虹膜识别外文翻译文献
毕业论文(设计)外文文献翻译及原文

金融体制、融资约束与投资——来自OECD的实证分析R.SemenovDepartment of Economics,University of Nijmegen,Nijmegen(荷兰内梅亨大学,经济学院)这篇论文考查了OECD的11个国家中现金流量对企业投资的影响.我们发现不同国家之间投资对企业内部可获取资金的敏感性具有显著差异,并且银企之间具有明显的紧密关系的国家的敏感性比银企之间具有公平关系的国家的低.同时,我们发现融资约束与整体金融发展指标不存在关系.我们的结论与资本市场信息和激励问题对企业投资具有重要作用这种观点一致,并且紧密的银企关系会减少这些问题从而增加企业获取外部融资的渠道。
一、引言各个国家的企业在显著不同的金融体制下运行。
金融发展水平的差别(例如,相对GDP的信用额度和相对GDP的相应股票市场的资本化程度),在所有者和管理者关系、企业和债权人的模式中,企业控制的市场活动水平可以很好地被记录.在完美资本市场,对于具有正的净现值投资机会的企业将一直获得资金。
然而,经济理论表明市场摩擦,诸如信息不对称和激励问题会使获得外部资本更加昂贵,并且具有盈利投资机会的企业不一定能够获取所需资本.这表明融资要素,例如内部产生资金数量、新债务和权益的可得性,共同决定了企业的投资决策.现今已经有大量考查外部资金可得性对投资决策的影响的实证资料(可参考,例如Fazzari(1998)、 Hoshi(1991)、 Chapman(1996)、Samuel(1998)).大多数研究结果表明金融变量例如现金流量有助于解释企业的投资水平。
这项研究结果解释表明企业投资受限于外部资金的可得性。
很多模型强调运行正常的金融中介和金融市场有助于改善信息不对称和交易成本,减缓不对称问题,从而促使储蓄资金投着长期和高回报的项目,并且提高资源的有效配置(参看Levine(1997)的评论文章)。
因而我们预期用于更加发达的金融体制的国家的企业将更容易获得外部融资.几位学者已经指出建立企业和金融中介机构可进一步缓解金融市场摩擦。
物联网中英文对照外文翻译文献

中英文资料外文翻译Internet of Things1.the definition of connotationThe English name of the Internet of Things The Internet of Things, referred to as: the IOT.Internet of Things through the pass, radio frequency identification technology, global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light, heat, electricity, mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes, identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application, known as the third wave of the world's information industry development following the computer, the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications, Internet of Things is also seen as Internet application development. Therefore, the application of innovation is the core of the development of Internet of Things, and 2.0 of the user experience as the core innovation is the soul of Things.2.The meaning of "material"Where the "objects" to meet the following conditions can be included in the scope of the "Internet of Things":1. Receiver have the appropriate information;2. Have a data transmission path;3. Have a certain storage capabilities;4. T o have the CPU;5.T o have the operating system;6. Have specialized applications;7. Have a data transmitter;8. Follow the communication protocol of Things;9. World Network, a unique number that can be identified.3. "Chinese style" as defined inInternet of Things (Internet of Things) refers to is the ubiquitous (Ubiquitous) terminal equipment (Devices) and facilities (Facilities), including with the "inner intelligence" sensors, mobile terminals, industrial systems, floor control system, the family of Intelligentfacilities, video surveillance systems, and external can "(Enabled), such as RFID, a variety of assets (the Assets), personal and vehicle carrying the wireless terminal" intelligent objects or animals "or" smart dust "(the Mote), through a variety of wireless and / or cable over long distances and / or short-range communication networks to achieve interoperability (M2M), application integration (the Grand Integration), and based on cloud computing, SaaS operation mode, in internal network (intranet), private network (e xtranet), and / or the Internet (Internet) environment, the use of appropriate information security mechanisms to provide a safe, controlled and even personalized real-time online monitoring, retrospective positioning, alarm linkage, command and control plan management, remote control, security, remote repair and maintenance, online upgrades, statistical reporting, decision support, the leadership of the desktop (showcase of the Cockpit Dashboard) management and service functions, "Everything," "efficient, energy saving, security environmental protection, "" possession, control, Camp integration [1].4.EU definitionIn September 2009, the Internet of Things and enterprise environments held in Beijing, China-EU Seminar on the European Commission and Social Media Division RFID Division is responsible for Dr. Lorent Ferderix, given the EU's definition of things: the Internet of Things is a dynamic global network infrastructure, it has a standards-based and interoperable communication protocols, self-organizing capabilities, including physical and virtual "objects" of identity, physical attributes, virtual features and smart interface and seamless integration of information networks . Internet of Things Internet and media, the Internet and business Internet one, constitute the future of the Internet.5.changeThe Internet of Things (Internet of Things) the word universally recognized at home and abroad Ashton, Professor of the MIT Auto-ID Center in 1999 first proposed to study RFID. The report of the same name released in 2005, the International T elecommunication Union (ITU), the definition and scope of the Internet of Things has been a change in the coverage of a larger expansion, no longer refers only to the Internet of Things based on RFID technology.Since August 2009, Premier Wen Jiabao put forward the "Experience China" Internet of Things was officially listed as a national one of the five emerging strategic industries, to write the "Government Work Report" Internet of Things in China has been the great concern of the society as a whole degree of concern is unparalleled in the United States, European Union, as well as other countries.The concept of Internet of Things is not so much a foreign concept, as it has been the concept of a "Made in China", his coverage of the times, has gone beyond the scope of the 1999 Ashton professor and the 2005 ITU report referred to, Internet of Things has been labeled a "Chinese style" label.6.BackgroundThe concept of Internet of Things in 1999. Internet-based, RFID technology and EPC standards, on the basis of the computer Internet, the use of radio frequency identification technology, wireless data communication technology, a global items of information to real-time sharing of the physical Internet "Internet of things" (referred to as the Internet of Things) , which is also the basis of the first round of the China Internet of Things boom set off in 2003.The sensor network is built up based on sensing technology network. Chinese Academy of Sciences in 1999 on the start sensor network research and has made some achievements in scientific research, the establishment of applicable sensor network.1999, held in the United States, mobile computing and networking International Conference, "The sensor network is a development opportunity facing humanity in the next century. In 2003, the United States, "T echnology Review" proposed sensor network technology will be future changes ten people's lives first.November 17, 2005, the WSIS held in Tunis (WSIS), the International T elecommunication Union released ITU Internet Report 2005: Internet of Things ", citing the concept of the" Internet of things ". The report pointed out that the ubiquitous "Internet o f Things" communication era is approaching, all the objects in the world, from tires to toothbrushes, from housing to the tissue via the Internet, take the initiative to be exchanged. Radio Frequency Identification (RFID), sensor technology, nanotechnology, intelligent embedded technology will be more widely used.According to the description of the ITU, the era of things, a short-range mobile transceivers embedded in a variety of daily necessities, human beings in the world of information and communication will receive a new communication dimension, from any time communication between people of the place of connection extended to the communication connection between persons and things and things and things. The Internet of Things concept of the rise, largely due to the International T elecommunication Union (ITU), the title of Internet of Things 2005 annual Internet Report. However, the ITU report the lack of a clear definition of Things.Domestic Internet of Things is also there is no single standard definition, but the Internet of Things In essence, the Internet of Things is a polymer application of modern information technology to a certain stage of development and technological upgrading of various sensing technology modern network technology and artificial intelligence and automation technology aggregation and integration of applications, so that the human and material wisdom of dialogue to create a world of wisdom. Because the development of the Internet of Things technology, involving almost all aspects of IT, innovative application and development of a polymer, systematic, and therefore be called revolutionary innovation of information industry. Summed up the nature of the Internet of Things is mainly reflected in three aspects: First, the Internet features that need to be networked objects must be able to achieve the interoperability of the Internet; identification and communication features, that is included in the Internet of Things "objects" must to have the functions of automatic identification and physical objects communication (M2M); intelligent features, the network system should have automated, self-feedback and intelligent control features January 28, 2009, Obama became the President of the United States, held with U.S.business leaders a "round table", as one of the only two representatives, IBM CEO Sam Palmisano for the first time that "the wisdom of the Earth" this concept, it is recommended that the new government to invest in a new generation of intelligent infrastructure.February 24, 2009 news, IBM Greater China CEO money crowd called "Smarter Planet" strategy announced in the forum 2009IBM.This concept was put forth, that is the great concern of the United States from all walks of life, and even analysts believe that IBM's vision is very likely to rise to U.S. national strategy, and caused a sensation in the world. IBM believes that the industry, the next phase of the mission is to make full use of the new generation of IT technology in all walks of life among specifically, is the embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water supply systems dams, oil and gas pipelines and other objects, and is generally connected to the formation of Things.Strategy conference, IBM, and implant the concept of "wisdom" in the implementation of the infrastructure, strong, not only in the short term to stimulate the economy, promote employment, and in a short period of time for China to build a mature wisdom infrastructure platform.IBM "Smarter Planet" strategy will set off again after the wave of Internet technology industrial revolution. Former IBM CEO Lou Gerstner has raised an important point of view, every 15 years, a revolution in computing model. This judgment is the same as Moore's Law accurately call it a "15-year cycle Law". Before and after 1965, changes to the mainframe as a symbol, 1980 marked by the popularization of personal computers, 1995, the Internet revolution. Each such technological change are caused by the enterprise, industry and even the national competitive landscape of major upheaval and change. T o a certain extent in the Internet revolution is ripening by the "information superhighway" strategy. 