Zirconia+Fingerprint+Identification+Sensor+Cover

合集下载

Zinc finger锌指

Zinc finger锌指

Zinc fingerZinc fingers are small protein structural motifs that can coordinate one or more zinc ions to help stabilize their folds. They can be classified into several different structural families (zinc finger proteins) and typically function as interaction modules that bind DNA, RNA, proteins, or small molecules. The name "zinc finger" was originally coined to describe the finger-like appearance of a diagram showing the hypothesized structure of the repeated unit in Xenopus laevis transcription factor IIIA.[1]Zinc fingers coordinate zinc ions with a combination of cysteine and histidine residues. They can be classified by the type and order of these zinc coordinating residues (e.g., Cys2His2, Cys4, and Cys6). A more systematic method classifies them into different "fold groups" based on the overall shape of the protein backbone in the folded domain. The most common "fold groups" of zinc fingers are the Cys2His2-like (the "classic zinc finger"), treble clef, and zinc ribbonEngineered zinc finger arraysGenerating arrays of engineered Cys2His2 zinc fingers is the most developed method for creating proteins capable of targeting desired genomic DNA sequences. The majority of engineered zinc finger arrays are based on the zinc finger domain of the murine transcription factor Zif268, although some groups have used zinc finger arrays based on the human transcription factor SP1. Zif268 has three individual zinc finger motifs that collectively bind a 9 bp sequence with high affinity.[4] The structure of this protein bound to DNA was solved in 1991[5] and stimulated a great deal of research into engineered zinc finger arrays. In 1994 and 1995, a number of groups used phage display to alter the specificity of a single zinc finger of Zif268.[6][7][8][9] Carlos F. Barbas et al. also reported the development of zinc finger technology in the patent literature and have been granted a number of patents that have been important for the commercial development of zinc finger technology.[10][11] Typical engineered zinc finger arrays have between 3 and 6 individual zinc finger motifs and bind target sites ranging from 9 basepairs to 18 basepairs in length. Arrays with 6 zinc finger motifs are particularly attractive because they bind a target site that is long enough to have a good chance of being unique in a mammalian genome.[12] There are two main methods currently used to generate engineered zinc finger arrays, modular assembly and a bacterial selection system, and there is some debate about which method is best suited for most applications.[13][14][edit] Modular assemblyThe most straightforward method to generate new zinc finger arrays is to combine smaller zinc finger "modules" of known specificity. The structure of the zinc finger protein Zif268 bound to DNA described by Pavletich and Pabo in their 1991 publication has been key to much of this work and describes the concept of obtaining fingers for each of the 64 possible base pair triplets and then mixing and matching these fingers to design proteins with any desired sequence specificity.[5] The most common modular assembly process involves combining separate zinc fingers that can each recognize a 3 basepair DNA sequence to generate 3-finger, 4-, 5-, or 6-finger arrays that recognize target sites ranging from 9 basepairs to 18 basepairs in length. Another method uses 2-finger modules to generate zinc finger arrays with up to six individual zinc fingers.[15] The Barbas Laboratory of The ScrippsResearch Institute used phage display to develop and characterize zinc finger domains that recognize most DNA triplet sequences[16][17][18] while another group isolated and characterized individual fingers from the human genome.[19] A potential drawback with modular assembly in general is that specificities of individual zinc finger can overlap and can depend on the context of the surrounding zinc fingers and DNA. A recent study demonstrated that a high proportion of 3-finger zinc finger arrays generated by modular assembly fail togenerate zinc finger nucleases with both 3-finger arrays and 4-finger arrays and observed a much higher success rate with 4-finger arrays.[21] A variant of modular assembly that takes the context of neighboring fingers into account has also been reported and this method tends to yield proteins with improved performance relative to standard modular assembly.[22][edit] Selection methodsNumerous selection methods have been used to generate zinc finger arrays capable of targeting desired sequences. Initial selection efforts utilized phage display to select proteins that bound a given DNA target from a large pool of partially randomized zinc finger arrays. This technique is difficult to use on more than a single zinc finger at a time, so a multi-step processes that generated a completely optimized 3-finger array by adding and optimizing a single zinc finger at a time was developed.[23] More recent efforts have utilized yeast one-hybrid systems, bacterial one-hybrid and two-hybrid systems, and mammalian cells. A promising new method to select novel 3-finger zinc finger arrays utilizes a bacterial two-hybrid system and has been dubbed "OPEN" by its creators.[24] This system combines pre-selected pools of individual zinc fingers that were each selected to bind a given triplet and then utilizes a second round of selection to obtain 3-finger arrays capable of binding a desired 9-bp sequence. This system was developed by the Zinc Finger Consortium as an alternative to commercial sources of engineered zinc finger arrays. It is somewhat difficult to directly compare the binding properties of proteins generated with this method to proteins generated by modular assembly as the specificity profiles of proteins generated by the OPEN method have never been reported.[edit] ApplicationsEngineered zinc finger arrays can then be used in numerous applications such as artificial transcription factors, zinc finger methylases, zinc finger recombinases, and Zinc finger nucleases.[25] While initial studies with another DNA-binding domain from bacterial TAL effectors show promise,[26][27][28][29] it remains to be seen whether these domains are suitable for some or all of the applications where engineered zinc fingers are currently used. Artificial transcription factors with engineered zinc finger arrays have been used in numerous scientific studies, and an artificial transcription factor that activates expression of VEGF is currently being evaluated in humans as a potential treatment for several clinical indications. Zinc finger nucleases have become useful reagents for manipulating genomes of many higher organisms including Drosophila melanogaster, Caenorhabditis elegans, tobacco, corn,[15]zebrafish,[30] various types of mammalian cells,[31] and rats.[32] An ongoing clinical trial is evaluating Zinc finger nucleases that disrupt the CCR5 gene in CD4+ human T-cells as a potential treatment for HIV/AIDS.[33]Phage displayPhage display is a method for the study of protein–protein, protein–peptide, and protein–DNA interactions that uses bacteriophages to connect proteins with the genetic information that encodes them.[1] Phage Display was originally invented by George P. Smith in 1985 and he demonstrated the display of peptides on filamentous phage by fusing the peptide of interest on to gene3 of filamentous phage.[1] This technology was further developed and improved by groups at the MRC Laboratory of Molecular Biology with Winter and McCafferty and The Scripps Research Institute with Lerner and Barbas for display of proteins like antibodies for therapeutic protein engineering. The connection between genotype and phenotype enables large libraries of proteins to be screened and amplified in a process called in vitro selection, which is analogous to natural selection. The most common bacteriophages used in phage display are M13 and fd filamentous phage,[2][3] though T4,[4]T7, and λ phage have also been used.[edit] PrincipleLike the two-hybrid system, phage display is used for the high-throughput screening of protein interactions. In the case of M13 filamentous phage display, the DNA encoding the protein or peptide of interest is ligated into the pIII or pVIII gene, encoding either the minor or major coat protein, respectively. Multiple cloning sites are sometimes used to ensure thatthe fragments are inserted in all three possible frames so that the cDNA fragment is translated in the proper frame. The phage gene and insert DNA hybrid is then transformed into Escherichia coli (E. coli) bacterial cells such as TG1, SS320, ER2738, or XL1-Blue E. coli. If a "phagemid" vector is used (a simplified display construct vector) phage particles will not be released from the E. coli cells until they are infected with helper phage, which enables packaging of the phage DNA and assembly of the mature virions with the relevant protein fragment as part of their outer coat on either the minor (pIII) or major (pVIII) coat protein.By immobilizing a relevant DNA or protein target(s) to the surface of a well, a phage that displays a protein that binds to one of those targets on its surface will remain while others are removed by washing. Those that remain can be eluted, used to produce more phage (by bacterial infection with helper phage) and so produce a phage mixture that is enriched with relevant (i.e. binding) phage. The repeated cycling of these steps is referred to as 'panning', in reference to the enrichment of a sample of gold by removing undesirable materials.Phage eluted in the final step can be used to infect a suitable bacterial host, from which the phagemids can be collected and the relevant DNA sequence excised and sequenced to identify the relevant, interacting proteins or protein fragments.The use of a helper phage can be eliminated by using 'bacterial packaging cell line' technology.[5][edit] General protocol1.Target proteins or DNA sequences are immobilised to the wells of a microtiter plate.2.Many genetic sequences are expressed in a bacteriophage library in the form of fusions withthe bacteriophage coat protein, so that they are displayed on the surface of the viral particle.The protein displayed corresponds to the genetic sequence within the phage.3.This phage-display library is added to the dish and after allowing the phage time to bind, thedish is washed.4.Phage-displaying proteins that interact with the target molecules remain attached to thedish, while all others are washed away.5.Attached phage may be eluted and used to create more phage by infection of suitablebacterial hosts. The new phage constitutes an enriched mixture, containing considerably less irrelevant phage (i.e. non-binding) than were present in the initial mixture.6.The DNA within the interacting phage contains the sequences of interacting proteins, andfollowing further bacterial-based amplification, can be sequenced to identify the relevant,interacting proteins or protein fragments.[edit] ApplicationsThe applications of this technology include determination of interaction partners of a protein (which would be used as the immobilised phage "bait" with a DNA library consisting of all coding sequences of a cell, tissue or organism) so that new functions or mechanisms of function of that protein may be inferred.[6] The technique is also used to determine tumour antigens (for use in diagnosis and therapeutic targeting)[7] and in searching for protein–DNA interactions[8] using specially-constructed DNA libraries with randomised segments.Phage display is also a widely used method for in vitro protein evolution (also called protein engineering). As such, phage display is a useful tool in drug discovery. It is used for finding new ligands (enzyme inhibitors, receptor agonists and antagonists) to target proteins.[9][10][11] Invention of antibody phage display by laboratories at the MRC Laboratory of Molecular Biology led by Greg Winter and John McCafferty and at The Scripps Research Institute led by Richard Lerner and Carlos F. Barbas revolutionised antibody drug discovery.[12][13] In 1991, The Scripps group reported the first display and selection of human antibodies on phage.[14] This initial study described the rapid isolation of human antibody Fab fragements that bound tetanus toxin and the method was then extended to rapidly clone human anti-HIV-1 antibodies for vaccine design and therapy.[15][16][17][18][19] Following the pioneering disclosures of these laboratories phage display of antibody libraries became a powerful method for both studying the immune response as well as a method to rapidly select and evolve human antibodies for therapy. Antibody phage display was later used by Carlos F. Barbas at The Scripps Research Institute to create the first synthetic human antibody libraries, thereby allowing human antibodies to be created in vitro from synthetic diversity elements.[20][21][22][23] Antibody libraries displaying millions of different antibodies on phage are frequently used in the pharmaceutical industry for isolation of highly specific therapeutic antibody leads, for development into primarily anti-cancer or anti-inflammatory antibody drugs. One of the most successful was HUMIRA (adalimumab), discovered by Cambridge Antibody Technology as D2E7 and developed and marketed by Abbott Laboratories. HUMIRA, an antibody to TNF alpha, was the world's first fully human antibody,[24] which achieved annual sales exceeding $1bn.[25]Competing methods for in vitro protein evolution are yeast display, bacterial display, ribosome display, and mRNA display.。

On the Vulnerability of Fingerprint Verification Systems to Fake Fingerprint Attack

On the Vulnerability of Fingerprint Verification Systems to Fake Fingerprint Attack

