首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
彩色图像的对比度增强具有较强的工程应用价值,提出了一种简单高效的彩色图像增强算法。该算法基于模糊逻辑理论,配合使用RGB和HSI彩色模型,并依据使对比度变换误差最小的原则,调整灰度变换系数。实验结果表明,该方法的增强效果优于传统的直方图均衡,运行效率高,具有实用价值。  相似文献   

2.
针对无人机定位精度问题,硬件设计采用模块化设计思想,以STM32系列的微控制器为核心,以微机械传感器和GPS 模块为基础,组成无人机组合导航系统;软件提出了基于“模糊逻辑”的加速度区间自适应算法,修正惯导定位误差随时间快速积累、GPS发射信号受阻,造成的连续定位能力和精度较差的问题,保证了系统定位精度,为小型自主起降固定翼无人机、多旋翼无人机定位奠定基础。  相似文献   

3.
可编程光学并行模糊逻辑门   总被引:1,自引:0,他引:1  
张树群  陈彩生 《光学学报》1994,14(12):341-1344
提出了可级联的光学并行模糊逻辑门系统,十六种模糊逻辑运算可通过编程偏振半波片的状态而得到实现,语言中给出了实验结果。  相似文献   

4.
 在当今科学技术的成果中,模糊逻辑技术宛如科技百花园中一枝争奇斗艳的奇葩,在自动控制、智能信息系统中日益显示出新颖超凡的魅力。  相似文献   

5.
景红梅  刘立人 《光学学报》2001,21(11):347-1352
提出和验证一种基于偏振-空间编码方案和多重成像技术的光学方法来实现模糊逻辑图像处理,系统中,模糊变量和它们的补被编码为空间正交分布的两个偏振状态。通过对透镜阵列状态的编程,可以实现两个模糊图像间的模糊逻辑操作。本系统中,两个输入图像被偏振编码为8个编码图像作为输入图像,系统是空不变系统,不需要取阈装置和解码过程,通过引进取阈装置,可以在一层系统中实现两个图像间更为复杂的模糊逻辑操作,并给出了实验结果。  相似文献   

6.
吴建凯  屈卫东  王金荣 《应用声学》2014,22(6):1760-1762
描述和设计了一类生产陶瓷载体的大型微波干燥控制系统;针对微波干燥过程中微波功率控制不准确、产品缺陷率高的问题, 分析了过程变量与控制变量之间的关系特点,并在现有算法基础上,设计了一种基于前馈模糊逻辑的微波功率控制模型;最后对此控制模型设计算法,并应用于实际进行实验分析,得出了很好的效果。  相似文献   

7.
为准确且精细地识别云相态,提出一种基于模糊逻辑识别云相态的优化算法,基于不同云粒子特征参数对T函数系数进行了调整。考虑了回波反射率因子衰减和温度对云相态识别准确性的影响,利用毫米波云雷达订正后的回波反射率因子、径向速度、谱宽和微波辐射计探测的连续时空温度,作为优化后的模糊逻辑算法的输入参数。优化后的模糊逻辑算法在原有云粒子相态(冰晶、雪花、混合相态、液态云滴、毛毛雨和雨滴)识别的基础上,还可实现对过冷水和暖云滴的识别。利用该算法对2022年2月6日陕西省西安市一次降雪过程的云粒子相态进行识别,将近地面的云粒子相态结果与同址地面降水现象仪记录的降水粒子相态进行对比,二者探测的相态有较高的一致性,说明优化后的算法能准确且精细地识别云粒子相态。  相似文献   

8.
一种嵌入式软件逻辑覆盖测试方法研究   总被引:1,自引:0,他引:1  
针对嵌入式软件测试覆盖率低的问题,本文提出了基于软件故障注入的逻辑覆盖测试方法,首先就嵌入式系统常用传感器建立故障模式库,设计了嵌入式软件故障注入系统;其次选取中间层作为故障注入点,研究基于VxWorks653嵌入式操作系统的故障注入实现方式,并通过分析故障信号在软件系统中的传播,提出优化测试用例的方法;最后通过实验验证了该方法可有效提高容错设计功能、冗余设计功能、故障检测功能测试的逻辑覆盖率;有助于提高嵌入式软件的可靠性。  相似文献   

9.
提出了一种基于模糊成像机理的QR码图像快速盲复原方法。在对模糊成像弥散光斑质心不变性研究的基础上,设计圆形寻像图形,在成像模糊时能通过连通域等方法快速检测到图形质心以及QR码符号位置,再结合阶跃边缘特性、梯度强度特性、边缘检测技术以及光学成像机理快速准确估计出模糊QR码图像离焦半径大小,应用维纳滤波算法快速且有效复原QR码图像。与对比算法相比,本文算法在结构相似性和峰值信噪比上都有提升,特别是在复原速度上有显著提高,其平均复原时间为0.3292s。该方法能够以较高的精度估算出离焦半径大小,并能快速实现QR码图像的盲复原,具有快速性及稳健性优势,便于嵌入式硬件实现,能较好适用于条码标识相关的工业物联网应用场景。  相似文献   