1990s, the Clinton administration plan for 20 years, $ 200 billion to -4000 billion, construction of the U.S. National Information Infrastructure, to create a huge economic and social benefits.T oday, the "Smarter Planet" strategy by many Americans that there are many similarities with the "information superhighway", the same they revive the economy, a key strategy for competitive advantage. The strategy can be set off, not only for the UnitedStates, such as the Internet revolution was the wave of technological and economic concern, more attention from the world."Internet of Things prospects are very bright, it will dramatically change our current way of life." Demonstration director of the Center of Nanjing University of Aeronautics and Astronautics, National Electrical and Electronic Zhao Guoan said. Industry experts said that the Internet of things to our life personification of the things became a kind of human.Goods (goods) in the world of physical objects associated with each other "exchange", without the need for human intervention. The Internet of Things using radio frequency identification (RFID) technology, to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet. It can be said that the Internet of Things depict the world is full of intelligent. In the world of Internet of Things, material objects connected to the dragnet.The second session, held at Peking University in November 2008, China Mobile Government Seminar "Knowledge Society and Innovation 2.0", the experts made the mobile technology, the Internet of Things technology led to the development of economic and social form, innovative forms of change, and promote the The next generation of innovation for the knowledge society as the core of user experience (innovative 2.0) the formation of innovation and development of the form to pay more attention to the user to focus on people-oriented. Research institutions is expected to 10 years, the Internet of Things may be mass adoption of this technology will develop into one of thousands of yuan-scale high-tech market, the industry than the Internet 30 times.It is learned that the things industry chain can be broken down into the identity, perception, processing and information transfer, four links, each link of the key technologies for the wireless transmission network of RFID, sensors, smart chip and telecom operators. EPOSS in the "Internet of Things in 2020" report, an analysis predicted that the future development of the Internet of Things will go through four stages, 2010, RFID is widely used in the field of logistics, retail and pharmaceutical objects interconnect 2010 to 2015, 2015 ~ In 2020, the object into the semi-intelligent, intelligent objects into 2020.As the vanguard of the Internet of Things, RFID has become the most concerned about the technology market. The data show that the global RFID market size in 2008 from$ 4.93 billion in 2007 rose to $ 5.29 billion, this figure covers all aspects of the RFID market, including tags, readers and other infrastructure, software and services. RFID card and card-related infrastructure will account for 57.3 percent of the market, reaching $ 3.03 billion. Application from financial and security industries will drive the market growth of RFID cards. Analysys International forecasts, the Chinese RFID market size in 2009 will reach 5.0 billion, a CAGR of 33%, in which the electronic tag is more than 3.8 billion yuan, the reader close to 700 million yuan, software and services market to reach 500 million yuan pattern.MEMS is the abbreviation of the micro-electromechanical systems, MEMS technology is built on the basis of micro / nano, the market prospect is broad. The main advantage of the MEMS sensor is the small size, large-scale mass production cost reduction, mainly used in two major areas of automoti ve and consumer electronics. Under ICInsight the latest report is expected in 2007-2012, global sales of semiconductor sensors and actuators based on MEMS will reach 19 percent compound annual growth rate (CAGR), compared with $ 4.1 billion in 2007 to five years will achieve $ 9.7 billion in annual sales. 7.PrincipleInternet of Things is on the basis of the computer Internet, RFID, wireless data communications technology, to construct a cover everything in the world's "Internet of Things". In this network, the goods (products) to each other "exchange", without the need for human intervention. Its essence is the use of radio frequency identification (RFID) technology to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet.The Internet of Things is a very important technology is radio frequency identification (RFID) technology. RFID is radio frequency identification (Radio Frequency Identification) technology abbreviation, is an automatic identification technology in the 1990s began to rise, the more advanced a non-contact identification technology. The development of RFID technology based on a simple RFID system, combined with existing network technology, database technology, middleware technology, to build a one composed by a large number of networked readers and numerous mobile label, much larger than the Internet of Things trend.RFID, It is able to let items "speak" a technique. In the "Internet of Things" concept, RFID tags are stored in the specification and interoperability information collected automatically by wireless data communications network to a central information system, to achieve the identification of goods (products), and then through the open computer network for information exchange and sharing, items "transparent" management.The information technology revolution in the Internet of Things is referred to as IT mobile Pan of a specific application. Internet of Things through IntelliSense, identification technology and pervasive computing, ubiquitous network convergence applications, breaking the conventional thinking before, human beings can achieve ubiquitous computing and network connectivity [3]. The traditional thinking has been the separation of physical infrastructure and IT infrastructure: on the one hand, airports, roads, buildings, while on the other hand, the data center, PC, broadband. In the era of the "Internet of Things", reinforced concrete, cable with the chip, broadband integration into a unified infrastructure, in this sense, the infrastructure is more like a new site of the Earth, the world really works it, which including economic management, production operation, social and even personal life. "Internet of Things" makes it much more refined and dynamic management of production and life, to manage the future of the city to achieve the status of "wisdom" to improve resource utilization and productivity levels, and improve the relationship between man and nature.8.Agency1, institution-buildingAs the first national Internet of Things industry community organizations - the application of professional Committee of China Electronic Chamber of Things technology products (referred to as: "objects of the IPCC"), the Ministry of Civil Affairs in June 2010, preliminary approved by the Ministry of August being reported that the Ministry of Civil Affairs for final approval.2, the main taskServe as a bridge between business and government to assist the Government of the industry guidance, coordination, consultation and services to help members to reflect the business requirements to the Government; coordinate the relationship between enterprisesto strengthen technical cooperation, product distribution, the elimination of vicious competition ; supervision of members the correct implementation of national laws and regulations, to regulate the industry; member of information communication technology products, cooperation, resource sharing, capital operation, and promote the app lication of Internet of Things technologies and products, and promote the Internet of Things industrial scale , co-development.9.ConstructionInternet of Things in the practical application to carry out requires the involvement of all walks of life, and need the guidance of the national government as well as related regulations and policies to assist the launching of the Internet of Things has the scale, broad participation, management, technical, and material properties, etc. other features, the technical problem is the most crucial issues of Things billion Bo logistics consulting, Internet of Things technology is an integrated technology, a system not yet which company has overall responsibility for network planning and construction of the entire system, theoretical studies have commenced in all walks of life and the practical application is limited to within the industry. The key is on the planning and design and research and development of the Internet of Things research in the field of RFID, sensors, embedded software, and transmission of data calculation. In general, to carry out the steps of the Internet of things mainly as follows:(1) identified the object attributes, properties, including static and dynamic properties of the static property can be stored directly in the label, the dynamic properties need to start with sensors to detect real-time;(2) the need to identify the equipment to complete the reading of object attributes, and information into a data format suitable for network transmission;(3) the object of information transmitted over the network to the information processing center (processing center may be distributed, such as home computers or mobile phones, may also be centralized, such as China Mobile IDC) by the processing center to complete the object communication calculation.10.key areasInternet of Things 4 key areas:(1) RFID;(2) sensor network;(3) The M2M;(4) integration of the two.11.TrendIndustry experts believe that the Internet of things on the one hand can improve economic efficiency and significant cost savings; the other hand, can provide technical impetus to global economic recovery. Currently, the United States, the European Union are all invested heavily in-depth study to explore the Internet of Things. The country is also highly concerned about the emphasis of Things, Industry and Information T echnology Ministry in conjunction with the relevant departments are conducting research in a new generation of IT to the formation of policies and measures to support the development of a new generation of IT.China Mobile CEO Wang Jianzhou has repeatedly mentioned the Internet of Things will become the focus of future development of China Mobile. He will be invited to T aiwan to produce RFID, sensors and bar code manufacturers and China Mobile. According to him, the use of the Internet of Things technology, Shanghai Mobile has a number of industrial customers tailor the data collection, transmission, processing and business management in one set of wireless application solutions. The latest data show that Shanghai Mobile has more than 100,000 chips mounted on a taxi, bus, various forms of matter networking applications in all walks of prowess, to ensure the orderly operation of the city. During the Shanghai World Expo, "the bus services through" will be fully applied to the Shanghai public transport system, the smooth flow traffic to the most advanced technology to protect Expo area; for logistics transportation management, e-logistics ", will provide users with real-time accurate information of Cargo, vehicle tracking and positioning, the transport path selection, logistics network design and optimization services greatly enhance the comprehensive competitiveness of logistics enterprises.In addition, the popularization of the "Internet of Things" for the number of animals, plants and machinery, sensors and RFID tags of items and related interface devices will greatly exceed the number of mobile phones. The promotion of the Internet of Things willbecome a drive to promote economic development for the industry to open up a potential development opportunities. According to the current demand on the Internet of Things, in recent years, billions of sensors and electronic tags, which will greatly promote the production of IT components, while increasing the number of job opportunities.According to reports, it is necessary to truly build an effective Internet of things, there are two important factors. First, the scale, only with the scale to make the items of intelligence play a role. For example, a city of one million vehicles, if we only 10000 vehicles installed on the smart system, it is impossible to form an intelligent transportation system; two mobility items are usually not static, but in the state of the movement , we must maintain the items in the state of motion, and even high-speed motion state can at any time for dialogue.FORRESTER of the authority of the U.S. advisory body predicted that 2020, the world of business of the Internet of Things, compared with the business of interpersonal communication, will reach 30 to 1, so the "Internet of Things" is known to be the next one trillion communications services.Internet of Things heat wave Why is rapidly growing in China? Internet of Things in China rapid rise thanks to the several advantages of our country in terms of things.In the early 1999 launched the Internet of Things core sensor network technology research, R & D level in the world; the second, sensor network field in the world, China is the standard one of the dominant country, the patent owner; third China is one of the countries to achieve a complete industrial chain of Things; Fourth, China's wireless communications network and broadband coverage provides a solid infrastructure to support the development of the Internet of Things; Fifth, China has become the world's first the three major economies, with strong economic strength to support the development of the Internet of Things.12.MythThe current understanding of the Internet of things there are a lot of misunderstanding, which is also a direct impact on our understanding of Things on the development of the logistics industry, it is necessary first to distinguish errors, clarify our thinking.One sensor networks or RFID network