CHAPTER 1 INTRODUCTION

Size: px
Start display at page:

Download "CHAPTER 1 INTRODUCTION"

Transcription

1 CHAPTER 1 INTRODUCTION 1.1 Motivations Vision is the process of discovering from images what is present in the world and where it is (Marr [88], p. 3). Due to the apparent simplicity of the action of seeing, however, the underlying difficulties of visual information processing had not been realized until Marr s pioneer work on computational vision. According to Marr, the ultimate task of any computer vision system is essentially to transform an array of input numerical values into meaningful description that a human normally perceives. Figure 1.1(a) shows an image which consists of two texture regions. However, the texture regions are not obvious at all from the numerical values, where a small portion is shown in Figure 1.1(c). While the true transformation employed by humans is not known, any algorithm for solving vision problems attempts to approximate the transformation based on different assumptions and constraints with respect to the problems to be solved. Existing approaches can thus be categorized according to the problems to be solved and their assumptions. Due to the complexities of the vision process, four problems are widely studied in computer vision relatively independently: edge detection, stereo 1

2 (a) (b) 67 6d a 73 6c 6a f 7b 7c 7d 7e 87 7b 86 bd a6 85 8e b4 8d 95 8c a d 69 6b 63 6f 6c 69 6b 6c 70 6e 6c 6b d 93 8b 7e 7f 81 b7 8f c9 a9 c d 80 7e 8e 7e 8d d 6b 71 6c 6e 6b 6e bb ee ac 81 b8 b6 9c 57 7a 8c 5d d0 8b ab b2 8d d0 bd 8f 84 7a 86 7c e a 6c 62 6d 6a 6d 6e 73 6c 69 b8 9e a6 6b 4e a a7 79 7e 59 ad 80 7e 7a 70 b9 7b d e d a b0 e5 ce 5c 8e 7d 64 6c 98 bd 88 9a e 3d 9b 8c cc 7d 85 7c 87 8d b 65 6a 6e 67 6c dd 9e e e 6b 87 b9 a4 ae 9b 9f b 92 5f a6 7f a8 ab 7c b 8a 8f 8d c a8 a7 a9 a2 5f a c a8 a0 97 9c a d 9d 8a 9f a7 ac b e 93 8b a0 73 6c 70 6b ef e7 d1 a5 82 8e c5 40 7f 9f 9f a2 a3 a6 a0 9d 9e 8f a ca c e e 72 6c 6c 6d dd e0 c6 c4 c2 b0 b6 8e f 9a 9f a3 99 a0 9d a1 70 8a 95 eb b9 7b 84 8a 82 8a b c 77 6e 6d fb d0 da 9f 8f be c0 a8 aa a0 9f a1 a4 9d 9e a d 9e ce 8e c d 9a 8f 96 9a 71 6f e3 e0 dd da c0 a4 d7 a1 a f 98 a0 af a5 9e a7 8b 4d 9c 86 a7 a e 8e d 6d c e6 cf d8 c8 da ad a1 ca b1 fb a4 5f 92 a2 b4 b5 a3 9b 7f 82 b2 4f dd dd ff 88 8d e f d f5 af e3 d0 c0 c2 b7 a7 b2 a2 a6 7f 79 c8 a5 a2 a6 a3 9a b6 d9 99 8a 8a e 9a 97 9a 71 6e 6b 6f fc f5 e0 b1 a3 cc a2 d0 a0 ae a0 93 8f ab be a5 a9 a1 a2 87 7e 8a b1 8f a 8d 8c d 6c 79 6f 6d 73 df d4 e2 9b 84 c0 b0 9d a0 ce 9b ac bb 9b ac aa 9a a c c 88 8c f 78 6d 6f c cf f3 ce bb a2 c0 94 c9 bf 94 9a 9d a0 ad ad b3 a6 ad a3 86 7f b7 92 7a c 8f 8c e 99 9a ec bd cb c5 d8 94 a7 a0 b c8 a7 ab a8 aa bb af bc 8d 94 6e dc 8c 8d 88 8f 8c a 6d 6d 6c c ff d9 df fa d2 b8 ad 8b b1 b7 cd c8 ad a8 b6 af b4 bd d 8a b4 8a 8b 8f 8c d 94 9b 99 6e 6c c 6e ff f4 f0 d8 c5 db 8f a1 b1 c3 f6 d5 95 a8 b5 aa b1 e9 e4 78 7d 8c f 93 8e c 6e 73 6a 71 6f 72 5e dd f4 ef d5 ba bb aa ab aa ae ae ae 96 ab c1 f9 90 c2 f3 ed c4 81 7f d 86 8a c e 6d 6c ff da e6 dc cc b4 ae b5 ae 9e d5 ae ba af 93 a4 b5 ea b1 d3 e7 ff e b 8b 8f 8b a a f f7 c1 97 d8 c4 bb ab ac a7 af a3 aa b1 c5 e8 c3 af 94 9e b2 d6 cd ee de f b d 63 5d e5 d8 cb bb b8 ae aa a9 a3 9b a9 ca e3 ff b5 b6 8f 9b af aa b6 eb c1 80 7e 87 8d 8b d cc d7 c0 b3 bf b6 b3 ad a6 92 a3 c8 de ff a7 bd b5 9b 9c 98 9b d0 a6 e a 8a e 6c 6e 6e 76 6c 6f ff e9 c5 b9 b4 b3 c8 c8 b0 98 a9 b9 d2 ff af aa d1 d9 7b e 87 8e e 6d 63 5f e1 c9 ba ba b3 f6 cd c2 b4 a4 b9 d3 e8 ff 7e 7e 7b 8a 8d 96 7f 9b b3 d3 d7 6e b 8d 8e 96 6c a 71 6b 76 6c 61 db bd b6 a6 ee d9 d4 c4 b5 ad ac c7 d9 ea a b5 8b a5 a8 ad c0 dc d d c c3 a9 a9 99 de e5 d5 bd ae a5 ab bb c8 d7 e3 80 7a 7a d2 b f a0 ad d9 7b 7b 7f d 6a 5b 58 5e 5c 59 5a 63 8f 9c 76 db de c0 bd b9 b0 a9 b1 c2 bd c9 d4 7a f e c2 ee 7a 7f f 5f 5b f e9 cf b5 b0 ae ae b6 b0 bd c6 bb c9 cb a 87 8e e ad d5 e3 7d a 5e d6 bd ba b3 aa af ad b4 b7 bd c3 b9 bf c5 d3 cc 75 8f 9a c 9d a9 dc f a d 5c 68 5d 8d d0 b9 ab a9 a7 ac af b5 c2 c3 bd b2 af b5 c2 c0 d2 d4 b7 b9 97 9a f ae ff a f 65 5c 5f 59 4f 6d c5 bd ae ab a0 a9 a3 b1 b7 b9 c2 c8 c0 a9 9c a5 ba c6 d4 dc da c1 c6 c8 8a b3 c7 ff 7d c 5c 5a cb be bb b8 ba aa a8 a2 92 9c 9a a1 bc ba c5 d5 b9 a0 93 a4 b6 c5 de ee ee de c1 cc d9 b2 b7 ac b2 c3 da bd 5f 5c 54 d0 bd b5 b1 ad a7 9f a3 9a 94 9b 8c 98 a5 b6 c7 d2 e6 c7 9c 8b 94 b4 c2 e2 fe f0 e5 dc e7 de df b4 c1 cc d4 f6 f d0 c1 b8 b2 a6 a4 9e 9b 9d 97 8e 8e ac b5 cc e4 ef c8 9e 8c 91 b1 c5 ef ff fd f1 e7 ee f1 dd d4 cf cc dc e5 e2 82 ca c4 ba ab a6 9e 9f 9b 99 9a 8e a1 b4 cc ea ff c ae c0 f5 ff f4 f6 e9 e6 e2 df d3 d9 dd e3 ea d5 d0 c3 b3 a6 b1 a2 a4 9b 94 8f f e b5 cf ee fb ce 98 8c 90 a7 c4 e9 ff f4 eb e4 d9 d0 d8 d1 d7 e2 d6 e6 d9 ce bd b7 ac a7 a0 a3 9a 92 8e a b 9d ba d7 f2 ff d4 9a a7 c6 e3 f9 f9 f9 e4 d9 d7 de de ec ee ea f3 e4 (c) Figure 1.1: A texture image and the corresponding numerical arrays. (a) A texture image with size (b) A small portion with size of (a) centered at pixel (64, 37), which is on the boundary between the two texture regions. (c) Numerical values of (b). To save space, the values are displayed in hexadecimal format. 2

