A novel Bacterial Foraging Algorithm (BFA) based neural network is presented for image compression. To improve the quality of the decompressed images, the concepts of reproduction, elimination and dispersal in BFA are...A novel Bacterial Foraging Algorithm (BFA) based neural network is presented for image compression. To improve the quality of the decompressed images, the concepts of reproduction, elimination and dispersal in BFA are firstly introduced into neural network in the proposed algorithm. Extensive experiments are conducted on standard testing images and the results show that the pro- posed method can improve the quality of the reconstructed images significantly.展开更多
Radio frequency identification(RFID) is a new type of non-contact automatic identification technology.Due to its low energy consumption,low cost,and its adaptability to harsh environments,it has been applied to many f...Radio frequency identification(RFID) is a new type of non-contact automatic identification technology.Due to its low energy consumption,low cost,and its adaptability to harsh environments,it has been applied to many fields.In the RFID systems,data collision is inevitable when the reader sends a communication request and multiple tags respond with simultaneous data transmission.Data collision is prone to causing problems such as:identification delay,spectrum resource waste,a decreased system throughput rate,etc.Therefore,an efficient,stable anti-collision protocol is crucial for RFID systems.This research analysed the current research into RFID anticollision protocols and summarised means for its improvement through the mechanism of implementation of different types anticollision protocols.Finally,a new direction is proposed for the future development of RFID anti-collision protocol systems.展开更多
The capability of human_computer interaction reflects the intelligent degree of mobile navigation system.The navigation data and functions of mobile navigation system are divided into system commands and non_system co...The capability of human_computer interaction reflects the intelligent degree of mobile navigation system.The navigation data and functions of mobile navigation system are divided into system commands and non_system commands in this paper.And then a group of speech commands are abstracted.This paper applies speech recognition technology to intelligent mobile navigation system to process speech commands and does some deep research on the integration of speech recognition technology with mobile navigation system.The navigation operation can be performed by speech commands,which makes human_computer interaction easy during navigation.Speech command interface of navigation system is implemented by Dutty ++ Software,which is based on speech recognition system _Via Voice of IBM.Through navigation experiments,navigation can be done almost without keyboard,which proved that human_computer interaction is very convenient by speech commands and the reliability is also higher.展开更多
Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequen...Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequency identification(RFID) has been widely used in warehouse for item identifying. Meanwhile, RFID technology also has great potential for pallets localization which is underutilized in warehouse management. RFID-based checking-in and inventory systems have been applied in warehouse management by many enterprises. Localization approach is studied, which is compatible with existing RFID checking-in and inventory systems. A novel RFID localization approach is proposed for pallets checking-in. Phase variation of nearby tags was utilized to estimate the position of added pallets. A novel inventory localization approach combing angle of arrival(AOA) measurement and received signal strength(RSS) is also proposed for pallets inventory. Experiments were carried out using standard UHF passive RFID system. Experimental results show an acceptable localization accuracy which can satisfy the requirement of warehouse management.展开更多
The communication in the physical layer between an interrogator and a tag of a passive Radio Frequency Identification (RFID) system operating between 860-960 MHz is defined by the Gen 2 protocol. The tag can be cons...The communication in the physical layer between an interrogator and a tag of a passive Radio Frequency Identification (RFID) system operating between 860-960 MHz is defined by the Gen 2 protocol. The tag can be considered a remote executing unit or a computer that executes instructions from the Gen 2 protocol. The selection of the parameter and command configuration within the protocol limitations is critical especially if the time available for the memory operations in a passive RFID system is limited. An effort is made to map the operation of the tag not in its states of operation as elaborately explained in the protocol but rather in its elementary format. The research reported in this article identifies all the parameters that affect the dynamic operation of the tag. The operation is further divided into singulation, read and write; identifying the significant parameters in each case. The choices of the different commands that can be adopted to perform identical operations on the tag are analyzed. The elements to consider in selecting the optimum command configuration are described. The impact of the different parameter and command configuration on the singulation, read and write time is calculated and recorded using a tested Gen 2 simulator program.展开更多