equivalent of Things. The fact that sensortechnology, or RFID technology, or are simply one of the information collection technology. In addition to the sensor technology and RFID technology, GPS, video recognition, infrared, laser, scanning can be achieved automatically identify physical objects to communicate technical information collection technology can become the Internet of Things. Sensor networks or RFID network is just an application of Things, but not all of Things.Second, the Internet of Things as a myriad of unlimited extension of the Internet of Things as a completely open for all things, all of the interconnections, all shared Internet platform.In fact, the Internet of Things is not simple infinite extension of the global sharing of the Internet. Even if the Internet is also not only refers to we typically think of the international sharing computer network, Internet, WAN and LAN. Internet of Things can be both an extension of our usual sense of the Internet to the matter; LAN, professional can also be based on real needs and industrial applications. The reality is not necessary and can not make all the items networking; no need to make professional, LAN must be connected to the global Internet sharing platform. Of things in the future the Internet will be very different from the professional network of similar smart logistics, smart transportation, smart grid; the intelligence community and other local area network is the largest use of space.T er, that the ubiquitous network of the Internet of Things Internet of Things, and therefore the Internet of Things is a castle in the air, is difficult to achieve the technology. In fact the Internet of things are real, many of the primary Internet of Things applications already for our services. The Internet of Things concept is introduced in many real-world applications based on polymeric integrated innovation, pre-existing network with the Internet of Things, intelligent, automated system, summarized and upgrading it upgraded from a higher perspective our knowledge.Four of Things as a basket, and everything installed inside; based on self-awareness, and only be able to interact, communication products as the Internet of Things applications. For example, just embedded some of the sensors, to become the so-called Internet of Things appliances; products labeled with RFID tags, became the Internet of Things applications.es。
车牌识别外文文献翻译中英文

外文文献翻译(含:英文原文及中文译文)文献出处:Gao Q, Wang X, Xie G. License Plate Recognition Based On Prior Knowledge[C]// IEEE International Conference on Automation and Logistics. IEEE, 2007:2964-2968.英文原文License Plate Recognition Based On Prior KnowledgeQian Gao, Xinnian Wang and Gongfu XieAbstract - In this paper, a new algorithm based on improved BP (back propagation) neural network for Chinese vehicle license plate recognition (LPR) is described. The proposed approach provides a solution for the vehicle license plates (VLP) which were degraded severely. What it remarkably differs from the traditional methods is the application of prior knowledge of license plate to the procedure of location, segmentation and recognition. Color collocation is used to locate the license plate in the image. Dimensions of each character are constant, which is used to segment the character of VLPs. The Layout of the Chinese VLP is an important feature, which is used to construct a classifier for recognizing. The experimental results show that the improved algorithm is effective under the condition that the license plates were degraded severely.Index Terms - License plate recognition, prior knowledge, vehiclelicense plates, neural network.I. INTRODUCTIONV ehicle License-Plate (VLP) recognition is a very interesting but difficult problem. It is important in a number of applications such as weight-and-speed-limit, red traffic infringement, road surveys and park security [1]. VLP recognition system consists of the plate location, the characters segmentation, and the characters recognition. These tasks become more sophisticated when dealing with plate images taken in various inclined angles or under various lighting, weather condition and cleanliness of the plate. Because this problem is usually used in real-time systems, it requires not only accuracy but also fast processing. Most existing VLP recognition methods [2], [3], [4], [5] reduce the complexity and increase the recognition rate by using some specific features of local VLPs and establishing some constrains on the position, distance from the camera to vehicles, and the inclined angles. In addition, neural network was used to increase the recognition rate [6], [7] but the traditional recognition methods seldom consider the prior knowledge of the local VLPs. In this paper, we proposed a new improved learning method of BP algorithm based on specific features of Chinese VLPs. The proposed algorithm overcomes the low speed convergence of BP neural network [8] and remarkable increases the recognition rate especially under the condition that the license plate images were degrade severely.II. SPECIFIC FEA TURES OF CHINESE VLPSA. DimensionsAccording to the guideline for vehicle inspection [9], all license plates must be rectangular and have the dimensions and have all 7 characters written in a single line. Under practical environments, the distance from the camera to vehicles and the inclined angles are constant, so all characters of the license plate have a fixed width, and the distance between the medium axes of two adjoining characters is fixed and the ratio between width and height is nearly constant. Those features can be used to locate the plate and segment the individual character. B. Color collocation of the plateThere are four kinds of color collocation for the Chinese vehicle license plate .These color collocations are shown in table I.TABLE IMoreover, military vehicle and police wagon plates contain a red character which belongs to a specific character set. This feature can be used to improve the recognition rate.C. Layout of the Chinese VLPSThe criterion of the vehicle license plate defines the characters layout of Chinese license plate. All standard license plates contain Chinese characters, numbers and letters which are shown in Fig.1. The first one is a Chinese character which is an abbreviation of Chineseprovinces. The second one is a letter ranging from A to Z except the letter I. The third and fourth ones are letters or numbers. The fifth to seventh ones are numbers ranging from 0 to 9 only. However the first or the seventh ones may be red characters in special plates (as shown in Fig.1). After segmentation process the individual character is extracted. Taking advantage of the layout and color collocation prior knowledge, the individual character will enter one of the classes: abbreviations of Chinese provinces set, letters set, letters or numbers set, number set, special characters set.(a)Typical layout(b) Special characterFig.1 The layout of the Chinese license plateIII. THE PROPOSED ALGORITHMThis algorithm consists of four modules: VLP location, character segmentation, character classification and character recognition. The main steps of the flowchart of LPR system are shown in Fig. 2.Firstly the license plate is located in an input image and characters are segmented. Then every individual character image enters the classifier to decide which class it belongs to, and finally the BP network decides which character the character image represents.A. Preprocessing the license plate1) VLP LocationThis process sufficiently utilizes the color feature such as color collocation, color centers and distribution in the plate region, which are described in section II. These color features can be used to eliminate the disturbance o f the fake plate ’ s regions. The flowchart of the plate location is shown in Fig. 3.Fig.3 The flowchart of the plate location algorithmThe regions which structure and texture similar to the vehicle plate are extracted. The process is described as followed:Here, the Gaussian variance is set to be less than W/3 (W is the character stroke width), so 1P gets its maximum value M at the center of the stroke. After convolution, binarization is performed according to a threshold which equals T * M (T<0.5). Median filter is used to preserve the edge gradient and eliminate isolated noise of the binary image. An N * N rectangle median filter is set, and N represents the odd integer mostly close to W.Morphology closing operation can be used to extract the candidate region. The confidence degree of candidate region for being a license plate is verified according to the aspect ratio and areas. Here, the aspect ratio is set between 1.5 and 4 for the reason of inclination. The prior knowledge of color collocation is used to locate plate region exactly. The locating process of the license plate is shown in Fig. 4.2) Character segmentationThis part presents an algorithm for character segmentation based on prior knowledge, using character width, fixed number of characters, the ratio of height to width of a character, and so on. The flowchart of the character segmentation is shown in Fig. 5.Firstly, preprocess the license the plate image, such as uneven illumination correction, contrast enhancement, incline correction and edge enhancement operations; secondly, eliminating space mark which appears between the second character and the third character; thirdly, merging the segmented fragments of the characters. In China, all standard license plates contain only 7 characters (see Fig. 1). If the number of segmented characters is larger than seven, the merging process must be performed. Table II shows the merging process. Finally, extracting the individual character’ image based on the number and the width of the character. Fig. 6 shows the segmentation results. (a) The incline and broken plate image, (b) the incline and distort plate image, (c)the serious fade plate image, (d) the smut license plate image.where Nf is the number of character segments, MaxF is the number of the license plate, and i is the index of each character segment.The medium point of each segmented character is determined by:(3)where 1i Sis the initial coordinates for the character segment, and 2i S is thefinal coordinate for the character segment. The d istance between two consecutive medium points is calculated by:(4)Fig.6 The segmentation resultsB. Using specific prior knowledge for recognitionThe layout of the Chinese VLP is an important feature (as described in the section II), which can be used to construct a classifier for recognizing. The recognizing procedure adopted conjugate gradient descent fast learning method, which is an improved learning method of BP neural network[10]. Conjugate gradient descent, which employs a series of line searches in weight or parameter space. One picks the first descent direction and moves along that direction until the minimum in error is reached. The second descent direction is then computed: this direction the “ conjugate direction” is the one along which the gr adient does not change its direction will not “ spoil ” the contribution from the previous descent iterations. This algorithm adopted topology 625-35-N as shown in Fig. 7. The size of input value is 625 (25*25 ) and initial weights are with random values, desired output values have the same feature with the input values.As Fig. 7 shows, there is a three-layer network which contains working signal feed forward operation and reverse propagation of error processes. The target parameter is t and the length of network outputvectors is n. Sigmoid is the nonlinear transfer function, weights are initialized with random values, and changed in a direction that will reduce the errors.The algorithm was trained with 1000 images of different background and illumination most of which were degrade severely. After preprocessing process, the individual characters are stored. All characters used for training and testing have the same size (25*25 ).The integrated process for license plate recognition consists of the following steps:1) Feature extractingThe feature vectors from separated character images have direct effects on the recognition rate. Many methods can be used to extract feature of the image samples, e.g. statistics of data at vertical direction, edge and shape, framework and all pixels values. Based on extensive experiments, all pixels values method is used to construct feature vectors. Each character was reshaped into a column of 625 rows’ feature vector. These feature vectors are divided into two categories which can be used for training process and testing process.2) Training modelThe layout of the Chinese VLP is an important feature, which can be used to construct a classifier for training, so five categories are divided. The training process of numbers is shown in Fig. 8.As Fig. 8 shows, firstly the classifier decides the class of the inputfeature vector, and then the feature vector enters the neural network correspondingly. After the training process the optimum parameters of the net are stored for recognition. The training and testing process is summarized in Fig. 9.