3 matching and motion analysis, image segmentation and perceptual organization, and pattern recognition. Roughly speaking, the techniques for the first three problems are primarily data-driven, or called bottom-up processes, and pattern recognition is model-driven, or called top-down process. Early techniques with successful applications are classification techniques [25], which map a given input into one of the pre-defined classes according to a distance measure. However, all the possible classes and their variations we normally perceive are too gigantic to be implemented effectively in any system. The attention of computer vision was then shifted to derive more generic features for arbitrary images. From information and encoding theories, edges, i.e., discontinuities in images, carry more information and exhibit nice properties such as invariance to luminance changes. Motivated by neurophysiological findings [53], many edge detection algorithms were proposed and studied. Segmentation techniques try to solve the same problem by segmenting an image into homogeneous regions, where edges and region contours can be obtained straightforwardly and more robustly. These approaches were claimed to be unified [92] through what is called Mumford-Shah Segmentation energy functional [94] (See Chapters 4 and 5). Common to these approaches, the images are assumed to be piece-wise smooth regions with additive Gaussian noise, resulting in efficient algorithms. To improve the performance for real images, multiple scales are generally needed and linear and nonlinear scale spaces are thus proposed and studied. Chapter 2 studies segmentation for range images. Chapter 3 studies a new nonlinear smoothing algorithm and addresses some of problems in nonlinear scale spaces. Chapter 7 applies a nonlinear smoothing algorithm to hydrographic object extraction from remotely sensed images. 3

4 While there are useful applications of edge detection and segmentation algorithms, the underlying assumption limits their successes in dealing with natural images. As shown in Figure 1.1, texture regions neither are piece-wise smooth nor can be modeled with additive Gaussian noise. Figure 1.2 demonstrated that a pure linear system is not sufficient for natural image modeling [63], where the spatial relationships among pixels are more prominent in characterizing the texture regions than individual pixels. Clearly piece-wise smooth regions with additive Gaussian noise are not sufficient and more sophisticated models are needed to deal with texture images. Supported by neurophysiological and psychophysical experiments [12] [23], The early processes in the human vision system can be abstractly modeled by filtering with a set of frequency and orientation tuned filters. However, as demonstrated in Figure 1.2, purely linear filtering is not sufficient, nonlinearity beyond filtering must be incorporated [87]. Spectral histograms integrate the responses of a chosen bank of filters through marginal distributions [148] [149] [150] [147]. As demonstrated in Figure 1.2, spectral histograms are nonlinear. Chapters 4 and 5 apply spectral histograms to modeling [147], classification, and segmentation of texture as well as intensity images. While edge detection and segmentation techniques are very fruitful, there are perceptual phenomena that cannot be explained by purely data-driven processes. Classical examples include virtual contours, which are widely studied by Gestaltists. The long-range order grouping is known as perceptual organization. Chapter 6 studies perceptual organization through temporal dynamics. Because many of the meaningful objects cannot be characterized well using intensity values or even textures, such as a human face, the relationships among some 4

5 (a) (b) (c) Figure 1.2: Demonstration of nonlinearity for texture images. (a) A regular texture image. (b) The image in (a) was circularly shifted left and downward for 2 pixels at each direction. (c) The pixel-by-pixel average of (a) and (b). The relative variance defined in (3.20) between (a) and (b) is 137, and between (a) and (c) is 69. The distance between the spectral histograms defined in Chapter 4 between (a) and (b) is and between (a) and (c) is

6 primitives need to be modeled. This leads to the need of top-down processes such as recognition. Clearly, the four problems studied are sub-problems of vision process and the integration among them is critical for a complete vision system. The interaction between different modules is briefly discussed in Chapter Thesis Overview As discussed above, we study vision problems at different organizational levels in this dissertation. In Chapter 2, we study the segmentation problem for range images. Depth is most important cue for visual perception and range image segmentation has a wide range of applications. We propose a feature vector consisting of surface normal, mean and Gaussian curvatures and a similarity measure for range images. We implemented a system based on oscillatory correlation using a LEGION (locally excitatory globally inhibitory oscillator network) network. Experimental results demonstrate that our system is capable of handling different kinds of surfaces. With the unique properties of a temporal dynamic system, our approach may lead to a real-time approach for range image segmentation. In Chapter 3, we propose a new nonlinear smoothing algorithm by incorporating contextual information and geometrical constraints. Several nonlinear algorithms are derived as special cases of the proposed one. We have compared the temporal behavior and boundary detection results of several widely algorithms, including the proposed method. The proposed algorithm gives quantitatively good results and exhibits nice temporal behaviors such as quick convergence and robustness to noise. In Chapter 4, we propose spectral histograms as a generic statistic feature for texture as well as intensity images. We demonstrate the properties of spectral histograms 6