On the Vulnerability of Fingerprint Verification Systems toFake Fingerprints AttacksJ.Galbally-Herrero,J.Fierrez-Aguilar,J.D.Rodriguez-GonzalezF.Alonso-Fernandez,Javier Ortega-Garcia,M.TapiadorBiometrics Research Lab.-ATVS,Escuela Politecnica Superior-Universidad Autonoma de Madrid C/.Francisco Tomas y Valiente,11-Campus de Cantoblanco-28049Madrid,Spain {javier.galbally,julian.fierrez,fernando.alonso,javier.ortega}@uam.esAbstractA new method to generate gummyfingers is presented.A medium-size fakefingerprint database is described and two differentfingerprint verification systems are evaluated on it. Three different scenarios are considered in the experiments, namely:enrollment and test with realfingerprints,enroll-ment and test with fakefingerprints,and enrollment with realfingerprints and test with fakefingerprints.Results for an optical and a thermal sweeping sensors are given.Both systems are shown to be vulnerable to direct attacks.1IntroductionIn the current networked society there is an increasing need for reliable automated personal identification.Pre-vious advances in pattern recognition have given rise to a technology area known as biometrics in which users are identified by what they are rather than by what they know (e.g.a password),which could be forgotten,or what they have(e.g.a key),which could be lost or stolen[1].Within thefield of biometrics,fingerprints are widely used in many personal identification systems due to its permanence and uniqueness[2].The deployment of portable devices ca-pable of capturingfingerprint images(e.g.mobile tele-phones or PC peripherals)is resulting in a growing demand offingerprint-based authentication applications,such as ac-cess control or on-line identification.However,in spite of their numerous advantages,biomet-ric systems are also vulnerable to attacks,which can de-crease their security[3].In[3]eight different vulnerable points of a general biometric system are pointed out.All eight points are depicted in Fig.1.These attacks can be grouped in two generic classes: i)direct attacks,in which the intruder does not have any knowledge about the functioning of the system and which comprise attacks type1of Fig.1,and ii)indirect attacks in which the impostor has some knowledge about the in-ner working of the system(e.g.the way data is stored)and which comprise all the remaining7attacks in Fig.1.DecisionFigure1.Eight points of attack to a biometricverification system.In the present work we concentrate our efforts in study-ing direct attacks onfingerprint-based verification systems. For this porpuse we have generated a medium-size database with realfingerprints and their respective syntethic imita-tions on which two differentfingerprint verification systems are tested,namely:the minutiae-based system of reference infingerprint verification by NIST,and a ridge-based sys-tem developed in the ATVS group.For this two systems evaluation is performed on three different scenarios:i)the normal operation mode in which both the enrollment and test are carried out using realfinger-prints,ii)a second scenario where enrollment and test are done with fakefingerprints,and iii)a third scenario where the enrollment is performed with realfingerprints and the test with imitations.For all three cases results in terms of EER and DET curves are given and the robustness of both systems to direct attacks is analized.This paper is structured as follows.Some related works are presented in Sect.2.In Sect.3we detail the process fol-lowed for the creation of the gummyfingers,and the data-base used in the experiments is presented.The experimental protocol,some results and further discussion are reported in Sect.4.Conclusions arefinally drawn in Sect.5.2Related WorksPutte and Keuning in[4]tested the vulnerability of sev-eral sensors to fakefingerprints made with plasticine and silicone.In this work two different methods to create fake fingerprints were described:with and without the coopera-tion of the user.When having the cooperation of the owner, the quality of the imitations increased and the system was easier to fool.Five out of the six sensors tested(optical and of solid state)accepted the gummyfinger as real.In[5]similar attacks to the ones described in[4]were carried out.In this case the fakefingerprints used were made of gelatin.Between68and100%of the attempts for all the systems under study were fooled by the imitations.Similar experiments testing different sensors and using several attacking methods can be found in[6]and[7].3Fake Fingerprints DatabaseA fast,reliable and fairly easy method to create gummy fingerprints from common materials is presented in the fol-lowing sections.The process is divided into two steps:first the negative of thefingerprint is acquired(ridges and valleys in thefingerprint are respectively valleys and ridges in the negative),and then the gummyfingerprint is created from the negative.3.1Fake Fingerprint Generation MethodThe material used for the negative is a special mater-ial sold in modeling shops commonly known as“modeling putty”.This substance is a dual compound formed by two pastes.Once both pastes are mixed together we have sev-eral minutes before the mixture hardens and becomes solid. The steps followed in the creation of the negative are:•Take a portion of both pastes and mix them uniformly.•Spread the resulting ball on a sheet of paper and smooth the surface to eliminate non desired imperfec-tions.•Place thefinger to be forged on the putty and press.Next lift thefinger carefully and check that thefinger-print is thoroughly printed in the putty.In Fig.2the negative of afingerprint is shown.Modeling silicone is used to create thefinal fakefinger-print.This silicone is sold in any modeling shop together with a catalyst that reacts with the silicone turning it into a consistent state.The steps followed in the creation of the gummyfingerprint are:•Mix in a container the silicone with the catalyst.•Pour the mixture over the negative of thefingerprint and wait until it hardens.•Once the silicone hardens detach it from the negative.In Fig.3an example gummyfinger isshown.Figure2.Negative of thefingerprint.Figure3.Fakefingerprint.3.2DatabaseExtending previous experiences in the acquisition of large scale databases[8],we generated a medium-size data-base of realfingerprints and their respective gummy imita-tions.The database was captured in just one session and it comprises the index and middlefingers of both hands of 17donors,that is4×17=68genuinefingerprints and as many gummy imitations.Four images of eachfinger were acquired using two on-linefingerprint sensors,that is 68×4×2=544real samples and as many fake images.In order to accomplish a realistic acquisition and reach enough inter-and intra-variability,samples of the samefinger were not acquired consecutively.The protocol followed for the acquisition of each user was:•Indexfingerprint/synthetic/right hand•Middlefingerprint/synthetic/right hand•Indexfingerprint/synthetic/left hand•Middlefingerprint/synthetic/left hand•Indexfingerprint/original/right hand•Middlefingerprint/original/right hand•Indexfingerprint/original/left hand•Middlefingerprint/original/left handAs mentioned before two sensors were used in the ac-quisition of the database:an optical sensor and a thermal sweeping sensor.The protocol described above was re-peated four times with each sensor in order to capture all the4impressions of eachfingerprint.3.2.1Optical SensorThe optical sensor used was the model Fx2000by Bio-metrika,used in the Fingerprint Verification Competition 2002(FVC2002)[9].It has a resolution of569dpi.In Fig.4we show some realfingerprints(top row)and their respective synthetic imitations(bottom row)captured with this device.3.2.2Thermal Sweeping SensorThe thermal sensor used incorporates thefingerprint ther-mal sweeping technology by Atmel.This technology en-ables a very restricted sensor surface and a very compact architecture but it is more difficult to use and it may gener-ate errors in the image reconstruction process.The resolu-tion of the sensor is500dpi.In Fig.5we show some real fingerprints(top row)and their respective synthetic imita-tions(bottom row)captured with this device.4Experiments4.1Experimental ProtocolFor the experiments each differentfinger in the database is considered as a different user.This way we have4real impressions and4synthetic impresions of all68users(17 donors and4fingers per donor).Three different scenarios are considered in the experiments:•Scenario1:both the enrollment and the test are car-ried out with realfingerprints.This corresponds to the normal operation mode of the system and is used as the scenario of reference.•Scenario2:both the enrollment and the test are car-ried out with fakefingerprints.In this case the attacker enrolls to the system with the fakefingerprint of the genuine user and then tries to access the application with that same fakefingerprint.For the previous two scenarios the following sets of scores are generated:i)for genuine tests all the4sam-ples of each user(real or fake depending on the scenario) are matched with each other avoiding symmetric matchings ((4×3)/2=6scores per user),this results in6×68= 408genuine scores,and ii)for impostor tests each of the four samples of every user are matched with all the sam-ples of the remaining users in the database,resulting in 67×4×4×68=72896impostor scores.•Scenario3:the enrollment is done using realfinger-prints and tests are carried out with fakefingerprints.In this case the genuine user enrolls with hisfingerprint and the attacker tries to access the application with the gummyfingerprint of the legal user.In this last scenario the genuine set of scores is com-puted the same way as in scenario1.Impostor scores are computed matching all4original samples of each user with all4fake samples which results in16×68=1088impostor scores.This experimental protocol was followed for the two sen-sors used in the database acquisition so the sets of scores mentioned above were computed twice.For each of the three scenarios described,the perfor-mance of two differentfingerprint verification systems was evaluated:•The minutiae-based NIST Fingerprint Image Software 2(NFIS2)[10].•The ridge-basedfingerprint verification system devel-oped in the Biometrics Research Lab.ATVS(Univ.Autonoma de Madrid)[11,12].4.2Results4.2.1Quality MeasuresThe public software from NIST forfingerprint verification provides an application for the computation of quality in fingerprint images.This program ranks the samples infive levels of quality(from1to5),being1the highest quality and5the lowest.In Fig.6we show the quality distributions of the database samples,both real and fake.The left plot depicts the distribution for samples acquired with the opti-cal sensor and the right plot shows the distribution for the thermal sensor samples.As we can observe in Fig.6,the quality of the real sam-ples captured with both sensors is very high,being most of the images concentrated in thefirst two levels.The qual-ity of the real samples acquired with the optical sensor is higher due to the image reconstruction process carried out in the sweeping thermal technology.The quality of the fake fingerprints captured with the optical sensor is acceptable, most of the samples are concentrated in levels2and3,but it is still clearly lower than the quality of the realfingerprints acquired with that same sensor.In the right plot of Fig.6we can observe a very significant decrease in the quality of the fakefingerprints acquired with the thermal sensor compared to the real ones.The big difference of quality in the gummy imitations is due to the different technology used in both cases.The op-tical sensor is based on refraction effects of the light which take place in a similar way both in the skin and in the sili-cone,thus we obtain good quality imitations.On the other hand,the thermal sensor is based on the difference of tem-perature between ridges and valleys which is almost non-existent in the siliconefingerprints.Although the imitationsFigure4.Real samples captured with the optical sensor(top row)and their respective imitations (bottom row).Figure5.Real samples captured with the thermal sweeping sensor(top row)and their respective imitations(bottom row).QUALITY − OPTICAL SENSORQuality labelN u m b e r o f i m a g e sQUALITY − THERMAL SENSORQuality labelN u m b e r o f i m a g e sFigure 6.Quality measures for the real and fake fingerprints acquired with the optical sensor (left plot)and the thermal sensor (right plot).Table 1.EER for the NIST fingerprint verifi-cation system on the 3scenarios considered using the optical and the thermal sensors.EER (%)Scenario 1Scenario 2Scenario 3Optical 0.22 4.8312.13Thermal 6.4239.467.60were heated up breathing on them to get the necessary tem-perature difference,the quality of the samples is very poor.4.2.2Evaluation of the NIST SystemIn Table 1we show the EER for the NIST fingerprint verifi-cation system,for the three evaluation scenarios consideredand for the two sensors used.This values are extracted from the DET curves shown in Fig.7,being the optical sensor de-picted in the left plot and for the thermal sensor in the rigth plot.Optical sensor .As expected from the quality measures,the performance of the system when enrolling and testing with real fingerprints (scenario 1)is very high,EER=0.22%.This performance drops when considering the second and third scenarios.In scenario 3the EER is 12.13%which is much bigger than in the first scenario,showing a very high level of vulnerability of the system to direct attacks.Thermal sensor .In Table 1we can see that the EER of the system in the normal operation mode (scenario 1)with the thermal sensor is much higher (6.42%)than with the opti-cal one (0.22%).Due to the very low quality of the fake samples captured with the thermal sensor,the EER hardlyTable 2.EER for the ATVS fingerprint verifi-cation system on the 3scenarios consideredusing the optical and the thermal sensors.EER (%)Scenario 1Scenario 2Scenario 3Optical 11.2715.0522.55Thermal 19.8544.1232.35varies from the first scenario (6.42%)to the third (7.40%),which implies that fake samples acquired with the thermal sensor have very little valid information.Furthermore,in the scenario 2the EER of the system is 39.46%,which cor-roborates the fact that fake samples of the thermal sensor have no discriminative power on the NIST system.In summary,the NIST fingerprint verification system performs better with the optical sensor but it is also more vulnerable to direct attacks on it as compared to experi-ments on the thermal sensor.4.2.3Evaluation of the ATVS SystemIn Table 2we show the EER for the ATVS fingerprint verifi-cation system,for the three evaluation scenarios considered and for the two sensors used.In Fig.8the curves from which these EER values were obtained are depicted.In the left plot the curves for the optical sensor are shown and in the right plot for the thermal sensor.Optical sensor .As expected from a ridge-based matcher its performance in the normal operation mode is lower than that of the minutiae-based system.However,there is just a factor 2increase in the EER from scenario 1to scenarioFAR (in %)F R R (i n %)FAR (in %)F R R (i n %)Figure 7.DET curves for the NIST system using the optical sensor (left)and the thermal sensor (right).FAR (in %)F R R (i n %)FAR (in %)F R R (i n %)Figure 8.DET curves for the ATVS system using the optical sensor (left)and the thermal sensor (right).3,compared to more than an order of magnitude rise of the NIST matcher.Thus,the ridge-based system is less vulner-able to direct attacks than the minutiae-based one. Thermal sensor.Again a drop in the system performance is observed as compared to the NIST software.Worth not-ing that in this case the increase of the EER for the scenario 1from the optical to the thermal sensors is not as significant as in the NIST case.This may be explained because the ridge-based system is robust to low quality samples[12].In summary,the overall performance of the ridge-based system is worse than the minutiae-based one,however,it is less vulnerable to direct attacks and it is also more robust to low quality samples.5ConclusionsA new method to generate gummyfingers was pre-sented.A medium-size fakefingerprint database was de-scribed and two differentfingerprint verification systems, one minutiae-based and one ridge-based,were evaluated on it.Three different scenarios were considered in the ex-periments,namely:i)enrollment and test with realfinger-prints,ii)enrollment and test with fakefingerprints,and iii)enrollment with realfingerprints and test with fakefin-gerprints.Results for an optical and a thermal sweeping sensors were given.The NISTfingerprint verification system performs better with the optical sensor but it is also more vulnerable to di-rect attacks on it as compared to experiments on the thermal sensor.The overall performance of the ridge-based system was worse than the minutiae-based one,however,it showed to be less vulnerable to direct attacks and it was also more re-sistant to low quality samples.AcknowledgmentsThis work has been supported by Spanish Ministry of Defense,BioSecure NoE and the TIC2003-08382-C05-01 project of the Spanish Ministry of Science and Technology. J.G.-H.is supported by a FPU Fellowship from the Minis-terio de Educacion y Ciencia(Spanish Ministry of Science). J.F.-A.and F.A-F are supported by a FPI Fellowship from Comunidad de Madrid.6References[1]Anil K.Jain,Arun Ross,and Salil Prabhakar,“Anintroduction to biometric recognition,”IEEE Trans.on Circuits and Systems for Video Technology,vol.14, no.1,pp.4–20,January2004.[2]D.Maltoni,D.Maio,A.K.Jain,and S.Prabhakar,Handbook of Fingerprint Recognition,Springer,2003.[3]U.Uludag and Anil K.Jain,“Attacks on biometricsystems:a case study infingerprints,”in Proc.SPIE, 2004,vol.5306,pp.622–633.[4]T.van der Putte and J.Keuning,“Biometricalfinger-print recognition don’t get yourfingers burned,”in IFIP,2000,pp.289–303.[5]T.Matsumoto,H.Matsumoto,K.Yamada,andS.Hoshino,“Impact of artificial gummyfingers on fingerprint systems,”in SPIE,2002,vol.4677. [6]L.Thalheim and J.Krissler,“Body check:biometricaccess protection devices and their programs put to the test,”ct magazine,2002.[7]H.Kang,B.Lee,H.Kim,D.Shin,and J.Kim,“Astudy on performance evaluation of the liveness detec-tion for variousfingerprint sensor modules,”in KES.2003,LNAI-2774,pp.1245–1253,Springer.[8]J.Ortega-Garcia,J.Fierrez-Aguilar,et al.,“MCYTbaseline corpus:a bimodal biometric database,”IEE Proc.Vis.Image Signal Process.,vol.150,no.6,pp.395–401,December2003.[9]R.Cappelli,D.Maio,D.Maltoni,J.L.Wayman,andA.K.Jain,“FVC2002:Second Fingerprint Verifica-tion Competition,”PAMI,vol.28,pp.3–18,2006. [10]Graig I.Watson,Michael D.Garris,Elham Tabassi,Charles L.Wilson,R.Michael McCabe,and Stanley Janet,User’s guide to NIST Fingerprint Image Soft-ware2(NFIS2),National Institute of Standards and Technology,2004.[11]F.Alonso-Fernandez,J.Fierrez-Aguilar,H.Fron-thaler,K.Kollreider,J.Ortega-Garcia,J.Gonzalez-Rodriguez,and J.Bigun,“Combining multiple match-ers forfingerprint verification:A case study in Biose-cure Network of Excellence,”Annals of Telecommuni-cations,Special Issue on Multimodal Biometrics,vol.61,2006,(to appear).[12]J.Fierrez-Aguilar,Yi Chen,J.Ortega-Garcia,andAnil Jain,“Incorporating image quality in multi-algorithmfingerprint verification,”in Proc.of IAPR Intl.Conf.on Biometrics,ICB,D.Zhang and Anil K.Jain,Eds.2006,pp.213–220,Springer LNCS-3832.。

