±2. 3), LVB(CI: 2. 78±0.52, PCWP: 14. 4±3.1), RV-Bi(CI: 2. 83±0.57, PCWP: 12. 8± 2. 5) and Bi -Ⅴ pacing (CI: 2. 94± 0.60, PCWP: 12. 7±2. 5), P < 0. 01, respectively. (2) The CI of RV-Bi and Bi-Ⅴ pacing was higher than that of RVOT and LVB pacing, the PCWP was lower, P < 0. 05, respectively. (3) There was no significant difference between RV - Bi pacing and Bi-Ⅴ pacing in CI and PCWP. Conclusion There is no significant difference between RV - Bi pacing and Bi -V pacing in the acute hemodynamic effects; however,dual - site pacing is much better than single site pacing in that aspect for patients with cardiac function NYHA class Ⅰ to Ⅱ without BBB. Among single site pacing, the RVOT and LVB pacing is better than RVA pacing in cardiac function.展开更多
In this paper, a successfully studied and developed master - slave muld - microcomputers control system based on PC - BUS for hollow spindle fancy yarn spinning machine, mainly Its overall scheme, software and hardwar...In this paper, a successfully studied and developed master - slave muld - microcomputers control system based on PC - BUS for hollow spindle fancy yarn spinning machine, mainly Its overall scheme, software and hardware construction, is introduced. Spinning experiments show that the system achieves satisfactory result. This system can solve the diftkultles of mechatronical fusion between domestic hollow splndk fancy yarn spuming muchine and its microcomputer control technology.展开更多
A quantitative method is developed to identify the structures of multi-layer woven fabric in this study. Six structural parameters are selected to represent the fabric structure. With some design criteria for the rein...A quantitative method is developed to identify the structures of multi-layer woven fabric in this study. Six structural parameters are selected to represent the fabric structure. With some design criteria for the reinforcement of textile composites, the relationships among the structural parameters are derived for different binding patterns of the fabric structure. The conditions, which meet the requirements of structural cell stability,are also discussed.展开更多
To meet the development trend of multi-bar warp knit-ting machine towards high-speed,advanced technologyand computer control and the requirements of variousproducts with small quantity,there are many researcheson the ...To meet the development trend of multi-bar warp knit-ting machine towards high-speed,advanced technologyand computer control and the requirements of variousproducts with small quantity,there are many researcheson the computer-aided pattern design of multi-barwarp knitted fabrics.In terms of the special propertiesof the computer-aided pattern design of multi-barwarp knitted fabrics,the Object Oriented Program(OOP)programming-Object Windows class Library(OWL)programming is selected.According to thecharacters of the OWL programming,various functionsare defined.Pattern design and technical parameters canbe output,which offers a great convenience for the fac-tory.展开更多
This paper states a new metaheuristic based on Deterministic Finite Automata (DFA) for the multi - objective optimization of combinatorial problems. First, a new DFA named Multi - Objective Deterministic Finite Auto...This paper states a new metaheuristic based on Deterministic Finite Automata (DFA) for the multi - objective optimization of combinatorial problems. First, a new DFA named Multi - Objective Deterministic Finite Automata (MDFA) is defined. MDFA allows the representation of the feasible solutions space of combinatorial problems. Second, it is defined and implemented a metaheuritic based on MDFA theory. It is named Metaheuristic of Deterministic Swapping (MODS). MODS is a local search strategy that works using a MDFA. Due to this, MODS never take into account unfeasible solutions. Hence, it is not necessary to verify the problem constraints for a new solution found. Lastly, MODS is tested using well know instances of the Bi-Objective Traveling Salesman Problem (TSP) from TSPLIB. Its results were compared with eight Ant Colony inspired algorithms and two Genetic algorithms taken from the specialized literature. The comparison was made using metrics such as Spacing, Generational Distance, Inverse Generational Distance and No-Dominated Generation Vectors. In every case, the MODS results on the metrics were always better and in some of those cases, the superiority was 100%.展开更多
Most of the password based authentication protocols make use of the single authentication server for user's authentication. User's verifier information stored on the single server is a main point of susceptibi...Most of the password based authentication protocols make use of the single authentication server for user's authentication. User's verifier information stored on the single server is a main point of susceptibility and remains an attractive target for the attacker. On the other hand, multi-server architecture based authentication protocols make it difficult for the attacker to find out any significant authentication information related to the legitimate users. In 2009, Liao and Wang proposed a dynamic identity based remote user authentication protocol for multi-server environment. However, we found that Liao and Wang's protocol is susceptible to malicious server attack and malicious user attack. This