7 using image synthesis, image classification, and content-based image retrieval. We also compare with several widely used statistic features for textures and show that the distribution of local features is critically important for classification while mean and variance in general are not sufficient. We also propose a model for texture discrimination, which matches the existing psychophysical data well. Chapter 5 continues the work in Chapter 4. In Chapter 5, segmentation problem is studied extensively using spectral histograms. A new energy functional for segmentation is proposed by making explicit the homogeneity measures. An approximate algorithm is derived, implemented and studied under different assumptions. Satisfactory results have been obtained using natural texture images. Chapter 6 studies the problem of perceptual organization and long-range grouping, which is one level beyond the segmentation. By using a boundary-pair representation, we propose a figure-ground segregation network. Gestalt-like grouping rules are incorporated by modulating the connection weights in the network. The network can explain many perceptual phenomena such as modal and amodal completion, shape composition and perceptual grouping using a fixed set of parameters. Chapter 7 presents a computational framework for feature extraction from remote sensing images for map revision and geographic information extraction purposes. A multi-layer perceptron is used to learn the features to be extracted from examples. A locally coupled LEGION network is used to achieve accurate boundary localization. To increase the robustness of the system, a weight adaption method is used. Experimental results using DOQQ images show that our system can handle very large images efficiently and may have a wide range of applications. 7

8 Chapter 8 summarizes the contributions of the work presented in this dissertation and concludes this dissertation with discussions on the future work. 8

Visa Smart Debit/Credit Certificate Authority Public Keys

Visa Smart Debit/Credit Certificate Authority Public Keys CHIP AND NEW TECHNOLOGIES Visa Smart Debit/Credit Certificate Authority Public Keys Overview The EMV standard calls for the use of Public Key technology for offline authentication, for aspects of online

More information

FAN DECK FEDERAL STANDARD 595B COLORS (July 1994) 2002 Rob Graham. Special thanks to Pete Chalmers.

FAN DECK FEDERAL STANDARD 595B COLORS (July 1994) 2002 Rob Graham. Special thanks to Pete Chalmers. 7690-01-162-2210 FAN DECK FEDERAL STANDARD 595B COLORS (July 1994) Introduction 2002 Rob Graham. Special thanks to Pete Chalmers. The Federal Standard 595B specification is a U.S. government paint color

More information

Quick Installation Guide TBK-SER1001

Quick Installation Guide TBK-SER1001 Quick Installation Guide TBK-SER1001 This manual has been designed to guide you to basic settings of your IP devices such as installation and configuration for using them. 1. Connect cables to IP device

More information

S-boxes generated using Affine Transformation giving Maximum Avalanche Effect

S-boxes generated using Affine Transformation giving Maximum Avalanche Effect S-boxes generated using Affine Transformation giving Maximum Avalanche Effect Chandrasekharappa T.G.S., Prema K.V. and Kumara Shama Department of Electronics and Communication Engineering Manipal Institute

More information

Quick Installation Guide

Quick Installation Guide Quick Installation Guide This manual has been designed to guide you through basic settings of your IP devices, such as installation and configuration for using them. Step1. Assemble and install IP device

More information

Quick Start Guide G-Code/EEC-2400

Quick Start Guide G-Code/EEC-2400 Quick Start Guide G-Code/EEC-2400 This manual provides instructions for quick installation and basic configuration of your IP device. 1. Part names and positions Please check names and positions of each

More information

Advanced Encryption Standard. Z. Jerry Shi Department of Computer Science and Engineering University of Connecticut

Advanced Encryption Standard. Z. Jerry Shi Department of Computer Science and Engineering University of Connecticut Advanced Encryption Standard Z. Jerry Shi Department of Computer Science and Engineering University of Connecticut February 2012 Classes of cryptographic algorithms Symmetric-key algorithms Use the same

More information

SERVER CERTIFICATES OF THE VETUMA SERVICE

SERVER CERTIFICATES OF THE VETUMA SERVICE Page 1 Version: 3.4, 19.12.2014 SERVER CERTIFICATES OF THE VETUMA SERVICE 1 (18) Page 2 Version: 3.4, 19.12.2014 Table of Contents 1. Introduction... 3 2. Test Environment... 3 2.1 Vetuma test environment...

More information

!" #" $ % $ & ' % "( ) $* ( + $, - $. /

! # $ % $ & ' % ( ) $* ( + $, - $. / !" #"$ %$ & '% "( )$* (+$, - $. / 0 & 1&&##+.2 " 2&%%.&, &#& $ & 1 $ + $1 & 31,4!%'"%# 1$4 % 2.& # &2 5 + 670894, ' &" '$+.&2 2$%&##" +..$&&+%1$%114+1 &$ +1&#&+,#%11" &&.1&.$$!$%&'" &:#1;#.!, $& &' +".2

More information

Network Working Group. Category: Informational. NTT S. Kanno. NTT Software Corporation. April 2009

Network Working Group. Category: Informational. NTT S. Kanno. NTT Software Corporation. April 2009 Network Working Group Request for Comments: 5528 Category: Informational A. Kato NTT Software Corporation M. Kanda NTT S. Kanno NTT Software Corporation April 2009 Camellia Counter Mode and Camellia Counter

More information

VISIX Time of Flight People Tracking Camera VX-VTOF-01 Quick Start Guide v VISIX Time of Flight Quick Start Guide VX-VTOF-01

VISIX Time of Flight People Tracking Camera VX-VTOF-01 Quick Start Guide v VISIX Time of Flight Quick Start Guide VX-VTOF-01 VISIX Time of Flight Quick Start Guide VX-VTOF-01 VISIX Time of Flight People Tracking Camera VX-VTOF-01 Quick Start Guide v01-2016 10385 Westmoor Drive, Suite 210, Westminster, CO 80021 www.3xlogic.com

More information

SERVER CERTIFICATES OF THE VETUMA SERVICE

SERVER CERTIFICATES OF THE VETUMA SERVICE Page 1 Version: 3.5, 4.11.2015 SERVER CERTIFICATES OF THE VETUMA SERVICE 1 (18) Page 2 Version: 3.5, 4.11.2015 Table of Contents 1. Introduction... 3 2. Test Environment... 3 2.1 Vetuma test environment...

