首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 214 毫秒
1.
在EPC Gen2系统应用中,发现标签卡与读卡器间的距离对EPC Gen2系统读卡效率影响较大:距离增大使部分标签卡反馈给读卡器的信号变得很弱而无法识别;需要并发识别多张标签卡时,距离增大使反射信号相对较弱的部分标签卡发出的信号更难到达读卡器。对上述问题进行了量化实验,得到如下结果:当标签卡与读卡器间的距离为3 m时,没有出现漏读标签卡的情况,并且读取时间较短;当标签卡与读卡器间的距离为5 m时,出现个别标签卡在2 min内无法读取到的情况。实验结果表明,随着标签卡与读卡器间的距离增大,EPC Gen2系统读卡速率和读取率明显下降,EPC Gen2系统不适用于需要远距离并发识别多张标签卡且可靠性要求较高的场合。  相似文献   

2.
随着IC器件上的I/O尺寸减小和密度增加,与之通过接触来进行电性能测试的探卡密度也要相应增加,传统手工制作的环氧树脂针形探卡难以满足使用要求,使用MEMS技术制作探卡成为发展的趋势,但是当前MEMS探卡的主要问题是不能承受和产生破坏焊垫表面氧化层和污染层所需的应力.本文提出了一种简支梁结构、通过多次电镀工艺制作的三维弹性MEMS探卡,这种探卡可以承受更大应力,并且具有较小的自身电阻.针对间距为250 μm阵列排布的器件I/O,使用ANSYS有限元方法对弹簧型探卡进行了结构分析和设计,采用UV-LIGA工艺制备探卡,最后对探卡的力学性能进行了测试.  相似文献   

3.
李淑琴    陈子鹏    郑蓝舟    孟坤   《智能系统学报》2021,16(3):466-473
全国竞技二打一扑克锦标赛是国家体育总局棋牌运动管理中心推出的新兴项目,比赛采用复式赛赛制,然而这种赛制存在无法杜绝线上比赛作弊的问题,为此提出用同等牌力赛制来代替复式赛制进行比赛的设想。本文主要针对如何判定和选取具有同等牌力的初始手牌进行研究,提出用等级难度评估指标来计算初始手牌的难度,初始手牌难度相近的牌认定为同等牌力,并给出了同等牌力的选取方法;为保证一副牌所得等级难度评估指标的可靠性,提出用多个不同水平的“二打一AI程序”来代替真人打牌产生牌谱的方法。实验证明了同等牌力生成方法的有效性,本文提出的同等牌力方法应用于比赛是可行的。  相似文献   

4.
随着我国医疗信息化的不断深入,建立医疗信息共享平台将成为必须。南京市民卡作为具有统一名称、统一标识、统一标准等特点的智能卡,可以较好的作为区域医疗就诊卡的载体,但市民卡也存在着一些实际问题。因此对市民卡与诊疗卡进行了很好地整合,是迈出医疗区域共享中重要的一步。  相似文献   

5.
尽管许多人可能并没有意识到,各类卡已经被广泛应用到我们的日常生活当中。其中,信用卡,现金卡,驾驶执照,等等,其实与钱包同等重要。为了防止这些卡被非法使用,用户认证是必不可少的。最常用的用户认证方法就是要求用户提供某些个人信息。如果用户提供的信息与卡中记录的信息一致,我们就认为用户是合法的。然而如果个人信息被泄露,卡就有可能被非法使用。本论文的目的就是要提供一种新的基于图像变形的卡用户认证方法。其基本思路是把真正持卡人的脸部图像通过图像变形隐藏到某个覆盖数据下,并把恢复原图像所需要的钥匙信息分散保存到卡,终端,服务器等不同地方。在用户使用卡的时候,认证系统可以利用反变形技术恢复原图像,让受权人察知到用户的真伪,从而有效地保护持卡人的权益。  相似文献   