fingerprintidentification(指纹识别)

fingerprintidentification(指纹识别)

fingerprint identification(指纹识别)fingerprint identificationHelp edit an encyclopediaBecause of its lifetime invariance, uniqueness and convenience, legend fingerprints have almost become synonymous with biometrics. Fingerprint refers to the ridge of the skin at the end of a person's finger. The ridges are regularly arranged to form different lines. The starting point, end point, joint point and bifurcation point of a ridge are called minutiae (minutiae) of fingerprints.CatalogFingerprint identification, fingerprint featureFingerprint identification principleFingerprint identification systemdactyloscopyMajor applications of computersFirst generation fingerprint identification systemSecond generation capacitive sensorThird generation biological radio frequency fingerprint identification technologyAlgorithm overview, fingerprint identification, fingerprint featuresFingerprint identification principleFingerprint identification systemdactyloscopyMajor applications of computersFirst generation fingerprint identification systemSecond generation capacitive sensorThird generation biological radio frequency fingerprint identification technologyAlgorithm overviewEdit this section of fingerprint identification profilesFingerprint characteristicsEnglish Name: (fingerprinting)Fingerprint identification principleFingerprint identification refers to the identification of minutiae by comparing the minutiae of different fingerprints.Because each person's fingerprints are different, that is, between the ten fingers of the same person, there is also a significant difference between fingerprints, so fingerprints can be used for identification. In fact, in ancient China, early use of fingerprint (fingerprint) to sign. In 1684, Grew, the botanical engineer, published his first scientific paper on fingerprints. Fingerprint identification principleIn 1809, Bewick used his fingerprints as a trademark. In 1823, Purkije dissected the fingerprints into nine categories. In 1880, Faulds in nature called for fingerprints to be used to identify criminals. In 1891, Galton proposed the famous Galton classification system. After that, the British, American, German and other police departments have adopted fingerprint identification as the main method of identification. Along with the development of computer and information technology, FBI and Paris police station began to research and develop automatic fingerprint identification system (AFIS) for criminal case detection in 60s. At present, the automatic identification system has been widely used in police stations all over the world. In 90s, automatic fingerprint identification system for personal identification was developed and applied. Because each stamp of the range is not exactly the same, focus on the different will lead to different degree of deformation, and there are a lot of fuzzy fingerprint, feature extraction and how to realize the correct matching, fingerprint recognition technology is the key. Fingerprint identification technology involves many fields, such as image processing, pattern recognition, machine learning, computer vision, mathematical morphology and wavelet analysis.Edit this section of fingerprint identification systemPreprocessing system of fingerprint identificationFingerprint identification system is a typical pattern recognition system, including fingerprint image acquisition, processing, feature extraction and peer to peer module. Fingerprint image acquisition: through a special fingerprint acquisition instrument, you can collect living fingerprint images. At present, fingerprint acquisition instruments mainly include living optics, capacitive and pressure-sensitive devices. For the technical indicators such as resolution and acquisition area, the public security industry has formed international and domestic standards, but other standards are still lacking. According to the fingerprint area can be divided into rolling press fingerprint and plane fingerprints, public security industry commonly used rolling press fingerprint. In addition, fingerprint images can be obtained by scanners, digital cameras, and so on. Fingerprint image compression: large capacity fingerprint database must be compressed and stored to reduce storage space. The main methods include JPEG, WSQ, EZW and so on. Fingerprint image processing includes fingerprint area detection, image quality judgment, direction and frequency estimation, image enhancement, two value reduction and thinning of fingerprint images.Edit this section of fingerprint classificationFingerprint identification securityThe pattern is the basic classification of fingerprints, whichis divided into the basic pattern of the center pattern and the triangle. Of or relating to the shape of a central line. In our country, the ten fingerprint analysis divides the fingerprint into three major types and nine forms.In general, the automatic fingerprint identification system divides the fingerprint into arcuate (arc, account, shape), skip (left, right, left), bucket and miscellaneous patterns. Extraction form and detail features of fingerprint: fingerprint features including Center (upper and lower) and delta (left and right), the details of fingerprint feature points including the starting point and end point, combining ridge point and bifurcation point. Fingerprint matching: it can be coarsely matched according to the shape of the fingerprint, and then use the fingerprint shape and minutiae to make the exact matching, and give the similarity score of the two fingerprints. According to the different applications, the similarity score of the fingerprint is sorted or given whether the result of the same fingerprint is same.Edit the main application of this paragraphFingerprint recognition keyboardApplications in computersIn today's computer applications, including many very confidential file protection, most of them use the "user ID+ password" approach to user authentication and access control. However, if the password is forgotten or stolen by others, the security problems of the computer system and files arethreatened. With the development of science and technology, fingerprint identification technology has gradually begun to enter the computer world. At present, many companies and research institutions in the field of fingerprint recognition technology achieved great progress breakthrough, many application products introduced the combination of fingerprint identification and traditional IT technology perfect, these products have been recognized by more and more users. Fingerprint identification technology is applied in the business field of the relatively high security requirements, and a well-known brand in the business field of mobile office building Fujitsu, Samsung and IBM and other international has a fingerprint recognition system technology and application of mature, the following brief introduction on the application of fingerprint identification system in the notebook computer.First generation fingerprint identification systemAs we all know, two years ago, some brands of notebooks used fingerprint identification technology for user login identification, the first generation of optical fingerprint readerHowever, the fingerprint system introduced at the time belonged to the optical identification system, which should belong to the first generation of fingerprint identification technology. Optical fingerprint recognition system because light can not penetrate the surface of the skin (dead skin layer), so can only scan the surface of finger skin, or scan the dead skin layer, but not deep dermis. In this case, the cleanliness of the finger surface directly affects the recognition effect. If the user'sfinger is stuck with more dust, there may be an identification error. And, if people follow a finger, a fingerprint fingerprint recognition system, it may also be, for users, it is not very safe and stable.Second generation capacitive sensorLater, the second generation of capacitive sensors, capacitive sensor technology is the use of alternating command and arrangement and sensor panels, alternating plate of the second generation capacitive sensorsThe forms are two capacitive plates, and the fingerprint valleys and ridges become dielectric between plates. The dielectric constant sensor to detect changes between the generated fingerprint image. But because the sensor surface is the use of silicon material is easy to damage lead to loss of life, and it is through fingerprint valleys and ridges to form a concave convex fingerprint image so the dirty fingers wet fingers, fingers difficult low recognition rate.Third generation biological radio frequency fingerprint identification technologyTo today, the third generation of RF biological fingerprint recognition technology (radio frequency fingerprint core technology principle leather (line collector)), RF sensor technology is through the sensor itself emits trace RF signal to penetrate the epidermal layer, finger control layer texture measurement, to obtain the best fingerprint image. Therefore, on the dry finger, the Han third generation biological RFsensorsDry fingers, fingers and other difficulties through the fingers can be as high as 99@%, fingerprint anti-counterfeiting ability, fingerprint recognition principle of sensor only to human dermal skin reaction, fundamentally eliminate the artificial fingerprint, wide temperature range: especially suitable for cold or hot special area.Radio frequency technology is the most reliable and powerful solution because RF sensors produce high quality images. In addition, the high quality image also allows the reduction of the sensor, no need to sacrifice reliability certification, thereby reducing the cost and makes the application of RF sensor thought to any field of mobile and unfettered in size.Edit this section algorithm overviewAs people usually put in fingerprint into dustpan, bucket type, in the research of automatic fingerprint recognition, fingerprint is divided into five types: arch, left and right ring ring, pointed arch, vortex type (i.e. "bucket"). The main purpose of fingerprint classification is to facilitate the management of large capacity fingerprint libraries, and to reduce the search space and speed up the fingerprint matching process. Fingerprint classification is based on the overall flow direction of fingerprint ridges or valleys, and the core point of fingerprints. Many researchers have tried to solve the problem of fingerprint classification, but the classification algorithm still has a higher recognition rate. How to improve the accuracy of fingerprint classification is a key problem inautomatic fingerprint identification research.。