More information

ZN-NH22XE Quick User Guide

ZN-NH22XE Quick User Guide ZN-NH22XE Quick User Guide This manual has been designed to guide you through basic installation, configuration and the webpage access settings of the device. Step1. Install the lens 1. Place the lens

More information

Simple MIDI for Virtual Organ (using Midi-Ox)

Simple MIDI for Virtual Organ (using Midi-Ox) Simple MIDI for Virtual Organ (using Midi-Ox) Index Introduction...- 2 - Requirements...- 2 - Three Basic MIDI Functions - Overview...- 3 - MIDI Note ON / Note OFF...- 3 - MIDI Program Change...- 3 - MIDI

More information

Catalyst 3850 Series Switch with Embedded Wireshark Configuration Example

Catalyst 3850 Series Switch with Embedded Wireshark Configuration Example Catalyst 3850 Series Switch with Embedded Wireshark Configuration Example Document ID: 117639 Contributed by Colby Beam, Cisco TAC Engineer. Apr 22, 2014 Contents Introduction Prerequisites Requirements

More information

SMS4 Encryption Algorithm for Wireless Networks

SMS4 Encryption Algorithm for Wireless Networks SMS4 Encryption Algorithm for Wireless Networks Translated and typeset by Whitfield Diffie of Sun Microsystems and George Ledin of Sonoma State University 15 May 2008 Version 1.03 SMS4 is a Chinese block

More information

Les identités féminines dans le conte traditionnel occidental et ses réécritures : une perception actualisée

Les identités féminines dans le conte traditionnel occidental et ses réécritures : une perception actualisée Les identités féminines dans le conte traditionnel occidental et ses réécritures : une perception actualisée des élèves Sarah Brasseur To cite this version: Sarah Brasseur. Les identités féminines dans

More information

Internet Engineering Task Force (IETF) May This document contains test vectors for the stream cipher RC4.

Internet Engineering Task Force (IETF) May This document contains test vectors for the stream cipher RC4. Internet Engineering Task Force (IETF) Request for Comments: 6229 Category: Informational ISSN: 2070-1721 J. Strombergson SecWorks Sweden AB S. Josefsson Simon Josefsson Datakonsult AB May 2011 Test Vectors

More information

Pattern Co. Monkey Trouble Wall Quilt. Size: 48" x 58"

Pattern Co. Monkey Trouble Wall Quilt. Size: 48 x 58 .............................................................................................................................................. Pattern Co..........................................................................................

More information

Type: Universal Relais Modbus protocol description. EA-Nr.: 1451 Replace for: Page: 1 von 9

Type: Universal Relais Modbus protocol description. EA-Nr.: 1451 Replace for: Page: 1 von 9 EA-Nr.: 1451 Replace for: Page: 1 von 9 MODBUS TCP/IP TCP Port: 502 Max. TCP connections): 5 MODBUS RTU Supported function codes Function code Name Utilization 3 (03H) Read Holding Registers Read data

More information

USB HID to PS/2 Scan Code Translation Table

USB HID to PS/2 Scan Code Translation Table Key Name HID Usage Page HID Usage ID PS/2 Set 1 Make* PS/2 Set 1 Break* PS/2 Set 2 Make PS/2 Set 2 Break System Power 01 81 E0 5E E0 DE E0 37 E0 F0 37 System Sleep 01 82 E0 5F E0 DF E0 3F E0 F0 3F System

More information

New CUSD 7-12 Secondary High School Proposed Boundary Recommendation. CUSD Board Study Session November 5, 2014

New CUSD 7-12 Secondary High School Proposed Boundary Recommendation. CUSD Board Study Session November 5, 2014 New CUSD 7-12 Secondary High School Proposed Boundary Recommendation CUSD Board Study Session November 5, 2014 1 Goals Develop school boundaries for the new 7-12 secondary high school Balance projected

More information

PayPass Testing Environment (Terminal Products)

PayPass Testing Environment (Terminal Products) PayPass Testing Environment (Terminal Products) January 2011 Proprietary Rights The information contained in this document is proprietary and confidential to MasterCard International Incorporated, one

More information

Type: Universal Relais Modbus protocol description. EA-Nr.: 1451 Replace for: Page: 1 von 10

Type: Universal Relais Modbus protocol description. EA-Nr.: 1451 Replace for: Page: 1 von 10 EA-Nr.: 1451 Replace for: 12280-1605-00 Page: 1 von 10 MODBUS TCP/IP TCP Port: 502 Max. TCP connections): 5 MODBUS RTU Connection diagram RS 485 Connection name Modbus Ziehl EIA/TIA-485 - wire D0 B (B

More information

Arts et politique sous Louis XIV

Arts et politique sous Louis XIV Arts et politique sous Louis XIV Marie Tourneur To cite this version: Marie Tourneur. Arts et politique sous Louis XIV. Éducation. 2013. HAL Id: dumas-00834060 http://dumas.ccsd.cnrs.fr/dumas-00834060

More information

Solutions to Assignment 10

Solutions to Assignment 10 Solutions to Assignment 10 Math 412, Winter 2003 7.1.26 Prove that each element of a finite group G appears exactly once in each row and exactly once in each column of the operation table. It is not difficult

More information

Payload Type = SA Next Payload = ISAKMP_NEXT_VID Payload Length = 0x94 DOI = 0x1 Situation = 0x1

Payload Type = SA Next Payload = ISAKMP_NEXT_VID Payload Length = 0x94 DOI = 0x1 Situation = 0x1 How can you analyze VPN IPSec Log? Here we take an example with brief description to teach you how to read the IPSec log of Vigor router, so that you may be able to do some basic troubleshooting by yourself.

More information

Quick Installation Guide

Quick Installation Guide O1 N 2 3 4 5 6 7 8 O1 N 2 3 4 5 6 7 8 Quick Installation Guide This manual has been designed to guide you through basic settings of your IP devices, such as installation and configuration for using them.

More information

Design Note DN509. Data Whitening and Random TX Mode By Grant Christiansen. Keywords. 1 Introduction CC430 CC1100 CC1100E CC1101 CC1110 CC1111 CC1150

Design Note DN509. Data Whitening and Random TX Mode By Grant Christiansen. Keywords. 1 Introduction CC430 CC1100 CC1100E CC1101 CC1110 CC1111 CC1150 Data Whitening and Random TX Mode By Grant Christiansen Keywords CC430 CC1100 CC1100E CC1101 CC1110 CC1111 CC1150 CC2500 CC2510 CC2511 CC2550 Whitening Test Generator 1 Introduction This document gives

More information

Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.7

Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.7 Written By: Adam Berent Advanced Encryption Standard by Example V.1.7 1.0 Preface The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL)

More information

Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.5

Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.5 Written By: Adam Berent Advanced Encryption Standard by Example V.1.5 1.0 Preface The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL)

More information

CONVERSION CHART PROBATE CODE TO ESTATES CODE

CONVERSION CHART PROBATE CODE TO ESTATES CODE Revised January 27, 2014 Prepared by Prof. Gerry W. Beyer CONVERSION CHART PROBATE CODE TO ESTATES CODE 2(a) (part) 21.006 2(c) 21.004 3 (part) 22.001 3(a) 22.002 3(b) 22.004 3(c) 22.005 3(d) 22.006 3(e)

More information

Request for Comments: 1947 Category: Informational May Greek Character Encoding for Electronic Mail Messages

Request for Comments: 1947 Category: Informational May Greek Character Encoding for Electronic Mail Messages Network Working Group D. Spinellis Request for Comments: 1947 SENA S.A. Category: Informational May 1996 Greek Character Encoding for Electronic Mail Messages Status of This Memo This memo provides information

More information

THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL CONTENTS

THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL CONTENTS THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL CONTENTS EDITORIAL TECHNICAL ANALYSIS Sorry, the had disk drive C is too full. Remove a few old files from

More information

Digital Lighting Systems, Inc.