6.
无线信号在井下传输过程中由于信号强度衰减和干扰导致读卡器与标志卡之间测距失败,当测距失败后,标志卡只能等到下一超帧内的固定测距时隙再次与读卡器进行测距,由于标志卡与读卡器进行重新测距的间隔时间较长,不利于及时掌控井下人员实时动态分布情况。针对该问题,提出了一种井下精确人员定位系统定位重测机制。当标志卡测距失败时,该定位重测机制利用空闲时隙,重新对标志卡进行测距。在出现多张标志卡竞争空闲时隙进行重测的情况下,采用层次分析法,根据标志卡的累计重测次数、信号强度、运动速度,确定标志卡抢占空闲时隙的重测优先级,定位读卡器根据重测优先级为测距失败的标志卡优先进行重测。测试结果表明,当标志卡数量少于70张时,定位重测机制能提高精确人员定位系统的平均测距成功率、降低平均重测延时、提升平均时隙利用率,从而能实时监测到不间断的标志卡运动轨迹。  相似文献   

7.
Lin  Hanyang  Zhan  Yongzhao  Liu  Shiqin  Ke  Xiao  Chen  Yuzhong 《Applied Intelligence》2022,52(13):15259-15277

With the widespread use of mobile Internet, mobile payment has become a part of daily life, and bank card recognition in natural scenes has become a hot topic. Although printed character recognition has achieved remarkable success in recent years, bank card recognition is not limited to traditional printed character recognition. There are two types of bank cards: unembossed bank cards, such as most debit cards which usually use printed characters, and embossed bank cards, such as most credit cards which mainly use raised characters. Recognition of raised characters is very challenging due to its own characteristics, and there is a lack of fast and good methods to handle it. To better recognize raised characters, we propose an effective method based on deep learning to detect and recognize bank cards in complex natural scenes. The method can accurately recognize the card number characters on embossed and unembossed bank cards. First, to break the limitation that YOLOv3 algorithm is usually used for object detection, we propose a novel approach that enables YOLOv3 to be used not only for bank card detection and classification, but also for character recognition. The CANNYLINES algorithm is used for rectification and the Scharr operator is introduced to locate the card number region. The proposed method can satisfy bank card detection, classification and character recognition in complex natural scenes, such as complex backgrounds, distorted card surfaces, uneven illumination, and characters with the same or similar color to the background. To further improve the recognition accuracy, a printed character recognition model based on ResNet-32 is proposed for the unembossed bank cards. According to the color and morphological characteristics of embossed bank cards, raised character recognition model combining traditional morphological methods and LeNet-5 convolutional neural network is proposed for the embossed bank cards. The experimental results on the collected bank card dataset and bank card number dataset show that our proposed method can effectively detect and identify different types of bank cards. The accuracy of the detection and classification of bank cards reaches 100%. The accuracy of the raised characters recognition on the embossed bank card is 99.31%, and the accuracy of the printed characters recognition on the unembossed bank card reaches 100%.

  相似文献   

8.
A personalized system is one that generates unique output for each individual. As a result, personalization has transformed the interaction between the user and the system, and specific new usability issues have arisen. Methods used for evaluating personalized systems should be able to reveal the issues and problems specifically associated with personalization. Therefore this study evaluated three of the most common test methods used to detect usability problems in a personalized search engine. This was done by comparing the comments generated from thinking-aloud, questionnaires, and interviews. Questionnaires and interviews appear to be more useful for assessing specific usability issues for personalization, whereas thinking-aloud generates more comments on the usefulness of the system in the intended context of use and identifies the most critical and serious problems. Interviews, on the other hand, appear to yield a disproportionate number of positive comments. During the formative evaluation of a personalized system it is best to use a combination of thinking-aloud and questionnaires. This article concludes with a summary of implications for practitioners.  相似文献   