玻璃行业相关英文术语

玻璃行业相关英文术语

玻璃行业相关英文术语玻璃行业相关英文术语1. 玻璃窑炉annealing rate 退火速率(bath) atmosphere 保护气体(锡槽内)air flow alarm 风管报警(bath) casing 锡槽底壳annealing lehr 退火窑(furnace & bath)熔窑和锡槽annealing region 退火区(raw material)原料部分(tin) bath 锡槽air forced cooling zone 气流强冷区atmosphere cooled exit lip plate 保护气体冷却的出口唇板(金属制)auxiliary panel 辅助控制盘(板)back wall of burner 小炉后墙batch 配合料(混合料)batch-mixing plant 配合料房bath bottom 锡槽底砖bath bottom cooling 锡槽底壳冷却bath roof 锡槽顶盖bath roof casing 锡槽顶盖外壳bath sidewall 锡槽侧壁bath water cooling 锡槽水冷却器bay 锡槽分段bin 料仓bins of raw materials 原料仓库branch flue 支烟道breast wall 胸墙burner 喷枪bus bar 汇流带(电接线排)canal 流道carbon pusher 石墨挡块carbon side wall lining 侧壁石墨衬charge end hopper 窑头料仓(在投料机上方)(料斗)check damper(stackdamper) 支烟道闸板check setting 码格子砖checker brick 格子砖checker chamber 蓄热室checker work 格子体chimney(stack) 烟囱chrome magnesite 铬镁砖close down a furnace orshut down 止窑(冷修前停窑)coal dust 煤粉control valves 控制伐cooling 风冷(水冷)cross fire furnace 横焰窑crown(main arch) 大碹cullet 碎玻璃cullet hopper 碎玻璃仓(料斗)damper block 闸板砖dedrossing pocket 排锡渣口demolish 拆除diatomite insulating brick硅藻土保温砖discharging hopper 卸料料仓(斗)dolomite 白云石draft (=draught) 抽力drain (a furnace) 放(玻璃水)drain(ing) hole 放玻璃水孔dross box 锡槽箱ducting 风管electric furnace 电熔窑electrods on melter bottom(电极底插式)electrods on sidewalls (电极侧插式)end fire furnace 马蹄型焰窑exit end 出口端exit linter 出口横梁exit lip 出口唇板fans 风机feldspar 长石filling pocket 投料池fire-clay bottom block 粘土大砖(池底)fireclay brick 粘土砖flame 火焰flat arch spread 流道上部平碹flexes 软管float furnace 浮法玻璃窑flue 烟道fluxline 液面线front linter 锡槽进口横梁(楣)front wall 前脸墙front wall buckstay 前脸墙立柱front wall platform 前脸墙平台furnace structure 熔窑结构gable 山墙heating element 加热元件honeycomb 蜂窝状砖(用于锡槽顶盖)hopper 料斗/铁皮料仓hot end 锡槽热端inspection 检查insulating brick 保温砖invert arch 反碹isolating valves 隔离伐jack arch 平碹jack arch of port 小炉平碹jamb wall 小炉之间胸墙lehr 退火窑lehr hood 退火窑罩lift out roller 提升辊道lime stone 石灰石linear motors 直线马达magnesite brick 镁砖maintenance 维修manifold 主管道modify 修改neck ends 蓄热室锁断nip on 将拉边器置于板面上overhead coolers 高架冷却器oxy-gas furnace for TV panels 全氧-气体燃料电视屏窑periscopes 潜望镜porous silica brick 多孔硅砖port 小炉口post annealing region后退火区pre-annealing region 预退火区preheat area 预热区(锡槽)pressure transmitters 压力转换器primary cable 电缆refractory brick 耐火砖regenerator 蓄热室regenerator crown 蓄热室大碹regenerator doors 蓄热室门regenerator flues 蓄热室烟道reheat 重热区remove 搬移restrictor tile 限流砖(锡槽专用砖)ribbon 浮法玻璃带rider arch 炉条碹rod 吊杆sand 石英砂sealing drapes 密封挡坎secondary cable 次级电缆Shoulder 锡槽肩部shut down 关闭锡槽(放下截流闸板)side sealing 锡槽侧密封sidewall of tank 池壁silica brick 硅砖silo 水泥筒仓skew arch of port 小炉斜碹skewback 碹脚砖sleeve 套管soda ash 纯碱sodium sulfate 芒硝span of arch 碹跨度spout lip流道出口唇板springer 碹碴staggered brick joint 错缝砖start-up 点火steel work 钢结构stirrer 搅拌器strain 应变stress 应力stud 螺栓substance 厚度(英)superstructure 上部结构suspended arch 吊碹take-off line 玻璃带起跳点tapping 放玻璃水tapping tank 放玻璃水池television system 电视监控系统thickness 厚度(美)thrust screws & plates 止推螺丝和止推板tin drain 排锡(放锡)top roll machine 拉边器top roll system 拉边机系统tuckstons 挂钩砖Tweel 流道控制闸板unit melter withrecuperator 换热器式单元窑upper making-up brick 上间隙砖waist 炉腰waist gable 炉腰山墙waist side block 炉腰池墙warm up (heat up) 烤窑wedge brick 楔型砖wetback flow 湿背流wet-back tile 湿背砖(锡槽专用砖)withdraw 搬离、退出zirconia brick 锆刚玉砖2. 玻璃机械1. 电加热供料道Electric-heatingForehearth2. 气加热供料道Gas-heating Forehearth3.滴料式供料机GobFeeder4.行列式制瓶机I.S.machine5. 稳压阀PressureStabilizing Valve6.电子分料器ElectronicGob Distributor7.瓶罐托盘码垛包装设备Glassware PalletizingSeries8.托盘燃气热缩机PalletShrink-wrapping Machine9.瓶罐自动热缩包装机Automatic GlasswareShrink-wrapping Machine10.热端蒸涂机Hot-endCoating Machine12冷端喷涂机Cold-endCoating Machine13.弧线递送机CurvedTransfer Wheel14.横向输瓶机CrossConveyor15.曲线推瓶机Curve-typeStacker16.排瓶机、输瓶机Liner & Single –line Conveyor 17.垂直输瓶机Vertical Conveyor18.玻璃液搅拌机Melting Glass Stirrer19.玻璃器皿烧口机Glassware Jar Burning Machine20.玻璃拉管生产设备Glass-tube Drawing-out Equipment3. 玻璃产品,不能保证完全正确的,我会努力的去添加深加工玻璃glass processing钢化玻璃 tempered glass/ toughened glass/ strengthened glass中空玻璃 insulatingglass/hollow glass夹胶玻璃 laminated glass 防火玻璃 fire-resistant glass/fireproof glass防弹玻璃armored glass / ballistic resistant glass防弹玻璃Bullet-proof Glass汽车玻璃 automotive glass 镀膜玻璃 coatedglass/coating glass光学玻璃 optical glass热弯玻璃hot bending glass/ thermal bending glass家具玻璃furniture glass 家电玻璃appliance glass安全玻璃 safety glass / security glass卫浴 sanitary镜子 mirror 银镜 silver glass铝镜 aluminum glass低辐射玻璃:low-e glass太阳能玻璃 Sun-e glass彩色玻璃:tintedglass/stained glass变色玻璃photochromicglass建筑玻璃architecturalglass在真空玻璃vacuum glass热反射玻璃heat reflectingglass吸热玻璃heat absorbingglassITO导电玻璃ITOconductive glass丝印玻璃silk printingglass耐热玻璃thermal glass光电玻璃photoelectricglass仪表玻璃instrument glass挡风玻璃windshield glass幕墙玻璃 Glass CurtainWall/glass facade原片玻璃 sheet glass平板玻璃 flat glass/ sheetglass/ plate glass浮法玻璃 float glass格法玻璃 glaverbel glass压延玻璃rolling glass超白玻璃 ultra-whiteglass/ultra clear glass超薄玻璃 ultra-thin sheetglass茶玻 tawny glass蓝玻 blue glass灰玻 gray glass艺术玻璃 art glass压花玻璃 patterned glass /figured glass热熔玻璃 hot-melt glass镶嵌玻璃 mosaic glass/Panel Glass镶嵌宝石 inlaid gemstone /jewel夹丝玻璃 Wired glass装饰玻璃 decoration glass彩釉玻璃 colored glazingglass彩绘玻璃 stained glass玻璃工艺品 glasshandicraft靓彩玻璃 nacreous glass彩绘玻璃stained glass聚晶玻璃polycrystallineglass喷砂玻璃sandblastingglass冰花玻璃ice glass肌理玻璃textured glass玻璃砖glass brick玻璃马赛克glass Mosaic玻璃烛台glasscandleholder玻璃球:glass ball玻璃珠:glass bead浮雕玻璃embossed glass吹制玻璃:glass blowing器皿玻璃 ware glass灯具玻璃 light glass玻璃灯罩 glass lampshade钟表玻璃 watch crystal医用玻璃pharmaceuticalglass玻璃仪器 glass instrument/ glass apparatus化妆瓶 cosmetic bottle玻璃瓶 glass bottle香水瓶 perfume bottle /scent bottle玻璃餐具glass tableware玻璃盖glass cap/cover玻璃采板glass cuttingboard杯垫mat日用玻璃daily use glass特种玻璃 special glass智能调光玻璃smart glass 微晶玻璃 crystallite glass 石英玻璃 quartz glass /防眩玻璃anti-dazzle glass / glare-reducing glass纳米玻璃 nanometer glass 液晶玻璃 liquid crystal glass玻璃纤维glass fiber亚历克玻璃Acrylic glass 高硼硅玻璃high borosilicate glass自洁玻璃 Self-cleanness Glass乳化玻璃Emulsification Glass防火玻璃Fireproof Glass 激光玻璃 Laser Glass发光玻璃 Shining Glass磁性玻璃 Magnetic Glass 泡沫玻璃Foam Glass杀菌玻璃 anti-bacterial Glass纳米玻璃 Nanometer Glass有机玻璃 Organic Glass透红外玻璃Infrared Transmission Glass玻璃机械glass machinery钢化炉 toughening furnace 热弯炉thermal bending/ hot bending furnace高压釜 high-pressure autoclave退火炉 annealing furnace 玻璃窑炉 glass kiln磨边机edge grinding machine 切割机cutting machine清洗机 washing machine打孔机 drilling machine检测设备 detectionequipment喷砂机 sandblastingmachine辊压机 rolling machine热熔炉 melting furnace印花机decorating glass抛光机polishing machine灌装机Feeder混合机Hydramix振动加料机oscillatingbath charger异性机irregular machine码垛机palletizer行列机I.S.machine斜边机beveling machine夹层玻璃生产线processing line forlaminated glass / multipleglass / triple glassinterlayer glass中空玻璃生产线theprocessing lineof insulating glass丝网印刷机 Ferro cementprinting machine机械配件,辅助工具mechanicalparts, supplementarymeans磨轮 grinding wheel抛光轮polishing wheel金刚轮 diamond wheel树脂轮 resin wheelBD轮 BD wheel玻璃刀 glass cutter /glazing knife无影灯 shadowless lamp花边钳 lacey plier钻头 drill五金 ironmongery /hardware /吸盘 sucker / sucking disk/ osculate网版 screen玻璃工具 glass tool玻璃模具 glassmould/pattern水钻磨轮 water boreholeabrasive wheel陶质焊补 ceramicresurfacing / rewelding防潮纸Moisture proofPaper托盘Wooden Pallet木箱Wooden Box汽垫膜Air Cushion Film周转箱Recycle Case铁架子Iron Shelf化工材料,辅料 chemicalmaterials , accessories玻璃油墨 glass printing oil玻璃颜料 glass pigmentcolour玻璃涂料 glass adhesivecoating玻璃油漆 glass oil paint澄清剂fining agent /refining agent/ clarifyingagent抛光粉polishingpowder/ burnishingpowder助熔剂flux还原剂reducing agent着色剂coloring agent脱色剂decolorize agent石英砂 quartz sand分子筛 molecular sieve蒙砂粉 glass frostingpowderPVB胶片 PVB rubbersheetEVA胶片 EVA rubbersheet花纸decal paper玻璃微珠 glassmicro-balloon玻璃胶 glass cement无影胶 shadow less glue 密封胶 sealant / sealing gum耐火材料 fire-resisting material / refractory material玻璃吊带glass sling密封胶sealent行业技术服务,机构 industry technical service , institution玻璃软件 glass software书刊杂志books and magazines检测机构 feeler mechanism /detection institution协会 associationOther related:高脚玻璃酒杯 goblet无手印玻璃 non-fingerprint glass冰雕玻璃 ice sculpture glass / ice carving glass长石矿 feldspar quarry玉砂粉 emery powder打孔钻 grooved bit贝壳纽扣钻shell button drill水晶钻crystal drill石材钻stone drill瓷砖钻 tile drill陶瓷 pottery and porcelain / ceramics宝石 jewel石材 stone material玛瑙 agate / carnelian磁砖 ceramic tile 脆硬材料 crisp and hardmaterial锋利耐磨 sharp andwearable直柄 straight shank锥柄taper shank螺纹柄 threaded shank按比例稀释 diluteproportionally氢氟酸 hydrofluoric acid样品库 sample chamber玻璃电熔炉glass electricalfurnace退火窑 lehr / annealingfurnace电热烘烤炉electricalbaking furnace电坩锅炉electricalcrucible furnace复合式加热电熔炉 compound heatingelectrical melting furnace手糊制品Manually PasteProduct拉挤制品Stretching &Compressing Product模压制品Mould PressedProducts浇铸制品Casting Product喷涂制品Spray and PaintProduct切片制品Slicing Product压花玻璃中压纹的中英文叫法Diamond, 钻石Crystal etc.Chinchilla, 金丝玻璃Nashiji, 香梨玻璃Millennium, 千禧格玻璃水纹玻璃Water布纹玻璃 Woven glass七巧板玻璃Karatachiglass四季红玻璃Masterlite甲骨文(Ancient Figure)水纹(Aqualite)花狸金丝(Chinhilla)水晶(Crystal)小灯芯纹1(Fiutelite-S)小灯芯纹2(Fiutelite-B)七巧板(Karatachi)银霞(Kasumi)五月花(May Flower)千禧格(Millennium)彩云(Moran)金龙(Morgon)香梨(Nashiji)银波(Oceanic)银珠(Pearl-S)雨花Ⅰ(Rain-B)雨花Ⅱ(Rain-S)万元(Wanji)金波纹(water)玫瑰(Rose)春潮(Spring tide)。