Digital Lighting Systems, Inc. Digital Lighting Systems, Inc. PD26-DMX Two Channel DMX Dimmer Pack (includes information for PD26-DMX-S) PD26-DMX S2 S 2 USER'S MANUAL PD26-DMX-UM 0/0 2-Channel Dimmer Pack Digital Lighting Systems PD26-DMX

More information

TRANSFORMING CHILD WELFARE OUTCOMES FOR ALASKA NATIVE CHILDREN STRATEGIC PLAN:

TRANSFORMING CHILD WELFARE OUTCOMES FOR ALASKA NATIVE CHILDREN STRATEGIC PLAN: TRANSFORMING CHILD WELFARE OUTCOMES FOR ALASKA NATIVE CHILDREN STRATEGIC PLAN: 2016-2020 Vision: Alaska Native culture keeps Alaska Native children safe. Mission: Alaska Native children, families and communities

More information

user manual 2 2011 Mikro Sdn Bhd All Rights Reserved 2 inch, 64 x 128 dot matrix LCD display with back lighting Three phase and single phase detection of reactive power 12 (or 8 for 8 step model) output

More information

Les effets de la relaxation sur les apprentissages à l école

Les effets de la relaxation sur les apprentissages à l école Les effets de la relaxation sur les apprentissages à l école Laurine Bouchez To cite this version: Laurine Bouchez. Les effets de la relaxation sur les apprentissages à l école. Éducation. 2012.

More information

BCB 713 Module Spring 2011

BCB 713 Module Spring 2011 Sequential Pattern Mining COMP 790-90 Seminar BCB 713 Module Spring 2011 The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Sequential Pattern Mining Why sequential pattern mining? GSP algorithm FreeSpan

More information

E A AD D AB C AB A BF C A B C BD E FA B C

E A AD D AB C AB A BF C A B C BD E FA B C E A AD D AB C AB A BF C A B C BD E FA B C ABCDE B B F A B A CD E F D B E D D ACBA E F B AB C D A EF EAD E E A CE E E B A E A E E AE E EA D E AE C AD E A C E D ED A A A E EA A ED D A E E D A E ED E E CE

More information

Canadian Aero Manufacturing Applicability list for CAM Lycoming Oil Pump replacement parts

Canadian Aero Manufacturing Applicability list for CAM Lycoming Oil Pump replacement parts Issue Date August 7, 2002 Print Date 27/02/09 Revision: 5 Page 1 of 5 This applicability list is approved by PDA00-17, and its eligibility list CA-L-01 issued October 30 2001, or later approved revision.

More information

Honors Algebra 2 Learning Targets. Unit 1 - Equations and Inequalities Learning Target

Honors Algebra 2 Learning Targets. Unit 1 - Equations and Inequalities Learning Target Honors Algebra 2 s I can Unit 1 - Equations and Inequalities 1. Describe the subsets of the real numbers and show how they are related to one another. 2. Use the properties of real numbers to justify the

More information

Report of Independent Accountant on SSL CORP d/b/a SSL.COM CA s Root Key Generation

Report of Independent Accountant on SSL CORP d/b/a SSL.COM CA s Root Key Generation Tel: 314-889-1100 Fax: 314-889-1101 www.bdo.com 101 South Hanley Road, Suite 800 St. Louis, MO 63105 Report of Independent Accountant on SSL CORP d/b/a SSL.COM CA s Root Key Generation To The Management

More information

Appendix A: Evolutionary dynamics

Appendix A: Evolutionary dynamics Supporting Information (Appendixes) Appendix A: Evolutionary dynamics The quantitative genetic model of the evolutionary dynamics (Iwasa et al. 1991) is rearranged as follows (Yamauchi and Yamamura 2004):

More information

PROVU Series Modbus Register Tables

PROVU Series Modbus Register Tables PRECISION DIGITAL CORPORATION 89 October Hill Road Holliston, MA 01746 USA Tel(508) 655-7300 Fax(508) 655-8990 www.predig.com WARNING As is typical with most instruments, the addition of serial communications

More information

Dallas DS1620 Digital Thermometer Cornerstone Electronics Technology and Robotics II

Dallas DS1620 Digital Thermometer Cornerstone Electronics Technology and Robotics II Dallas DS1620 Digital Thermometer Cornerstone Electronics Technology and Robotics II Administration: o Prayer PicBasic Pro Programs Used in The DS1620 Lesson: o General PicBasic Pro Program Listing: http://www.cornerstonerobotics.org/picbasic.php

More information

Roman 8 Character Set Codes

Roman 8 Character Set Codes Roman 8 Character Set Codes Roman 8 Character Set Codes Roman 8 Character Set Codes ASCII HEX DEC OCT DESCRIPTION NULL 00 0 000 Null SOH 01 1 001 Start of heading STX 02 2 002 Start of text EXT 03 3 003

More information

COMPRESSION SPRINGS: STANDARD SERIES (INCH)

COMPRESSION SPRINGS: STANDARD SERIES (INCH) : STANDARD SERIES (INCH) LC 014A 01 0.250 6.35 11.25 0.200 0.088 2.24 F F M LC 014A 02 0.313 7.94 8.90 0.159 0.105 2.67 F F M LC 014A 03 0.375 9.52 7.10 0.126 0.122 3.10 F F M LC 014A 04 0.438 11.11 6.00

More information

Side trigger event. Limitations that are important for users of the Bosch Crash Data Retrieval (CDR) tool on this Ford product to know

Side trigger event. Limitations that are important for users of the Bosch Crash Data Retrieval (CDR) tool on this Ford product to know IMPORTANT NOTICE: Robert Bosch LLC and the manufacturers whose vehicles are accessible using the CDR System urge end users to use the latest production release of the Crash Data Retrieval system software

More information

HANDBOOK ON INDUSTRIAL PROPERTY INFORMATION AND DOCUMENTATION. Ref.: Standards ST.17 page: STANDARD ST.17

HANDBOOK ON INDUSTRIAL PROPERTY INFORMATION AND DOCUMENTATION. Ref.: Standards ST.17 page: STANDARD ST.17 Ref.: Standards ST.17 page: 3.17.1 STANDARD ST.17 RECOMMENDATION FOR THE CODING OF HEADINGS OF ANNOUNCEMENTS MADE IN OFFICIAL GAZETTES INTRODUCTION 1. This recommendation is intended to improve the informative

More information

CROSS REFERENCE. Cross Reference Index 110-122. Cast ID Number 110-111 Connector ID Number 111 Engine ID Number 112-122. 2015 Ford Motor Company 109

