Entity

Time filter

Source Type


Lei N.,Henan Mecharnical and Electrical Engineering College | Chen X.,Henan Mecharnical and Electrical Engineering College
Journal of Convergence Information Technology | Year: 2012

The heart rate indicates the important indicator of the movement and physical body enginery, so this paper design and use the bi-polar ECG signal collection system. The traditional method to accurately get the heart rate from the bi-polar ECG information under the movement status is not very effective. Two mainstream time-domain-frequency-domain analysis method is used to analyze and compare the ECG signals. The results indicate that the discrete wavelet transfer can effectively recover the heart rate information from the ECG information with noises. After discrete wavelet transfer and reestablishment, the heart rate can be accurately computed. Source


Hui W.,Henan Mecharnical and Electrical Engineering College | Liu Z.,Henan Mecharnical and Electrical Engineering College
Journal of Convergence Information Technology | Year: 2012

Aiming at the problem that traditional median filtering algorithm is difficult to finish the task of removing the noise of images polluted by depth impulsive noise, this paper studies the problem of removing noise effectively and retaining image details as much as possible under the situation that images are polluted by depth noise. According to the characteristics of images polluted by depth noise and the impulse properties of noise, this paper puts forward a removal method of image depth impulsive noise combining adaptive median filter and detail retention system. This method has two main steps: fist, applies adaptive median filter to determine the candidate noise pixel as far as possible; second, restore the polluted image according to the specific regularized optimization method aiming at candidate noise pixel. Experiment result shows that compared with traditional adaptive median filter, this method has obvious superiority, which can finish the task of removing the noise of the image polluted by impulsive noise up to 90% and has certain practical significance. Source


Chen X.,Henan Mecharnical and Electrical Engineering College | Lei N.,Henan Mecharnical and Electrical Engineering College
Journal of Convergence Information Technology | Year: 2012

The images captured by the CCD image sensor are relatively obvious in the image of the focus plane. One feasible image fusion method is to combine all different focused horizontal images. We propose a multi-focus image fusion algorithm combination based on the wavelet and curvelet transform. Although separate wavelet or curvelet transform can get satisfactory fusion results, they can further improve the result because the wavelet is used for rough features of the image and the wavelet transform is used to improve the detail feature of the images, so our method combines two methods. First decompose each registered image and use the curvelet, then use the fusion factors of the image fusion method based on the wavelet transform and finally perform the reverse curvelet transform to reestablish the fusion image. The test results of several images indicate that the fusion algorithm based on combination of the curvelet and wavelet is better than the image reconstruction based on the wavelet or curvelet transform. Source


Liu Z.,Henan Mecharnical and Electrical Engineering College | Wei H.,Henan Mecharnical and Electrical Engineering College
Journal of Convergence Information Technology | Year: 2012

E-business is moving forward at a rapid pace across the globe, exposing businesses to e-business processes that rely on interdependencies among customers, merchants, and TTPs. New e-business foci, such as web services and pervasive computing, will extend the reach of e-business, but these may also increase complexity and exposure possibilities. This will necessitate proactive verification of related models. Model checking could become a fundamental tool in this process. Variation in execution of concurrent processes in nonstop, nondeterministic systems increases the potential for automation failures. Consequently, minimizing flaws in transaction protocols is crucial for the survival and sustainability of e-business. Stakeholders, such as system designers, users, and auditors need methods to preclude these subtle but potentially critical mistakes-before erroneous processing occurs or an attacker exploits them-to enhance control and assurance to e-commerce users. Model checking offers a promising method for addressing these issues. Source

Discover hidden collaborations