Regulation of angiogenesis with zinc finger protei

Regulation of angiogenesis with zinc finger protei

专利名称:Regulation of angiogenesis with zinc finger proteins发明人:Edward Rebar,Andrew Jamieson,QiangLiu,Pei-Qi Liu,Stephen P. Eisenberg,Eric Jarvis 申请号:US10006069申请日:20011206公开号:US07026462B2公开日:20060411专利内容由知识产权出版社提供摘要:Provided herein are a variety of methods and compositions for regulating angiogenesis, such methods and compositions being useful in a variety of applications where modulation of vascular formation is useful, including, but not limited to, treatments for ischemia and wound healing. Certain of the methods and compositions accomplish this by using various zinc finger proteins that bind to particular target sites in one or more VEGF genes. Nucleic acids encoding the zinc finger proteins are also disclosed. Methods for modulating the expression of one or more VEGF genes with the zinc finger proteins and nucleic acids are also disclosed. Such methods can also be utilized in a variety of therapeutic applications that involve the regulation of endothelial cell growth. Pharmaceutical compositions including the zinc finger proteins or nucleic acids encoding them are also provided.申请人:Edward Rebar,Andrew Jamieson,Qiang Liu,Pei-Qi Liu,Elizabeth J.Wolffe,Stephen P. Eisenberg,Eric Jarvis地址:El Cerrito CA US,San Francisco CA US,Foster City CA US,Richmond CA US,Orinda CA US,Boulder CO US,Boulder CO US国籍:US,US,US,US,US,US,US代理机构:Townsend and Townsend and Crew LLP 更多信息请下载全文后查看。

Selection of sites for targeting by zinc finger pr

Selection of sites for targeting by zinc finger pr

专利名称:Selection of sites for targeting by zinc finger proteins and methods of designing zincfingers proteins to binds to preselectedsites发明人:Eisenberg, Stephen P.,Case, Casey C.,Cox,George N., III,Jamieson, Andrew,Rebar,Edward J.申请号:EP03015798.6申请日:20000106公开号:EP1352975B1公开日:20060927专利内容由知识产权出版社提供摘要:The invention provides criteria and methods for selecting optimum subsequence(s) from a target gene for targeting by a zinc finger protein. Some of the methods of target site selection seek to identify one or more target segments having a DNA motif containing one or more so-called D-able subsites having the sequence5′NNGK3′. Other methods of the invention are directed to selection of target segments within target genes using a correspondence regime between different triplets of three bases and the three possible positions of a triplet within a nine-base site. In another aspect, the invention provides methods of designing zinc finger proteins that bind to a preselected target site. These methods can be used following the preselection of target sites according to the procedures and criteria described above. The methods of design use a database containing information about previously characterized zinc finger proteins.申请人:SANGAMO BIOSCIENCES INC 地址:US国籍:US代理机构:Weiss, Wolfgang更多信息请下载全文后查看。

Selection of sites for targeting by zinc finger pr

Selection of sites for targeting by zinc finger pr

专利名称:Selection of sites for targeting by zinc finger proteins and methods of designing zincfingers proteins to binds to preselectedsites发明人:Eisenberg, Stephen P.,Case, Casey C.,Cox,George N., III,Jamieson, Andrew,Rebar,Edward J.申请号:EP03015798.6申请日:20000106公开号:EP1352975A3公开日:20040204专利内容由知识产权出版社提供摘要:The invention provides criteria and methods for selecting optimum subsequence(s) from a target for targeting by a zinc finger protein. Some of the methods of targetgene site selection seek to identify one or more target segments having a DNA motif containing one or more so-called D-able subsites having the sequence 5'NNGK3'. Other methods of the invention are directed to selection of target segments within target genes using a correspondence regime between different triplets of three bases and the three possible positions of a triplet within a nine-base site. In another aspect, the invention provides methods of designing zinc finger proteins that bind to a preselected target site. These methods can be used following the preselection of target sites according to the procedures and criteria described above. The methods of design use a database containing information about previously characterized zinc finger proteins.申请人:Sangamo Biosciences Inc.地址:Point Richmond Tech Center, Suite A100, 501 Canal Boulevard Richmond, CA 94804 US国籍:US代理机构:Weiss, Wolfgang, Dipl.-Chem. Dr.更多信息请下载全文后查看。

