托尼盖十二款经典39页PPT
Standard
INCITS M1/07-0129iRevision of ANSI®INCITS 379-2004American National Standardfor Information Technology – Iris Image Interchange FormatSecretariatInformation Technology Industry Council (ITI)American National Standards Institute, Inc.AbstractThis standard describes a format for exchange of iris image information. It contains a definition of attributes, a data record format, sample records and conformance criteria. Two alternative formats for iris image data are described, one based on a cartesian coordinate system and the other on a polar coordinate system.iiApproval of an American National Standard requires review by ANSI that the requirements for due process, consensus, and other criteria for approval have been met by the standards developer. Consensus is established when, in the judgement of the ANSI Board ofStandards Review, substantial agreement has been reached by directly andmaterially affected interests. Substantial agreement means much more than asimple majority, but not necessarily unanimity. Consensus requires that allviews and objections be considered, and that a concerted effort be madetowards their resolution.The use of American National Standards is completely voluntary; theirexistence does not in any respect preclude anyone, whether he has approvedthe standards or not, from manufacturing, marketing, purchasing, or usingproducts, processes, or procedures not conforming to the standards.The American National Standards Institute does not develop standards and willin no circumstances give an interpretation of any American National Standard.Moreover, no person shall have the right or authority to issue an interpretationof an American National Standard in the name of the American NationalStandards Institute. Requests for interpretations should be addressed to thesecretariat or sponsor whose name appears on the title page of this standard.CAUTION NOTICE: This American National Standard may be revised orwithdrawn at any time. The procedures of the American National StandardsInstitute require that action be taken periodically to reaffirm, revise, or withdrawthis standard. Purchasers of American National Standards may receive currentinformation on all standards by calling or writing the American NationalStandards Institute.Published byAmerican National Standards Institute, Inc.11 West 42nd Street, New York, NY 10036Copyright © 2007 by Information Technology Industry Council (ITI)All rights reserved.No part of this publication may be reproduced in anyform, in an electronic retrieval system or otherwise,without prior written permission of ITI, 1250 Eye Street NW,Washington, DC 20005. Printed in the United States of AmericaAmericanNationalStandardINCITS M1/07-0129iiiContents Page Foreword............................................................................................................................................................iv Introduction.. (ix)1 Scope (1)2 Conformance (1)3 Normative references (1)4 Terms, definitions, symbols, units and abbreviated terms (2)5 Iris image format specification (3)5.1 General (3)5.2 Image compression (3)5.3 Image5.4 Irisimage5.5 Iris 5.6 Data values Annex A (informative) Iris image capture best practice A.1 Image quality (13)A.1.1 Optical and Digital Resolution (13)A.1.2 Focus Quality (13)A.1.3 Image Quality (13)A.2 Grayscale density (14)A.3 Illumination (14)A.4 Contrast (14)A.5 Visible iris (15)A.6 Pixel aspect ratio (15)A.7 Image scale (15)A.8 Optical distortion (16)A.9 Noise (16)A.10 Image orientation (16)A.11 Presentation (16)Annex B (informative) Sample iris image data records (17)B.1 B.2 Rectilinear data record sample, multiple eyes, multiple images B.3 BibliographyForewordINCITS (The International Committee for Information Technology Standards) is the ANSI recognized Standards Development Organization for information technology within the United States of America. Members of INCITS are drawn from Government, Corporations, Academia and other organizations with a material interest in the work of INCITS and its Technical Committees. INCITS does not restrict membership and attracts participants in its technical work from 13 different countries, and operates under the rules of the American National Standards Institute.In the field of Biometrics, INICTS has established the Technical Committee M1. Standards developed by this Technical Committee have reached consensus throughout the development process and have been thoroughly reviewed through several Public Review processes.At the time that it approved this standard, INCITS had the following members:ivINCITS M1/07-0129vTechnical Committe M1 on Biometrics, which reviewed this standard, had the following members:Fernando Podio, ChairColin Soutar, Vice-ChairOrganization RepresentedName of Representative P – Principal A – Alternate 3M COCampbell, John (P)Larson, Roger (A) Assa Abloy ITGPefley, Marian (P)Quan, Ralph (A) AuthenTec, Inc.Setlak, Dale (P) Authenti-CorpValencia, Valorie (P) AWARE INCBenini, David (P)Mungovan, Rob (A) Bioscrypt, Inc.Soutar, Colin (P) Business SolutionsEul, John (P) Cross Match Technologies, Inc.Ruggles, Thomas (P) Cannon, Greg (A) DCTAThewlis, Dave (P) DataCard GroupBaggeroer, Chuck (P) IBIARichard Norton (P) ID Technology Partners, Inc.Jerde, Mark (P)Herr, Fred (A) Identix CorporationRudolph Nobel, Kirsten (P)Griffin, Paul (A)Bowman, Erik (A) INFINEON TECHNOLOGIESStafford, Mark (P)Majid, Ashi (A) International Biometric GroupMak, Mken (P)Thieme, Mike (A) Iridian TechnologiesCambier, James (P) Iritech, Inc.Kim, Daehoon (P) LASERCARD SYSTEMS CORPPrice-Francis, Stephen (P) LOCKHEED MARTIN CORPSutton, Ronald (P)Florsek, Donald (A) MastercardRussell, James (P)Nardone, Christopher (A) Mississippi