CROSS REFERENCE. Cross Reference Index 110-122. Cast ID Number 110-111 Connector ID Number 111 Engine ID Number 112-122. 2015 Ford Motor Company 109 CROSS REFERENCE Cross Reference Index 110-122 Cast ID Number 110-111 Connector ID Number 111 112-122 2015 Ford Motor Company 109 CROSS REFERENCE Cast ID Number Cast ID Ford Service # MC Part # Part Type

More information

IMAGE SEGMENTATION FROM TEXTURE MEASUREMENT

IMAGE SEGMENTATION FROM TEXTURE MEASUREMENT IMAGE SEGMENTATION FROM TEXTURE MEASUREMENT Dong-Cheon Lee Toni Schenk Department of Geodetic Science and Surveying The Ohio State University Columbus, OH 43210-1247 U.S.A. Commission III ABSTRACT It is

More information

PERCEIVING OBJECTS. Different Approaches. Visual Perception. Circuits & Brain Areas. Brain. Physiological Approach. Individual Features

PERCEIVING OBJECTS. Different Approaches. Visual Perception. Circuits & Brain Areas. Brain. Physiological Approach. Individual Features PERCEIVING OBJECTS Visual Perception Different Approaches Molecules Neurons Circuits & Brain Areas Brain Physiological Approach Individual Features Groups of Features Objects Scenes Psychophysical Approach

More information

How to create OpenDocument URL s with SAP BusinessObjects BI 4.0

How to create OpenDocument URL s with SAP BusinessObjects BI 4.0 How to create OpenDocument URL s with SAP BusinessObjects BI 4.0 Creator: Twitter: Blog: Pieter Verstraeten http://www.twitter.com/pverstraeten http://www.pieterverstraeten.com/blog Hi, Thanks for downloading

More information

The ASCII Character Set

The ASCII Character Set The ASCII Character Set The American Standard Code for Information Interchange or ASCII assigns values between 0 and 255 for upper and lower case letters, numeric digits, punctuation marks and other symbols.

More information

RECOMMENDATION ITU-R BT *, **

RECOMMENDATION ITU-R BT *, ** Rec. ITU-R BT.1381-1 1 RECOMMENDATION ITU-R BT.1381-1 *, ** Serial digital interface-based transport interface for compressed television signals in networked television production based on Recommendations

More information

SL-8800 HDCP 2.2 and HDCP 1.x Protocol Analyzer for HDMI User Guide

SL-8800 HDCP 2.2 and HDCP 1.x Protocol Analyzer for HDMI User Guide SL-8800 HDCP 2.2 and HDCP 1.x Protocol Analyzer for HDMI Simplay-UG-02003-A July 2015 Contents 1. Overview... 4 1.1. SL-8800 HDCP Protocol Analyzer Test Equipment... 4 1.2. HDCP 2.2/HDCP 1.x Protocol Analyzer

More information

0242-1. HSR TRAINING COURSE REQUIREMENTS HSR Training Course Guidance Booklet 2

0242-1. HSR TRAINING COURSE REQUIREMENTS HSR Training Course Guidance Booklet 2 0242-1 HSR TRAINING COURSE REQUIREMENTS HSR Training Course Guidance Booklet 2 SafeWork SA 2 Contents Introduction... 4 Learning resources... 4 PART 1 UNDERPINNING PRINCIPLES FOR THE DEVELOPMENT OF A SAFEWORK

More information

Sent sent. lavoro licenziamento marittimo ISSN Pubblicato dal 01/04/2010

Sent sent. lavoro licenziamento marittimo ISSN Pubblicato dal 01/04/2010 ISSN 1127-8579 Pubblicato dal 01/04/2010 All'indirizzo http://www.diritto.it/docs/29254-tribunale-di-modica-giudice-del-lavoro-dottssa-sandra-levanti-sentenza-n-74-2008-in-tema-di-irrogazione-di-sanzione-disciplinarenell-ambito-di-rapporto-di-lavoro-nel-settore-marittimo

More information

Indeterminate Analysis Force Method 1

Indeterminate Analysis Force Method 1 Indeterminate Analysis Force Method 1 The force (flexibility) method expresses the relationships between displacements and forces that exist in a structure. Primary objective of the force method is to

More information

TUPAS IDENTIFICATION SERVICE FOR SERVICE PROVIDERS. Service Description and Service Provider s Guidelines

TUPAS IDENTIFICATION SERVICE FOR SERVICE PROVIDERS. Service Description and Service Provider s Guidelines TUPAS IDENTIFICATION SERVICE FOR SERVICE PROVIDERS Service Description and Service Provider s Guidelines Version 2.3c 20 January 2011 1 (16) Contents 1 Tupas service features... 3 2 Service security...

More information

Luxembourg (Luxembourg): Trusted List

Luxembourg (Luxembourg): Trusted List Luxembourg (Luxembourg): Trusted List Institut Luxembourgeois de la Normalisation, de l'accréditation de la Sécurité et qualité des produits et services Scheme Information TSL Version 4 TSL Sequence Number

More information

Service Instruction. 1.0 SUBJECT: ECi Accessory Cases for Lycoming 4-Cylinder engines with single magneto configurations and TITAN 361 Engines

Service Instruction. 1.0 SUBJECT: ECi Accessory Cases for Lycoming 4-Cylinder engines with single magneto configurations and TITAN 361 Engines Title: Service Instruction ECi Accessory Cases Installed on Engines S.I. No.: 03-1 Page: 1 of 7 Issued: 2/28/2003 Revision: 2 (4/13/2009) Technical Portions are FAA DER Approved. 1.0 SUBJECT: ECi Accessory

More information

URL encoding uses hex code prefixed by %. Quoted Printable encoding uses hex code prefixed by =.

URL encoding uses hex code prefixed by %. Quoted Printable encoding uses hex code prefixed by =. ASCII = American National Standard Code for Information Interchange ANSI X3.4 1986 (R1997) (PDF), ANSI INCITS 4 1986 (R1997) (Printed Edition) Coded Character Set 7 Bit American National Standard Code

More information

\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x4d\x04\ \xff\x00\x1d\x01\x04\x45\x54\x68\x65\x20\x54\x69\x6d\x65\x73\x20\x30\x33\

\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x4d\x04\ \xff\x00\x1d\x01\x04\x45\x54\x68\x65\x20\x54\x69\x6d\x65\x73\x20\x30\x33\ \xf9\xbe\xb4\xd9\x1d\x01\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\ \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\ \x00\x00\x00\x00\x00\x00\x3b\xa3\xed\xfd\x7a\x7b\x12\xb2\x7a\xc7\x2c\x3e\

More information

KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard

KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard Dr. Gavekort c/o Vakiopaine Bar Kauppakatu 6, 41 Jyväskylä FINLAND mjos@iki.fi Abstract. We have discovered that the