paper presents a novel dynamic identity based authentication protocol for multi-server architecture using smart cards that resolves the aforementioned flaws, while keeping the merits of Liao and Wang's protocol. It uses two-server paradigm by imposing different levels of trust upon the two servers and the user's verifier information is distributed between these two servers known as the service provider server and the control server. The proposed protocol is practical and computational efficient because only nonce, one-way hash function and XOR operations are used in its implementation. It provides a secure method to change the user's password without the server's help. In e-commerce, the number of servers providing the services to the user is usually more than one and hence secure authentication protocols for multi-server environment are required.展开更多
Anonymity is a very important security objective in network communications.Recently,Pang et al.proposed a novel multirecipient signcryption scheme with complete anonymity and claimed that the new concrete scheme was s...Anonymity is a very important security objective in network communications.Recently,Pang et al.proposed a novel multirecipient signcryption scheme with complete anonymity and claimed that the new concrete scheme was strong existential unforgeability under selective multi-ID,chosen message attack.Unfortunately,by giving concrete attacks,named " inside attack" and " outside attack" respectively,we indicate that Pang et al.'s scheme is not secure in their security model.展开更多
文摘In the video-based surveillance application, moving shadows can affect the correct localization and detection of moving objects. This paper aims to present a method for shadow detection and suppression used for moving visual object detection. The major novelty of the shadow suppression is the integration of several features including photometric invariant color feature, motion edge feature, and spatial feature etc. By modifying process for false shadow detected, the averaging detection rate of moving object reaches above 90% in the test of Hall-Monitor sequence.
文摘The Large Sky Area Multi-Object Fiber Spectroscopic Telescope (LAMOST, also called the Guo Shou Jing Telescope) is a special reflecting Schmidt telescope. LAMOST’s special design allows both a large aperture (effective aperture of 3.6 m–4.9 m) and a wide field of view (FOV) (5°). It has an innovative active reflecting Schmidt configuration which continuously changes the mirror’s surface that adjusts during the observation process and combines thin deformable mirror active optics with segmented active optics. Its primary mirror (6.67m×6.05 m) and active Schmidt mirror (5.74m×4.40 m) are both segmented, and composed of 37 and 24 hexagonal sub-mirrors respectively. By using a parallel controllable fiber positioning technique, the focal surface of 1.75 m in diameter can accommodate 4000 optical fibers. Also, LAMOST has 16 spectrographs with 32 CCD cameras. LAMOST will be the telescope with the highest rate of spectral acquisition. As a national large scientific project, the LAMOST project was formally proposed in 1996, and approved by the Chinese government in 1997. The construction started in 2001, was completed in 2008 and passed the official acceptance in June 2009. The LAMOST pilot survey was started in October 2011 and the spectroscopic survey will launch in September 2012. Up to now, LAMOST has released more than 480 000 spectra of objects. LAMOST will make an important contribution to the study of the large-scale structure of the Universe, structure and evolution of the Galaxy, and cross-identification of multiwaveband properties in celestial objects.
文摘Objective To compare the acute hemodynamic effects of five different pacing modes in patients with cardiac function NYHA class Ⅰ to Ⅱ without bundle branch block (BBB). Methods This study included 12 patients (SSS 7, Ⅲ°AVB 5) undergoing pacemaker implantation. Right ventricular apex (RVA), right ventricular outflow tract (RVOT), right ventricular bifocal (RV-Bi), left ventricular base (LVB) and bi -ventricular (Bi-Ⅴ) pacing at 60 -80 ppm were done in VVI mode prior to implantation of DDD pacemaker. The cardiac index (CI), mean pulmonary artery pressure (mPAP) and pulmonary capillary wedge pressure (PCWP) were measured with Swan - Ganz thermodilution catheter after 5 minutes of each pacing mode. Results (1) Comparing to pacing at RVA (CI: 2. 41± 0. 38 L/min per m2, PCWP: 16. 7 ±3.3 mmHg), the CI increased and the PCWP decreased significantly in pacing at RVOT(CI: 2. 63 ± 0.46, PCWP: 13. 8±2. 3), LVB(CI: 2. 78±0.52, PCWP: 14. 4±3.1), RV-Bi(CI: 2. 83±0.57, PCWP: 12. 8± 2. 5) and Bi -Ⅴ pacing (CI: 2. 94± 0.60, PCWP: 12. 7±2. 5), P < 0. 01, respectively. (2) The CI of RV-Bi and Bi-Ⅴ pacing was higher than that of RVOT and LVB pacing, the PCWP was lower, P < 0. 05, respectively. (3) There was no significant difference between RV - Bi pacing and Bi-Ⅴ pacing in CI and PCWP. Conclusion There is no significant difference between RV - Bi pacing and Bi -V pacing in the acute hemodynamic effects; however,dual - site pacing is much better than single site pacing in that aspect for patients with cardiac function NYHA class Ⅰ to Ⅱ without BBB. Among single site pacing, the RVOT and LVB pacing is better than RVA pacing in cardiac function.