(a) Training process(b)Testing processFig.9 The recognition process3) Recognizing modelAfter training process there are five nets which were completely trained and the optimum parameters were stored. The untrained feature vectors are used to test the net, the performance of the recognition system is shown in Table III. The license plate recognition system is characterized by the recognition rate which is defined by equation (5).Recognition rate =(number of correctly read characters)/ (number of found characters) (5)IV. COMPARISON OF THE RECOGNITION RA TE WITH OTHER METHODSIn order to evaluate the proposed algorithm, two groups of experiments were conducted. One group is to compare the proposed method with the BP based recognition method [11]. The result is shown in table IV. The other group is to compare the proposed method with themethod based on SVM [12].The result is shown in table V. The same training and test data set are used. The comparison results show that the proposed method performs better than the BP neural network and SVM counterpart.V. CONCLUSIONIn this paper, we adopt a new improved learning method of BP algorithm based on specific features of Chinese VLPs. Color collocation and dimension are used in the preprocessing procedure, which makes location and segmentation more accurate. The Layout of the Chinese VLP is an important feature, which is used to construct a classifier for recognizing and makes the system performs well on scratch and inclined plate images. Experimental results show that the proposed method reduces the error rate and consumes less time. However, it still has a few errors when dealing with specially bad quality plates and characters similar to others. This often takes place among these characters (especially letter and number): 3—8 4—A 8—B D—0.In order to improve the incorrect recognizing problem we try to add template-based model [13] at the end of the neural network.中文译文基于先验知识的车牌识别Qian Gao, Xinnian Wang and Gongfu Xie摘要- 本文介绍了一种基于改进的BP(反向传播)神经网络的中国车牌识别(LPR)算法。
智能交通系统中英文对照外文翻译文献

智能交通系统中英文对照外文翻译文献(文档含英文原文和中文翻译)原文:Traffic Assignment Forecast Model Research in ITS IntroductionThe intelligent transportation system (ITS) develops rapidly along with the city sustainable development, the digital city construction and the development of transportation. One of the main functions of the ITS is to improve transportation environment and alleviate the transportation jam, the most effective method to gain the aim is to forecast the traffic volume of the local network and the important nodes exactly with GIS function of path analysis and correlation mathematic methods, and this will lead a better planning of the traffic network. Traffic assignment forecast is an important phase of traffic volume forecast. It will assign the forecasted traffic to every way in the traffic sector. If the traffic volume of certain road is too big, which would bring on traffic jam, planners must consider the adoption of new roads or improving existing roads to alleviate the traffic congestion situation. This study attempts to present an improved traffic assignment forecast model, MPCC, based on analyzing the advantages and disadvantages of classic traffic assignment forecast models, and test the validity of the improved model in practice.1 Analysis of classic models1.1 Shortcut traffic assignmentShortcut traffic assignment is a static traffic assignment method. In this method, the traffic load impact in the vehicles’ travel is not considered, and the traffic impedance (travel time) is a constant. The traffic volume of every origination-destination couple will be assigned to the shortcut between the origination and destination, while the traffic volume of other roads in this sector is null. This assignment method has the advantage of simple calculation; however, uneven distribution of the traffic volume is its obvious shortcoming. Using this assignment method, the assignment traffic volume will be concentrated on the shortcut, which isobviously not realistic. However, shortcut traffic assignment is the basis of all theother traffic assignment methods.1.2 Multi-ways probability assignmentIn reality, travelers always want to choose the shortcut to the destination, whichis called the shortcut factor; however, as the complexity of the traffic network, thepath chosen may not necessarily be the shortcut, which is called the random factor.Although every traveler hopes to follow the shortcut, there are some whose choice isnot the shortcut in fact. The shorter the path is, the greater the probability of beingchosen is; the longer the path is, the smaller the probability of being chosen is.Therefore, the multi-ways probability assignment model is guided by the LOGIT model:∑---=n j ii i F F p 1)exp()exp(θθ (1)Where i p is the probability of the path section i; i F is the travel time of thepath section i; θ is the transport decision parameter, which is calculated by the followprinciple: firstly, calculate the i p with different θ (from 0 to 1), then find the θwhich makes i p the most proximate to the actual i p .The shortcut factor and the random factor is considered in multi-ways probabilityassignment, therefore, the assignment result is more reasonable, but the relationshipbetween traffic impedance and traffic load and road capacity is not considered in thismethod, which leads to the assignment result is imprecise in more crowded trafficnetwork. We attempt to improve the accuracy through integrating the several elements above in one model-MPCC.2 Multi-ways probability and capacity constraint model2.1 Rational path aggregateIn order to make the improved model more reasonable in the application, theconcept of rational path aggregate has been proposed. The rational path aggregate,which is the foundation of MPCC model, constrains the calculation scope. Rationalpath aggregate refers to the aggregate of paths between starts and ends of the trafficsector, defined by inner nodes ascertained by the following rules: the distancebetween the next inner node and the start can not be shorter than the distance betweenthe current one and the start; at the same time, the distance between the next innernode and the end can not be longer than the distance between the current one and theend. The multi-ways probability assignment model will be only used in the rationalpath aggregate to assign the forecast traffic volume, and this will greatly enhance theapplicability of this model.2.2 Model assumption1) Traffic impedance is not a constant. It is decided by the vehicle characteristicand the current traffic situation.2) The traffic impedance which travelers estimate is random and imprecise.3) Every traveler chooses the path from respective rational path aggregate.Based on the assumptions above, we can use the MPCC model to assign thetraffic volume in the sector of origination-destination couples.2.3 Calculation of path traffic impedanceActually, travelers have different understanding to path traffic impedance, butgenerally, the travel cost, which is mainly made up of forecast travel time, travellength and forecast travel outlay, is considered the traffic impedance. Eq. (2) displaysthis relationship. a a a a F L T C γβα++= (2)Where a C is the traffic impedance of the path section a; a T is the forecast traveltime of the path section a; a L is the travel length of the path section a; a F is theforecast travel outlay of the path section a; α, β, γ are the weight value of that threeelements which impact the traffic impedance. For a certain path section, there aredifferent α, β and γ value for different vehicles. We can get the weighted average of α,β and γ of each path section from the statistic percent of each type of vehicle in thepath section.2.4 Chosen probability in MPCCActually, travelers always want to follow the best path (broad sense shortcut), butbecause of the impact of random factor, travelers just can choose the path which is ofthe smallest traffic impedance they estimate by themselves. It is the key point ofMPCC. According to the random utility theory of economics, if traffic impedance is considered as the negativeutility, the chosen probability rs p of origination-destinationpoints couple (r, s) should follow LOGIT model:∑---=n j jrs rs bC bC p 1)exp()exp( (3) where rs p is the chosen probability of the pathsection (r, s);rs C is the traffic impedance of the path sect-ion (r, s); j C is the trafficimpedance of each path section in the forecast traffic sector; b reflects the travelers’cognition to the traffic impedance of paths in the traffic sector, which has reverseratio to its deviation. If b → ∞ , the deviation of understanding extent of trafficimpedance approaches to 0. In this case, all the travelers will follow the path whichis of the smallest traffic impedance, which equals to the assignment results withShortcut Traffic Assignment. Contrarily, if b → 0, travelers ’ understanding error approaches infinity. In this case, the paths travelers choose are scattered. There is anobjection that b is of dimension in Eq.(3). Because the deviation of b should beknown before, it is difficult to determine the value of b. Therefore, Eq.(3) is improvedas follows:∑---=n j OD j OD rsrs C bC C bC p 1)exp()exp(,∑-=n j j OD C n C 11(4) Where OD C is the average of the traffic impedance of all the as-signed paths; bwhich is of no dimension, just has relationship to the rational path aggregate, ratherthan the traffic impedance. According to actual observation, the range of b which is anexperience value is generally between 3.00 to 4.00. For the more crowded cityinternal roads, b is normally between 3.00 and 3.50.2.5 Flow of MPCCMPCC model combines the idea of multi-ways probability assignment anditerative capacity constraint traffic assignment.Firstly, we can get the geometric information of the road network and OD trafficvolume from related data. Then we determine the rational path aggregate with themethod which is explained in Section 2.1.Secondly, we can calculate the traffic impedance of each path section with Eq.(2),Fig.1 Flowchart of MPCC which is expatiated in Section 2.3.Thirdly, on the foundation of the traffic impedance of each path section, we cancalculate the respective forecast traffic volume of every path section with improvedLOGIT model (Eq.(4)) in Section 2.4, which is the key point of MPCC.Fourthly, through the calculation processabove, we can get the chosen probability andforecast traffic volume of each path section, but itis not the end. We must recalculate the trafficimpedance again in the new traffic volumesituation. As is shown in Fig.1, because of theconsideration of the relationship between trafficimpedance and traffic load, the traffic impedanceand forecast assignment traffic volume of everypath will be continually amended. Using therelationship model between average speed andtraffic volume, we can calculate the travel timeand the traffic impedance of certain path sect-ionunder different traffic volume situation. For theroads with different technical levels, therelationship models between average speeds totraffic volume are as follows: 1) Highway: 1082.049.179AN V = (5) 2) Level 1 Roads: 11433.084.155AN V = (6) 3) Level 2 Roads: 66.091.057.112AN V = (7) 4) Level 3 Roads: 3.132.01.99AN V = (8) 5) Level 4 Roads: 0988.05.70A N V =(9) Where V is the average speed of the path section; A N is the traffic volume of thepath section.At the end, we can repeat assigning traffic volume of path sections with themethod in previous step, which is the idea of iterative capacity constraint assignment,until the traffic volume of every path section is stable.译文智能交通交通量分配预测模型介绍随着城市的可持续化发展、数字化城市的建设以及交通运输业的发展,智能交通系统(ITS)的发展越来越快。
基于普通向量的虹膜识别算法

基于普通向量的虹膜识别算法
王志芳;宋晨;牛夏牧;Christoph Busch
【期刊名称】《电子学报》
【年(卷),期】2007(035)00z
【摘要】典型的虹膜识别算法都是针对单个虹膜样本采用图像处理的方法提取虹膜特征,只强调个体信息,而忽略了虹膜样本间的联系.本文提出了一种基于普通向量的虹膜识别算法,从模式分析的角度,利用普通向量方法融合虹膜的个体特征和统计特征,并且通过高效的睫毛滤除和眼皮定位的算法,进一步提高了识别的精度和算法的稳定性.实验结果表明了该算法具有良好的性能.