10.
许多局域网采用Cisco路由器与因特网连接,如何充分利用Cisco路由器提供的防火墙功能,构筑一个实用的防火墙呢?一般来说,一个完整的防火墙系统不仅要防外侵,而且要防止内部人员对外的非法访问。局域网外面来的访问,网络边界是确定的,内部对外的访问,边界则是动态的,这就需要确定哪个访问是非法的,并且动态、自动地禁止非法对外访问。因此需要采取某种方法,既能保证对内对外的自由访问,又能保证网络上的资源足够安全。这就是本文所要解决的问题。  相似文献   

11.
    
Blockchain-based applications are gaining traction in various application fields, including supply chain management, health care, and finance. The Internet of Things (IoT) is a critical component of these applications since it allows for data collection from the environment. In this work, we integrate the Hyperledger Fabric blockchain and IoT devices to demonstrate the access control and establish the root of trust for IoT devices. The Hyperledger Fabric is designed to be secure against unwanted access and use through encryption protocols, access restrictions, and cryptography algorithms. An attribute-based access control (ABAC) mechanism was created using Hyperledger Fabric components only to gain access to the IoT device. Single board computers based on the ARM architecture are becoming increasingly powerful and popular in automation applications. In this study, the Raspberry Pi 4 Model B based on ARM64 architecture is used as the IoT device. Because the ARM64 architecture is not supported by default, we build executable binaries and Docker images for the ARM64 architecture, using the Hyperledger Fabric source code. On an IoT device, we run the fabric node in native mode to evaluate the executable binaries generated for the ARM64 architecture. Through effective chaincode execution and testing, we successfully assess the Hyperledger fabric blockchain implementation and access control mechanism on the ARM64 architecture.  相似文献   

12.
    
Data is an essential asset of an organization or individual in this information age. Secure and resource-efficient data communication has become paramount in the IoT-enabled cloud storage environment. The users must communicate with the cloud storage servers to access, store, and share the data utilizing the public communication channel, which is exposed to various security threats. Moreover, various security frameworks have been presented to render secure data access, storage, and sharing functionalities for the cloud storage environment. Most of them are complicated and incapacitated of resisting various security attacks. Thus, it is imperative to design a secure and resource-efficient data access, storage, and sharing framework for the cloud storage environment. This paper presents a chaotic map-based authenticated data access/sharing framework for the IoT-enabled cloud storage environment (CADF-CSE). CADF-CSE is designed using the chaotic map, authenticated encryption scheme (AEGIS), and one-way hash function (Esch256). The proposed CADF-CSE comprises three significant phases user access control, data storage, and data sharing. The user access control phase enables the user and cloud server to attain mutual authentication followed by the secret session key establishment. Using the established SK during the access control phase user and cloud server exchange information securely across the public Internet. The data storage phase facilitates the data owner to store the data on a cloud server in encrypted form, where encryption is performed with a secret key derived from the user’s biometric. The data-sharing phase enables users to access the data from the cloud server after acquiring mutual permission from the cloud server and the data owner. In addition, an explication of the CADF-CSE through formal and informal analysis shows its resilience to various security attacks. Finally, the performance comparison explicates that CADF-CSE renders better security features while requiring lower computational and communication costs than the related security frameworks.  相似文献   

13.
    
The Internet of Things (IoT) is a revolutionary technique of sharing data for smart devices that generates huge amounts of data from smart healthcare systems. Therefore, healthcare systems utilize the convergence power and traffic analysis of sensors that cannot be satisfactorily handled by the IoT. In this article, a novel mutation operator is devised and incorporated with the differential evolution (DE) algorithm. Two tests have been conducted in the validation process. Firstly, the newly dual adaption-based operators incorporated with the differential evolution algorithm are being proposed. The proposed approach provides sufficient diversity and enhances the search speed of nature’s local and global search environments in the problem. The proposed method incorporates the application of IoT-based smart healthcare. Second, an application-based test has been conducted, in which the proposed approach is applied to the application in the smart healthcare system. Therefore, IoT sensor deployment is an optimization problem to minimize service time, delay, and energy loss by considering the communication constraint between sensors(objects). The proposed algorithm is applied in this article to solve this optimization problem. Further, in the experimentation and comparative study, the proposed method is superior to the standard evolutionary algorithms in IoT applications concerning the minimum number of function evaluations and minimization of traffic services. The proposed approach also achieves efficiency in the minimum loss of energy in each service and reduces load and delay.  相似文献   

