文档库 最新最全的文档下载
当前位置:文档库 › 人脸识别文献翻译(中英双文)

人脸识别文献翻译(中英双文)

人脸识别文献翻译(中英双文)
人脸识别文献翻译(中英双文)

4 Two-dimensional Face Recognition

4.1 Feature Localization

Before discussing the methods of comparing two facial images we now take a brief look at some at the preliminary processes of facial feature alignment. This process typically consists of two stages: face detection and eye localization. Depending on the application, if the position of the face within the image is known beforehand (for a cooperative subject in a door access system for example) then the face detection stage can often be skipped, as the region of interest is already known. Therefore, we discuss eye localization here, with a brief discussion of face detection in the literature review .

The eye localization method is used to align the 2D face images of the various test sets used throughout this section. However, to ensure that all results presented are representative of the face recognition accuracy and not a product of the performance of the eye localization routine, all image alignments are manually checked and any errors corrected, prior to testing and evaluation.

We detect the position of the eyes within an image using a simple template based method. A training set of manually pre-aligned images of faces is taken, and each image cropped to an area around both eyes. The average image is calculated and used as a template.

Figure 4-1 The average eyes. Used as a template for eye detection.

Both eyes are included in a single template, rather than individually searching for each eye in turn, as the characteristic symmetry of the eyes either side of the nose, provide a useful feature that helps distinguish between the eyes and other false positives that may be picked up in the background. Although this method is highly susceptible to scale (i.e. subject distance from the camera) and also introduces the assumption that eyes in the image appear near horizontal. Some preliminary experimentation also reveals that it is advantageous to include the area of skin just beneath the eyes. The reason being that in some cases the eyebrows can closely match the template, particularly if there are shadows in the eye-sockets, but the area of skin below the eyes helps to distinguish the eyes from eyebrows (the area just below the eyebrows contain eyes, whereas the area below the eyes contains only plain skin).

A window is passed over the test images and the absolute difference taken to that of the average eye image shown above. The area of the image with the lowest difference is taken as the region of interest containing the eyes. Applying the same procedure using a smaller template of the individual left and right eyes then refines each eye position.

This basic template-based method of eye localization, although providing fairly precise localizations, often fails to locate the eyes completely. However, we are able to improve performance by including a weighting scheme.

Eye localization is performed on the set of training images, which is then separated into two sets: those in which eye detection was successful; and those in which eye detection failed. Taking the set of successful localizations we compute the average distance from the eye template (Figure 4-2 top). Note that the image is quite dark, indicating that the detected eyes correlate closely to the eye template, as we would expect. However, bright points do occur near the whites of the eye, suggesting that this area is often inconsistent, varying greatly from the average eye template.

Figure 4-2 – Distance to the eye template for successful detections (top) indicating variance due to noise and failed detections (bottom) showing credible variance due to miss-detected features.

In the lower image (Figure 4-2 bottom), we have taken the set of failed localizations(images of the forehead, nose, cheeks, background etc. falsely detected by the localization routine) and once again computed the average distance from the eye template. The bright pupils surrounded by darker areas indicate that a failed match is often due to the high correlation of the nose and cheekbone regions overwhelming the poorly correlated pupils. Wanting to emphasize the difference of the pupil regions for these failed matches and minimize the variance of the whites of the eyes for successful matches, we divide the lower image values by the upper image to produce a weights vector as shown in Figure 4-3. When applied to the difference image before summing a total error, this weighting scheme provides a much improved detection rate.

Figure 4-3 - Eye template weights used to give higher priority to those pixels that best represent the

eyes.

4.2 The Direct Correlation Approach

We begin our investigation into face recognition with perhaps the simplest approach, known as the direct correlation method (also referred to as template matching by Brunelli and Poggio) involving the direct comparison of pixel intensity values taken from facial images. We use the term ‘Direct Correlation’ to encompass all techniques in which face images are compared directly, without any form of image space analysis, weighting schemes or feature extraction, regardless of the distance metric used. Therefore, we do not infer that Pearson’s correlation is applied as the similarity function (although such an approach would obviously come under our definition of direct correlation). We typically use the Euclidean distance as our metric in these investigations (inversely related to Pearson’s correlation and can be considered as a scale and translation sensitive form of image correlation), as this persists with the contrast made between image space and subspace approaches in later sections.

Firstly, all facial images must be aligned such that the eye centers are located at two specified pixel coordinates and the image cropped to remove any background information. These images are stored as grayscale bitmaps of 65 by 82 pixels and prior to recognition converted into a vector of 5330 elements (each element containing the corresponding pixel intensity value). Each corresponding vector can be thought of as describing a point within a 5330 dimensional image space. This simple principle can easily be extended to much larger images: a 256 by 256 pixel image occupies a single point in 65,536-dimensional image space and again, similar images occupy close points within that space. Likewise, similar faces are located close together within the image space, while dissimilar faces are spaced far apart. Calculating the Euclidean distance d, between two facial image vectors (often referred to as the query image q, and gallery image g), we get an indication of similarity. A threshold is then applied to make the final verification decision.

4.2.1 Verification Tests

The primary concern in any face recognition system is its ability to correctly verify a claimed identity or determine a person's most likely identity from a set of potential matches in a database. In order to assess a given system’s ability to perform these tasks, a variety of evaluation methodologies have arisen. Some of these analysis methods simulate a specific mode of operation (i.e. secure site access or surveillance), while others provide a more mathematical description of data distribution in some classification space. In addition, the results generated from each analysis method may be presented in a variety of formats. Throughout the experimentations in this thesis, we primarily use the verification test as our

method of analysis and comparison, although we also use Fisher’s Linear Discriminate to analyze individual subspace components in section 7 and the identification test for the final evaluations described in section 8. The ver ification test measures a system’s ability to correctly accept or reject the proposed identity of an individual. At a functional level, this reduces to two images being presented for comparison, for which the system must return either an acceptance (the two images are of the same person) or rejection (the two images are of different people). The test is designed to simulate the application area of secure site access. In this scenario, a subject will present some form of identification at a point of entry, perhaps as a swipe card, proximity chip or PIN number. This number is then used to retrieve a stored image from a database of known subjects (often referred to as the target or gallery image) and compared with a live image captured at the point of entry (the query image). Access is then granted depending on the acceptance/rejection decision.