智能指纹识别抽屉设计与3D打印说明书

智能指纹识别抽屉设计与3D打印说明书

Individual Design and Rapid 3D Printing of anIntelligent Fingerprint Identification DrawerWeizhen Li and Qiyuan FanSchool of Mechanical Engineering, Guangzhou College of South China University of Technology, Guangzhou, 510800, ChinaAbstract—With the development of biometric identification technology, fingerprint identification technology was used widely in the fields of attendance, entrance guard and mobile payment due to its advantages of security and reliability. Now Fingerprint locking technology has also been developed rapidly in intelligent home, more and more users began to try to accept the fingerprint lock products. In this paper, an intelligent fingerprint identification drawer was designed with Arduino UNO R3 development board as the main body and an auxiliary control electric control circuit to realize the function of "cabinet locked if hand out and unlocked if hand in". After designed the lock structure of the fingerprint drawer and then rapid prototyped the main components with 3D printing, then assembled and debugged. An individual fingerprint identification drawer was finished. And it’s meaningful for the promotion in the individual design in the smart home area in future.Keywords—biometric identification; fingerprint identification; smart home; individual design; 3D printing; assembly debuggingI.I NTRODUCTIONThe fingerprint identification technology (Automatic Fingerprint Identification Technology) is abbreviated as AFID, which mainly works for the unique of the skin pattern of each person's fingerprint. Because the break point and crossing point of each person's fingerprint pattern are different, and they never change all life. Therefore, fingerprint can be used as the basis of personal identification. Its development also benefits from modern electronic integrated manufacturing technology and the fast & reliable algorithm research. Common keys, smart cards, passwords, etc may be in danger of being stolen, copied, forgotten, lost, and so on. But human biometrics cannot be forgotten, stolen and copied. The fingerprint recognition belongs to biometrics, and it is more accurate than other biometrics such as vein recognition, face recognition and pupil for iris recognition, and so on. The fingerprint recognition has much advantage for it’s safe, reliable, difficult to forge, and especially the low cost, high practicability. So fingerprint identification technology in the meeting attendance, entrance guard, mobile payment and other industries has been applied widely. Therefore, fingerprint identification was becoming one of the potentially developed technologies [1]. According to the survey results, Prospective Industrial Research Institute released the 2014-2018 market prospect and investment of biometric technology industry in China. As showed in Figure 1 According to the Strategic Planning Analysis report, the global biometric market reached $9.8 billion in 2013, with fingerprint identification accounting for 91.0% of consumption at a 10.4% growth rate. It is expected to increase to about $30 billion by 2020[2].In recent years, China promoted the standardization of biometric identification in the fields of information technology, information security, financial transactions, social security, and so on. From 2002 to 2015, the market for biometric identification had been continued to grow at a high rate. The annual compound growth rate of domestic biometrics market reached 50%, and the scale of biometric market reached about 12 billion yuan in 2016. By 2020 it was expected that, the market scale of biometric industry in China would exceed 34 billion yuan [2], and the global fingerprint recognition market would be expected to reach $13.0 billion, face recognition $2.4billion and iris recognition $1.6 billion, as shown in Figure 2. FIGURE I. INDUSTRY MARKET DATA AND FORECAST OF GLOBALBIOMETRIC IN 2007-2020 (UNIT: US $100 MILLION) FIGURE II. MARKET DATA OF GLOBAL BIOMETRIC SUBDIVISION(UNIT: US $100 MILLION)Fingerprint lock, as a branch of fingerprint identification technology, its security and anti-counterfeiting performance was very prominent. It had been widely developed and applied in recent years [3], and lots of fingerprint extraction accuracy matching algorithm had been explored to some degrees [4,5,6,7]. Intelligent fingerprint identification drawers were also accompanied by high-quality "intelligent residence" applications, it not only met with people's needs for daily use,2019 International Conference on Wireless Communication, Network and Multimedia Engineering (WCNME 2019) Copyright © 2019, the Authors. Published by Atlantis Press.also improved the security of storage items greatly for the drawers.There were two kind of fingerprint lock modules on the market at present: one was optical fingerprint head, the characteristic of this fingerprint module was its lower price, but the recognition errors often occurred. It needed the user to re-press the finger to identify, and it needed more power consumption; The other was capacitive fingerprint head, which was more expensive than optical fingerprint head, but it had high recognition rate, low power consumption and low failure rate [8]. So capacitive fingerprint would be used more frequently in daily life than optical fingertips.Therefore, this paper mainly designed an intelligent fingerprint drawer, which could meet the intelligent demand. It realized the function: "hand off cabinet lock, hand in cabinet open".II. D ESIGN OF F INGERPRINT I DENTIFICATION S YSTEM This fingerprint identification system took the Arduino uno R3 as main board, and the control circuit to carry on the auxiliary control. The program framework mainly consisted of 3 parts: declared variables and interface name, setup (), loop () [9].The Arduino uno R3 had 14 digital I / O ports (6 of which could be used as PWM outputs), 6 analog ports, a 16MHz crystal oscillator, a USB interface, a DC power outlet, an ICSP header, and a reset button. The specific parameters were shown in table 1:TABLE I. PARAMETER LIST OF ARDUINO UNO R3Microprocessor ATmega328PWorking voltage5V Input voltage (recommended)7-12V Input voltage (limit) 6-20V Digital input / output pin 14 channelsPWM Digital I / O Pin 6 Analog input pin6 DC current per input / output pin20 mA DC current of 3.3V pin50 mA Flash memory 32KB ,SRAM 2 KB (ATmega328P) EEPROM 1 KB (ATmega328P)Clock frequency16 MHz Length 68.6 mmWidth 53.4 mm Weight25 gThe basic programming ideas for fingerprint drawers were as follows:Defined and called the function library including thefingerprint identification module function library <Adafruit_Fingerprint.h> and soft serial port settings functionlibrary <SoftwareSerial.h>, declaration variables and interfacenames. The fingerprint identification function getFingerprintIDez () and the pin interface and the soft serial port of the auxiliary components were used for the data exchange between the fingerprint module and the development board. The function Setup () with the baud rate of 9600 wasused for the development board to communicate with the fingerprint module. If the buzzer beeped two times the connection was successful, and otherwise it failed, the red lightwould be on. Set each auxiliary component pin mode for reador output mode. Opened the serial port monitoring, it’s easy to read fingerprint identification module status when debugging. The defined Loop () main function could check the opening or closing status of drawer before running the main program and judged by reading the pin level. If the drawer closed, interrupts should close, and the fingerprint identification function ran, fingerprint module was waiting for fingerprint input status. If the drawer opened, the break also opened, and the fingerprint module was dormant.The fingerprint identification function was "int getFingerprintIDez ()". Firstly, the fingerprint image was obtained. The module would look for the fingerprint state before the living fingerprint was recognized. When the fingerprint was identified, the fingerprint image was obtained by the capacitive pressure plate, and the fingerprint image was obtained successfully then went to the next step. If failure it returned to the value -1 and the red light emitting diode was light up. The next step was fingerprint image binarization, the purpose of which was to convert the grayscale image of fingerprint into a binary image which could be recognized by the module. If the recognition was ok then it continued to the next step but if it failed it returned to value -1 and illuminated the red light emitting diode. Last step was the fingerprint search and comparison; if successful the green light emitting diodes was lit up, if failure the red was light up. Here chose the light emitting diodes as indicators for its low energy consumption, low working voltage, high luminous efficiency and small size [9].III. T HE B ASIC P RE -IMPLEMENTED F UNCTION AND THESOURCE C ODE P ROGRAM In order to enable the intelligent fingerprint identification drawer to bring users a perfect experience and use it more humanly. The fingerprint identification system must judge accurately and run rapidly. The process of using the drawer was divided into the following stages:The intelligent fingerprint identification drawer must be able to tell the user that the fingerprint identification module works properly after the power was on. When the development board connected to the fingerprint identification module successfully, the buzzer would issue a "tick" and allow the user to use the drawer. If the fingerprint module communication failed, the system lighted up the red light emitting diode to inform the user. And then the user must carry on the fingerprint acquisition again till the green light was on.After the drawer was open, the interrupt function should be turned on at this time in order to avoid errors reported by thefingerprint identification system and the fingerprint system must enter the dormant state. When the drawer was closed, the fingerprint system would work again. According to the basic functions of the pre-implementation, the corresponding program should compiled with the function. Some of the program contents are as follows: # Include <Adafruit_Fingerprint.h>// Call Fingerprint Module Library# If ARDUINO >= 100 # include <Software Serial.h>#else# include <New SoftSerial.h>#endifInt getFingerprint IDez (); // Define fingerprint identification functionInt buttonpin = 2;Int gled = 4; // Define pin 4 as green light emitting diode portP = finger. fingerFastSearch (); // Search fingerprints and compare themIf (p!= FINGERPRINT_OK){Digital Write (rled, HIGH);Delay (500);Digital Write (rled, LOW); // Fingerprint search, if no match, red light on, return to value - 1Return -1;}Digital Write (gled, HIGH); // Find the fingerprint and the green light is on.Delay (500);Digital Write (gled, LOW);}Void Dian ()// buzzer generator function{Digital Write (buzzer, HIGH);Delay (50);Digital Write (buzzer, LOW);Delay (100);}When the system was interrupted, the interrupt function in the Arduino function library would conflict with the fingerprint recognition module, which would lead to no response for the interrupt failure and interrupts could be generated here by reading pin status. Firstly, the second pin is defined as reading pin, and the second pin is set as high level. The limit switch was disconnected and the other end was grounded. Closed the upper limit switch and the pin 2 was grounded. Now the pin 2 was in a low level. The system enters a dead cycle and interruption occurred.IV.THE S TRUCTURE D ESIGN,P ROTOTYPE AND A SSEMBLYFOR THE I NDIVIDUAL D RAWERIn order to enhance the structure integrity of the drawer the circuit board parts and drawer structure parts must well combined. The structure was designed to meet its individual requirements [10], [11]. And the designed parts were rapidly made by 3D printing, here the FDM method was selected. And reasonable 3D printing parameters were set for all parts to obtain good external surfaces [12], [13]. At last, the parts were assembled. Drawer internal structure effect as shown in Fig. 3, mainly by the drawer back wall, left and right wall, main connecting rod, cover, lock tongue, handle and other components, its specific layout and quantity were showed in the figure 3.1. the rear wall of the drawer2. the right wall3. the left wall4. thealuminum pipe cover 5. the top wall 6. the rear cover 7. the closed cover 8. the main linking rod 9. the locking tab 10. the rod 11. the hook 12. the handle 13. the handle rack A 14. Handle rack B FIGURE III. THE STRUCTURE OF THE DESIGNED INTELLIGENTFINGERPRINT DRAWERAfter 3D printing the lock tab and the reset spring were assembled, the rod and the hook were loaded, and then the back closed cover was sealed with assembly test, as shown in Figure 4(a). The circuit module mainly includes the following modules: fingerprint identification module, Arduino UNO R3 development board, electromagnet drive module, step-down module and so on. Next step is the installation of wiring and the relay modules, wiring requirements to leave room for future changes, wire routing must be clear and easy to identify. Finally, the effect diagram was completed, shown as Figure 4(b).(a)(b)FIGURE IV. (A). THE 3DPRINGTING LOCKING PARTS (B).THEASSEMBLY OF THE WIRING MODULEFinally, the whole module should be installed in the drawer. When installing, pay attention not to the M4 screw should beused when connecting. After installation, the effect shouldreach the following standard, drawer front effect map, as shown in Figure 5.FIGURE V. THE FRONT OF THE DRAWERV. T HE D EBUGGING FOR THE I NTELLIGENT F INGERPRINTI DENTIFICATION D RAWER After the completion of the assembly, the function of the designed system would be tested. When testing, all possible situations for users must be tested comprehensively. The test conditions were dry working environment, normal room temperature, anti-drop and no collision. The control circuit and working reliability of intelligent fingerprint drawer were tested emphatically.Firstly, the electrical test was carried out. After the drawer was powered on, it should be stationary for a period of time to confirm that there was no short circuit, circuit break and thecircuit control board was running well. See Figure 6.FIGURE VI. THE FUNCTION TESTINGThen the user input the fingerprint. Because each finger joint of the hand had a 90° angle range of motion [11], it is not expected of the drawer that the capacitance pressure plate could not be pressed normally when the user inserted the finger. The test contents included fingerprint recognition response speed, mechanical module movement effect and interruption effect. The main data of the test were shown in Table 2.TABLE II. TEST RESULTSTest itemsResponse time (in seconds)Response Speed of FingerprintRecognition﹤1 Opening speed of electromagnet﹤0.6 Total time of unlocking﹤1.6The test showed that the operation of the mechanical part was flexible and stable. After the drawer was pulled out, the locking tab could be prevented from being held up by the hook,closed the drawer, and the locking tab could be ejected and reset.VI. S UMMARYFrom the above results, it showed that the designed system of intelligent fingerprint identification drawer was creative and reliable. The opening speed of electromagnet followed unlocking time could only be 1.6 seconds. It would be improved and popularized in individual design of smart home greatly in future.R EFERENCES[1] CHEN Jiyan. Development and application of automatic fingerprintidentification technology [J]. Disc software and Application of computer,2013, (9): 56-57.[2] WU Xiaoyan, Li Ling, Deng Sha, Chinese bio-metrics industry marketresearch and investment analysis report 2014-2018 [R], Beijing, Prospective industry research institute,2016:1-50.[3] WANG Shuguang. A Review of fingerprint identification techniques [J].Information security research,2016, (4):343-355. [4] GUTIERREZ, P.D., LASTRA, M., HERRERA, F.,et al. A HighPerformance Fingerprint Matching System for Large Databases Based on GPU[J]. IEEE Transactions on Information Forensics & Security,2014,9 (1):62-71.[5] Rodrigues R D M, Costa M G F. Fingerprint verification usingcharacteristic vectors based on planar graphics[J]. Signal Image & Video Processing, 2015, 9(5):1-15.[6] Sankaran A, Vatsa M, Singh R. Latent fingerprint matching: A survey[J].Access IEEE, 2014, 2(2):982-1004.[7] DU Shuchun. Guide for the use of common electronic components [M].Beijing: Tsinghua University Press,2016:3-66;[8] LIU Ning, key Technology of automatic fingerprint Identificationsystem [M]. Beijing: Jilin University Press,2015:7-79;[9] SONG Nan, Han Guangyi ,Arduino development from the verybeginning [M]. Beijing:Tsinghua University Press,2014:2-100.[10] PU Lianggui, Chen Dingguo, Wu Liyan. Mechanical design [M].Beijing: higher Education Press 2013:2-80.[11] CHEN Zhoujuan, Song Ruiyin, Li Hong. Principle of machinery [M].Wuhan: Huazhong university of science and technology press.2013:2-90.[12] CHEN Jimin. Basic course of 3D printing technology [M]. Beijing:National defense industry press,2016:2-80.[13] Joan Horvath. Mastering 3D Printing[M]. Apress:2014:1-50.。

