Microsystem Technologies - “Zero drift” behavior of an optical intraocular pressure sensor is studied using an analytical model based on the deflection of a circular membrane. Results... 相似文献
We consider the classic problem of pole placement by state feedback. We offer an eigenstructure assignment algorithm to obtain a novel parametric form for the pole-placing feedback matrix that can deliver any set of desired closed-loop eigenvalues, with any desired multiplicities. This parametric formula is then exploited to introduce an unconstrained nonlinear optimisation algorithm to obtain a feedback matrix that delivers the desired pole placement with optimal robustness and minimum gain. Lastly we compare the performance of our method against several others from the recent literature. 相似文献
Effects of hydrodynamic conditions, current density and solution temperature on the d.c. electrodeposition of Fe–Ni–Co alloys have been investigated with stationary planar and rotating cylindrical electrodes. The deposition rate of Fe showed mass transfer effects at cathodic potentials –1.35 V/sce. Deposition of Ni appeared to be kinetically controlled; deposition of Co appeared to be under kinetic control at potentials –1.35 V/sce but under mixed control at –1.65 V. Current efficiency of the codeposition process increased with increasing current density and decreased with increasing rotation rate. Higher solution temperatures and rotation rates extended the applied current density range where smooth, adherent, and metallic-looking deposits could be obtained. An increase in solution temperatures also decreased anomalous codeposition of Fe–Ni–Co. Calculations based on the Hessami-Tobias model provide qualitative agreement with dependence of experimental electrodeposition on applied current density, hydrodynamics and temperature. 相似文献
Tetraalkylammonium cellulosates were prepared by means of an exchange reaction between cellulose and tetraalkylammonium methoxides in anhydrous methanol and dimethylsulfoxide up to a degree of substitution of about 0,7 without chain degradation. The course of this reaction and the structure of the cellulosates in comparison to lithium and sodium cellulosate has been studied. The reaction rate and the equilibrium substitution decreased with increasing size of the cation in the methoxide. The distribution of the alcoholate groups in equilibrium at C-2, C-3 and C-6 of the glucopyranosyl unit in the cellulosates, which was investigated by methylation, hydrolysis of the methylcelluloses, and analysis of the methylglucoses by gas chromatography, was independent of the nature of the cation. Under the given reaction conditions the hydroxyl group at C-2 was more acidic than those at C-3 and C-6, while for the latter practically no difference was found. The tetraalkylammonium cellulosates are highly reactive intermediates for the preparation of cellulose derivatives. The reactivity of the cellulosates increased with increasing size of the cation, Li⊕ < Na⊕ < N(CH3)4⊕ <[(CH3)3N? CH2? C6H5]⊕. 相似文献
Confocal Raman microscopy (CRM) has been used to extract dye diffusion data from poly(ethylene terephthalate) (PET) fibres dyed with Disperse Yellow 23 under supercritical CO2 conditions. Spectral information as a function of depth was measured in a non-destructive manner using dry and oil objectives in confocal Raman mode. Mapping along the radius of the fibre cross-section was performed and compared to the data from the confocal measurements. A significant dye concentration gradient has been observed along the line normal to the fibre surface which the data from the oil confocal measurements accurately describes to a depth of 45 μm. The effect of the supercritical CO2 dyeing process on the fibre morphology has also been evaluated using CRM. 相似文献
Conclusions Among the three non-self-similar methods studied in this paper, namely, the perturbation methods in and y and the density-profile method, the latter method gives the best estimates of blast parameters in a wide range of shock-wave intensities. This work was performed with support from the Council on Natural Sciences and Technical Research.Ottawa, Canada. Translated from Fizika Goreniya i Vzryva, Vol. 27, No. 3, pp. 83–91, May–June, 1991. 相似文献
This paper first presents a novel approach for modelling facial features, Local Directional Texture (LDT), which exploits the unique directional information in image textures for the problem of face recognition. A variant of LDT with privacy-preserving temporal strips (TS) is then considered to achieve faceless recognition with a higher degree of privacy while maintaining high accuracy. The TS uses two strips of pixel blocks from the temporal planes, XT and YT, for face recognition. By removing the reliance on spatial context (i.e., XY plane) for this task, the proposed method withholds facial appearance information from public view, where only one-dimensional temporal information that varies across time are extracted for recognition. Thus, privacy is assured, yet without impeding the facial recognition task which is vital for many security applications such as street surveillance and perimeter access control. To validate the reliability of the proposed method, experiments were carried out using the Honda/UCSD, CK+, CAS(ME)2 and CASME II databases. The proposed method achieved a recognition rate of 98.26% in the standard video-based face recognition database, Honda/UCSD. It also offers a 81.92% reduction in the dimension length required for storing the extracted features, in contrast to the conventional LBP-TOP.
A Nom historical document recognition system is being developed for digital archiving that uses image binarization, character segmentation, and character recognition. It incorporates two versions of off-line character recognition: one for automatic recognition of scanned and segmented character patterns (7660 categories) and the other for user handwritten input (32,695 categories). This separation is used since including less frequently appearing categories in automatic recognition increases the misrecognition rate without reliable statistics on the Nom language. Moreover, a user must be able to check the results and identify the correct categories from an extended set of categories, and a user can input characters by hand. Both versions use the same recognition method, but they are trained using different sets of training patterns. Recursive X–Y cut and Voronoi diagrams are used for segmentation; k–d tree and generalized learning vector quantization are used for coarse classification; and the modified quadratic discriminant function is used for fine classification. The system provides an interface through which a user can check the results, change binarization methods, rectify segmentation, and input correct character categories by hand. Evaluation done using a limited number of Nom historical documents after providing ground truths for them showed that the two stages of recognition along with user checking and correction improved the recognition results significantly. 相似文献
Password-authenticated key exchange (PAKE) protocols allow parties to share secret keys in an authentic manner based on an easily memorizable password. Recently, Lu and Cao proposed a three-party password-authenticated key exchange protocol, so called S-3PAKE, based on ideas of the Abdalla and Pointcheval two-party SPAKE extended to three parties. S-3PAKE can be seen to have a structure alternative to that of another three-party PAKE protocol (3PAKE) by Abdalla and Pointcheval. Furthermore, a simple improvement to S-3PAKE was proposed very recently by Chung and Ku to resist the kind of attacks that applied to earlier versions of 3PAKE. In this paper, we show that S-3PAKE falls to unknown key-share attacks by any other client, and undetectable online dictionary attacks by any adversary. The latter attack equally applies to the recently improved S-3PAKE. Indeed, the provable security approach should be taken when designing PAKEs; and furthermore our results highlight that extra cautions still be exercised when defining models and constructing proofs in this direction. 相似文献