The results of the test are calculated according to how many times the accept/reject decision is made correctly. In order to execute this test we must first define our test set of face images. Although the number of images in the test set does not affect the results produced (as the error rates are specified as percentages of image comparisons), it is important to ensure that the test set is sufficiently large such that statistical anomalies become insignificant (for example, a couple of badly aligned images matching well). Also, the type of images (high variation in lighting, partial occlusions etc.) will significantly alter the results of the test. Therefore, in order to compare multiple face recognition systems, they must be applied to the same test set.

However, it should also be noted that if the results are to be representative of system performance in a real world situation, then the test data should be captured under precisely the same circumstances as in the application environment. On the other hand, if the purpose of the experimentation is to evaluate and improve a method of face recognition, which may be applied to a range of application environments, then the test data should present the range of difficulties that are to be overcome. This may mean including a greater percentage of ‘difficult’ images than would be expected in the perceived operating conditions and hence higher error rates in the results produced. Below we provide the algorithm for executing the verification test. The algorithm is applied to a single test set of face images, using a single function call to the face recognition algorithm: Compare Faces (FaceA, FaceB). This call is used to compare two facial images, returning a distance score indicating how dissimilar the two face images are: the lower the score the more similar the two face images. Ideally, images of the same face should produce low scores, while images of different faces should produce high scores.

Every image is compared with every other image, no image is compared with itself and no pair is compared more than once (we assume that the relationship is symmetrical). Once two images have been compared, producing a similarity score, the ground-truth is used to determine if the images are of the same person or different people. In practical tests this information is often encapsulated as part of the image filename (by means of a unique person identifier). Scores are then stored in one of two lists: a list containing scores produced by comparing images of different people and a list containing scores produced by comparing images of the same person. The final acceptance/rejection decision is made by application of a threshold. Any incorrect decision is recorded as either a false acceptance or false rejection. The false rejection rate (FRR) is calculated as the percentage of scores from the same people that were classified as rejections. The false acceptance rate (FAR) is calculated as the percentage of scores from different people that were classified as acceptances.

These two error rates express the inadequacies of the system when operating at a specific threshold value. Ideally, both these figures should be zero, but in reality reducing either the FAR or FRR (by altering the threshold value) will inevitably result in increasing the other. Therefore, in order to describe the full operating range of a particular system, we vary the threshold value through the entire range of scores produced. The application of each threshold value produces an additional FAR, FRR pair, which when plotted on a graph produces the error rate curve shown below.

Figure 4-5 - Example Error Rate Curve produced by the verification test.

The equal error rate (EER) can be seen as the point at which FAR is equal to FRR. This EER value is often used as a single figure representing the general recognition performance of a biometric system and allows for easy visual comparison of multiple methods. However, it is important to note that the EER does not indicate the level of error

that would be expected in a real world application. It is unlikely that any real system would use a threshold value such that the percentage of false acceptances was equal to the percentage of false rejections. Secure site access systems would typically set the threshold such that false acceptances were significantly lower than false rejections: unwilling to tolerate intruders at the cost of inconvenient access denials.

Surveillance systems on the other hand would require low false rejection rates to successfully identify people in a less controlled environment. Therefore we should bear in mind that a system with a lower EER might not necessarily be the better performer towards the extremes of its operating capability.

There is a strong connection between the above graph and the receiver operating characteristic (ROC) curves, also used in such experiments. Both graphs are simply two visualizations of the same results, in that the ROC format uses the True Acceptance Rate (TAR), where TAR = 1.0 –FRR in place of the FRR, effectively flipping the graph vertically. Another visualization of the verification test results is to display both the FRR and FAR as functions of the threshold value. This presentation format provides a reference to determine the threshold value necessary to achieve a specific FRR and FAR. The EER can be seen as the point where the two curves intersect.

Figure 4-6 - Example error rate curve as a function of the score threshold

The fluctuation of these error curves due to noise and other errors is dependant on the number of face image comparisons made to generate the data. A small dataset that only allows for a small number of comparisons will results in a jagged curve, in which large steps correspond to the influence of a single image on a high proportion of the comparisons made. A typical dataset of 720 images (as used in section 4.2.2) provides 258,840 verification operations, hence a drop of 1% EER represents an additional 2588 correct decisions, whereas the quality of a single image could cause the EER to fluctuate by up to

4 二维人脸识别

4.1 特征定位

在讨论两幅人脸图像的比较之前,我们先简单看下面部图像特征定位的初始过程。这一过程通常有由两个阶段组成:人脸检测和眼睛定位。根据不同的应用,如果在面部图像是事先所知的(例如在门禁系统主题之中),因为所感知区域是已知的,那么人脸检测阶段通常是可以跳过的。因此,我们讨论眼睛定位的过程中,有一个人脸检测文献的简短讨论。眼睛定位适用于对齐的各种测试二维人脸图像的方法通篇使用于这一节。但是,为了确保所有的结果都代表面部识别准确率,而不是对产品功能的眼睛定位,所有图像结果都是手动检查的。若有错误,则需要更正测试和评价。我们发现在一个使用图像的眼睛一个简单的基于模板的位置方法。

在一个区域中对前脸手动对齐图像进行采取和裁剪,以两只眼睛周围的区域,平均计算图像作为模板。

图4-1 - 平均眼睛,用作模板的眼睛检测

两个眼睛都包括在一个模板,而不是单独的为单个搜索,因为眼睛在鼻子两边对称的特点,这样就提供了一个可用方法,可以帮助区分眼睛和其他可能误报的背景。虽然这种方法介绍了假设眼睛水平的形象出现后很容易受到小距离的影响(即主体和相机的距离),但初步试验显示,还是利于包括眼睛下方的皮肤区域得到校准去的结果。因为在某些情况下,眉毛可以密切配合模板,特别是如果在眼睛区域的阴影周围。此外眼睛以下的皮肤面积有助于区分眉毛(眉毛下方的面积眼中包含的眼睛,而该地区眼睛下面的皮肤只含有纯色)。窗口区域是通过对测试图像和绝对差采取的这一平均眼睛上面显示的图像。图像的最低差额面积作为含有眼中感知的区域。运用同样的程序使用小模板单人左,右眼,然后提取每只眼睛的位置。

