level plane
Recently Published Documents


TOTAL DOCUMENTS

25
(FIVE YEARS 2)

H-INDEX

8
(FIVE YEARS 0)

Author(s):  
Nisreen Kareem Ali ◽  
Mustafa Yaseen Abdulateef ◽  
Mohammed Hasan Ali

Most mishaps happening at clinical foundations treating older patients with portability hindrance are bedsores and slip-and-fall accidents. One reason for this high pace of mishaps is the absence of nursing faculty. So as to help parental figures in nursing old patients who are unable to move freely, we offer an arrangement and implementation of a wise bed in this work. This is the bed. Under the sheet material spread, a couple of weight sensors are passed to consider the two social orders' regular actual characteristics as well as the specific body portions where bedsores commonly arise. The body zone is divided into three vertical territories and three level zones to cope with the weight ulcer territory and prevent falls. Each microcontroller unit is in charge of monitoring pressure-differentiating data in one of the bodily regions separated on a level plane. In this review, a consistent weight distinguishing figure is offered that is useful for predicting the anticipated outcomes of bedsores and falling setbacks by taking into account both the strength and the length of weight of unambiguous body parts. Our preliminary findings reveal that a model magnificent bed serves a pair of human models of varied heights and burdens admirably.


Mathematics ◽  
2020 ◽  
Vol 8 (2) ◽  
pp. 234
Author(s):  
Yue Jiang ◽  
Xuehu Yan ◽  
Jianqing Qi ◽  
Yuliang Lu ◽  
Xuan Zhou

A ( k , n ) threshold secret image sharing (SIS) method is proposed to divide a secret image into n shadows. The beauty of this scheme is that one can only reconstruct a secret image with k or more than k shadows, but one cannot obtain any information about the secret from fewer than k shadows. In the ( k , n ) threshold SIS, shadow authentication means the detection and location of manipulated shadows. Traditional shadow authentication schemes require additional bits for authentication; need much information to be public; or need to put each shadow into a host image, utilizing the information hiding technique, which makes the generation, recovery and authentication complexity higher. Besides, most existing schemes work when a dealer participates in recovery. Our contribution is that we propose a SIS method for a ( k , n ) threshold with dealer-participatory and non-dealer-participatory mutual shadow authentication capabilities which integrates polynomial-based SIS and visual secret sharing (VSS) through using the result of VSS to “guide” the polynomial-based SIS by a screening operation. In our scheme, when an authentication image is public, all involved actors (participants and dealer) can mutually authenticate each other by exchange the lowest level plane instead of the whole shadow. Our scheme is suitable for the case with and without a dealer participate recovery. In addition, the proposed scheme has characteristics of low generation and authentication complexity, no pixel expansion, 100% detection rate and lossless recovery.


2018 ◽  
Vol 6 (2) ◽  
pp. 78-84 ◽  
Author(s):  
И. Боровиков ◽  
Ivan Borovikov ◽  
Геннадий Иванов ◽  
Gennadiy Ivanov ◽  
Н. Суркова ◽  
...  

This publication is devoted to the application of transformations at descriptive geometry’s problems solution. Using parametric calculus lets rationally select the number of transformations in the drawing. In Cartesian coordinates, on condition that an identical coordinate plane exists, the difference between parameters of linear forms, given and converted ones, is equal to the number of transformations in the composition. In affine space under these conditions, this difference is equal to two. Based on parameters calculation the conclusion is confirmed that the method of rotation around the level line, as providing the transformation of the plane of general position to the level plane, is a composition of two transformations: replacement of projections planes and rotation around the projection line. In various geometries (affine, projective, algebraic ones, and topology) the types of corresponding transformations are studied. As a result of these transformations are obtained affine, projective, bi-rational and topologically equivalent figures respectively. Such transformations are widely used in solving of applied problems, for example, in the design of technical surfaces of dependent sections. At the same time, along with transformation invariants, the simplicity of the algorithm for constructing of corresponding figures should be taken into account, with the result that so-called stratified transformations are preferred. A sign of transformation’s stratification is a value of dimension for a set of corresponding points’ carriers. This fact explains the relative simplicity of the algorithm for constructing the corresponding points in such transformations. In this paper the use of stratified transformations when finding the points of intersection of a curve with a surface, as well as in the construction of surfaces with variable cross-section shape are considered. The given examples show stratification idea possibilities for solving the problems of descriptive geometry.


Complexity ◽  
2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Wei Chen ◽  
Ruisheng Sun ◽  
Weisheng Yan

This paper investigates the problem on simultaneously estimating the velocity and position of the target for range-based multi-USV positioning systems. According to the range measurement and kinematics model of the target, we formulate this problem in a mixed linear/nonlinear discrete-time system. In this system, the input and state represent the velocity and position of the target, respectively. We divide the system into two components and propose a three-step minimum variance unbiased simultaneous input and state estimation (SISE) algorithm. First, we estimate the velocity in the local level plane and predict the corresponding position. Then, we estimate the velocity in the heave direction. Finally, we estimate the 3-dimensional (3D) velocity and position. We establish the unbiased conditions of the input and state estimation for the MLBL system. Simulation results illustrate the effectiveness of the problem formulation and demonstrate the performance of the proposed algorithm.


2018 ◽  
Vol 32 (10) ◽  
pp. 1850124 ◽  
Author(s):  
Xiupin Lv ◽  
Xiaofeng Liao ◽  
Bo Yang

Most of the existing image encryption algorithms had two basic properties: confusion and diffusion in a pixel-level plane based on various chaotic systems. Actually, permutation in a pixel-level plane could not change the statistical characteristics of an image, and many of the existing color image encryption schemes utilized the same method to encrypt R, G and B components, which means that the three color components of a color image are processed three times independently. Additionally, dynamical performance of a single chaotic system degrades greatly with finite precisions in computer simulations. In this paper, a novel coupled map lattice with time-varying delay therefore is applied in color images bit-level plane encryption to solve the above issues. Spatiotemporal chaotic system with both much longer period in digitalization and much excellent performances in cryptography is recommended. Time-varying delay embedded in coupled map lattice enhances dynamical behaviors of the system. Bit-level plane image encryption algorithm has greatly reduced the statistical characteristics of an image through the scrambling processing. The R, G and B components cross and mix with one another, which reduces the correlation among the three components. Finally, simulations are carried out and all the experimental results illustrate that the proposed image encryption algorithm is highly secure, and at the same time, also demonstrates superior performance.


2018 ◽  
Vol 7 (2.8) ◽  
pp. 248
Author(s):  
T Padmapriya ◽  
S V. Manikanthan

To meet the regularly expanding versatile information movement request, the portable administrators are conveying a heterogeneous system with numerous entrance innovations and an ever-increasing number of base stations to build the system scope and limit. Be that as it may, the base stations are disconnected from each other, so unique sorts of radio assets and equipment assets can't be shared and dispensed inside the general system agreeably. The versatile administrators are in this manner confronting expanding system operational costs and a high framework control utilization. In this paper, a brought together radio access organize design, alluded to as the super base station (super BS), is proposed, as a conceivable answer for a vitality productive fifth-age (5G) versatile framework. The super base station decouples the coherent capacities and physical elements of conventional base stations, so unique sorts of framework assets can be on a level plane shared and factually multiplexed among all the virtual base stations all through the whole framework. The framework structure and principle functionalities of the super BS are portrayed. Some key advances for framework usage, i.e., the asset pooling, continuous virtualization, versatile equipment asset assignment are likewise featured.


Sign in / Sign up

Export Citation Format

Share Document