不锈钢螺丝海关证书

不锈钢螺丝海关证书

不锈钢螺丝海关证书英文回答:Stainless steel screws are commonly used in various industries due to their durability and resistance to corrosion. When it comes to customs certificates for stainless steel screws, there are a few important things to consider.Firstly, it is crucial to ensure that the stainless steel screws meet the necessary quality standards and specifications required by the customs authorities. This may involve providing documentation such as material composition, dimensions, and other relevant information to prove the authenticity and quality of the screws.Secondly, it is important to accurately declare the value of the stainless steel screws to avoid any issues with customs clearance. Under or overvaluing the screws can lead to delays or even penalties, so it is essential toprovide an accurate valuation based on market prices and other relevant factors.Additionally, it is advisable to work with a reputable customs broker or agent who is familiar with theregulations and requirements for importing stainless steel screws. They can help navigate the complex customs procedures and ensure that all necessary documentation isin order to avoid any potential issues.In conclusion, obtaining a customs certificate for stainless steel screws involves ensuring quality compliance, accurate valuation, and working with experienced professionals to facilitate the import process smoothly.中文回答:不锈钢螺丝因其耐用性和抗腐蚀性而被广泛应用于各行各业。

指纹化学

指纹化学

指纹化学作者:暂无来源:《检察风云》 2014年第7期文/阿碧在大多数刑事案件的侦破工作中,提取案发现场的指纹是一项常规性工作。

然而,指纹鉴定有一定的局限性。

如果指纹残缺或遭到有意破坏,则很难将提取到的指纹进行比对,而且指纹鉴定往往需要有能比对的数据才有用。

能不能用指纹直接寻找嫌疑人的相关线索呢?英国法医学家表示,很难用指纹本身去追踪身份不明的嫌疑人;然而,分析指纹中隐藏的一些化学物质,则可以寻找到嫌疑人的有关线索。

指尖留痕为什么可以通过查找指纹中的化学物质来获得线索呢?这得从留下指纹的原因说起。

人们之所以会在接触过的物体上留下指纹,那是因为在人的手指、手掌面的皮肤上,存在有大量的汗腺和皮脂腺,只要生命活动存在,就不断地有汗液、皮脂液排出,有点像印章不断有油墨渗到印文表面,因此,只要手指、手掌接触到物体表面,这些汗液和皮脂液就像印泥一样,令在人们所接触的物体上留下印痕。

如果人们中途接触过其他化学物质没有洗手,或是长期接触某类化学物质(如香烟、毒品等),指纹中也会残留这些化学物质。

通过分析这些化学物质,就可以找到犯罪嫌疑人的相关线索。

对皮肤分泌的脂酸和其他化学成分的分析可以揭示个人生活的细节。

伦敦国王学院法医与毒品监控学系的苏·金克尔博士举了一个例子:“我们在一个人的指纹中发现了一种从未见过的物质,通过询问,我们发现,那人正在使用一种独特的从蓖麻油中提取的洗发水成分。

正是这种少见的洗发水,导致了蓖麻油的衍生物出现在皮肤分泌的脂酸中。

”以往,法医们并不分析指纹中的化学物质,那是因为指纹中有多种化学物质,而这些化学物质的含量十分微小,有时少到只有几个分子。

按照传统的化学分析方法,很难分析出这些微量化学物质的成分。

随着新的化学分析方法的出现,以及化学仪器的逐渐精密化,分析隐藏在指纹中的化学物质已经不再有技术上的障碍了。

需要解决的问题是,如何进一步提高精度,简化仪器操作的程序和读取数据的便捷性,以及降低仪器的制造成本,以便这些化学仪器能够在各地的警局或专业的法医鉴定部门中得以普及。

指纹识别(Fingerprint Recognition)PPT英文版

指纹识别(Fingerprint Recognition)PPT英文版

Development Prospect and Application Area
Become civilian
Replace the identification code and password
Development Prospect and Application Area Combine the feature of the biological recognition technology and the fingerprint. Face recognition
5、Used in many other fields later. 6、Rapid development of personal identification application. ( late 1990s)
Fingerprint Recognition System
The structure of hardware system
We will talk about…
• History and development
• Fingerprint Recognition System • Technical features
• Development Prospect and Application Area • Examples of related products
Adding other users only for using the car.
Touch ID
Touch ID
Question?
Enter the CPU
Authentication(身份验证 )
Fingerprint anti-theft device