这个基本模板的眼睛定位方法,尽管提供了相当精确的本地化,但往往不能找到完全的眼睛区域。但是,我们能够改善性能和加权值。

眼睛定位是在执行图像处理,然后被分成集两套:哪些眼睛检测成功的,和哪些眼睛检测失败的。以成功的本地化处理,我们在计算平均距离眼睛模板(图4-2丁部)时,请注意,该图像是非常黑暗的,这表明发现眼睛密切相关的眼睛模板,正如我们期望的那样。然而,亮点确实发生在眼睛区域,表明这方面经常是不一致的,不同于普通模板。

图4-2 对眼睛模板成功检测(左),由于方差噪音和失败的检测(右)显示

在右侧的图像(图4-2右),前额,鼻子图像,脸颊,背景等采用了虚假的检测,并再次从眼睛计算了平均距离。明亮点由暗区包围表明,一个失败的匹配往往和鼻子和颧骨地区绝大多数的高相关性差相关。我们排除以上价值较低的图像产生的重矢量,如图4-3所示。应用到差分图像在总结前的误差,这个比重计划大大提高了检出率。

图 4-3

4.2直接相关方法

我们把最简单的人脸识别调查方法称为直接相关方法(也称为模板匹配的布鲁内利和波焦),其中所涉及的像素亮度值直接比较取自面部图像。我们使用术语'直接关系',以涵盖所有图像技术所面临的直接比较,以及没有任何形式的形象空间分析,加权计划或特征提取。因此,我们并不能推断皮尔逊函数的相关性,作为应用相似的功能(尽管这种做法显然会受到我们的直接相关的定义)。我们通常使用欧氏距离度量作为我们的调查结果(负相关,Pearson相关,可以考虑作为一个规模和翻译的图像相关敏感的形式),这还对比了后面的章节的空间和子空间图像方法。

首先,所有的面部图像必须保持一致,这样使眼睛在两个中心位于指定的像素坐标和裁剪,以消除任何背景中的图像信息。这些图像存储为65和82像素灰度位图前进入了5330元素(每个元素包含向量转换确认相应的像素强度值)。每一个对应的向量可以认为是在说明5330点的三维图像空间。这个简单的原则很容易被推广到更大的照片:由256像素的图像256占用一个在65,536维图像空间,并再次指出,类似的图像占据接近点在该空间。同样,类似的面孔靠近一起在图像空间,而不同的面间距相距甚远。计算欧几里得距离d,两个人脸图像向量(通常称为查询图像Q和画廊图像克),我们得到一个相似的迹象。然后用一个阈值,制作出最后核查结果。

4.2.1验证测试

任何一个人脸识别系统的主要关注点是它能够从一个潜在的集合数据库中正确地验证人脸的身份或确定一个人最可能的身份。为了评估一个给定的系统的能力是否能执行这些任务,我们可以采用不同的评价方法。其中一些分析方法模拟一个具体的运作模式(即安全网站的访问或监视),而其他人提供更多的数据分布(数学描述中

的一些分类空间)。此外,每个分析结果产生的方法可能提交的各种格式。在本论文的整个实验过程中,我们主要验证我们的方法分析和比较,以核查措施的测试系统的能力,是否能正确地接受或拒绝一个人的身份认证。在一个功能级别中,可以减少到两个图像的比较,该系统必须对任何一个接受返回(两个图像是同一人)或拒绝(两个不同的图像人)做出结论。该测试旨在模拟安全网站访问的应用领域。在这种情况下,主题将在某一入境点的身份证件,或是刷卡,接近芯片或PIN号码。用于检索数据库中的已知对象通常被称为目标(1存储的图像画廊或图像),并在入境点(捕获的现场图像比较查询图像)。能否通过访问是根据当时获得的接受/拒绝的决定而执行的。

测试结果计算出多少人的接受/拒绝决定是正确的。为了执行这项测试,我们必须首先确定我们的测试人脸图像集。虽然这些图像的测试集数量不会影响结果产生的准确性,但重要的是要确保测试集是足够大,这样才能使统计的异常变得不重要(例如,一个非常一致的匹配以及情侣的图像)。另外,影像的类型(照明高度变化,部分遮挡等)将明显改变的结果测试。因此,为了比较多个面部识别系统,这些图像必须适用于相同的测试集。还应该指出,如果系统性能的结果代表在现实世界中的情况,测试数据应在同样情况下所获得的。另一方面,如果该实验的目的是评估和完善人脸识别方法,是否可应用到产品所在的范围环境中,那么测试过程中困难,要尽量克服。这也可能意味着包含一个'难'的图片,产生较高的错误率的结果。

以下我们提供了执行验证测试的算法。该算法适用于单个测试人脸图像集,调用一个在人脸识别算法中的函数:CompareFaces(FaceA,FaceB)。这一函数是用来比较两个面部图像。返回距离的评分表明两个不同的人脸图像的相似度:得分越低越相似。理想情况下,相同的人脸图像生产低分数,而不同的人脸图像产生高分。每一个形象,与所有其他形象相比较,,并与自身比较不止一次(我们假设关系是对称的)。当两个图像进行比较,产生相似性评分,结果用于确定图像中是否为同一人或不同人。实际中这些信息往往是通过测试图片中部分独特的人标识符来确定结果。比较后存储在两个列表其中一个中:一份列出通过比较的不同人的形象清单,另一份列出通过分数比较产生的同一人图像清单。最终的接受/拒绝决定是由一个门槛决定。任何不正确的决定,记为虚假或错误拒绝接受。该错误拒绝率(FRR)的计算方法作为得分从被认为是在拒绝归类相同的百分比。该错误接受率(FAR)是按不同的分数比例被认为是在接受归类的人。