Valley State UniversityGilligan, Allan (P) MITRETEK SYSTEMSD'Amato, Donald (P)Kiebuzinski, George (A) NATIONAL SECURITY AGENCYDunn, Jeffrey (P)Reinert, Lawrence (A)King, Matthew (A) NEC SolutionsGiordano, Theresa (P)Gousie, Stephen (A) NIST Podio, Fernando (P)Hogan, Michael (A)McCabe, Michael (A) OSS NOKALVA Triglia, Alessandro (P)Scott, Bancroft (A) Purdue University Elliott, Stephen (P) Q.E.D. Systems Harmon, Craig (P) SAFLINK Corp. Tilton, Cathy (P) SAGEM MORPHO INC Jones, Creed (P) Security Industry Association Visbal, Mark (P) SONY ELECTRONICS INC Harris, John (P)Barrett, Ed (A)ST MICROELECTRONICS Fabbrizio, Vito (P) Transaction Security, Inc. Beatson, Rod (P) Unisys Corp Schaffner, Ed (P)Vinsik, Steve (A) United States Dept. of Defense - BMO/BFC Hapeman, Dale (P) United States Dept. of Homeland Security Lazarick, Rick (P)Neumann, John (A)Ruwaldt, Paul (A) United States Dept. of Justice Miles, Christopher (P)Gilchrist, Mike (A) United States Dept. of State Kefauver, Barry (P)Williams, Curtis (A) West Virginia High Technology Consortium Foundation Gaydos, Kenneth (P)Malnick, Kathy (A)viINCITS M1/07-0129viiTask Group M1.1 on Biometric Data Interchange Formats, which developed this standard, had the following participants :Creed Jones, ChairJames Cambier, Vice-Chair and Iris Interchange Technical EditorOrganization RepresentedName of Representative P – Principal A – Alternate 3M CoCampbell, John (P)Larson, Roger (A) AtmelMainguet, Jean-Francois (P)Ruffin, Philippe (A) AuthenTec, Inc.Setlak, Dale (P) Aware IncBenini, David (P)Maurer, Jim (A) Bioscrypt, Inc.Soutar, Colin (P) CrossMatch Cannon, Greg (P) Identix CorporationNobel, Kirsten (P)Griffin, Paul (A)Bowman, Erik (A) Iridian TechnologiesCambier, James (P) Iritech, Inc.Kim, Daehoon (P) Lockheed Martin CorpSutton, Ronald (P) Mitretek SystemsD'Amato, Donald (P) Motorola Wabgaonkar, Harshawardhan (P)Hall, David (A) National Biometric Security ProjectWilliams, Gerald (P) National Security AgencyDunn, Jeffrey (P)King, Matthew (A) NEC SolutionsGiordano, Theresa (P)Gousie, Stephen (A) NISTMcCabe, Michael (P)Hogan, Michael (P) OSS NokalvaTriglia, Alessandro (P)Scott, Bancroft (A) Passports AustraliaHartmann, Terry (P)Osborne, John (A) Recognition Systems, Inc.Tamer, Samir (P)Gaughan, Chris (A) SAFLINK Corp.Tilton, Cathy (P) Sagem Morpho IncJones, Creed (P) Fineman, Dan (A) Sony Electronics IncHarris, John (P)Barrett, Ed (A) The Aerospace CorporationBuettner, Doug (P) Transaction Security, Inc.Beatson, Rod (P) Unisys CorpVinsik, Steve (P)Organization Represented Name of RepresentativeP – PrincipalA – AlternateSchaffner, Ed (A)United States Dept. of Defense – BMO/BFC Guirguis, Ramy (P)Randall, Rick (A)United States Dept. of Defense – DISA Walker, Ric (P)United States Dept. of Homeland Security Lazarick, Rick (P)Neumann, John (A)Wing, Brad (A)United States Dept. of State Kefauver, Barry (P)Williams, Curtis (A)viiiINCITS M1/07-0129IntroductionThe purpose of this document is to define a proposed standard for exchange of iris image information. The standard contains a specific definition of attributes, a data record format for storing and transmitting the iris image and certain attributes, several sample records, and conformance criteria.Currently, exchange of iris information between equipment from different vendors can only be done using a large-scale image of the entire eye. This is expensive in storage and bandwidth. To provide interoperability among vendors, it is necessary to define a standard, compact representation of a human iris.ixM1/03-0167Iris Image Interchange Format1 ScopeThis Standard specifies two alternative image interchange formats for biometric authentication systems that utilize iris recognition. The first is based on a rectilinear image storage format that may be a raw, uncompressed array of intensity values or a compressed format such as that specified by the JPEG standard. Images may be monochrome or color with 256 or more intensity levels (grey or per-color), and vary in size depending on field of view and compression. Typical size is 25 –30 Kbytes for JPEG format.The second format is based on a polar image specification that requires certain pre-processing and image segmentation steps, but produces a much more compact data structure that contains only iris information. The record size can be as small as 2 Kbytes. The polar image may be either raw or compressed format.Data that comply with either one of the iris image formats specified in this standard are intended to be embedded in a CBEFF-compliant structure in the CBEFF Biometric Data Block (BDB).2 ConformanceConformity with the standard requires compliance with one of the data formats described in Section 5. Recommended image quality criteria described in Annex A are expressed in terms of resolution, contrast, noise level, etc. Quality is specified as a value from 0 to 100, where value 0 means “unspecified”. In general, the highest image quality levels are recommended for high-volume, high-security applications where the lowest possible recognition error rates are required. Lower levels of image quality are appropriate for less demanding applications in which higher error rates can be tolerated but camera cost is a critical factor.This standard is intended for technical review of the proposed image standard.3 Normative referencesThe following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.