【总页数】5页(P69-73)
【作者】王志芳;宋晨;牛夏牧;Christoph Busch
【作者单位】哈尔滨工业大学信息对抗技术研究所,黑龙江哈尔滨,150001;哈尔滨工业大学信息对抗技术研究所,黑龙江哈尔滨,150001;哈尔滨工业大学信息对抗技术研究所,黑龙江哈尔滨,150001;德国弗朗赫费计算机图形学研究所,达姆施塔特,64283
【正文语种】中文
【中图分类】TP391
【相关文献】
1.一种基于支持向量机的虹膜识别算法 [J], 王维民
2.基于普通向量的虹膜识别算法 [J], 王志芳;宋晨;牛夏牧;Christoph Busch
3.基于特征加权FDCT和模糊最小二乘支持向量机的虹膜识别算法 [J], 何振红
4.支持向量机虹膜识别算法研究 [J], 严继利;王为民
5.基于Gabor滤波的改进虹膜识别算法 [J], 马晓峰;高玮玮
因版权原因,仅展示原文概要,查看原文内容请购买。
外文文献翻译译稿和原文

外文文献翻译译稿1卡尔曼滤波的一个典型实例是从一组有限的,包含噪声的,通过对物体位置的观察序列(可能有偏差)预测出物体的位置的坐标及速度。
在很多工程应用(如雷达、计算机视觉)中都可以找到它的身影。
同时,卡尔曼滤波也是控制理论以及控制系统工程中的一个重要课题。
例如,对于雷达来说,人们感兴趣的是其能够跟踪目标。
但目标的位置、速度、加速度的测量值往往在任何时候都有噪声。
卡尔曼滤波利用目标的动态信息,设法去掉噪声的影响,得到一个关于目标位置的好的估计。
这个估计可以是对当前目标位置的估计(滤波),也可以是对于将来位置的估计(预测),也可以是对过去位置的估计(插值或平滑)。
命名[编辑]这种滤波方法以它的发明者鲁道夫.E.卡尔曼(Rudolph E. Kalman)命名,但是根据文献可知实际上Peter Swerling在更早之前就提出了一种类似的算法。
斯坦利。
施密特(Stanley Schmidt)首次实现了卡尔曼滤波器。
卡尔曼在NASA埃姆斯研究中心访问时,发现他的方法对于解决阿波罗计划的轨道预测很有用,后来阿波罗飞船的导航电脑便使用了这种滤波器。
关于这种滤波器的论文由Swerling(1958)、Kalman (1960)与Kalman and Bucy(1961)发表。
目前,卡尔曼滤波已经有很多不同的实现。
卡尔曼最初提出的形式现在一般称为简单卡尔曼滤波器。
除此以外,还有施密特扩展滤波器、信息滤波器以及很多Bierman, Thornton开发的平方根滤波器的变种。
也许最常见的卡尔曼滤波器是锁相环,它在收音机、计算机和几乎任何视频或通讯设备中广泛存在。
以下的讨论需要线性代数以及概率论的一般知识。
卡尔曼滤波建立在线性代数和隐马尔可夫模型(hidden Markov model)上。
其基本动态系统可以用一个马尔可夫链表示,该马尔可夫链建立在一个被高斯噪声(即正态分布的噪声)干扰的线性算子上的。
系统的状态可以用一个元素为实数的向量表示。
物联网毕业论文外文文献翻译.doc

Internet of Things1 .the definition of connotationThe English name of the Internet of Things The Internet of Things, referred to as: the IOT.Internet of Things through the pass,radio frequency identification technology,global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light,heat, electricity,mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes,identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application,known as the third wave of the world’s information industry development following the computer,the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications,Internet of Things is also seen as Internet application development. Therefore,the application of innovation is the core of the development of Internet of Things,and 2.0 of the user experience as the core innovation is the soul of Things.2.The meaning of ’’material”Where the ’’objects” to meet the following conditions can be included in the scope of the "Internet of Things":1.Receiver have the appropriate information;2.Have a data transmission path;3.Have a certain storage capabilities;4.To have the CPU;5.To have the operating system;6.Have specialized applications;7.Have a data transmitter;8.Follow the communication protocol of Things;9.World Network,a unique number that can be identified.3."Chinese style" as defined inInternet of Things (Internet of Things) refers to is the ubiquitous (Ubiquitous) terminal equipment (Devices) and facilities (Facilities), including with the "inner intelligence" sensors,mobile terminals, industrial systems,floor control system,the family of Intelligentfacilities,video surveillance systems,and external can "(Enabled),such as RFID,a variety of assets (the Assets),personal and vehicle carrying the wireless terminal” intelligent objects or animals n or” smart dust ’’(the Mote),through a variety of wireless and/or cable over long distances and/or short-range communication networks to achieve interoperability (M2M),application integration (the Grand Integration),and based on cloud computing,SaaS operation mode,in internal network (intranet),private network (extranet), and / or the Internet (Internet) environment, the use of appropriate information security mechanisms to provide a safe,controlled and even personalized real-time online monitoring,retrospective positioning,alarm linkage, command and control plan management, remote control,security,remote repair and maintenance, online upgrades,statistical reporting, decision support,the leadership of the desktop (showcase of the Cockpit Dashboard) management and service functions,’’Everything,” ’’efficient,energy saving, security environmental protection/"’ possession,control,Camp integration [1].4.EU definitionIn September 2009,the Internet of Things and enterprise environments held in Beijing,China-EU Seminar on the European Commission and Social Media Division RFID Division is responsible for Dr. Lorent Ferderix,given the EU’s definition of things: the Internet of Things is a dynamic global network infrastructure, it has a standards-based and interoperable communication protocols, self-organizing capabilities, including physical and virtual "objects” of identity, physical attributes,virtual features and smart interface and seamless integration of information networks . Internet of Things Internet and media,the Internet and business Internet one,constitute the future of the Internet.5.changeThe Internet of Things (Internet of Things) the word universally recognized at home and abroad Ashton, Professor of the MIT Auto-ID Center in 1999 first proposed to study RFID. The report of thesame name released in 2005, the International Telecommunication Union (ITU), the definition and scope of the Internet of Things has been a change in the coverage of a larger expansion, no longer refers only to the Internet of Things based on RFID technology.Since August 2009, Premier Wen Jiabao put forward the "Experience China” Internet of Things was officially listed as a national one of the five emerging strategic industries,to write the •’Government Work Report’1 Internet of Things in China has been the great concern of the society as a whole degree of concern is unparalleled in the United States,European Union, as well as other countries.The concept of Internet of Things is not so much a foreign concept, as it has been the concept of a "Made in China' his coverage of the times,has gone beyond the scope of the 1999 Ashton professor and the 2005 ITU report referred to, Internet of Things has been labeled a "Chinese style" label.6.BackgroundThe concept of Internet of Things in 1999. Internet-based, RFID technology and EPC standards,on the basis of the computer Internet,the use of radio frequency identification technology, wireless data communication technology, a global items of information to real-time sharing of the physical Internet ’’Internet of things” (referred to as the Internet of Things),which is also the basis of the first round of the China Internet of Things boom set off in 2003.The sensor network is built up based on sensing technology network. Chinese Academy of Sciences in 1999 on the start sensor network research and has made some achievements in scientific research,the establishment of applicable sensor network. 1999, held in the United States,mobile computing and networking International Conference, "The sensor network is a development opportunity facing humanity in the next century. In 2003, the United States,"Technology Review” propo sed sensor network technology will be future changes ten people’s lives first.November 17, 2005, the WSIS held in Tunis (WSIS),the International Telecommunication Union released ITU Internet Report 2005: Internet of Things ”,citing the concept of the” Int ernet of things "• The report pointed out that the ubiquitous ’’Internet of Things" communication era is approaching, all the objects in the world, from tires to toothbrushes, from housing to the tissue via the Internet, take the initiative to be exchanged. Radio Frequency Identification (RFID),sensortechnology, nanotechnology,intelligent embedded technology will be more widely used.According to the description of the ITU, the era of things,a short-range mobile transceivers embedded in a variety of daily necessities,human beings in the world of information and communication will receive a new communication dimension, from any time communication between people of the place of connection extended to the communication connection between persons and things and things and things. The Internet of Things concept of the rise,largely due to the International Telecommunication Union (ITU), the title of Internet of Things 2005 annual Internet Report. However,the ITU report the lack of a clear definition of Things.Domestic Internet of Things is also there is no single standard definition, but the Internet of Things In essence,the Internet of Things is a polymer application of modern information technology to a certain stage of development and technological upgrading of various sensing technology modern network technology and artificial intelligence and automation technology aggregation and integration of applications,so that the human and material wisdom of dialogue to create a world of wisdom. Because the development of the Internet of Things technology,involving almost all aspects of IT,innovative application and development of a polymer, systematic, and therefore be called revolutionary innovation of information industry. Summed up the nature of the Internet of Things is mainly reflected in three aspects: First, the Internet features that need to be networked objects must be able to achieve the interoperability of the Internet; identification and communication features,that is included in the Internet of Things "objects" must to have the functions of automatic identification and physical objects communication (M2M); intelligent features,the network system should have automated,self-feedback and intelligent control featuresJanuary 28, 2009, Obama became the President of the United States,held with U.S. business leaders a "round table’’,as one of the only two representatives,IBM CEO Sam Palmisano for the first time that H the wisdom of the Earth” this concept, it is recommended that the new government to invest in a new generation of intelligent infrastructure.February 24,2009 news,IBM Greater China CEO money crowd called "Smarter Planet” strategy announced in the forum 2009IBM.This concept was put forth, that is the great concern of the United States from all walks of life,and even analysts believe that IBM’s vision is very likely to rise to U.S. national strategy,and caused a sensation in the world. IBM believes that the industry, the next phase of the mission is to make full use of the new generation of IT technology in all walks of life among specifically,is the embedded sensors and equipment to the power grid,railways,bridges,tunnels, highways, buildings, water supply systems dams,oil and gas pipelines and other objects,and is generally connected to the formation of Things.Strategy conference, IBM, and implant the concept of ’’wisdom” in the implementation of the infrastructure,strong,not only in the short term to stimulate the economy,promote employment,and in a short period of time for China to build a mature wisdom infrastructure platform.IBM n Smarter Planet” strategy will set off again after the wave of Internet technology industrial revolution. Former IBM CEO Lou Gerstner has raised an important point of view, every 15 years,a revolution in computing model. This judgment is the same as Moore’s Law accurately call it a n15-year cycle Law' Before and after 1965, changes to the mainframe as a symbol,1980 marked by the popularization of personal computers,1995, the Internet revolution. Each such technological change are caused by the enterprise, industry and even the national competitive landscape of major upheaval and change. To a certain extent in the Internet revolution is ripening by the ”information superhighway” strategy. 