这两个错误率反映了系统的不足之处。理想情况下,这两个数字应该是零,但在现实中无论是远或近(通过改变阈值)将不可避免地导致在增加。因此,为了描述一个完整的工作范围尤其是在系统中的,我们通过不同的分数范围的阈值来产生数据。每个阈值应用程序产生一个额外的容积率,它绘制在图表上时产生的错误率曲线如下图所示。

图4-5 - 范例错误率曲线的验证测试生成

等错误率(能效比)可以被看作是点的远近所产生的值。这能效比值通常被用来作为一个单一的代表普遍承认的数字生物识别系统的性能和视觉比较容易允许多个方法。不过,重要的是要注意,能效比未注明级别错误,这将是在一个真实世界中的应用预期。这是不太可能有真正的系统将使用一个阈值,这样的虚假承兑百分比等于拒绝虚假的百分比。安全网站接入系统通常会设置的门槛,例如虚假承兑汇票均显着高于假的则拒绝:不容忍入侵者在访问不便否认成本。另一方面监控系统将要求低错误拒绝率成功地确定一个受控环境中的人少。因此,我们应该承担。记住,一个具有较低的能效比制度不一定是最好的表演实现其经营能力的极端。有一图形和接收器强大的连接操作特征(ROC)曲线,亦在此类实验中使用。这两个图是完全相同的结果,在这视觉效果,中国格式使用真验收率,其中有效地翻转图垂直。另一个验证试验结果的可视化的,而且同时显示了FRR和职能的阈值。此演示文稿格式提供一参照确定阈值要达到一个特定的FRR,该能效比可以被看作是点的两条曲线相交。

图4-6 - 范例错误作为得分率阈值函数曲线

这些错误的波动曲线,噪音和其他错误是由于人脸图像进行比较时产生的,便可生成数据。一个小的数据集包含一个比较小的数目和一条锯齿状曲线。720图像的一个典型的数据集所提供258840验证操作,因此下降1%的EER代表了一个额外的2588

的正确决策,而一个单一的图像质量可能会导致能效比波动达

中英文文献翻译

毕业设计(论文)外文参考文献及译文 英文题目Component-based Safety Computer of Railway Signal Interlocking System 中文题目模块化安全铁路信号计算机联锁系统 学院自动化与电气工程学院 专业自动控制 姓名葛彦宁 学号 200808746 指导教师贺清 2012年5月30日

Component-based Safety Computer of Railway Signal Interlocking System 1 Introduction Signal Interlocking System is the critical equipment which can guarantee traffic safety and enhance operational efficiency in railway transportation. For a long time, the core control computer adopts in interlocking system is the special customized high-grade safety computer, for example, the SIMIS of Siemens, the EI32 of Nippon Signal, and so on. Along with the rapid development of electronic technology, the customized safety computer is facing severe challenges, for instance, the high development costs, poor usability, weak expansibility and slow technology update. To overcome the flaws of the high-grade special customized computer, the U.S. Department of Defense has put forward the concept:we should adopt commercial standards to replace military norms and standards for meeting consumers’demand [1]. In the meantime, there are several explorations and practices about adopting open system architecture in avionics. The United Stated and Europe have do much research about utilizing cost-effective fault-tolerant computer to replace the dedicated computer in aerospace and other safety-critical fields. In recent years, it is gradually becoming a new trend that the utilization of standardized components in aerospace, industry, transportation and other safety-critical fields. 2 Railways signal interlocking system 2.1 Functions of signal interlocking system The basic function of signal interlocking system is to protect train safety by controlling signal equipments, such as switch points, signals and track units in a station, and it handles routes via a certain interlocking regulation. Since the birth of the railway transportation, signal interlocking system has gone through manual signal, mechanical signal, relay-based interlocking, and the modern computer-based Interlocking System. 2.2 Architecture of signal interlocking system Generally, the Interlocking System has a hierarchical structure. According to the function of equipments, the system can be divided to the function of equipments; the system

建筑类外文文献及中文翻译

forced concrete structure reinforced with an overviewRein Since the reform and opening up, with the national economy's rapid and sustained development of a reinforced concrete structure built, reinforced with the development of technology has been great. Therefore, to promote the use of advanced technology reinforced connecting to improve project quality and speed up the pace of construction, improve labor productivity, reduce costs, and is of great significance. Reinforced steel bars connecting technologies can be divided into two broad categories linking welding machinery and steel. There are six types of welding steel welding methods, and some apply to the prefabricated plant, and some apply to the construction site, some of both apply. There are three types of machinery commonly used reinforcement linking method primarily applicable to the construction site. Ways has its own characteristics and different application, and in the continuous development and improvement. In actual production, should be based on specific conditions of work, working environment and technical requirements, the choice of suitable methods to achieve the best overall efficiency. 1、steel mechanical link 1.1 radial squeeze link Will be a steel sleeve in two sets to the highly-reinforced Department with superhigh pressure hydraulic equipment (squeeze tongs) along steel sleeve radial squeeze steel casing, in squeezing out tongs squeeze pressure role of a steel sleeve plasticity deformation closely integrated with reinforced through reinforced steel sleeve and Wang Liang's Position will be two solid steel bars linked Characteristic: Connect intensity to be high, performance reliable, can bear high stress draw and pigeonhole the load and tired load repeatedly.

企业创新战略外文翻译文献

企业创新战略外文翻译文献(文档含中英文对照即英文原文和中文翻译) 翻译之一: Choosing an innovation strategy: theory and practice Author:Joseph T. Gilbert Nationality:America Derivation:Business Horizons, Nov-Dec, 1994 Innovations come as both inventions and adoptions. They come in many types and vary greatly in complexity and scope. Companies attempting to

make a profit cannot continue for long periods without innovating. If they try, their customers will leave them for firms with more up-to-date products or services. It is an observed fact that different companies take different approaches to the use of innovation in attempting to improve their performance. Both academic and practitioner publications in recent years have contained a great deal of writing about innovation, the subjects of which have ranged from comparisons of national patterns of innovation to studies of individual innovations. However, little has been published regarding one issue of both theoretical and practical importance: the innovation policy or strategy of individual firms. Business strategy as a field of study is concerned with how a company competes in its chosen business. It deals with the analysis of a firm's strengths and weaknesses and the opportunities and threats presented by the firm's environment. Strategy looks toward consistent execution of broad plans to achieve certain levels of performance. Innovation strategy determines to what degree and in what way a firm attempts to use innovation to execute its business strategy and improve its performance. To choose an innovation strategy, managers might logically start by thinking about various kinds of innovations and their requirements. We shall discuss three major features of innovation, and analyze each in terms of distinct opposites, even though innovations found in the real world more often appear at various points between these opposites. Innovation is sometimes used in a limited sense to refer only to inventions (products, services, or administrative procedures that no other firm has introduced). More often, however, it applies in a more general sense that includes both invention as described above and imitation (adoption by a firm of a product, service, or administrative procedure that is not an invention but is new to that firm). We use the term in this second sense. Innovations can be characterized in a variety of ways. In the following