[CBEFF] NISTIR 6529-A – Common biometric exchange file format - augmented[BioAPI] ANSI/NIST 358-2002 – Information technology – BioAPI specification[X9.84] X9.84-2001 – Biometric information management and security[JPEG] ISO/IEC 10918-1:1994, ISO/IEC 10918-2:1995, ISO/IEC 10918-3:1997, ISO/IEC 10918-4:1999 – Information technology – Digital compression and coding of continuous-tone still images (JPEG)[JPEG2000] ISO/IEC 15444-1:2000, ISO/IEC 15444-3:2002, ISO/IEC 15444-4:2002 – Information technology – JPEG 2000 image coding system4 Terms, definitions, symbols, units and abbreviated termsFor the purposes of this document, the following terms, definitions, units and abbreviated terms apply.4.1BLOBbinary large object, a large block of binary data, typically an image, that may have to be handled in a special way4.2continuous tone imageimage whose components have more than one bit per sample4.3cropto reduce the size of an image by removing unimportant parts of it, typically the outer regions4.4grey scalecontinuous-tone image that has one component, which is luminance4.5iriscolored annular ring in the front portion of the eye comprised of muscular and connective tissue and pigment cells that defines and controls the central opening of the pupil4.6JPEGcompression standard for continuous-tone images, published in 1994 as ISO 10918-1 and ITU-TT.814.7JPEG2000enhanced compression standard published as ISO/IEC 154444.8limbusouter boundary of the iris where it is joined to the sclera4.9lpline pair, a measure of spatial feature content, which when associated with a fixed distance measurement provides an estimate of spatial frequency4.10mmmillimetre4.11pixelsingle picture element, one of an m by n matrix of picture elements where m is the number of columns and n is the number of rows4.12pupilopening in the center of the eye that serves as a variable light aperture and defines the inner boundary of the irisINCITS M1/07-0129 4.13rawimage file format in which the image is stored in the same format in which it is stored in video memory, typically one byte (for monochrome images) per picture element or three bytes (for color images) per picture element4.14resolutionnumber of picture elements (pixels) per unit distance in the object plane or image plan, specified as the number of pixels per millimetre at the object plane, that is on the eye4.15roundmathematical function applied to a number x such that round(x) is the integer that is closest in value to x4.16sclerawhite outer covering of the eye peripheral to the iris5 Iris image format specification5.1 GeneralThe iris image format specification defines header and data structures that support storage of the iris image in rectilinear or polar coordinates.The biometric data record specified in this standard shall be embedded in a CBEFF-compliant structure in the CBEFF Biometric Data Block (BDB). The CBEFF Format Owner assigned by the International Biometric Industry Association (IBIA) to INCITS Technical Committee M1 shall be used. This is the sixteen-bit value 0x001B (hexadecimal 1B or 27 decimal). It is recommended that iris image data transmitted or stored in accordance with the standard defined here be encrypted and signed to protect privacy and integrity of the data. The CBEFF structure supports such encryption and signing.One of the two following CBEFF Format Type values shall be used in the CBEFF Header. The sixteen-bit value 0x0601 shall be used for records that represent the iris image in rectilinear coordinates and the sixteen-bit value 0x0602 shall be used for records that represent the iris image in polar coordinates.5.2 Image compression5.2.1 General - The iris image shall be transmitted and stored in one of several possible formats described in the following sub-clauses.5.2.2 Raw format – The image shall be represented as an array of m columns by n rows by at least 8 bits. There is no image header, and each pixel in a monochrome image shall be represented by eight or more bits. Color images shall be represented as three samples per pixel, each comprised of eight or more bits, representing red, blue, and green intensities, in that order. The image shall be organized in row-major order, with the lowest address corresponding to the upper left corner of the image.5.2.3 Lossless compression format -If lossless compression is used, the image data shall be compressed in accordance with JPEG2000 lossless compression specified in ISO/IEC 15444.5.2.4 Compressed format – If lossy compression is used the image shall be compressed in accordance with the JPEG compression algorithm specified in ISO/IEC 10918 or in accordance with JPEG2000 lossy compression specified in ISO/IEC 15444.5.3 Image pre-processing5.3.1 Rectilinear image pre-processing - If the image is collected by a camera that captures only one eye at a time and stored using a rectilinear coordinate system no specific pre-processing is required. Cameras that capture images of both eyes simultaneously may use the following processing steps to calculate the rotation angle of the iris images.5.3.1.1 Rectilinear image rotation angle – Iris image capture systems that record images of both eyes simultaneously may have the capability to measure the angle of the subject’s head by defining a line between the pupil centers of the left and right eyes and determining the angular difference between this line and the horizontal axis of the imaging system. If this rotation is measured and recorded, it shall be recorded as the angle in degrees between the horizontal axis of the camera system and the line between the pupil centers of the two eyes, with a positive value signifying counter-clockwise rotation of the inter-pupil line relative to the camera’s horizontal axis.5.3.1.2 Rectilinear image rotation uncertainty - The rotation uncertainty is an estimate, dependent on the imaging device, of the maximum rotation error associated with the rotation angle. It shall be recorded as a positive nonzero value measured in degrees. If rotation information is not available the rotation uncertainty