14.
杨秀清  陈海燕 《中国光学》2014,7(6):889-896
介绍了物联网的定义及结构;从感知层和网络层角度,探讨了光通信技术(光纤通信和无线通信)在物联网中的应用现状和前景.光纤通信、近距离无线通信、移动通信是物联网开发的基础,制定物联网各个层面上统一的、标准化协议和技术标准是物联网未来发展必须解决的关键和难点.  相似文献   

15.
长期以来我国陶瓷产业仍以手工为主,工业化、自动化、信息化程度较低。本文力图在陶瓷物流领域,结合物联网概念和技术,提出打造“陶瓷物流装备物联网”的理念,本文阐述了陶瓷物流装备物联网的整体构想、应用前景等,并且有针对性地阐述了打造该物联网所需要解决的关键技术,并提出陶瓷二维码花纸底款、智能I-Box物联网终端等解决方案,取得了一定的前期开发与应用成果,为今后进一步打造围绕陶瓷生产全过程的物联网建设做了有益的探索。  相似文献   

16.
    
In the era of the interconnection of all things, the security of the Internet of Things (IoT) has become a new challenge. The theoretical basis of unconditional security can be guaranteed by using quantum keys, which can form a QKD network-based security protection system of quantum Internet of Things (Q-IoT). However, due to the low generation rate of the quantum keys, the lack of a reasonable key allocation scheme can reduce the overall service quality. Therefore, this paper proposes a dynamic on-demand key allocation scheme, named DDKA-QKDN, to better meet the requirements of lightweight in the application scenario of Q-IoT and make efficient use of quantum key resources. Taking the two processes of the quantum key pool (QKP) key allocation and the QKP key supplement into account, the scheme dynamically allocates quantum keys and supplements the QKP on demand, which quantitatively weighs the quantum key quantity and security requirements of key requests in proportion. The simulation results show that the system efficiency and the ability of QKP to provide key request services are significantly improved by this scheme.  相似文献   

17.
黎山峰  杨雷  孙建军 《应用声学》2015,23(5):1785-1788
针对“智慧城市、智慧社区”建设的需求,设计并实现了通过智慧社区服务平台可实时发布环境参数的监测系统。该系统以ST公司的ARM芯片STM32F103C8T6为核心,分别通过GP2Y1010AU0F、UV10SF和DHT11模块完成对环境中的PM2.5值、紫外线强度和温湿度各参数的实时采集,辅之SIM900A模块实现GPRS数据传输,最后借助乐联网平台,用网页、微信等方式进行数据发布和管理,从而实现用户使用PC机或手机终端实时查看监测点环境参数的目的。经实验证明,该系统测量准确度温度为±0.4℃、 湿度为3.8%、PM2.5值为7.2%、紫外线强度为7.9%,数据采集准确、通信方式灵活,符合未来智慧社区建设的发展趋势,具有一定的创新性和推广价值。  相似文献   

18.
魏航信  吴伟  职黎光  贺冲 《应用声学》2014,22(6):1881-1883
针对游梁式抽油机平衡装置效果不理想的问题,设计了风光储联合供电的抽油机自动平衡装置;该装置由伺服电机驱动平衡块,根据油井工况实时调节其位置,实现抽油机的最佳平衡;针对平衡装置耗电量大的不足,设计了由风光储联合供电的模式,真正实现抽油机节能;最后,对该装置设计了模糊PD自适应控制器,由模糊控制器在线调节PD控制器参数;在实验室试验10 h,该装置可将抽油机平衡度从1.61减小到1.03以内,白天由太阳能电池供电,夜间由蓄电池供电,其电压从12 V降到9.3 V,表明供电系统完全能满足要求。  相似文献   

19.
刘峰 《应用声学》2015,23(3):65-65
针对我国高等级公路严重的管理滞后问题,分析公路网传感设备的特点、实际使用情况及故障诊断常用方法,研究了基于FTP传输协议及Windows服务程序的公路网传感设备数据采集传输方法,通过实验表明该方法解决了公路网多种传感设备的异构数据的采集传输的问题。采用Visual Studio 2008及SQL Server 2005作为开发工具,设计开发了基于B/S结构的公路网传感设备故障信息系统,实现对各类型公路网传感设备基本信息的管理、故障记录的管理及传感设备的数据采集传输, 通过实际测试证明该系统可以正确运行,实现了设计的功能。  相似文献   

20.
    
A risk assessment model for a smart home Internet of Things (IoT) network is implemented using a Bayesian network. The directed acyclic graph of the Bayesian network is constructed from an attack graph that details the paths through which different attacks can occur in the IoT network. The parameters of the Bayesian network are estimated with the maximum likelihood method applied to a data set obtained from the simulation of attacks, in five simulation scenarios. For the risk assessment, inferences in the Bayesian network and the impact of the attacks are considered, focusing on DoS attacks, MitM attacks and both at the same time to the devices that allow the automation of the smart home and that are generally the ones that individually have lower levels of security.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号