文献翻译英文原文

https://www.wendangku.net/doc/a85016915.html,/finance/company/consumer.html Consumer finance company The consumer finance division of the SG group of France has become highly active within India. They plan to offer finance for vehicles and two-wheelers to consumers, aiming to provide close to Rs. 400 billion in India in the next few years of its operations. The SG group is also dealing in stock broking, asset management, investment banking, private banking, information technology and business processing. SG group has ventured into the rapidly growing consumer credit market in India, and have plans to construct a headquarters at Kolkata. The AIG Group has been approved by the RBI to set up a non-banking finance company (NBFC). AIG seeks to introduce its consumer finance and asset management businesses in India. AIG Capital India plans to emphasize credit cards, mortgage financing, consumer durable financing and personal loans. Leading Indian and international concerns like the HSBC, Deutsche Bank, Goldman Sachs, Barclays and HDFC Bank are also waiting to be approved by the Reserve Bank of India to initiate similar operations. AIG is presently involved in insurance and financial services in more than one hundred countries. The affiliates of the AIG Group also provide retirement and asset management services all over the world. Many international companies have been looking at NBFC business because of the growing consumer finance market. Unlike foreign banks, there are no strictures on branch openings for the NBFCs. GE Consumer Finance is a section of General Electric. It is responsible for looking after the retail finance operations. GE Consumer Finance also governs the GE Capital Asia. Outside the United States, GE Consumer Finance performs its operations under the GE Money brand. GE Consumer Finance currently offers financial services in more than fifty countries. The company deals in credit cards, personal finance, mortgages and automobile solutions. It has a client base of more than 118 million customers throughout the world

指纹识别系统(文献综述)

指纹识别方法的综述 摘 要: 对在指纹的预处理和特征提取、指纹分类、指纹的匹配过程中的方向图、滤波器、神经网络等关 键性原理和技术做了详细的说明,并对在各个过程中用到的方法做了进一步的比较,讨论了各种方法的优越性。 0 引 言 自动指纹识别是上世纪六十年代兴起的,利用计算机取代人工来进行指纹识别的一种方法。近年 来,随着计算机技术的飞速发展,低价位指纹采集仪的出现以及高可靠算法的实现,更使得自动指纹识 别技术越来越多地进入到人们的生活和工作中,自动指纹识别系统的研究和开发正在成为国内外学术 界和商业界的热点。相对于其他生物特征鉴别技术例如语音识别及虹膜识别,指纹识别具有许多独到 的优点,更重要的是它具有很高的实用性和可行性,已经被认为是一种理想的身份认证技术,有着十分 广泛的应用前景,是将来生物特征识别技术的主流。 1 指纹取像 图 1 是一个自动指纹识别系统AFIS(Automated Fingerprint Identification System) 的简单流程。 → → → ↓ ↑ ———— 将一个人的指纹采集下来输入计算机进行处理是指纹自动识别的首要步骤。指纹图像的获取主要利用设备取像,方便实用,比较适合AFIS 。利用设备取像的主要方法又利用光学设备、晶体传感器和超声波来进行。光学取像设备是根据光的全反射原理来设计的。晶体传感器取像是根据谷线和脊线皮肤与传感器之间距离不同而产生的电容不同来设计的。超声波设备取像也是采用光波来取像,但由于超声波波长较短,抗干扰能力较强,所以成像的质量非常好。 2 图像的预处理与特征提取 无论采取哪种方法提取指纹,总会给指纹图像带来各种噪声。预处理的目的就是去除图像中的噪 音,把它变成一幅清晰的点线图,以便于提取正确的指纹特征。预处理是指纹自动识别过程的第一步, 它的好坏直接影响着指纹识别的效果。常用的预处理与特征提取( Image Preprocessing and Feature Ex 2 t raction) 方法的主要步骤包括方向图计算、图像滤波、二值化、细化、提取特征和后处理。当然这些步骤 可以根据系统和应用的具体情况再进行适当变化。文献[ 1 ]提出了基于脊线跟踪的方法能够指纹取像 图像预处理 特征提取 指纹识别 数据库管理