value shall be set to the maximum possible value.5.3.2 Polar image pre-processing - If the polar coordinate system is used the following pre-processing operations shall be performed on the rectilinear image in order to convert it to polar form.5.3.2.1 Boundary extraction – The boundaries of the pupil and iris may be extracted using a variety of techniques and either parametric or nonparametric representations. The polar image consists of a number of samples along radial lines positioned at regular angular intervals. The position of each pupil and outer iris boundary point along its radial line shall be determined with a precision of plus or minus one pixel. The polar image contains iris data between the inner boundary with the pupil and the outer boundary with the sclera.5.3.2.2 No boundary extraction - An alternative storage format is provided, in which the estimated pupil center is used as the inner boundary and the polar image samples extend radially from the pupil center to a supplier-defined outer circle that encloses the entire iris. In this case the number of radial samples in the polar image shall be not less than the iris radius in the rectilinear image expressed in pixels, and the number of annular samples shall be not less than one-half the iris/sclera boundary length in the rectilinear image expressed in pixels. Users of this format are expected to apply post-processing algorithms to extract the precise inner and outer iris boundaries using suitable techniques.5.3.2.3 Iris occlusions – Areas obscured by specular reflections, eyelids, eyelashes, etc. may be located and special intensity values assigned. If such assignment is performed such pixels shall be assigned a reserved iris occlusion value, usually maximum intensity or zero. The occlusion value shall be defined in the header. If such iris occlusion processing is performed and occluded areas are filled by a reserved value, subsequent compression applied to the image shall use only lossless compression algorithms.5.3.2.4 Scan type – Corrections to accommodate specific scan types such as progressive or interlaced should be applied prior to conversion to polar coordinates. If such corrections are applied the scan type entry in the image properties bitfield shall be set to SCAN_TYPE_CORRECTED.5.3.2.5 Orientation correction – Transformations to correct for horizontal or vertical flipping of the image shall be applied prior to conversion to polar coordinates, and the entries for horizontal and vertical orientation in the image properties bitfield shall be set to ORIENTATION_UNDEF or ORIENTATION_BASE.INCITS M1/07-0129 5.3.2.6 Polar conversion - Image data between the inner and outer iris boundaries shall be converted to polar coordinates, with each pixel represented by one or more (for color) intensity values. The inner and outer boundaries, which need not be circular or concentric, shall be each divided into m angular intervals. The image segment extending from the i th inner boundary segment to the i th outer boundary segment shall be divided into n radial samples. The intensity of each polar image sample p(r,θ) shall be computed using nearest-neighbor re-sampling or other industry-standard method. The zero degree angular value shall be at the 6 o’clock position, directly downward from the estimated pupil center, and angular values shall increase in the counter-clockwise direction. The pixel with the lowest address shall be adjacent to the inner boundary at 0 degrees. Subsequent addresses shall be occupied by pixels at the same radius but increasing angles until the first ring is completed. This shall be followed by m samples at radius = 1, etc. as shown in Figure 1a (for m=256 and boundary extraction) and figure 1b (for m=256 without boundary extraction). The entire uncompressed image shall consist of n x m pixels for a monochrome image having 8 or more bits per pixel intensity information or 3 x n x m for a color image having 8 or more bits of intensity information per pixel for each color. Figure 2 is a representative iris image showing the results of pre-processing steps that extract the inner and outer iris boundaries using the circular models. The extracted pupil, iris, and eyelid boundaries are shown along with the iris center. The polar representation of this same iris is shown in Figure 3. Note that the pupil boundary is at the top and the outerθ=0θ=1Figure 1a — Polar image sampling grid?=0?=1Figure 1b --- Polar image sampling grid (no boundary extraction)Figure 2 — Iris image with featuresFigure 3 —Polar iris imageINCITS M1/07-0129 5.3.2.7 Polar image rotation correction – If the rotation angle is available when the polar image is produced, it may be used to correct for rotation, so that the 0 degree radial is perpendicular to the line between the pupil centers. If such correction is performed the rotation uncertainty shall be set to a nonzero value indicating the expected accuracy of the correction. If rotation correction is not performed the rotation uncertainty shall be set to its maximum possible value. The rotation angle field is not used for polar images, and the value indicating undefined rotation angle shall be entered.5.4 Iris image data recordTable 1 illustrates the structure of the iris data record. Every record shall have an iris record header that contains information about the image capture device and conditions. The record shall contain images from one or two eyes, which are designated iris features, and the iris record header shall indicate how many features were recorded (one or two). Each iris feature shall have an iris feature header that designates it as a right or left eye, and contains information on the number of images recorded from that eye. If