9.
IC卡在线检测的码号定位分割方法研究   总被引:3,自引:0,他引:3       下载免费PDF全文
针对IC卡的版面复杂性及版面质量,对IC卡在线检测中的码号定位分割问题进行了研究,提出了一种IC卡码号在线检测的定位分割方法。该方法采用预测样卡定位参数,结合初定位、宽区间定位、区间缩小精确定位对码号区定位,解决了不同版面、不同位置码号的IC卡定位问题。对定位方法进行了详细论述,采用求多投影直方图综合分割法对码号字符进行分割,有效地解决了IC卡在线检测中码号的定位分割问题。实验结果表明了方法的可行性与实用性。  相似文献   

10.
本文对智能卡作了简要介绍,给出了一台手持设备中的接触式智能卡的读写电路。该电路避免了智能卡的带电插拔操作,能有效地延长智能卡的使用寿命。本文同时探讨了智能卡的类型识别问题,提出了一种对ATMEL公司各型存储器卡的识别办法,最后对“一卡多用”问题进行了讨论。  相似文献   

11.
有线设备接入认证是保障有线以太网安全的重要组成部分,其中MAC地址认证和设备数字证书认证是目前的主流身份认证方式,然而前者存在MAC地址易被篡改和伪造,后者存在系统复杂、使用不便等问题。基于设备指纹的物理层安全技术是解决这一问题的有效途径,并已在无线网络中得到广泛应用,但有线网络目前研究颇少。设备指纹的提取是物理层安全技术的一个重要环节,有线网络已有研究主要从10M有线网卡信号中提取指纹。本文提出了一种基于最小均方误差自适应滤波算法(LMS算法)从100M有线网卡信号中提取指纹的方法,该方法提取的网卡指纹产生自网卡及所在设备本身的物理特性,不可克隆,无法被篡改,而且指纹可直接通过分析网卡输出信号而得,简单方便。本文设计了一套基于LMS算法的网卡指纹提取系统,通过大量实验估算了合适的诸如收敛因子、滤波器阶数、数据长度等算法参数,并对提取的指纹进行了有效性验证。经过实验验证,使用本文方法提取的网卡指纹可有效识别出不同品牌和相同品牌不同类型的以太网网卡,在使用线性判别和集成子空间判别分类算法时,针对50块网卡的识别率可分别达到97.3%、98.5以上。  相似文献   

12.
This paper proposes a method for understanding and modelling human values in the evaluation of new technology in social settings, and analyses the validity of the proposed method in a specific use case. The method, which is based on the Schwartz universal model of human values adopted from social psychology research, is used in the context of value analysis of the adoption of a technology-supported attendance control system in a primary school. The results are based on an evaluation of a 14-week trial where two classes of elementary school children used an attendance control system that was implemented using networked technology components, including smart cards, NFC-enabled mobile phones and card readers, a web portal, and SMS messaging. The findings from the trial are analysed from the viewpoint of three end-user groups, namely children, parents, and teachers.  相似文献   

13.
本文首先回顾了智能卡一卡多用的发展历史和现在的应用情况,针对智能卡一卡多用过程中出现的种种问题,介绍了一种全新的智能卡体系架构UCard的概念及其特点,并根据其特点重点讨论了UCard底层管理程序USP的COS装栽、COS调度、环境清理三大主要功能;最后,对下一步研究方向进行了展望,给出了若干值得研究的问题。  相似文献   

14.
基于我国银行业所面临的数据匮乏、信息披露制度不完善等问题,国际上先进的统计量化方法并不能完全适用于对我国操作风险的评价,从定性和定量相结合的角度出发,针对操作风险评价中的多属性群决策问题,提出一种在区间模糊语言信息下基于不确定的拓展有序加权平均算子(UEOWA)和不确定语言混合集结算子(ULHA)的多专家多属性商业银行操作风险评价方法,构建基于区间模糊语言的评价集来描述专家不精确、难量化的意见,梳理评价思路,设计评价步骤,通过实例验证了该方法的可操作性和有效性。  相似文献   