More information

3. April 2013 IT ZERTIFIKATE. Zertifizierungsstellen / Certification Center. IT Sicherheit UNTERNEHMENSBEREICH IT

3. April 2013 IT ZERTIFIKATE. Zertifizierungsstellen / Certification Center. IT Sicherheit UNTERNEHMENSBEREICH IT IT Sicherheit UNTERNEHMENSBEREICH IT IT ZERTIFIKATE 3. April 2013 Zertifizierungsstellen / Certification Center D-TRUST D-Trust Root Class 2 CA2007 Aussteller/Issuer: D-TRUST Root Class 2 CA 2007 Gültig

More information

VISIX V-Series All-in-One Cameras VX-2AD3-IWD Quick Start Guide v VISIX Camera Quick Start Guide VX-2AD3-IWD

VISIX V-Series All-in-One Cameras VX-2AD3-IWD Quick Start Guide v VISIX Camera Quick Start Guide VX-2AD3-IWD VISIX V-Series All-in-One Cameras VX-2AD3-IWD Quick Start Guide v01-2016 10225 Westmoor Drive, Suite 300, Westminster, CO 80021 www.3xlogic.com (877) 3XLOGIC 1 Table of Contents 1 Part Names and Positions...

More information

White Paper Converting from 7-bit to 8-bit character set in BS2000

White Paper Converting from 7-bit to 8-bit character set in BS2000 White Paper Converting from 7-bit to 8-bit character set in BS2000 When processing data, the BS2000 system uses a 7-bit EBCDIC character set as standard, making 95 different characters available. With

More information

ASCII CODES WITH GREEK CHARACTERS

ASCII CODES WITH GREEK CHARACTERS ASCII CODES WITH GREEK CHARACTERS Dec Hex Char Description 0 0 NUL (Null) 1 1 SOH (Start of Header) 2 2 STX (Start of Text) 3 3 ETX (End of Text) 4 4 EOT (End of Transmission) 5 5 ENQ (Enquiry) 6 6 ACK

More information

CHAPTER 6 Space Trusses

CHAPTER 6 Space Trusses CHAPTER 6 Space Trusses INTRODUCTION A space truss consists of members joined together at their ends to form a stable threedimensional structures A stable simple space truss can be built from the basic

More information

Content-Based Image Retrieval ---Challenges & Opportunities

Content-Based Image Retrieval ---Challenges & Opportunities Content-Based Image Retrieval ---Challenges & Opportunities Jianping Fan Department of Computer Science University of North Carolina at Charlotte Charlotte, NC 28223 Networks How can I access image/video

More information

BRASS PIPE FITTINGS. 90 Female Elbow 100-A 1/8 100-B 1/4 100-C 3/8 100-D 1/2 * C100-E 3/4 * C100-F 1 * C100-G 1-1/4 * C100-H 1-1/2 * C100-I 2

BRASS PIPE FITTINGS. 90 Female Elbow 100-A 1/8 100-B 1/4 100-C 3/8 100-D 1/2 * C100-E 3/4 * C100-F 1 * C100-G 1-1/4 * C100-H 1-1/2 * C100-I 2 Characteristics Available in a wide variety of shapes and sizes. Many of the shapes are available as either an extrusion or as a forging. Sizes over 3/4 N.P.T. are generally supplied as a cast fitting.

More information

VM7000A PAPERLESS RECORDER COMMUNICATION FUNCTION OPERATION MANUAL

VM7000A PAPERLESS RECORDER COMMUNICATION FUNCTION OPERATION MANUAL Graficzne rejestratory temperatury VM7000A http://acse.pl VM7000A PAPERLESS RECORDER COMMUNICATION FUNCTION OPERATION MANUAL WXPVM70mnA0002E March, 2016(Rev.6) Copyright 2009-2016, Ohkura Electric Co.,Ltd.

More information

HTML Codes - Characters and symbols

HTML Codes - Characters and symbols ASCII Codes HTML Codes Conversion References Control Characters English version Versión español Click here to add this link to your favorites. HTML Codes - Characters and symbols Standard ASCII set, HTML

More information

KNIGHT M : A Multi-Camera Surveillance System

KNIGHT M : A Multi-Camera Surveillance System KNIGHT M : A Multi-Camera Surveillance System Omar Javed and Mubarak Shah Computer Vision Lab, University of Central Florida, Orlando, Fl 32816 {ojaved,shah}@cs.ucf.edu Abstract In this paper, we present

More information

Socorro Consolidated Schools Tenth Grade Content Map

Socorro Consolidated Schools Tenth Grade Content Map Strand: Reading and Listening for Comprehension Content Standard I: Students will apply strategies and skills to comprehend information that is read, heard, and viewed. LA.I-A.1a Produce reminiscences

More information

Embargos de Declaração no Processo do Trabalho

Embargos de Declaração no Processo do Trabalho ISSN 1127-8579 Pubblicato dal 12/03/2013 All'indirizzo http://www.diritto.it/docs/34770-embargos-de-declara-o-no-processo-dotrabalho Autore: José Geraldo da Fonseca Embargos de Declaração no Processo do

More information

Walton County Public Schools Balanced Scorecard

Walton County Public Schools Balanced Scorecard Walton County Public Schools Balanced Scorecard 1. Safe and Disciplined Schools 1.1 - Collaborating with the community 1.2 - Reducing Class II and Class III offenses 1.3 - Clarify duties of Resource Officers

More information

The first 32 characters in the ASCII-table are unprintable control codes and are used to control peripherals such as printers.

The first 32 characters in the ASCII-table are unprintable control codes and are used to control peripherals such as printers. The following ASCII table contains both ASCII control characters, ASCII printable characters and the extended ASCII character set ISO 8859-1, also called ISO Latin1 The first 32 characters in the ASCII-table

More information

What do you see? Lecture 5 3D Visual Perception. Depth Perception. Which circle is larger?