the capture device is unable to determine which eye was presented, then the eye designation shall be entered as "unknown", and all capture images shall be saved with a single feature header. Each iris image shall be accompanied by an iris image header, that contains an image sequence number plus information about quality and rotation for that image. Each image shall be padded with extra bits, if necessary, to end on an integral byte boundary. All header data shall be stored in network byte (big-endian) order. Where bit-level data definitions are specified, bit 1 shall be interpreted as the least significant bit (LSB). Signed fields shall use 2's complement encoding. A single record header structure shall be used for both rectilinear and polar formats. An iris image data record shall contain either rectilinear format images or polar format images; the two formats shall not be intermixed within a data record. The CBEFF Format Type value in the CBEFF header shall indicate the format used, with the value 0x0601 used to indicate rectilinear coordinates and 0x0602 to indicate polar coordinates as specified in 5.1.Table 1 — Iris image data recordBytes Type Content Description1 - 63 Iris Record Header Information pertaining to capture device,number of features (eyes) included in therecord, and total record size in bytes64 - 66 Iris Feature Header Header for feature indicating right or left eye,if known, and number of images67 - 81 Iris Image Header Header for first image containing imagenumber for first eye, quality, rotation angleand uncertainty, and image length82 – (imagelength-1)Unsigned char Image First image, this eyeIris Image Header Image header, second image, first eyeUnsigned char Image Second image, first eye• •• • • •Iris Image Header Image header, last image, first eye Unsigned char Image Last image, first eyeIris Feature Header Feature header indicating right or left eyeand number of images (used only if eye typeis known)Iris Image Header Image header, first image, second eyeUnsigned char Image First image, second eyeIris Image Header Image header, second image, second eye Unsigned char Image Second image, second eye• •• • • •Iris Image Header Image header, last image, second eyeUnsigned char Image Last image, second eye5.5 Iris header structures5.5.1 Iris Record Header structure - The iris record header shall contain data values that identify the record as containing iris image data, specify properties of the image capture device and the image format, and designatea unique identifier for the data capture event. The record header format is shown in Table 2.5.5.2 Iris Feature Header structure – The iris feature header shall contain data values that indicate which eye was presented, if known, and the number of images captured for that eye. The iris feature header format is shown in Table 3.5.5.3 Iris Image Header structure – The iris image header shall indicate an image sample number, quality value, eye rotation information (if available), and image data length. It will be followed by the image data. The iris image header format is shown in Table 4.5.5.4 CBEFF Product ID - The ‘owner’ of the product or device used to generate the image data (or transforming application) shall be uniquely identified by the two most significant bytes of a CBEFF Product ID (Owner). The product software version or device version shall be uniquely identified as the least significant two bytes of the CBEFF Product ID (Type). The type value of the CBEFF Product ID is established by the vendor. The value can be obtained from the IBIA. The CBEFF Product ID is specified in the augmented version of CBEFF (NISTIR 6529-A). CBEFF Product ID codes will be assigned by the International Biometric Industry Association (). Refer to the CBEFF standard for the definition of CBEFF Format Owner, Format Type, and Product ID, and information on how to obtain a CBEFF Product ID from IBIA.5.5.5 Capture Device ID – The iris record header shall include a two byte identification code for the image capture device that generated the image data. This code shall be vendor-specified.5.5.6 Iris Image Quality – The quality of the rectilinear iris image or the quality of the original image used to produce the polar image shall be represented in a five-byte set of fields. The quality score shall occupy the first byte. The value of the quality score shall range from 0 to 100 for samples where the sample quality has been assessed. A value of 254 shall indicate that no attempt was made to assess the sample quality. A value of 255 shall indicate that the sample quality assessment was attempted but was unsuccessful (e.g. due to iris segmentation failure). Values of biometric sample quality must be interpreted in view of the method used to assess the quality. Therefore, the quality assessment algorithm’s supplier (owner) and specific identity (ID) are contained in the next four bytes. The quality algorithm ID is the 16-bit format owner value assigned by the International Biometric Industry Association. The next two bytes contain a specific identifier for the quality assessment algorithm. This value is assigned by the organization, and may be registered with the IBIA.。
5.88页haloge
About Our 9pany
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec est nibh, vestibulum sit amet nisi eget, semper gravida enim. Sed pretium posuere porttitor. Maecenas dictum gravida vestibulum. Sed nisl nunc, facilisis a aliquet eget, molestie a neque. Donec nec felis at ipsum Sed nisl nunc, facilisis a aliquet eget, molestie a neque. Donec nec felis at ipsum
Halogen
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec est nibh, vestibulum sit amet nisi eget, semper gravida enim. Sed pretium posuere porttitor.