1990s,the Clinton administration plan for 20 years, $ 200 billion to -4000 billion,construction of the U.S. National Information Infrastructure,to create a huge economic and social benefits.Today, the H Smarter Planet" strategy by many Americans that there are many similarities with the "informa tion superhighway”,the same they revive the economy,a key strategy for competitive advantage. The strategy can be set off, not only for the United States, such as the Internet revolution was the wave of technological and economic concern, more attention from the world.H Internet of Things prospects are very bright,it will dramatically change our current way of life.’’ Demonstration director of the Center of Nanjing University of Aeronautics and Astronautics,National Electrical and Electronic Zhao Guoan said. Industry experts said that the Internet of things to our life personification of the things became a kind of human.Goods (goods) in the world of physicalobjects associated with each other "exchange' without the need for human intervention. The Internet of Things using radio frequency identification (RFID) technology, to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet. It can be said that the Internet of Things depict the world is full of intelligent. In the world of Internet of Things, material objects connected to the dragnet.The second session,held at Peking University in November 2008, China Mobile Government Seminar H Knowledge Society and Innovation 2.0n,the experts made the mobile technology, the Internet of Things technology led to the development of economic and social form, innovative forms of change,and promote the The next generation of innovation for the knowledge society as the core of user experience (innovative 2.0) the formation of innovation and development of the form to pay more attention to the user to focus on people-oriented. Research institutions is expected to 10 years,the Internet of Things may be mass adoption of this technology will develop into one of thousands of yuan-scale high-tech market,the industry than the Internet 30 times.It is learned that the things industry chain can be broken down into the identity,perception,processing and information transfer,four links, each link of the key technologies for the wireless transmission network of RFID, sensors,smart chip and telecom operators. EPOSS in the ’’Internet of Things in 2020” report,an analysis predicted that the future development of the Internet of Things will go through four stages, 2010, RFID is widely used in the field of logistics,retail and pharmaceutical objects interconnect 2010 to 2015,2015 〜In 2020,the object into the semi-intelligent, intelligent objects into 2020.As the vanguard of the Internet of Things,RFID has become the most concerned about the technology market. The data show that the global RFID market size in 2008 from $ 4.93 billion in 2007 rose to $ 5.29 billion,this figure covers all aspects of the RFID market,including tags, readers and other infrastructure, software and services. RFID card and card-related infrastructure will account for 57.3 percent of the market, reaching $ 3.03 billion. Application from financial and security industries will drive the market growth of RFID cards. Analysys International forecasts,the Chinese RFID market size in 2009 will reach 5.0 billion, a CAGR of 33%, in which the electronic tag is morethan 3.8 billion yuan,the reader close to 700 million yuan, software and services market to reach 500 million yuan pattern.MEMS is the abbreviation of the micro-electromechanical systems,MEMS technology is built on the basis of micro / nano, the market prospect is broad. The main advantage of the MEMS sensor is the small size,large-scale mass production cost reduction,mainly used in two major areas of automotive and consumer electronics. Under ICInsight the latest report is expected in 2007-2012, global sales of semiconductor sensors and actuators based on MEMS will reach 19 percent compound annual growth rate (CAGR), compared with $ 4.1 billion in 2007 to five years will achieve $ 9.7 billion in annual sales.7.PrincipleInternet of Things is on the basis of the computer Internet, RFID, wireless data communications technology, to construct a cover everything in the world’s ’’Internet of Things' In this network, the goods (products) to each other ’’exchange”,without the need for human intervention. Its essence is the use of radio frequency identification (RFID) technology to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet.The Internet of Things is a very important technology is radio frequency identification (RFID) technology. RFID is radio frequency identification (Radio Frequency Identification) technology abbreviation,is an automatic identification technology in the 1990s began to rise,the more advanced a non-contact identification technology. The development of RFID technology based on a simple RFID system, combined with existing network technology, database technology, middleware technology, to build a one composed by a large number of networked readers and numerous mobile label, much larger than the Internet of Things trend.RFID,It is able to let items "speak” a technique. In the "Internet of Things” con cept,RFID tags are stored in the specification and interoperability information collected automatically by wireless data communications network to a central information system,to achieve the identification of goods (products), and then through the open computer network for information exchange and sharing, items "transparent” management.The information technology revolution in the Internet of Things is referred to as IT mobile Pan of a specific application. Internet of Things through IntelliSense,identification technology andpervasive computing, ubiquitous network convergence applications,breaking the conventional thinking before,human beings can achieve ubiquitous computing and network connectivity [3]. The traditional thinking has been the separation of physical infrastructure and IT infrastructure: on the one hand,airports,roads,buildings,while on the other hand,the data center,PC,broadband. In the era of the ’’Internet of Things’’,reinforced concrete,cable with the chip,broadband integration into a unified infrastructure, in this sense, the infrastructure is more like a new site of the Earth, the world really works it, which including economic management, production operation, social and even personal life. H Internet of Things” makes it much more refined and dynamic management of production and life, to manage the future of the city to achieve the status of "wisdom” to improve resource utilization and productivity levels,and improve the relationship between man and nature.8.Agency1,institution-buildingAs the first national Internet of Things industry community organizations - the application of professional Committee of China Electronic Chamber of Things technology products (referred to as: ’’objects of the IPCC n),the Ministry of Civil Affairs in June 2010,preliminary approved by the Ministry of August being reported that the Ministry of Civil Affairs for final approval.2, the main taskServe as a bridge between business and government to assist the Government of the industry guidance,coordination,consultation and services to help members to reflect the business requirements to the Government; coordinate the relationship between enterprises to strengthen technical cooperation, product distribution, the elimination of vicious competition ; supervision of members the correct implementation of national laws and regulations,to regulate the industry; member of information communication technology products, cooperation,resource sharing, capital operation, and promote the application of Internet of Things technologies and products,and promote the Internet of Things industrial scale,co-development.9.ConstructionInternet of Things in the practical application to carry out requires the involvement of all walks of life,and need the guidance of the national government as well as related regulations and policies toassist the launching of the Internet of Things has the scale,broad participation,management, technical,and material properties,etc. other features,the technical problem is the most crucial issues of Things billion Bo logistics consulting, Internet of Things technology is an integrated technology, a system not yet which company has overall responsibility for network planning and construction of the entire system, theoretical studies have commenced in all walks of life and the practical application is limited to within the industry. The key is on the planning and design and research and development of the Internet of Things research in the field of RFID,sensors,embedded software, and transmission of data calculation. In general,to carry out the steps of the Internet of things mainly as follows:(1)identified the object attributes,properties, including static and dynamic properties of the static property can be stored directly in the label,the dynamic properties need to start with sensors to detect real-time;(2)the need to identify the equipment to complete the reading of object attributes,and information into a data format suitable for network transmission;(3)the object of information transmitted over the network to the information processing center (processing center may be distributed,such as home computers or mobile phones,may also be centralized,such as China Mobile IDC) by the processing center to complete the object communication calculation.10.key areasInternet of Things 4 key areas:(1)RFID;(2)sensor network;(3)The M2M;(4)integration of the two.11 .TrendIndustry experts believe that the Internet of things on the one hand can improve economic efficiency and significant cost savings; the other hand,can provide technical impetus to global economic recovery. Currently,the United States,the European Union are all invested heavilyin-depth study to explore the Internet of Things. The country is also highly concerned about the emphasis of Things,Industry and Information Technology Ministry in conjunction with the relevant departments are conducting research in a new generation of IT to the formation of policies and measures to support the development of a new generation of IT.China Mobile CEO Wang Jianzhou has repeatedly mentioned the Internet of Things will become the focus of future development of China Mobile. He will be invited to Taiwan to produce RFID,sensors and bar code manufacturers and China Mobile. According to him,the use of the Internet of Things technology,Shanghai Mobile has a number of industrial customers tailor the data collection,transmission,processing and business management in one set of wireless application solutions. The latest data show that Shanghai Mobile has more than 100,000 chips mounted on a taxi,bus,various forms of matter networking applications in all walks of prowess, to ensure the orderly operation of the city. During the Shanghai World Expo, ’’the bus services through’’ will be fully applied to the Shanghai public transport system, the smooth flow traffic to the most advanced technology to protect Expo area; for logistics transportation management,e-logistics n,will provide users with real-time accurate information of Cargo, vehicle tracking and positioning, the transport path selection, logistics network design and optimization services greatly enhance the comprehensive competitiveness of logistics enterprises.In addition,the popularization of the n Internet of Things” for the number of animals,plants and machinery,sensors