期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Identify Plant Drought Stress by 3D-Based Image 被引量:3
1
作者 ZHAO Yan-dong SUN Yu-rui +2 位作者 CAI Xiang LIU He Peter Schulze Lammers 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2012年第7期1207-1211,共5页
Plants respond to drought stress with different physical manners, such as morphology and color of leaves. Thus, plants can be considered as a sort of living-sensors for monitoring dynamic of soil water content or the ... Plants respond to drought stress with different physical manners, such as morphology and color of leaves. Thus, plants can be considered as a sort of living-sensors for monitoring dynamic of soil water content or the stored water in plant body. Because of difficulty to identify the early wilting symptom of plants from the results in 2D (two-dimension) space, this paper presented a preliminary study with 3D (three-dimension)-based image, in which a laser scanner was used for achieving the morphological information of zucchini (Cucurbita pepo) leaves. Moreover, a leaf wilting index (DLWIF) was defined by fractal dimension. The experiment consisted of phase-1 for observing the temporal variation of DLWIF and phase-2 for the validation of this index. During the experiment, air temperature, luminous intensity, and volumetric soil water contents (VSWC) were simultaneously recorded over time. The results of both phases fitted the bisector (line: 1:1) with R2=0.903 and REMS=0.155. More significantly, the influence of VSWC with three levels (0.22, 0.30, and 0.36 cm3 cm-3) on the response of plant samples to drought stress was observed from separated traces of DLWIF. In brief, two conclusions have been made: (i) the laser scanner is an effective tool for the non-contact detection of morphological wilting of plants, and (ii) defined DLWIF can be a promising indicator for a category of plants like zucchini. 展开更多
关键词 WILTING 3d-based image laser scanner fractal dimension drought stress ZUCCHINI
下载PDF
ID-based authentication scheme combined with identity-based encryption with fingerprint hashing 被引量:1
2
作者 JIANG Wei-qiang HUANG Zheng-quan +2 位作者 YANG Yi-xian TIAN Jie LI Liang 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2008年第4期75-80,120,共7页
Current identity-based (ID) cryptosystem lacks the mechanisms of two-party authentication and user's private key distribution. Some ID-based signcryption schemes and ID-based authenticated key agreement protocols h... Current identity-based (ID) cryptosystem lacks the mechanisms of two-party authentication and user's private key distribution. Some ID-based signcryption schemes and ID-based authenticated key agreement protocols have been presented, but they cannot solve the problem completely. A novel ID-based authentication scheme based on ID-based encrypfion (IBE) and fingerprint hashing method is proposed to solve the difficulties in the IBE scheme, which includes message receiver authenticating the sender, the trusted authority (TA) authenticating the users and transmitting the private key to them. Furthermore, the scheme extends the application of fingerprint authentication from terminal to network and protects against fingerprint data fabrication. The fingerprint authentication method consists of two factors. This method combines a token key, for example, the USB key, with the user's fingerprint hash by mixing a pseudo-random number with the fingerprint feature. The security and experimental efficiency meet the requirements of practical applications. 展开更多
关键词 ID authentication d-based encryption bilinear pairing fingerprint authentication fingerprint hashing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部