About Our 9pany
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec est nibh, vestibulum sit amet nisi eget, semper gravida enim. Sed pretium posuere porttitor. Maecenas dictum gravida vestibulum. Sed nisl nunc, facilisis a aliquet eget, molestie a neque. Donec nec
世界现代设计史图片解析
世界现代设计史图片解析一、工艺美术运动1、水晶宫内景 1851年伦敦世界博览会展览馆设计:约瑟夫·帕克斯顿此设计完全采用现代建筑材料——钢材和玻璃建成。
共用玻璃板30万张,在6个月内装配完成。
室内虽然看起来像今天的建筑脚手架,但采光良好,适宜展示。
1963年被大火烧毁。
2、“红屋”设计:菲里普·韦伯 1859年红屋因外墙用了红砖而得名。
红屋是具有创造性的建筑,强调了功能性、使用性和舒适性。
改正了过去建筑单纯模仿而缺乏创造性的通病,是哥特式建筑与英国乡村建筑的结合体,自然、简朴、实用。
3、“红屋”里的红木桌子和地毯设计:威廉·莫里斯 1876年红木桌子的造型延续了手工艺造型的传统,可看出作者的设计追求和审美趣味,地毯的图案设计则是他擅长的植物花纹。
4、镶嵌花砖图案设计:威廉·莫里斯 1876年图案设计的灵感来自植物花纹,展现出莫里斯的典型风格,写实、对称,造型幽雅,穿插的枝条使画面富有变化,与有永恒的美感,对今天的设计师仍然有参考价值。
5、椅子莫里斯的公司生产设计:罗塞蒂 1910年罗塞蒂设计的椅子既有手工艺时代椅子造型的幽雅,又体现了莫里斯民主设计思想的简洁,这种由“艺术设计师”设计的椅子被称为“艺术家具”,在19世纪后期极为流行。
6、扶手椅莫里斯的公司生产设计:罗塞蒂 1865年莫里斯的公司生产的椅子造型简洁朴实,灯心草编的坐垫美观舒适,葫芦型的椅子腿具有东方和民间特色,是莫里斯的最爱,至今销路良好,被称为“永恒的设计”。
7、“Sussex”扶手椅莫里斯的公司生产设计:布朗 1864—1940年画家布朗在Sussex商店发现了这一椅子原形,他在此基础上所做的设计与莫里斯公司生产的椅子风格一致,葫芦型的椅子腿和灯心草编的坐垫成为这种风格在造型和材料上的特点。
8、可调节的扶手椅莫里斯的公司生产设计:菲里普·韦伯 1865年韦伯设计的椅子可以调节靠背的角度,更增加了这一有柔软纺织品坐、靠垫椅子的舒适感,四只脚上的轮子可更方便地移动椅子,也体现了椅子设计的时代特点。
托尼盖十二款经典
名称:芭芘烫
1:烫发分区
分5区 1区左耳连接右耳采用空气 杠水平排列2区最高点到皇 冠点水平排列3区皇冠点到 后颈点自然垂直排列4区5 区水平排列
名称:芭芘烫
1:色彩分区
名称:佳丽烫
1:裁剪分区
A区方形裁剪,轻微刻痕 B区提拉到一点,动感长发裁 剪 C区向前边缘层次。
名称:佳丽烫
1:烫发分区 马蹄区以内V分区以空气 杠排列 马蹄区以下随头型自然 垂落一大一小左右对称 排列
托尼盖十二款经典染烫组合
名称:发纱烫
1:裁剪分区 环形分区 自然垂落 2:裁剪分配 方形,圆形轮廓线 3:裁剪切口 轻微点剪,通道式滑剪
名称:发纱烫
1:烫发分区 方块形 2:工具 锡纸,直板夹 3:手法 放射排列,轻微扭转,留发稍
名称:发纱烫
1:色彩分区 骨梁区以下5/41+6% 马蹄区以内 8/41挑染
名称:魅影烫
1:裁剪分区 马蹄型分区 2:裁剪分配 方形,动感长发,向前边 缘层次 3:裁剪切口 点剪.
名称:魅影烫
1:烫发分区 马蹄区分鱼鳞状发片 2:马蹄区以下 随头形垂直平行分区 3:烫发工具 马蹄区使用大号空气 杠 马蹄区以下使用4号杠
名称:魅影烫
1:色彩分区 马蹄区以内A
马蹄区以下B
名称:情迷烫
1:裁剪分区 马蹄形分区 2:裁剪分配 方形,动感长发,向前 边缘层次 3:切口 轻微刻痕
情迷烫
1:烫发分区 马蹄区以内一大一小水 平排列 马蹄区以下一大一小 随头型垂直排列
情迷烫
1:色彩分区
名称:索爱烫
1:裁剪分区 A区圆形裁剪 B区向前边缘层次
名称:索烫
1:烫发分区 全头采用之字形分区一 大一小左右对称排列
托尼盖理论..