科技外文文献译文

流动的:一个快速的,多平台的开放源码的同步化多媒体整合语言唱机Dick C.A. Bulterman, Jack Jansen, Kleanthis Kleanthous, Kees Blom and Daniel Benden CWI: Centrum voor Wiskunde en Informatica Kruislaan 413 1098 SJ Amsterdam, The Netherlands +31 20 592 43 00 Dick.Bulterman@cwi.nl 摘要: 本文概述了一个出现在早期的流动性的同步化多媒体唱机。不同于其它同步化的实现,早期的播放器是一个可重组的同步化引擎,可以定制作为一个实验媒体播放器的核心。同步化唱机是一个引用了同步化多媒体引擎并可以集成在一个广泛的媒体播放器的项目。本文是以我们要创造一个新的同步化引擎为动机的综述开始的。然后论述的是早期媒体播放器的核心架构(包括可扩展性,播放器自定义的集成装置)。我们以一个关于我们在windows,Mac,Linux版本应用于台式机以及PDA设备上实施流动性例子的体验的讨论结束。 类别和主题描述符: H.5.2 多媒体的信息系统。 H.5.4 超级文本/超级媒体。 一般词汇: 试验,性能,验证。 关键词: 同步化多媒体整合语言,唱机,公开源代码,演示。 1.动机: 早期公开的同步化媒体播放器是一个非常有特色的公开源代码的同步化 2.0播放器,它以研究团体的意图被使用(在我们的研究团体内外)目的是为了研究项目的团体在需要源代码的时候可以访问生产特性的同步化播放器的网站。它也被用作一个独立的不需要专有的媒体格式的同步化播放器使用,播放器支持一系列同步化2.0配置文件(包括台式机和移动的配置)可以被分配利用在Linux,Macintosh,windows系统的台式机,PDA设备和掌上电脑。 同时现存的几个同步化播放器,包括网络视频播放软件,IE浏览器,小型同步化播放器, GRiNS ,X- GRiNS ,以及各种各样专有移动设备,我们发展流动性唱机有三个原因: 准许制作数字以及个人或者课堂使用中的的全部硬拷贝即时没有提供拷贝权限或者商业性的利益分摊,而且在第一页有这种拷贝的注意事项。服务器上有关于复制以及翻版的分发列表的通知。需要事先明确具体的许可权以及费用。 'MM’04, October 10-16, 2004, New Y ork, New Y ork, USA. Copyright 2004 ACM 1-58113-893-8/04/0010...$5.00. 现有的同步化播放器没有提供一个完整同步化2.0播放器的正确实现。早期的播放器所有的同步化工具,是以同步化2.0语言的属性为基础加上扩展功能能够支持高级的动画以及规范可移动设备以3GPP/PSS-6同步化使用. 所有的同步化播放器都是针对商业SMIL表达专有媒介。早期的播发器使用开源的媒体解码器和开源的网络传输协议,以便播放器可以轻松定制广泛的使用范围的研究计划。 我们的目标是建立一个鼓励发展类似的多媒体研究输出的平台,,我们期望的是一个标准的基线播放器的供给,其他研究人员和开发机构可以集中精力到基线播放器的集成扩展(从新媒体的解码器或新的网络控制算法任何一个中)。这些扩展可以在其它的平台上被共享。 在2004年中期,与螺旋形客户机对照,同时移动到一个GPL核心,早期的播放器支持一个广阔的范围的同步化应用指标构架,它提供了一个准确实现的更完整的同步化语言,它在低资源配置下提供了更好的性能,提供了更多可扩展的媒体播放器架构。它也提供了一个包含所有媒体解码作为部分开放的客户基础。

英文文献翻译

中等分辨率制备分离的 快速色谱技术 W. Clark Still,* Michael K a h n , and Abhijit Mitra Departm(7nt o/ Chemistry, Columbia Uniuersity,1Veu York, Neu; York 10027 ReceiLied January 26, 1978 我们希望找到一种简单的吸附色谱技术用于有机化合物的常规净化。这种技术是适于传统的有机物大规模制备分离,该技术需使用长柱色谱法。尽管这种技术得到的效果非常好,但是其需要消耗大量的时间,并且由于频带拖尾经常出现低复原率。当分离的样本剂量大于1或者2g时,这些问题显得更加突出。近年来,几种制备系统已经进行了改进,能将分离时间减少到1-3h,并允许各成分的分辨率ΔR f≥(使用薄层色谱分析进行分析)。在这些方法中,在我们的实验室中,媒介压力色谱法1和短柱色谱法2是最成功的。最近,我们发现一种可以将分离速度大幅度提升的技术,可用于反应产物的常规提纯,我们将这种技术称为急骤色谱法。虽然这种技术的分辨率只是中等(ΔR f≥),而且构建这个系统花费非常低,并且能在10-15min内分离重量在的样本。4 急骤色谱法是以空气压力驱动的混合介质压力以及短柱色谱法为基础,专门针对快速分离,介质压力以及短柱色谱已经进行了优化。优化实验是在一组标准条件5下进行的,优化实验使用苯甲醇作为样本,放在一个20mm*5in.的硅胶柱60内,使用Tracor 970紫外检测器监测圆柱的输出。分辨率通过持续时间(r)和峰宽(w,w/2)的比率进行测定的(Figure 1),结果如图2-4所示,图2-4分别放映分辨率随着硅胶颗粒大小、洗脱液流速和样本大小的变化。

土木工程外文文献翻译

专业资料 学院: 专业:土木工程 姓名: 学号: 外文出处:Structural Systems to resist (用外文写) Lateral loads 附件:1.外文资料翻译译文;2.外文原文。

附件1:外文资料翻译译文 抗侧向荷载的结构体系 常用的结构体系 若已测出荷载量达数千万磅重,那么在高层建筑设计中就没有多少可以进行极其复杂的构思余地了。确实,较好的高层建筑普遍具有构思简单、表现明晰的特点。 这并不是说没有进行宏观构思的余地。实际上,正是因为有了这种宏观的构思,新奇的高层建筑体系才得以发展,可能更重要的是:几年以前才出现的一些新概念在今天的技术中已经变得平常了。 如果忽略一些与建筑材料密切相关的概念不谈,高层建筑里最为常用的结构体系便可分为如下几类: 1.抗弯矩框架。 2.支撑框架,包括偏心支撑框架。 3.剪力墙,包括钢板剪力墙。 4.筒中框架。 5.筒中筒结构。 6.核心交互结构。 7. 框格体系或束筒体系。 特别是由于最近趋向于更复杂的建筑形式,同时也需要增加刚度以抵抗几力和地震力,大多数高层建筑都具有由框架、支撑构架、剪力墙和相关体系相结合而构成的体系。而且,就较高的建筑物而言,大多数都是由交互式构件组成三维陈列。 将这些构件结合起来的方法正是高层建筑设计方法的本质。其结合方式需要在考虑环境、功能和费用后再发展,以便提供促使建筑发展达到新高度的有效结构。这并