玻璃行业英文术语

玻璃行业英文术语

Diamond, 钻石Crystal etc.Chinchilla, 金丝玻璃Nashiji, 香梨玻璃Millennium, 千禧格玻璃水纹玻璃Water布纹玻璃Woven glass七巧板玻璃Karatachi glass四季红玻璃Masterlite甲骨文(Ancient Figure)水纹(Aqualite)花狸金丝(Chinhilla)水晶(Crystal)小灯芯纹1(Fiutelite-S)小灯芯纹2(Fiutelite-B)七巧板(Karatachi)银霞(Kasumi)五月花(May Flower)千禧格(Millennium)彩云(Moran)金龙(Morgon)香梨(Nashiji)银波(Oceanic)银珠(Pearl-S)雨花Ⅰ(Rain-B)雨花Ⅱ(Rain-S)万元(Wanji)金波纹(water)玫瑰(Rose)春潮(Spring tide)深加工玻璃glass processing钢化玻璃tempered glass/ toughened glass/ strengthened glass 中空玻璃insulating glass/hollow glass夹胶玻璃laminated glass防火玻璃fire-resistant glass/fireproof glass防弹玻璃armored glass / ballistic resistant glass防弹玻璃Bullet-proof Glass汽车玻璃automotive glass镀膜玻璃coated glass/coating glass光学玻璃optical glass热弯玻璃hot bending glass/ thermal bending glass家具玻璃furniture glass家电玻璃appliance glass安全玻璃safety glass / security glass卫浴sanitary镜子mirror银镜silver glass铝镜aluminum glass低辐射玻璃:low-e glass太阳能玻璃Sun-e glass彩色玻璃:tinted glass/stained glass变色玻璃photochromic glass建筑玻璃architectural glass在真空玻璃vacuum glass热反射玻璃heat reflecting glass吸热玻璃heat absorbing glassITO导电玻璃ITO conductive glass丝印玻璃silk printing glass耐热玻璃thermal glass光电玻璃photoelectric glass仪表玻璃instrument glass挡风玻璃windshield glass幕墙玻璃Glass Curtain Wall/glass facade原片玻璃sheet glass平板玻璃flat glass/ sheet glass/ plate glass 浮法玻璃float glass格法玻璃glaverbel glass压延玻璃rolling glass超白玻璃ultra-white glass/ultra clear glass 超薄玻璃ultra-thin sheet glass茶玻tawny glass蓝玻blue glass灰玻gray glass艺术玻璃art glass压花玻璃patterned glass / figured glass热熔玻璃hot-melt glass镶嵌玻璃mosaic glass/ Panel Glass镶嵌宝石inlaid gemstone / jewel夹丝玻璃Wired glass装饰玻璃decoration glass彩釉玻璃colored glazing glass彩绘玻璃stained glass玻璃工艺品glass handicraft靓彩玻璃nacreous glass聚晶玻璃polycrystalline glass喷砂玻璃sandblasting glass冰花玻璃ice glass肌理玻璃textured glass玻璃砖glass brick玻璃马赛克glass Mosaic玻璃烛台glass candleholder玻璃球:glass ball玻璃珠:glass bead浮雕玻璃embossed glass吹制玻璃:glass blowin器皿玻璃ware glass灯具玻璃light glass玻璃灯罩glass lampshade钟表玻璃watch crystal医用玻璃pharmaceutical glass玻璃仪器glass instrument / glass apparatus化装瓶cosmetic bottle玻璃瓶glass bottle香水瓶perfume bottle / scent bottle玻璃餐具glass tableware玻璃盖glass cap/cover玻璃采板glass cutting board杯垫mat日用玻璃daily use glass特种玻璃special glass智能调光玻璃smart glass微晶玻璃crystallite glass石英玻璃quartz glass /防眩玻璃anti-dazzle glass / glare-reducing glass 纳米玻璃nanometer glass液晶玻璃liquid crystal glass玻璃纤维glass fiber亚历克玻璃Acrylic glass高硼硅玻璃high borosilicate glass自洁玻璃Self-cleanness Glass乳化玻璃Emulsification Glass防火玻璃Fireproof Glass激光玻璃Laser Glass发光玻璃Shining Glass磁性玻璃Magnetic Glass杀菌玻璃anti-bacterial Glass纳米玻璃Nanometer Glass有机玻璃Organic Glass透红外玻璃Infrared Transmission Glass玻璃机械glass machinery钢化炉toughening furnace热弯炉thermal bending/ hot bending furnace高压釜high-pressure autoclave退火炉annealing furnace玻璃窑炉glass kiln磨边机edge grinding machine切割机cutting machine清洗机washing machine打孔机drilling machine检测设备detection equipment喷砂机sandblasting machine辊压机rolling machine热熔炉melting furnace印花机decorating glass抛光机polishing machine灌装机Feeder混合机Hydramix振动加料机oscillating bath charger异性机irregular machine码垛机palletizer行列机I.S.machine斜边机beveling machine夹层玻璃生产线processing line for laminated glass / multiple glass / triple glass interlayer glass 中空玻璃生产线the processing line of insulating glass丝网印刷机Ferro cement printing machine机械配件,辅助工具mechanical parts, supplementary means磨轮grinding wheel抛光轮polishing wheel金刚轮diamond wheel树脂轮resin wheelBD轮BD wheel玻璃刀glass cutter / glazing knife无影灯shadowless lamp花边钳lacey plier钻头drill五金ironmongery / hardware /吸盘sucker / sucking disk / osculate网版screen玻璃工具glass tool玻璃模具glass mould/pattern水钻磨轮water borehole abrasive wheel陶质焊补ceramic resurfacing / rewelding防潮纸Moisture proof Paper托盘Wooden Pallet木箱Wooden Box汽垫膜Air Cushion Film周转箱Recycle Case铁架子Iron Shelf化工材料,辅料chemical materials , accessories玻璃油墨glass printing oil玻璃颜料glass pigment colour玻璃涂料glass adhesive coating玻璃油漆glass oil paint澄清剂fining agent / refining agent/ clarifying agent抛光粉polishing powder/ burnishing powder助熔剂flux复原剂reducing agent着色剂coloring agent脱色剂decolorize agent石英砂quartz sand分子筛molecular sieve蒙砂粉glass frosting powderPVB胶片PVB rubber sheetEV A胶片EV A rubber sheet花纸decal paper玻璃微珠glass micro-balloon玻璃胶glass cement无影胶shadow less glue密封胶sealant / sealing gum耐火材料fire-resisting material / refractory material玻璃吊带glass sling密封胶sealent行业技术服务,机构industry technical service , institution 玻璃软件glass software书刊杂志books and magazines检测机构feeler mechanism /detection institution协会associationOther related:高脚玻璃酒杯goblet无手印玻璃non-fingerprint glass冰雕玻璃ice sculpture glass / ice carving glass长石矿feldspar quarry玉砂粉emery powder打孔钻grooved bit贝壳纽扣钻shell button drill水晶钻crystal drill石材钻stone drill瓷砖钻tile drill陶瓷pottery and porcelain / ceramics宝石jewel石材stone material玛瑙agate / carnelian磁砖ceramic tile脆硬材料crisp and hard material锋利耐磨sharp and wearable直柄straight shank锥柄taper shank螺纹柄threaded shank按比例稀释dilute proportionally氢氟酸hydrofluoric acid样品库sample chamber玻璃电熔炉glass electrical furnace退火窑lehr / annealing furnace电热烘烤炉electrical baking furnace电坩锅炉electrical crucible furnace复合式加热电熔炉compound heating electrical melting furnace手糊制品Manually Paste Product拉挤制品Stretching & Compressing Product模压制品Mould Pressed Products浇铸制品Casting Product喷涂制品Spray and Paint Product切片制品Slicing Product1.玻璃窑炉annealing rate 退火速率(bath) atmosphere 保护气体〔锡槽内〕air flow alarm 风管报警(bath) casing 锡槽底壳annealing lehr 退火窑〔furnace & bath〕熔窑和锡槽annealing region 退火区〔raw material〕原料部分(tin) bath 锡槽air forced cooling zone 气流强冷区atmosphere cooled exit lip plate 保护气体冷却的出口唇板〔金属制〕auxiliary panel 辅助控制盘〔板〕back wall of burner 小炉后墙batch 配合料〔混合料〕batch-mixing plant 配合料房bath bottom 锡槽底砖bath bottom cooling 锡槽底壳冷却bath roof 锡槽顶盖bath roof casing 锡槽顶盖外壳bath sidewall 锡槽侧壁bath water cooling 锡槽水冷却器bay 锡槽分段bin 料仓bins of raw materials 原料仓库branch flue 支烟道breast wall 胸墙burner 喷枪bus bar 汇流带〔电接线排〕canal 流道carbon pusher 石墨挡块carbon side wall lining 侧壁石墨衬charge end hopper 窑头料仓〔在投料机上方〕〔料斗〕check damper(stack damper) 支烟道闸板check setting 码格子砖checker brick 格子砖checker chamber 蓄热室checker work 格子体chimney(stack) 烟囱chrome magnesite 铬镁砖close down a furnace or shut down 止窑〔冷修前停窑〕coal dust 煤粉control valves 控制伐cooling 风冷〔水冷〕cross fire furnace 横焰窑crown(main arch) 大碹cullet 碎玻璃cullet hopper 碎玻璃仓〔料斗〕damper block 闸板砖dedrossing pocket 排锡渣口demolish 拆除diatomite insulating brick 硅藻土保温砖discharging hopper 卸料料仓〔斗〕dolomite 白云石draft (=draught) 抽力drain (a furnace) 放〔玻璃水〕drain(ing) hole 放玻璃水孔dross box 锡槽箱ducting 风管electric furnace 电熔窑electrods on melter bottom (电极底插式) electrods on sidewalls 〔电极侧插式〕end fire furnace 马蹄型焰窑exit end 出口端exit linter 出口横梁exit lip 出口唇板fans 风机feldspar 长石filling pocket 投料池fire-clay bottom block 粘土大砖〔池底〕fireclay brick 粘土砖flame 火焰flat arch spread 流道上部平碹flexes 软管float furnace 浮法玻璃窑flue 烟道fluxline 液面线front linter 锡槽进口横梁〔楣〕front wall 前脸墙front wall buckstay 前脸墙立柱front wall platform 前脸墙平台furnace structure 熔窑结构gable 山墙heating element 加热元件honeycomb 蜂窝状砖〔用于锡槽顶盖〕hopper 料斗/铁皮料仓hot end 锡槽热端inspection 检查insulating brick 保温砖invert arch 反碹isolating valves 隔离伐jack arch 平碹jack arch of port 小炉平碹jamb wall 小炉之间胸墙lehr 退火窑lehr hood 退火窑罩lift out roller 提升辊道lime stone 石灰石linear motors 直线马达magnesite brick 镁砖maintenance 维修manifold 主管道modify 修改neck ends 蓄热室锁断nip on 将拉边器置于板面上overhead coolers 高架冷却器oxy-gas furnace for TV panels 全氧-气体燃料电视屏窑periscopes 潜望镜porous silica brick 多孔硅砖port 小炉口post annealing region 后退火区pre-annealing region 预退火区preheat area 预热区〔锡槽〕pressure transmitters 压力转换器primary cable 电缆refractory brick 耐火砖regenerator 蓄热室regenerator crown 蓄热室大碹regenerator doors 蓄热室门regenerator flues 蓄热室烟道reheat 重热区remove 搬移restrictor tile 限流砖〔锡槽专用砖〕ribbon 浮法玻璃带rider arch 炉条碹rod 吊杆sand 石英砂sealing drapes 密封挡坎secondary cable 次级电缆Shoulder 锡槽肩部shut down 关闭锡槽〔放下截流闸板〕side sealing 锡槽侧密封sidewall of tank 池壁silica brick 硅砖silo 水泥筒仓skew arch of port 小炉斜碹skewback 碹脚砖sleeve 套管soda ash 纯碱sodium sulfate 芒硝span of arch 碹跨度spout lip流道出口唇板springer 碹碴staggered brick joint 错缝砖start-up 点火steel work 钢结构stirrer 搅拌器strain 应变stress 应力stud 螺栓substance 厚度〔英〕superstructure 上部结构suspended arch 吊碹take-off line 玻璃带起跳点tapping 放玻璃水tapping tank 放玻璃水池television system 电视监控系统thickness 厚度〔美〕thrust screws & plates 止推螺丝和止推板tin drain 排锡〔放锡〕top roll machine 拉边器top roll system 拉边机系统tuckstons 挂钩砖Tweel 流道控制闸板unit melter with recuperator 换热器式单元窑upper making-up brick 上间隙砖waist 炉腰waist gable 炉腰山墙waist side block 炉腰池墙warm up (heat up) 烤窑wedge brick 楔型砖wetback flow 湿背流wet-back tile 湿背砖〔锡槽专用砖〕withdraw 搬离、退出zirconia brick 锆刚玉砖2.玻璃机械1. 电加热供料道Electric-heating Forehearth2. 气加热供料道Gas-heating Forehearth3.滴料式供料机Gob Feeder4.行列式制瓶机I.S.machine5. 稳压阀Pressure Stabilizing Valve6.电子分料器Electronic Gob Distributor7.瓶罐托盘码垛包装设备Glassware Palletizing Series8.托盘燃气热缩机Pallet Shrink-wrapping Machine9.瓶罐自动热缩包装机Automatic Glassware Shrink-wrapping Machine10.热端蒸涂机Hot-end Coating Machine12冷端喷涂机Cold-end Coating Machine13.弧线递送机Curved Transfer Wheel14.横向输瓶机Cross Conveyor15.曲线推瓶机Curve-type Stacker16.排瓶机、输瓶机Liner & Single –line Conveyor17.垂直输瓶机Vertical Conveyor18.玻璃液搅拌机Melting Glass Stirrer19.玻璃器皿烧口机Glassware Jar Burning Machine20.玻璃拉管生产设备Glass-tube Drawing-out Equipment玻璃窑炉annealing rate 退火速率bath atmosphere 保护气体〔锡槽内〕air flow alarm 风管报警bath casing 锡槽底壳annealing lehr 退火窑furnace & bath 熔窑和锡槽annealing region 退火区raw material 原料部分(tin) bath 锡槽air forced cooling zone 气流强冷区atmosphere cooled exit lip plate 保护气体冷却的出口唇板〔金属制〕auxiliary panel 辅助控制盘〔板〕back wall of burner 小炉后墙batch 配合料〔混合料〕batch-mixing plant 配合料房bath bottom 锡槽底砖bath bottom cooling 锡槽底壳冷却bath roof 锡槽顶盖bath roof casing 锡槽顶盖外壳bath sidewall 锡槽侧壁bath water cooling 锡槽水冷却器bay 锡槽分段bin 料仓bins of raw materials 原料仓库branch flue 支烟道breast wall 胸墙burner 喷枪bus bar 汇流带〔电接线排〕canal 流道carbon pusher 石墨挡块carbon side wall lining 侧壁石墨衬charge end hopper 窑头料仓〔在投料机上方〕〔料斗〕check damper(stack damper) 支烟道闸板check setting 码格子砖checker brick 格子砖checker chamber 蓄热室checker work 格子体chimney(stack) 烟囱chrome magnesite 铬镁砖close down a furnace or shut down 止窑〔冷修前停窑〕coal dust 煤粉control valves 控制伐cooling 风冷〔水冷〕cross fire furnace 横焰窑crown(main arch) 大碹cullet 碎玻璃cullet hopper 碎玻璃仓〔料斗〕damper block 闸板砖dedrossing pocket 排锡渣口demolish 拆除diatomite insulating brick 硅藻土保温砖discharging hopper 卸料料仓〔斗〕dolomite 白云石draft (=draught) 抽力drain (a furnace) 放〔玻璃水〕drain(ing) hole 放玻璃水孔dross box 锡槽箱ducting 风管electric furnace 电熔窑electrods on melter bottom (电极底插式)electrods on sidewalls 〔电极侧插式〕end fire furnace 马蹄型焰窑exit end 出口端exit linter 出口横梁exit lip 出口唇板fans 风机feldspar 长石filling pocket 投料池fire-clay bottom block 粘土大砖〔池底〕fireclay brick 粘土砖flame 火焰flat arch spread 流道上部平碹flexes 软管float furnace 浮法玻璃窑flue 烟道fluxline 液面线front linter 锡槽进口横梁〔楣〕ront wall 前脸墙front wall buckstay 前脸墙立柱front wall platform 前脸墙平台furnace structure 熔窑结构gable 山墙heating element 加热元件honeycomb 蜂窝状砖〔用于锡槽顶盖〕hopper 料斗/铁皮料仓hot end 锡槽热端inspection 检查insulating brick 保温砖invert arch 反碹isolating valves 隔离伐jack arch 平碹jack arch of port 小炉平碹jamb wall 小炉之间胸墙lehr 退火窑lehr hood 退火窑罩lift out roller 提升辊道lime stone 石灰石linear motors 直线马达magnesite brick 镁砖maintenance 维修manifold 主管道modify 修改neck ends 蓄热室锁断nip on 将拉边器置于板面上overhead coolers 高架冷却器oxy-gas furnace for TV panels 全氧-气体燃料电视屏窑periscopes 潜望镜porous silica brick 多孔硅砖port 小炉口post annealing region 后退火区pre-annealing region 预退火区preheat area 预热区〔锡槽〕pressure transmitters 压力转换器primary cable 电缆refractory brick 耐火砖regenerator 蓄热室regenerator crown 蓄热室大碹regenerator doors 蓄热室门regenerator flues 蓄热室烟道reheat 重热区remove 搬移restrictor tile 限流砖〔锡槽专用砖〕ribbon 浮法玻璃带rider arch 炉条碹rod 吊杆sand 石英砂sealing drapes 密封挡坎secondary cable 次级电缆Shoulder 锡槽肩部shut down 关闭锡槽〔放下截流闸板〕side sealing 锡槽侧密封sidewall of tank 池壁silica brick 硅砖silo 水泥筒仓skew arch of port 小炉斜碹skewback 碹脚砖sleeve 套管soda ash 纯碱sodium sulfate 芒硝span of arch 碹跨度spout lip流道出口唇板springer 碹碴staggered brick joint 错缝砖start-up 点火steel work 钢结构stirrer 搅拌器strain 应变stress 应力stud 螺栓substance 厚度〔英〕superstructure 上部结构suspended arch 吊碹take-off line 玻璃带起跳点tapping 放玻璃水tapping tank 放玻璃水池television system 电视监控系统thickness 厚度〔美〕thrust screws & plates 止推螺丝和止推板tin drain 排锡〔放锡〕top roll machine 拉边器top roll system 拉边机系统tuckstons 挂钩砖Tweel 流道控制闸板unit melter with recuperator 换热器式单元窑upper making-up brick 上间隙砖waist 炉腰waist gable 炉腰山墙waist side block 炉腰池墙warm up (heat up) 烤窑wedge brick 楔型砖wetback flow 湿背流wet-back tile 湿背砖〔锡槽专用砖〕withdraw 搬离、退出zirconia brick 锆刚玉砖。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
相关文档
最新文档