• • • • • • • • • • •
• • • • • • .发片修剪形状{切口} 2,目测修剪:用眼睛判断切口的形状{随意} 3,平行修剪:切口与分线间距离相等{“T”型分区} 4,圆形:跟随头型形状修剪 五.个性化处理方法{修饰} 1,点剪:用剪刀尖点剪发梢使其更柔和 2,深度点剪:剪刀平行于发片去除发量 3,滑剪:剪刀不闭合顺发片向下滑动去除发量 4,深度滑剪:剪刀几乎闭合将短发与长发营造视觉上的连接效果 5,通道式滑剪:剪刀一侧插入发片中向下滑剪营造出发片间的分离感 并使头、常用于刘海和两侧区,制造头发自然流向. 发更柔顺 6,砖式点剪:在发片中不规则的点剪去除重量 7,拧挤剪:发片朝一个方向拧紧并向上滑剪或点剪 8,削道式滑剪:用剪刀一侧削发片,类似使用削刀的方法,剪刀朝发 根向里 滑剪突出造型感 9,削刀修剪:使用削刀 10倒剪;剪刀朝发根向内划剪突出造型感。增加发根蓬松度。
托尼盖精剪体系知识学习了解
• • • • • • • • • • • • • • • • • • • 术语 • 掌握科学方法之前 首先要明确四个重要的环节 一、分线与分区 1、轮廓线:从前额中点到后额中点 2、马蹄区: 连接额角两个退化点并将头顶头发单独分开 3、水平线: 平行于地平线 {水平分发片,即横分发片} 4、对角向前: 角度向前朝脸的方向,{ 斜向前分发片,低点在前} 5、对角向后: 角度向后朝着脸的方向 ,{斜向后分发片,低点在后} 6、放射线: 连接整个发迹线中任意两点的分线 7、放射状分区: 以 一点为中心向四周放射状分发片 常用分区 光圈分区//头顶最高点---两侧最高点---后部点 钥匙孔分区//光圈分区加一个梯形(前侧点) 钻石形分区//两个三角形组合(头顶最高点---两侧最高点---皇冠点) 马蹄型分区//小马蹄(前侧点---头顶最高点) 中马蹄(前侧点---黄金点) 大马蹄(前侧点---皇冠点) 三角半圆形分区//两侧最高点---后部点 V形分区//前侧点---两侧最高点---皇冠点 三角形分区//前后发区都可以用
PPT模板大全
ThemeGallery is a Design Digital
Content & Contents mall developed by Guild Design Inc.
Company Logo
Diagram You can briefly add outline of this slide page in this text box.
LOGO
Mission
Mission:
State the company’s mission statement and describe the company’s vision and business model.
Vision
Vision :
State the company’s mission statement and describe the company’s vision and business model.
Add your text in here
• Your text in here • Your text in here • Your text in here
Add your text in here
• Your text in here • Your text in here • Your text in here
Text 2 sub text
Text 3 sub text
Text 4 sub text
Text 1 sub text
Text 2 sub text
Text 3 sub text
Text 4 sub text
10
Related Documents
text1 example1
教学课件 (39)
THESIS DEFENSE GENERAL PPT GUIDE TEMPLATE
汇报人:
时间:2019年10月30日
CONTENTS
目 录
01 请在此处输入您的标题 02 请在此处输入您的标题 03 请在此处输入您的标题 04 请在此处输入您的标题
此处输入您的标题
01 请在此处输入您的标题
20
04 请在此处输入您的标题
2014
1
点击添加标题
请替换文字内容,修改 文字内容
2
点击添加标题
请替换文字内容,修改 文字内容
2015
2016
3
点击添加标题
请替换文字内容,修改 文字内容
4
点击添加标题
请替换文字内容,修改 文字内容
2017
请替换文字内容,修改文字内容请替换文字内容,修改文字内容请替换文字内容,修改文字内容请替换文字内容,修 改文字内容请替换文字内容,修改文字内容
赠送实用教学图标
PRESENTED PRACTICAL TEACHING ICON
请替换文字内容,修改文字内容 请替换文字内容,修改文字内容 请替换文字内容,修改文字内容
请替换文字内容,修改文字内容 请替换文字内容,修改文字内容 请替换文字内容,修改文字内容
15
03 请在此处输入您的标题
添加标题
添加标题
添加标题
添加标题
16
03 请在此处输入您的标题
点击添加标题
请替换文字内容,修改文字内容请替换文字内容,修改文字内容请替换文字内容,修改文字内容 请替换文字内容,修改文字内容请替换文字内容,修改文字内容
17
03 请在此处输入您的标题
21世纪的二盖一整理版
21世纪的二盖一体系[美]麦克斯·哈代著,王止戈黄艳余乐译(2011年7月整理于山东工院)体系大略和叫牌风格1、二盖一应叫逼叫到局2、5张高花开叫,1NT应叫逼叫一轮(敌方争叫或加倍后,逼叫进程取消)3、新低花逼叫,第四花色逼叫4、长套花色优先开叫原则5、速达原则(仅用于高花进程,而不包括无将和低花进程)(Principle of Fast Arrival)6、负加倍至4H水平7、合格的简单争叫,很少使用心理叫8、使用XYZ约定(下册P26)、MTWS(下册P75)、沃尔夫示弱叫(下册P81)、低花反加叫(下册P102)、低花斯台曼(下册P85)、哈代加叫(下册P123)、库克什进局试探(下册P127)、双路逆朱瑞(下册P112)、罗马关键张问叫(RKCB)、CAPP约定(下册P174)、莱本索尔(lebensohl)、迈克尔斯扣叫、色级形约定(下册P177)、Splinter目录第一章:牌力估算与开叫 ------------------------------------------------------------------5一、关于牌力估算 --------------------------------------------------------------------5二、开叫概述 ------------------------------------------------------------------------51、叫牌中的优先选择顺序----------------------------------------------------------52、均型牌的开叫 -----------------------------------------------------------------53、花色开叫(一览表)------------------------------------------------------------6备注1:一阶花色开叫原则------------------------------------------------------6备注2:弱二开叫标准 ---------------------------------------------------------7备注3:高阶开叫区别----------------------------------------------------------7 