不是说富于想象力的结构设计就能够创造出伟大建筑。正相反,有许多例优美的建筑仅得到结构工程师适当的支持就被创造出来了,然而,如果没有天赋甚厚的建筑师的创造力的指导,那么,得以发展的就只能是好的结构,并非是伟大的建筑。无论如何,要想创造出高层建筑真正非凡的设计,两者都需要最好的。 虽然在文献中通常可以见到有关这七种体系的全面性讨论,但是在这里还值得进一步讨论。设计方法的本质贯穿于整个讨论。设计方法的本质贯穿于整个讨论中。 抗弯矩框架 抗弯矩框架也许是低,中高度的建筑中常用的体系,它具有线性水平构件和垂直构件在接头处基本刚接之特点。这种框架用作独立的体系,或者和其他体系结合起来使用,以便提供所需要水平荷载抵抗力。对于较高的高层建筑,可能会发现该本系不宜作为独立体系,这是因为在侧向力的作用下难以调动足够的刚度。 我们可以利用STRESS,STRUDL 或者其他大量合适的计算机程序进行结构分析。所谓的门架法分析或悬臂法分析在当今的技术中无一席之地,由于柱梁节点固有柔性,并且由于初步设计应该力求突出体系的弱点,所以在初析中使用框架的中心距尺寸设计是司空惯的。当然,在设计的后期阶段,实际地评价结点的变形很有必要。 支撑框架 支撑框架实际上刚度比抗弯矩框架强,在高层建筑中也得到更广泛的应用。这种体系以其结点处铰接或则接的线性水平构件、垂直构件和斜撑构件而具特色,它通常与其他体系共同用于较高的建筑,并且作为一种独立的体系用在低、中高度的建筑中。

营销策略外文翻译文献

营销策略外文翻译文献 (文档含中英文对照即英文原文和中文翻译)

译文: 营销策略 内容提要:为了组织的销售能是成功的,它需要根据一个营销策略计划来帮助保证其努力的目标和宗旨与市场的需要想吻合。营销策略审查市场以确定潜在顾客的需要,竞争者的战略和市场地位,并且尝试制定出一套能使组织在市场上获取或维护竞争优势的相关战略。有一些因素会对营销策略计划的发展造成冲击性的影响,它包括内部因素例如组织的财产、技能和组织文化,外在因素例如各种各样的市场驱动者、市场或产业运作方式、战略窗口和竞争的本质。一个优选的营销策略计划也需具备一套意外情况防备策略以应对市场治理及组织生产能力的不确定性。 关键词:竞争优势竞争策略市场地位市场份额营销销售计划组织文化营销策略 营销策略简述 无论组织的产品或服务多么好,除非它们的价值能被传达给潜在的顾客,否则组织依然无法实现它的使命。这种传达和交流是组织内市场营销功能的职责。根据美国市场协会,营销是“一个组织效能和一套创造过程、交流和传达产品价值给顾客、处理与顾客关系的有益于组织和它的利益共享者的方式”。营销作用包括相辅相成的两方面。营销策略在市场上审查市场来确定潜在顾客和竞争者本质的需要,并且试图开发

出在市场上将使组织获取或维护竞争优势的战略。操作的营销被建立在营销策略作用和贯彻各种各样的计划和策略(包括适当的混合营销的发展)吸引顾客和促进顾客忠实的基础之上的。 产品和服务营销的方法 有很多的方式能用来销售你的产品或服务包括做广告,直接响应、推销活动和宣传。然而,除非你能了解顾客、市场和产业的需要并且竞争的优势和劣势,否则这些方法是不太可能成功的。营销策略帮助一个组织尖化它的焦点和在市场顺利地竞争。营销策略与二个组分有关:目标市场和用最佳的方式传达你的产品价值或服务到那个市场。一个可实行的销售方针的发展取决于几个关键维度。首先,与组织之内的所有全球性战略一样,一个成功的销售方针需要由在组织之内的最高管理层签名。销售方针本质上也具有政治性的色彩:在组织之内的强有力的单位在最佳的销售方针也许不同意,并且协议也许需要谈判达成。销售方针也许受组织文化的也影响,并且那得假定这发生。例如,如果组织总是销售它的装饰物给商业主管,它也许就看不到组织之内的低层人员甚至是成人或少年的个人消费潜力。 实施战略销售计划发展的因素 存在一些能冲击战略销售计划发展的因素,这些因素首先包括组织已经拥有或它可能欣然获取的财产和技能。例如,如果组织拥有一个重大编程的部门,就为它能做和销售应用软件提供了可行性的条件。然而,如果这些人员已经在其他工作介入并且不能自由研究一个新的软件项目,并且组织没能力聘用另外的程序员,起始一条新的软件线是不妥当

虹膜识别外文翻译文献

虹膜识别外文翻译文献 虹膜识别外文翻译文献 (文档含中英文对照即英文原文和中文翻译) 外文: The first chapter 1.1 The research background of iris recognition Biometrics is a technology for personal identification using physiological characteristics and behavior characteristics inherent in the human body. Can be used for the biological characteristics of biological recognition, fingerprint, hand type face, iris, retina, pulse, ear etc.. Behavior has the following characteristics: signature, voice, gait, etc.. Based on these characteristics, it has been the development of hand shape recognition, fingerprint recognition, facial recognition, iris recognition, signature recognition and other biometric technology, many techniques have been formed and mature to application of. Biological recognition technology in a , has a long history, the ancient Egyptians through identification of each part of the body size measure to carry out identity may be the earliest human based on the earliest history of biometrics. But the modern biological recognition technology began in twentieth Century 70 time metaphase, as biometric devices early is relatively expensive, so only a higher security level atomic test, production base.due to declining cost of microprocessor and various electronic components, precision gradually improve, control device of a biological recognition technology has been gradually applied to commerce authorized, such as access control, attendance management, management system, safety certification field etc.. All biometric technology, iris recognition is currently used as a convenient and accurate.