This paper focuses on the key technologies of P2P technology and network traffic monitoring, which focuses on AC automaton and bypass interference control technology, and on based of it, we design a new P2P traffic mo...This paper focuses on the key technologies of P2P technology and network traffic monitoring, which focuses on AC automaton and bypass interference control technology, and on based of it, we design a new P2P traffic monitoring system. The system uses DPI and DFI recognition technology, as well as straight loss and bypass interference control technology, basically meet the recognition and control of P2P traffic. Finally, the test results show that this system recognition accuracy of P2P traffic is high, good control effect, function and performance meet the design requirements.展开更多
Through the study of individual identification technology, the paper put forward the identification scheme for two-dimensional code ear tag + RFID electronic tag, namely using Ministry of agriculture regulations two-...Through the study of individual identification technology, the paper put forward the identification scheme for two-dimensional code ear tag + RFID electronic tag, namely using Ministry of agriculture regulations two-dimensional code ear tag to identify individual animal in the breeding stage, and record the basic information and breeding, using the RFID electronic identification tag to record slaughter quarantine information; phase, and finally the ear tag code, RFID electronic tag and product number should be encode relatively to generate tracing code in the final agricultural products, realize the smooth flow of the information flow from the breeding stage to the final product. For fruits and vegetables, agricultural products are adopted the common identification for orchard (greenhouse) numbers units.展开更多
Security access control systems and automatic video surveillance systems are becoming increasingly important recently,and detecting human faces is one of the indispensable processes.In this paper,an approach is presen...Security access control systems and automatic video surveillance systems are becoming increasingly important recently,and detecting human faces is one of the indispensable processes.In this paper,an approach is presented to detect faces in video surveillance.Firstly,both the skin-color and motion components are applied to extract skin-like regions.The skin-color segmentation algorithm is based on the BPNN (back-error-propagation neural network) and the motion component is obtained with frame difference algorithm.Secondly,the image is clustered into separated face candidates by using the region growing technique.Finally,the face candidates are further verified by the rule-based algorithm.Experiment results demonstrate that both the accuracy and processing speed are very promising and the approach can be applied for the practical use.展开更多
基金Supported by the National Natural Science Foundation of China (No.60572100)by the Royal Society (U.K.) International Joint Projects 2006/R3-Cost Share with NSFC (No.60711130233)
文摘A novel Bacterial Foraging Algorithm (BFA) based neural network is presented for image compression. To improve the quality of the decompressed images, the concepts of reproduction, elimination and dispersal in BFA are firstly introduced into neural network in the proposed algorithm. Extensive experiments are conducted on standard testing images and the results show that the pro- posed method can improve the quality of the reconstructed images significantly.
基金The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped improve the quality of this paper. This paper is supported by the National Natural Science Founda- tion of China (No. 61371092), the Doctoral Fund of Ministry of Education of China (No.20130061120062), and the China Postdoc- toral Science Foundation (No. 2014M551184).
文摘Radio frequency identification(RFID) is a new type of non-contact automatic identification technology.Due to its low energy consumption,low cost,and its adaptability to harsh environments,it has been applied to many fields.In the RFID systems,data collision is inevitable when the reader sends a communication request and multiple tags respond with simultaneous data transmission.Data collision is prone to causing problems such as:identification delay,spectrum resource waste,a decreased system throughput rate,etc.Therefore,an efficient,stable anti-collision protocol is crucial for RFID systems.This research analysed the current research into RFID anticollision protocols and summarised means for its improvement through the mechanism of implementation of different types anticollision protocols.Finally,a new direction is proposed for the future development of RFID anti-collision protocol systems.