15.
Multi-application smart cards enable a user to potentially have a diverse set of applications on her smart card. The growing trend of services convergence fuelled by Near Field Communication and smart phones has made multi-application smart cards a tangible reality. In such an environment, cardholders might have a number of applications on their smart cards and if a card is lost, all of the applications would be lost with it. In addition, consumers might decide to upgrade their smart cards and require a seamless and secure framework to migrate their applications from the old smart card to the new one. Currently, the recovery of a smart card-based service might take from a day to a week at best as each of the lost cards can only be replaced by the respective card issuer, during which time the card issuer might lose business from the user because she is not able to access the provisioned services. Similarly, there is at present no migration mechanism proposed for smart card applications. The proposed framework in this paper enables a user to acquire a new smart card as she desires and then migrate/restore all of her applications onto it—allowing her to recover from her lost digital wallet in a secure, efficient, seamless and ubiquitous manner.  相似文献   

16.
本文应用CODE39条形码技术,解决了实际工作中输入学生的学号、准考证号以及身份证号等数字问题。将上述这些信息以CY3DE39条形码方式打印在学生证或准考证上,通过激光条形码阅读器准确快速读出这些信息进行处理,避免重复性输入,提高了工作效率,降低了误码率发生。由于学号、准考证号以及身份证号存在数字、英文字母,所以,我在实际工作中选用CODE39条形码。  相似文献   

17.
麻将是棋牌游戏中最复杂的棋牌游戏之一。从程序的角度,鞍山麻将是复杂度可以说是五星级的。那么程序是怎么实现的让电脑玩麻将的呢?鞍山麻将相比其他地区的麻将多了混牌,枪牌,三叉,二八将,四归一,大哥大。逻辑核心就是如何判断牌是否胡牌。  相似文献   

18.
针对当前手工录入个人基本信息效率低的问题,提出一种基于二代身份证的房屋产权交易代理系统。首先该系统采用USB接口连接二代身份证读卡器,然后在VB6开发平台中利用动态链接库技术,采取机读方法来读取二代身份证的个人基本信息,并快速有效的识别身份证真伪,最后实时存储在数据库中。实验结果表明,基于二代身份证的机读方法有效解决了个人基本信息录入的效率问题,能够满足系统对客户基本信息的录入验证要求,具有较好的市场应用前景。  相似文献   

19.
Payments through cards have become very popular in today’s world. All businesses now have options to receive payments through this instrument; moreover, most organizations store card information of its customers in some way to enable easy payments in future. Credit card data are a very sensitive information, and theft of this data is a serious threat to any company. Any organization that stores credit card data needs to achieve payment card industry (PCI) compliance, which is an intricate process where the organization needs to demonstrate that the data it stores are safe. Recently, there has been a paradigm shift in treatment of the problem of storage of payment card information. In this new paradigm instead of the real credit card data a token is stored, this process is called “tokenization.” The token “looks like” the credit/debit card number, but ideally has no relation with the credit card number that it represents. This solution relieves the merchant from the burden of PCI compliance in several ways. Though tokenization systems are heavily in use, to our knowledge, a formal cryptographic study of this problem has not yet been done. In this paper, we initiate a study in this direction. We formally define the syntax of a tokenization system and several notions of security for such systems. Finally, we provide some constructions of tokenizers and analyze their security in light of our definitions.  相似文献   

20.
Evaluation of smart card security faced seemingly intractable problems of consistency and repeatability in its early days. The deeply specialised technologies, large parameter spaces for attacks, and the evolving attack types and countermeasures mean that the scope for variation in evaluation practice, and hence in evaluation conclusions, is potentially huge. The situation is further complicated by the fact that countermeasures against some types of attacks depend on both hardware and software, but there is also a need to evaluate hardware without specific software present at the time of evaluation. Stakeholders in the smart card world have formed a Community that has successfully created and applied interpretation of Common Criteria (ISO 15408) to deal with this problem and to achieve international mutual recognition of evaluation results. This paper discusses examples of the smart card security problem in order to illustrate some of the difficulties, and describes some of the interpretation that has been defined for rating the difficulty of an attack via calculation of an attack potential. It also considers the nature of the Community that has enabled the interpretation to be both defined and put into practice successfully.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号