Learn More
Automated signature verification is an important capability when doing fraud detection from high volumes of document images. The challenge is mainly caused by the combination of inherent writer variations and the conscious attention placed by the fraudster on imitating a legitimate signature. Getting good signature references is the first and most important(More)
Simulation, or rather virtual testing, is a good instrument for study and design of traffic management concepts, traffic safety, vehicle safety and ergonomics. Simulation facilitates the evaluation of the design at an early stage and reduces the costs of making prototypes. The Dutch research organization TNO, recently started a new initiative named(More)
  • YOUHONG GONG, Harry West, +5 authors Bert Hootsmans
  • 2006
Design process of Stewart platform used as Vehicle Emulator System (VES) was investigated and various aspects which affect the basic behavior of the mechanism was examined. Two additional design considerations were proposed: stiffness and admittance emulation accuracy. The analysis reveals the relationship between the performance of VES and the components(More)
Analysis of video images is a common way to determine properties of an electron or synchrotron radiation beam. At BESSY cost-efficient frame grabber hardware running on a Windows PC allows to perform such analysis in real-time. Life video images on the PC monitor give operators a direct view of the beam, enhanced by optional artificial coloring and(More)
Adaptive control refers to the control of systems that have poorly known parameters but a well modeled structure. The adaptive control of linear, time-invariant systems is well understood. However, for systems with multiple inputs and multiple outputs the adaptive controller is of high order and complex making the approach inapplicable in a number of(More)
The BESSY II control system takes advantage of the mature stage of the EPICS toolkit and its contributed generic applications. Development activities have been focussed on three aspects. (1) Dominant role is given to device control IO, based on distributed local intelligence of embedded controllers and CAN fieldbus networks. (2) Cooperative development of(More)
The first two years of user service of the third generation light source BESSY II emphasized the importance of a reliable , comprehensive and dense logging of a few thousand setpoints, readbacks, status and alarm values. Today data from sources with various characteristics residing in different protected networks are centrally collected and retriev-able via(More)
  • 1