文摘The capability of human_computer interaction reflects the intelligent degree of mobile navigation system.The navigation data and functions of mobile navigation system are divided into system commands and non_system commands in this paper.And then a group of speech commands are abstracted.This paper applies speech recognition technology to intelligent mobile navigation system to process speech commands and does some deep research on the integration of speech recognition technology with mobile navigation system.The navigation operation can be performed by speech commands,which makes human_computer interaction easy during navigation.Speech command interface of navigation system is implemented by Dutty ++ Software,which is based on speech recognition system _Via Voice of IBM.Through navigation experiments,navigation can be done almost without keyboard,which proved that human_computer interaction is very convenient by speech commands and the reliability is also higher.
基金Project(2009BADB9B09)supported by the National Key Technologies R&D Program of China
文摘Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequency identification(RFID) has been widely used in warehouse for item identifying. Meanwhile, RFID technology also has great potential for pallets localization which is underutilized in warehouse management. RFID-based checking-in and inventory systems have been applied in warehouse management by many enterprises. Localization approach is studied, which is compatible with existing RFID checking-in and inventory systems. A novel RFID localization approach is proposed for pallets checking-in. Phase variation of nearby tags was utilized to estimate the position of added pallets. A novel inventory localization approach combing angle of arrival(AOA) measurement and received signal strength(RSS) is also proposed for pallets inventory. Experiments were carried out using standard UHF passive RFID system. Experimental results show an acceptable localization accuracy which can satisfy the requirement of warehouse management.
文摘The communication in the physical layer between an interrogator and a tag of a passive Radio Frequency Identification (RFID) system operating between 860-960 MHz is defined by the Gen 2 protocol. The tag can be considered a remote executing unit or a computer that executes instructions from the Gen 2 protocol. The selection of the parameter and command configuration within the protocol limitations is critical especially if the time available for the memory operations in a passive RFID system is limited. An effort is made to map the operation of the tag not in its states of operation as elaborately explained in the protocol but rather in its elementary format. The research reported in this article identifies all the parameters that affect the dynamic operation of the tag. The operation is further divided into singulation, read and write; identifying the significant parameters in each case. The choices of the different commands that can be adopted to perform identical operations on the tag are analyzed. The elements to consider in selecting the optimum command configuration are described. The impact of the different parameter and command configuration on the singulation, read and write time is calculated and recorded using a tested Gen 2 simulator program.
文摘This paper focuses on the key technologies of P2P technology and network traffic monitoring, which focuses on AC automaton and bypass interference control technology, and on based of it, we design a new P2P traffic monitoring system. The system uses DPI and DFI recognition technology, as well as straight loss and bypass interference control technology, basically meet the recognition and control of P2P traffic. Finally, the test results show that this system recognition accuracy of P2P traffic is high, good control effect, function and performance meet the design requirements.
文摘Through the study of individual identification technology, the paper put forward the identification scheme for two-dimensional code ear tag + RFID electronic tag, namely using Ministry of agriculture regulations two-dimensional code ear tag to identify individual animal in the breeding stage, and record the basic information and breeding, using the RFID electronic identification tag to record slaughter quarantine information; phase, and finally the ear tag code, RFID electronic tag and product number should be encode relatively to generate tracing code in the final agricultural products, realize the smooth flow of the information flow from the breeding stage to the final product. For fruits and vegetables, agricultural products are adopted the common identification for orchard (greenhouse) numbers units.
基金This work is supported by the National Natural Science
文摘Security access control systems and automatic video surveillance systems are becoming increasingly important recently,and detecting human faces is one of the indispensable processes.In this paper,an approach is presented to detect faces in video surveillance.Firstly,both the skin-color and motion components are applied to extract skin-like regions.The skin-color segmentation algorithm is based on the BPNN (back-error-propagation neural network) and the motion component is obtained with frame difference algorithm.Secondly,the image is clustered into separated face candidates by using the region growing technique.Finally,the face candidates are further verified by the rule-based algorithm.Experiment results demonstrate that both the accuracy and processing speed are very promising and the approach can be applied for the practical use.