and RFID tags of items and related interface devices will greatly exceed the number of mobile phones. The promotion of the Internet of Things will become a drive to promote economic development for the industry to open up a potential development opportunities. According to the current demand on the Internet of Things,in recent years, billions of sensors and electronic tags,which will greatly promote the production of IT components,while increasing the number of job opportunities.According to reports, it is necessary to truly build an effective Internet of things, there are two important factors. First, the scale, only with the scale to make the items of intelligence play a role. For example, a city of one million vehicles,if we only 10000 vehicles installed on the smart system, it is impossible to form an intelligent transportation system; two mobility items are usually not static,but in the state of the movement,we must maintain the items in the state of motion,and even high-speed motion state can at any time for dialogue.FORRESTER of the authority of the U.S. advisory body predicted that 2020, the world ofbusiness of the Internet of Things,compared with the business of interpersonal communication,will reach 30 to 1,so the ’’Internet of Things’1 is known to be the next one trillion communications services.Internet of Things heat wave Why is rapidly growing in China? Internet of Things in China rapid rise thanks to the several advantages of our country in terms of things.In the early 1999 launched the Internet of Things core sensor network technology research, R & D level in the world; the second,sensor network field in the world,China is the standard one of the dominant country, the patent owner; third China is one of the countries to achieve a complete industrial chain of Things; F ourth, China’s wireless communications network and broadband coverage provides a solid infrastructure to support the development of the Internet of Things; Fifth, China has become the world’s first the three major economies,with strong economic strength to support the development of the Internet of Things.12.MythThe current understanding of the Internet of things there are a lot of misunderstanding,which is also a direct impact on our understanding of Things on the development of the logistics industry, it is necessary first to distinguish errors, clarify our thinking.One sensor networks or RFID network equivalent of Things. The fact that sensor technology,or RFID technology,or are simply one of the information collection technology. In addition to the sensor technology and RFID technology,GPS, video recognition,infrared,laser,scanning can be achieved automatically identify physical objects to communicate technical information collection technology can become the Internet of Things. Sensor networks or RFID network is just an application of Things,but not all of Things.Second,the Internet of Things as a myriad of unlimited extension of the Internet of Things as a completely open for all things,all of the interconnections,all shared Internet platform.In fact,the Internet of Things is not simple infinite extension of the global sharing of the Internet. Even if the Internet is also not only refers to we typically think of the international sharing computer network,Internet,WAN and LAN. Internet of Things can be both an extension of our usual sense of theInternet to the matter; LAN,professional can also be based on real needs and industrial applications. The reality is not necessary and can not make all the items networking; no need to make professional,LAN must be connected to the global Internet sharing platform. Of things in the future the Internet will be very different from the professional network of similar smart logistics, smart transportation,smart grid; the intelligence community and other local area network is the largest use of space.Ter, that the ubiquitous network of the Internet of Things Internet of Things, and therefore the Internet of Things is a castle in the air, is difficult to achieve the technology. In fact the Internet of things are real,many of the primary Internet of Things applications already for our services. The Internet of Things concept is introduced in many real-world applications based on polymeric integrated innovation,pre-existing network with the Internet of Things, intelligent,automated system, summarized and upgrading it upgraded from a higher perspective our knowledge.Four of Things as a basket,and everything installed inside; based on self-awareness, and only be able to interact, communication products as the Internet of Things applications. For example, just embedded some of the sensors,to become the so-called Internet of Things appliances; products labeled with RFID tags, became the Internet of Things applications.esThings widely used throughout the intelligent transportation, environmental protection,government,public safety, peace at home, smart fire, industrial monitoring, environmental monitoring, elderly care,personal health,floriculture,water monitoring,food traceability,enemydetection and intelligence collection and other fields.International Telecommunication Union in 2005, a report has portrayed the picture of the era of the "Internet of Things": car when the driver operational errors will automatically alarm; briefcase will remind the owner forgot somet hing; clothes will ’’tell” washing machine color and water temperature requirements. Billion Bo logistics consulting vivid introduction of Things in the logistics field,for example, a logistics company,application of Things truck,when loading overweight,the car will automatically tell you overloaded and overload how many, but the space remaining,the severity of。
关于LED的外文文献和中文译文

多个LED发光装置的新型采集系统作为光源的一种,发光二极管(LED)有很多优点。
LED集成度更高,颜色种类多,使用寿命更长,而且工作电压较低。
但是,它仍有一个非常大的缺陷:一只LED的光照强度还是比较低。
这个缺点导致显示屏上的光通量不会很高。
但是无论如何,LED还是以其出色的性能在低电压装置中普遍应用。
因此,利用此系统采集多个LED的光,集成为更高强度的照明装置。
本设计提出三种采集系统,来实现增强光强的功能。
效率最好的一种采集系统可以达到96%。
同时,还分析了本系统的制造误差以及预算。
1 简介利用传统的光源来设计一个便携式探照灯,尺寸和能耗会很大。
而利用LED 来设计将会避免这些问题。
LED有很多优点:节能、体积较小、使用寿命长(约100,103小时)等,尤其是LED的光很适合环境工作。
Carel Zeiss和Philips打算用LED光源设计两种便携式探照灯。
尽管LED有诸多优点,可以让他们设计出的探照灯更加便携和小巧,但是由于光学元件的转换效率问题,导致系统有很多困难。
解决这个困难将是本文研究的重点。
通常,用一种合成非线性集中器(CPC)来减小分散度。
但是,这种传统的CPC采集效率仅为72%,必须要改善采集效率来提高光的利用率。
本文中将解决分散度和采集效率两个问题。
为实现这个目标,设计了三种不同的采集系统,以提高效率,下面逐一介绍。
2 仿真部分利用光学仿真软件和标签查找模块(BRO),来设计并分析采集系统的性能。
LED光源部分来自Osram-Opical半导体。
远程LED光源是一种Lambertian模式,LED的规格见表1。
在采集系统的底部有四个LED。
系统各个LED之间的位置关系如图1。
通光部分为2.1×2.1mm2,孔径3.26mm。
LED阵列对称的分布于系统的底部。
采集系统的第一个光学元件为均质器。
这个均质器的受光角度是12.5°。
因此,这个系统就是要把LED的受光角度的范围控制在±60°到±12.5°之间。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
虹膜识别外文翻译文献虹膜识别外文翻译文献(文档含中英文对照即英文原文和中文翻译)外文:The first chapter1.1 The research background of iris recognitionBiometrics is a technology for personal identification using physiological characteristics and behavior characteristics inherent in the human body. Can be used for the biological characteristics of biological recognition, fingerprint, hand type face, iris, retina, pulse, ear etc.. Behavior has the following characteristics: signature, voice, gait, etc.. Based on these characteristics, it has been the development of hand shape recognition, fingerprint recognition, facial recognition, iris recognition, signature recognition and other biometric technology, many techniques have been formed and mature to application of.Biological recognition technology in a , has a long history, the ancient Egyptians through identification of each part of the body size measure to carry out identity may be the earliest human based on the earliest history of biometrics. But the modern biological recognition technology began in twentieth Century 70 time metaphase, as biometric devices early is relatively expensive, so only a higher security level atomic test, production base.due to declining cost of microprocessor and various electronic components, precision gradually improve, control device of a biological recognition technology has been gradually applied to commerce authorized, such as access control, attendance management, management system, safety certification field etc..All biometric technology, iris recognition is currently used as a convenient and accurate.Making twenty-first Century is information technology, network technology of the century, is also the human get rid of traditional technology, more and more freedom of the century. In the information, free for the characteristics of the century, biometric authentication technology, high-tech as the end of the twentieth Century began to flourish, will play a more and more important role in social life, fundamentally change the human way of life . Characteristics of the iris, fingerprint, DNA the body itself, will gradually existing password, key, become people lifestyle, instead of at the same time, personal data to ensure maximum safety, maximize the prevention of various types of crime, economic crime.Iris recognition technology, because of its unique in terms of acquisition, accuracy and other advantages, will become the mainstream of biometric authentication technology in the future society. Application of safety control, the customs import and export inspection, e-commerce and other fields in the future, is also inevitable in iris recognition technology as the focus. This trend, now in various applications around the world began to appear in the.1.2 Objective and significance of iris recognitionIris recognition technology rising in recent years, because of its strong advantages and potential commercial value, driven by some international companies and institutions have invested a lot of manpower, financial resources and energy research. The concept of automatic iris identification is first proposed by Frown, then Daugman for the first time in the algorithm becomes feasible.The iris is a colored ring in the pupil in the eye of fabric shape, each iris contains a structure like the one and only based on the crown, crystalline, filaments, spots, structure, concave point, ray, wrinkles and fringe characteristic. The iris is different from the retina, retinal is located in the fundus, difficult to image, iris can be seen directly, biometric identification technology can obtain the image of iris fine with camera equipment based on the following basis: Iris fibrous tissue details is rich and complicated, and the formation and embryonic tissue of iris details the occurrence stage of the environment, have great random the. The inherent characteristics of iris tissue is differ from man to man, even identical twins, there is no real possibility of characteristics of the same.When the iris are fully developed, he changes in people's life and tiny. In the iris outer, with a layer of transparent corneal it is separated from the outside world. So mature iris less susceptible to external damage and change.These characteristics of the iris has the advantages, the iris image acquisition, the human eye is not in direct contact with CCD, CMOS and other light sensor, uses a non technology acquisition invasion. So, as an important biometric identity verification system, iris recognition by virtue of the iris texture information, stability, uniqueness and non aggressive, more and more attention from both academic and industrial circles.1.3 Status and application of domestic and foreign research on iris recognitionIDC (International Data Group) statistics show that: by the end of 2003, the global