文摘In this paper, a successfully studied and developed master - slave muld - microcomputers control system based on PC - BUS for hollow spindle fancy yarn spinning machine, mainly Its overall scheme, software and hardware construction, is introduced. Spinning experiments show that the system achieves satisfactory result. This system can solve the diftkultles of mechatronical fusion between domestic hollow splndk fancy yarn spuming muchine and its microcomputer control technology.
文摘A quantitative method is developed to identify the structures of multi-layer woven fabric in this study. Six structural parameters are selected to represent the fabric structure. With some design criteria for the reinforcement of textile composites, the relationships among the structural parameters are derived for different binding patterns of the fabric structure. The conditions, which meet the requirements of structural cell stability,are also discussed.
文摘To meet the development trend of multi-bar warp knit-ting machine towards high-speed,advanced technologyand computer control and the requirements of variousproducts with small quantity,there are many researcheson the computer-aided pattern design of multi-barwarp knitted fabrics.In terms of the special propertiesof the computer-aided pattern design of multi-barwarp knitted fabrics,the Object Oriented Program(OOP)programming-Object Windows class Library(OWL)programming is selected.According to thecharacters of the OWL programming,various functionsare defined.Pattern design and technical parameters canbe output,which offers a great convenience for the fac-tory.
文摘This paper states a new metaheuristic based on Deterministic Finite Automata (DFA) for the multi - objective optimization of combinatorial problems. First, a new DFA named Multi - Objective Deterministic Finite Automata (MDFA) is defined. MDFA allows the representation of the feasible solutions space of combinatorial problems. Second, it is defined and implemented a metaheuritic based on MDFA theory. It is named Metaheuristic of Deterministic Swapping (MODS). MODS is a local search strategy that works using a MDFA. Due to this, MODS never take into account unfeasible solutions. Hence, it is not necessary to verify the problem constraints for a new solution found. Lastly, MODS is tested using well know instances of the Bi-Objective Traveling Salesman Problem (TSP) from TSPLIB. Its results were compared with eight Ant Colony inspired algorithms and two Genetic algorithms taken from the specialized literature. The comparison was made using metrics such as Spacing, Generational Distance, Inverse Generational Distance and No-Dominated Generation Vectors. In every case, the MODS results on the metrics were always better and in some of those cases, the superiority was 100%.
文摘Most of the password based authentication protocols make use of the single authentication server for user's authentication. User's verifier information stored on the single server is a main point of susceptibility and remains an attractive target for the attacker. On the other hand, multi-server architecture based authentication protocols make it difficult for the attacker to find out any significant authentication information related to the legitimate users. In 2009, Liao and Wang proposed a dynamic identity based remote user authentication protocol for multi-server environment. However, we found that Liao and Wang's protocol is susceptible to malicious server attack and malicious user attack. This paper presents a novel dynamic identity based authentication protocol for multi-server architecture using smart cards that resolves the aforementioned flaws, while keeping the merits of Liao and Wang's protocol. It uses two-server paradigm by imposing different levels of trust upon the two servers and the user's verifier information is distributed between these two servers known as the service provider server and the control server. The proposed protocol is practical and computational efficient because only nonce, one-way hash function and XOR operations are used in its implementation. It provides a secure method to change the user's password without the server's help. In e-commerce, the number of servers providing the services to the user is usually more than one and hence secure authentication protocols for multi-server environment are required.
基金Shandong Provincial Natural Science Foundation,China(No.ZR2014FL011)Higher Educational Science and Technology Program of Shandong Province,China(No.J13LN21)
文摘Anonymity is a very important security objective in network communications.Recently,Pang et al.proposed a novel multirecipient signcryption scheme with complete anonymity and claimed that the new concrete scheme was strong existential unforgeability under selective multi-ID,chosen message attack.Unfortunately,by giving concrete attacks,named " inside attack" and " outside attack" respectively,we indicate that Pang et al.'s scheme is not secure in their security model.