What do you see? Lecture 5 3D Visual Perception. Depth Perception. Which circle is larger? What do you see? Lecture 5 3D Visual Perception 1.Depth Perception 2.Perceptual Organization 3.Visual Completion 4.Object Recognition 1/68 2/68 Which circle is larger? Depth Perception Binocular Cues:

More information

Break-Out Box User Manual

Break-Out Box User Manual www.opal-rt.com Break-Out Box User Manual Published by Opal-RT Technologies, Inc. Richardson, suite Montreal, Quebec, Canada HK G www.opal-rt.com 0 Opal-RT Technologies, Inc. All rights reserved Printed

More information

CONSTRUCTION Straights and shapes are manufactured from CA360, CA345 or CA377 brass

CONSTRUCTION Straights and shapes are manufactured from CA360, CA345 or CA377 brass PIPE FITTINGS CONSTRUCTION Straights and shapes are manufactured from CA360, CA345 or CA377 brass ADVANTAGES Large range of styles and sizes Some shapes are offered in either extruded or forged patterns

More information

A EE A D A DE B CD A D BB B F A

A EE A D A DE B CD A D BB B F A Proceedings of the International Multiconference on Computer Science and Information Technology pp. 831 836 ISBN 978-83-60810-27-9 ISSN 1896-7094 AEEADADEBCDADBBBFA EBEBBBBE EBE BEBCFCFBCDBBFAFEA CFDABBDE

More information

Advanced Video Analysis & Imaging (5LSH0), Module 10A

Advanced Video Analysis & Imaging (5LSH0), Module 10A Advanced Video Analysis & Imaging (5LSH0), Module 10A Case Study 1: 3D Camera Modeling-Based Sports Video Analysis Peter H.N. de With & Jungong Han ( jp.h.n.de.with@tue.nl ) 1 Motivation System overview

More information

CMOS TYPE CAMERA JC403M-W01

CMOS TYPE CAMERA JC403M-W01 CMOS TYPE CAMERA JC403M-W01 Application The JC403M-W01 JPEG compression module performs as a video camera or a JPEG compressed still camera and can be fixed into all kinds of system. For example: remote

More information

Machine Language to Assembly Language Conversion Table

Machine Language to Assembly Language Conversion Table Machine Language to Assembly Language Conversion Table 1 Mode 00 * 01 NOP No operation Inherent 1 02 * 03 * 04 * 05 * 06 TAP Transfer from accumulator A to process code register Number Inherent 1 07 TPA

More information

NFC Forum IoT Library Inventory

NFC Forum IoT Library Inventory Aa Type 4 Tag MIFARE DESFire EV1 8 Kbyte Sample Card, Type 4 Tag With URL or Vcard Ab Type 2 Tag Mifare Ultralight Tag Type 2 Tag Sticker With Smart Poster URL Ac Type 2 Tag MIFARE Ultralight C 1 sample

More information

Magic Squares and Modular Arithmetic

Magic Squares and Modular Arithmetic Magic Squares and Modular Arithmetic Jim Carlson November 7, 2001 1 Introduction Recall that a magic square is a square array of consecutive distinct numbers such that all row and column sums and are the

More information

Community College of Philadelphia Calling Code 218 Employer Scan Client Approved: November 17, 2005 Region (CIRCLE) City MSA

Community College of Philadelphia Calling Code 218 Employer Scan Client Approved: November 17, 2005 Region (CIRCLE) City MSA Community College of Philadelphia Calling Code 218 Employer Scan Client Approved: November 17, 2005 Region (CIRCLE) City MSA Zip V0 V1 V2 Month/ Day/ Year of Contact: Business Name: Address: V3 City: V4

More information

input data (SXAL/MBAL) 8 byte/ byte output data (SXAL/MBAL) 8 byte/ byte

input data (SXAL/MBAL) 8 byte/ byte output data (SXAL/MBAL) 8 byte/ byte ,.. co'" -",c "e._c' " "c",'"'"'"""""""""""~,.,~oqq" 10012.. SXAL / MBAL ( a) ISO entry name ~ i.50 sl-a."lq..4"k q~.,cj.sx.o-l-",ba.l (12..)} ( b) Proprietary entry name Substitution Xor ALgorithm ( S

More information

Lecture VI : Secret Key Cryptography

Lecture VI : Secret Key Cryptography Lecture VI : Secret Key Cryptography Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University Spring 2012 Internet Security

More information

EMV (Chip-and-PIN) Protocol

EMV (Chip-and-PIN) Protocol EMV (Chip-and-PIN) Protocol Märt Bakhoff December 15, 2014 Abstract The objective of this report is to observe and describe a real world online transaction made between a debit card issued by an Estonian

More information

a) b) c) d) Figure 2: Gabor Transformation a) Gabor wavelets of four dierent orientations. b) An image and the Gabor responses corresponding to the ke

a) b) c) d) Figure 2: Gabor Transformation a) Gabor wavelets of four dierent orientations. b) An image and the Gabor responses corresponding to the ke Collinearity and arallism are Signicant Second Order Relations of Gabor Wavelet Responses Norbert Kruger Abstract By investigating the second order statistics of Gabor wavelet responses derived from natural

More information

A DIVISION OF THE MENO. Meno proposes a question: whether virtue can be taught. Three conversations or discussions following question

A DIVISION OF THE MENO. Meno proposes a question: whether virtue can be taught. Three conversations or discussions following question A DIVISION OF THE MENO 70A 70B-100B Meno proposes a question: whether virtue can be taught Three conversations or discussions following question 70B-80D Conversation on a question before Meno's: what is

More information

CS664 Lecture #20: Epipolar geometry, edge detection

CS664 Lecture #20: Epipolar geometry, edge detection CS664 Lecture #20: Epipolar geometry, edge detection Estimating epipolar geometry Assume for the moment that all intrinsic parameters are known Essential Matrix E captures the geometry Mapping from a point

More information

International Journal of Advancements in Research & Technology, Volume 2, Issue4, April ISSN

International Journal of Advancements in Research & Technology, Volume 2, Issue4, April ISSN International Journal of Advancements in Research & Technology, Volume 2, Issue4, April-2013 167 A NEW APPORACH TO OPTICAL CHARACTER RECOGNITION BASED ON TEXT RECOGNITION IN OCR Dr. Rajnesh Kumar (rajnesh.gcnagina@gmail.com)

More information

MODBUS- Protocol BR6000 Version 6.0 and higher (issue 02/2012) Function code 3: read only registers. Address Address HIGH-BYTE LOW-BYTE

MODBUS- Protocol BR6000 Version 6.0 and higher (issue 02/2012) Function code 3: read only registers. Address Address HIGH-BYTE LOW-BYTE MODBUS- Protocol BR6000 Version 6.0 and higher (issue 02/2012) Function code 3: read only registers Address Address HIGH-BYTE LOW-BYTE 0 0000 Reactive power H 1 01 Reactive power L 2 02 Active power H

More information

Image Analysis and Pattern Recognition 1

Image Analysis and Pattern Recognition 1 Image Analysis and Pattern Recognition 1 What is Image analysis is the extraction of meaningful information from images; mainly from digital images by means of digital image processing techniques. Image

More information

Robert Collins Robert Collins CSE486, Penn State CSE486, Penn State Appearance-Based Tracking Lecture 29: Video Tracking: Mean-Shift

Robert Collins Robert Collins CSE486, Penn State CSE486, Penn State Appearance-Based Tracking Lecture 29: Video Tracking: Mean-Shift Appearance-Based Tracking current frame + previous location Lecture 29: Video Tracking: Mean-Shift likelihood over object location current location appearance model (e.g. image template, or Mode-Seeking

More information