iris recognition technology and related products market capacity will reach the level of $2000000000. Predicted conserved survey China biometric authentication center: in the next 5 years, only in the Chinese, iris recognition in the market amounted to 4000000000 rmb. With the expansion of application of the iris recognition technology, and the application in the electronic commerce domain, this number will expand to hundreds of billions.The development of iris recognition can be traced back to nineteenth Century 80's.. In 1885, ALPHONSE BERTILLON will use the criminal prison thoughts of the application of biometrics individual in Paris, including biological characteristics for use at the time: the size of the ears, feet in length, iris.In 1987, ARAN SAFIR and LEONARD FLOM Department of Ophthalmology experts first proposed the concept, the use of automatic iris recognition iris image in 1991, USA Los ala Moss National Laboratory JOHNSON realized an automatic iris recognition system.In 1993, JOHN DAUGMAN to achieve a high performance automatic iris recognition system.In 1997, the first patent Chinese iris recognition is approved, the applicant, Wang Jiesheng.In 2005, the Chinese Academy of Sciences Institute of automation, National Laboratory of pattern recognition, because of outstanding achievement "in recognition of" iris image acquisition and aspects, won the two "National Technology Invention Prize", the highest level represents the development of iris recognition technology in china.In 2007 November, "requirements for information security technology in iris recognition system" (GB/T20979-2007) national standards promulgated and implemented, the drafting unit: Beijing arithen Information Technology Co., ltd..Application of safety control, the customs import and export inspection, e-commerce and other fields in the future, is also inevitable in iris recognition technology as the focus. This trend, now in various applications around the world began to appear in the. In foreign countries, iris recognition products have been applied in a wide range.In February 8, 2002, the British Heathrow Airport began to test an advanced security system, the new system can scan the passenger's eyes, instead of to check passports. It is reported, the pilot scheme for a period of five months, a British Airways and virgin Airlines passengers can participate in this test. The International Air Transport Association interested in the results of this study are, they encourage the Heathrow Airport to test, through the iris boarding passengers to determine its identity as a boarding pass.Iris recognition system America "Iriscan" developed has been applied in the three business department of Union Bank of American Texas within. Depositors to be left with nothing whatsoever to banking, no bank card password, no more memories trouble. They get money from the A TM, a camera first eye of the user to scan, and then scan the image into digital information and data check, check the user's identity.America Plumsted school in New Jersey has been in the campus installed device of iris recognition for security control of any school, students and staff are no longer use cards and certificates of any kind, as long as they passed in the iris camera before, their location, identity is system identification, all foreign workers must be iris data logging to enter the campus. At thesame time, through the central login and access control system to carry on the control to enter the scope of activities. After the installation of the system, various campus in violation of rules and infringement, criminal activity is greatly reduced, greatly reducing the campus management difficulty.In Afghanistan, the United Nations (UN) and the United Nations USA federal agency refugee agency (UNHCR) using iris recognition system identification of refugees, to prevent the same refugee multiple receive relief goods. Use the same system in refugee camps in Pakistan and Afghanistan. A total of more than 2000000 refugees use iris recognition system, this system to a key role for the United Nations for distribution of humanitarian aid from.In March 18, 2003, Abu Zabi (one of the Arabia and the United Arab Emirates) announced the iris recognition technology for expelled foreigners iris tracking and control system based on the borders opened the world's first set of national level, this system began construction from 2001, its purpose is to prevent all expelled by Abu Zabi tourists and other personnel to enter the Abu Zabi. Without this system in the past, due to the unique characteristics of the surface of the Arabs (Hu Xuduo), and the number of the expulsion of the numerous, customs inspection staff is very difficult to distinguish between what is a deported person. By using this system, illegal immigration, all be avoided, the maximum guarantee of national security.Kennedy International Airport in New Jersey state (John F. Kennedy International Airport) of the iris recognition system installed on its international flights fourth boarding port, 300 of all 1300 employees have already started to use the system login control. By using this system, all can enter to the apron personnel must be after the system safety certification of personnel. Unauthorized want to break through, the system will automatically take emergency measures to try to force through personnel closed in the guard space. Using this system, the safety grade Kennedy International Airport rose from B+ to A+ grade. The Kennedy International Airport to travel to other parts of the passengers has increased by 18.7%.Generally speaking, the iris recognition technology has already begun in all walks of life in various forms of application in the world. At the same time, to the application of their units of all had seen and what sorts of social benefits and economic benefits are not see. This trend is to enhance the high speed, the next 10 years will be gradually achieve the comprehensive application of iris recognition in each industry.In China, due to the Chinese embargo and iris technology itself and the difficulty in domestic cannot develop products. So far, there has not been a real application of iris recognition system. However, many domestic units are expressed using strong intention, especially the "9 · 11" later, security anti terrorism consciousness has become the most concerned problems in the field of aviation, finance. Iris recognition system is a major airline companies, major financial institutions and other security mechanisms (such as aerospace bureau) become the focus of attention of object and other key national security agency. As with the trend of development in the world, iris recognition technology will in the near future in application China set off climax.The second chapter of introduction of iris recognition technology2.1 Technology of biological feature recognition based on2.1.1 Present status and development of biological feature recognition“9.11" event is an important turning point in the development of biometric identif ication technology in the world, the importance of it makes governments more clearly aware of the biological recognition technology. Traditional identity recognition technologies in the face ofdefect anti terrorism has shown, the government began a large-scale investment in the research and application of biometric technology. At the same time, the public understanding of biological recognition technology with "9.11" exposure rate and greatly improve the.The traditional method of individual identification is the identity of the people with knowledge, identity objects recognition. The so-called identity: knowledge refers to the knowledge and memory system of personal identification, cannot be stolen, and the system is easy to install, but once the identification knowledge stolen or forgotten, the identity of easily being fake or replaced, this method at present in a wide range of applications. For example: the user name and password. The so-called identity items: refers to the person, master items. Although it is stable and reliable, but mainly depend on the outer body, lost or stolen identification items once proof of identity, the identity of easily being fake or replaced, for example: keys, certificates, magnetic card, IC card etc..Biometric identification technology is related to physical characteristics, someone using prior record of behavior, to confirm whether the facts. Biometric identification technology can be widely used in all fields of society. For example: a customer came into the bank, he did not take bank card, also did not remember the password directly drawing, when he was drawing in the drawing machine, a camera to scan on his eyes, and then quickly and accurately complete the user identification and deal with business. This is the application of the iris recognition system of modern biological identification technology. "".America "9.11" after the incident, the anti terrorist activity has become the consensus of governments, it is very important to strengthen the security and defense security at the airport, some airports USA can in the crowd out a face, whether he Is it right? Wanted. This is the application of modern technology in biological feature recognition "facial recognition technology".Compared with the traditional means of identity recognition, biometric identity recognition technology in general has the following advantages:(1) the security performance is good, not easy to counterfeit or stolen.(2) carry, whenever and wherever possible, therefore more safety and security and other identification method.For the biological information of biometric recognition, its basic nature must meet the following three conditions: universality, uniqueness and permanency.The so-called universality, refers to any individual has the. Uniqueness, is in addition to other than himself, other people did not have any, namely different. The so-called permanent, refers to the character does not change over time, namely, life-long.Feature selection of organisms with more than three properties, is the first step of biological recognition.In addition, there are two important indexes in biological recognition technology. The rejection rate and recognition rate. Adjusting the relation of these two values is very important. The reject rate, the so-called false rejection, this value is high, use frequency is low, the error recognition, its value is high, safety is relatively reduced. So in the biological identification of any adjustment, the two index is a can not abandon the process. The choice of range size, related to the biological identification is feasible and available .And technology of identity recognition based on iris feature now appears, it is the development of biometric identification technology quickly, due to its uniqueness, stability,convenience and reliability, so the formation of biometric identification technology has the prospects for development.Generally speaking, the biological recognition system consists of 4 steps. The first step, the image acquisition system of collecting biometric image; the second step, the biological characteristics of image preprocessing (location, normalization, image enhancement and so on); the third step, feature information extraction, converted into digital code; the fourth step, the generation of test code and database template code to compare, make identification。