新媒体营销外文翻译文献

新媒体营销外文翻译文献 (文档含英文原文和中文翻译) 译文: 研究微博中承诺和信用对消费者行为倾向的影响 ——基于关系营销的角度 摘要:本研究的目的是探索消费者对企业通过微博进行关系营销的观点。这项研究是以承诺-信用理论以及消费者对企业微博形象、承诺、信用、满意度和社群意识对消费者的行为倾向的研究为基础的。这项研究的成果可以成为企业利用微博进行关系营销的准则。这项研究显示消费者的满意度对承诺、信用、社群意识和消费者的行为倾向具有积极影响。企业形象对承诺和信用的影响是成立的,但对行为倾向的影响需须经由承诺和信用产生中介效果。信用对承诺和社群意识的影响是存在的,但是对行为倾向的影响须经由承诺和社群意识产生中介效果。最后,承诺和社群意识对行为倾向的影响是成立的。 关键词:微博、关系营销、满意度、企业形象、承诺、信用、社群意识、行为倾向 1、引言 当我们在新的经济时代面临着现今的商业环境时,许多企业在短时间内就变成了一个以顾客为中心的企业。为了提高竞争力,企业必须了解他们的顾客,了解顾客的需求,并且通过专项服务满足顾客的需求。随着技术时代环境的改变,企业已经通过信息系统与客

户建立了关系。随着顾客上网历史的增加,企业可以提供给他们更多的产品信息并且在第一时间获得顾客的回复。通过这种方法,客户服务的成本可以降低;企业与客户的关系可以变得稳定;企业与客户之间可以建立更多的联系;企业与客户之间的沟通可以个性化。 基于格朗鲁斯的研究,他认为关系营销意味着企业通过发展、维护和提高与顾客的关系来达到企业的目的。越来越多的企业发展其吸引力来构建自己的形象以留住和吸引新的顾客。因此,一个企业的专业性和企业形象的构建对企业来说是很重要的。一个公司是否可以提供服务或产品以满足客户的需求影响着客户对企业的信任和忠诚度。 基于Web2.0大流行,大众媒体已经覆盖了许多拥有新颖、有趣故事的网站,吸引了更多的公众关注互联网。这些问题对因特网的常用用户来说都不是问题。因特网发展很迅速。近来微博服务供应商例如Facebook、Twitter和Plurk是新闻的热点话题,已经聚集了大量用户。根据市场研究公司的成员尼尔森最近的一份报告,在2008年二月到2009年二月间,Twitter是用户增长速度最快的一个社交网站(从475000个用户到17600000个用户)。它的绝对访客增长率在美国是1382%。在2009年五月,全国用户数量达到37300000,这是一个令人吃惊的数据。博客用户一直在讨论是否微博可以取代博客。因特网用户最关注的是微博是否可以缩短他们与朋友们之间的距离,是否可以帮助他们交到新朋友。然而,商人们最关注的是微博是否可以替代博客变为一个新的营销武器。 博客营销是指不仅让因特网用户变的亲密,也是指需要“可信的”网络发言人的赞语。博客成为值得信赖的网络发言人是由于他们长时间在某些话题上努力花费时间。通过写文章,他们在互联网用户的心中构建了“大师”的形象。结果,即使他们的一个“好”字也对有科技非常强大的影响力。这就是博客营销的有效性。博客的权利:检查实际操作者在博客上的使用对公共关系产生的影响。 对于微博,我们可以在Twitter上看到谷歌。在谷歌在Twitter上的账户建立后,立马就有16000个追随者。现在谷歌在Twitter上的追随者有1670000人。这意味着谷歌每在Twitter上发表一条新闻,1760000个人在下一秒将在互联网或手机短信上被通知。这种传播新闻的速度和范围是令人吃惊的。 再来说说戴尔,一个主要的国际电脑制造商,例如,通过微博的能力来提供信息,特别提供了可以通过短信迅速传递给所有微博用户信息的功能。因为价钱很合理,许多用户已经立即决定变成戴尔的追随者。并且戴尔继续提供给追随者们更多的第一手优惠券。结果,通过微博达到的总订单金额已经达到了新台币100000000元。通过微博,消息可以更加迅速地传递给互联网用户。然而,这并不意味着任何一种营销信息都可以通过微博随意

英文文献及中文翻译

毕业设计说明书 英文文献及中文翻译 学院:专 2011年6月 电子与计算机科学技术软件工程

https://www.wendangku.net/doc/a85016915.html, Overview https://www.wendangku.net/doc/a85016915.html, is a unified Web development model that includes the services necessary for you to build enterprise-class Web applications with a minimum of https://www.wendangku.net/doc/a85016915.html, is part of https://www.wendangku.net/doc/a85016915.html, Framework,and when coding https://www.wendangku.net/doc/a85016915.html, applications you have access to classes in https://www.wendangku.net/doc/a85016915.html, Framework.You can code your applications in any language compatible with the common language runtime(CLR), including Microsoft Visual Basic and C#.These languages enable you to develop https://www.wendangku.net/doc/a85016915.html, applications that benefit from the common language runtime,type safety, inheritance,and so on. If you want to try https://www.wendangku.net/doc/a85016915.html,,you can install Visual Web Developer Express using the Microsoft Web Platform Installer,which is a free tool that makes it simple to download,install,and service components of the Microsoft Web Platform.These components include Visual Web Developer Express,Internet Information Services (IIS),SQL Server Express,and https://www.wendangku.net/doc/a85016915.html, Framework.All of these are tools that you use to create https://www.wendangku.net/doc/a85016915.html, Web applications.You can also use the Microsoft Web Platform Installer to install open-source https://www.wendangku.net/doc/a85016915.html, and PHP Web applications. Visual Web Developer Visual Web Developer is a full-featured development environment for creating https://www.wendangku.net/doc/a85016915.html, Web applications.Visual Web Developer provides an ideal environment in which to build Web sites and then publish them to a hosting https://www.wendangku.net/doc/a85016915.html,ing the development tools in Visual Web Developer,you can develop https://www.wendangku.net/doc/a85016915.html, Web pages on your own computer.Visual Web Developer includes a local Web server that provides all the features you need to test and debug https://www.wendangku.net/doc/a85016915.html, Web pages,without requiring Internet Information Services(IIS)to be installed. Visual Web Developer provides an ideal environment in which to build Web sites and then publish them to a hosting https://www.wendangku.net/doc/a85016915.html,ing the development tools in Visual Web Developer,you can develop https://www.wendangku.net/doc/a85016915.html, Web pages on your own computer.

相关文档
相关文档 最新文档