4、再叫 -------------------------------------------------------------------------7第二章:1NT开叫后的叫牌 ----------------------------------------------------------------7一、应叫人均型时的叫牌---------------------------------------------------------------7二、斯台曼(Stayman)---------------------------------------------------------------81、正常斯台曼2、斯台曼后的邀请3、斯台曼后的满贯试探----------------------------8三、斯莫伦转移叫(Smolen Transfer)----------------------------------------------------81、正常斯莫伦-------------------------------------------------------------------82、扩展斯莫伦转移叫3、3C再询问叫4、贝隆约定叫---------------------------------9四、杰可贝转移(Jacoby Transfer)----------------------------------------------------91、杰可贝转移-------------------------------------------------------------------92、超转移3、伯根超转移4、转移后的满贯试探5、沃尔什接力叫(Walsh Relays)--------10五、德克萨斯转移叫(能跳叫转移就不受争叫影响)(Texas Transfer)------------------------11六、低花斯台曼(方片套弱牌、双低花、双低花且有满贯兴趣)(Minor Suit Stayman──mss)---11七、2NT后3C接力(梅花套弱牌转移或4-4-4-1、5-4-4-0满贯兴趣)(Two Notrump Transfer)--11八、跳叫三阶低花邀请3NT(AQ或KQ领头的六张)(Suit Jump Response)-------------------11九、跳叫三阶高花(破套好牌,满贯兴趣)----------------------------------------------11十、罗马盖勃问叫(跳叫4C问A)(Roman Key Card Gerber)------------------------------11十一、4NT满贯邀请后的叫牌----------------------------------------------------------12 十二、2NT开叫后的叫牌 -------------------------------------------------------------12 1、傀儡斯台曼(Puppet Stayman)2、其他应叫---------------------------------------12第三章:一阶低花开叫后的叫牌 -----------------------------------------------------------12一、一盖一应叫开叫人再叫及后续叫牌-------------------------------------------------121、重点补充:常见后继处理方式高级进程 ------------------------------------------12(1)沃尔什原则(Walsh)---------------------------------------------------------13(2)XYZ约定叫 ---------------------------------------------------------------13(3)第四花色逼叫(Fourth Suit Forcing ──4sf)-------------------------------------13(4)新低花逼叫(New Minor Forcing ──nmf)------------------------------------14(5)MTWS约定叫(Modified Two-way Stayman)-------------------------------------142、开叫人再叫原花---------------------------------------------------------------143、开叫人顺叫新花---------------------------------------------------------------154、开叫人逆叫 (1)逆叫后继的示弱 (2)逆叫后继的示强 ------------------------------155、单加叫应叫高花---------------------------------------------------------------156、跳加叫应叫高花---------------------------------------------------------------157、跳加叫应叫花色到局-----------------------------------------------------------158、开叫人跳叫2NT (1)沃尔夫示弱应叫(Wolff Signoff) (2)高花重寻(Check Back)-------159、开叫人跳3NT-----------------------------------------------------------------1610、开叫人跳逆叫(Double Jump Reverse)---------------------------------------------1611、开叫人跳叫新花--------------------------------------------------------------1612、开叫人双跳新花--------------------------------------------------------------16二、以NT应叫(Notrump Response)--------------------------------------------------16三、二盖一应叫(Two Over One Response)---------------------------------------------16四、二阶弱跳应叫新花(Preenptive Jump New Suit Response)-------------------------------16五、低花加叫-----------------------------------------------------------------------171、低花反加叫(Inverted Minors ──invm) ------------------------------------------172、再翻转加叫-------------------------------------------------------------------17六、1D开叫后3C跳应叫(6张以上套,邀叫3NT)-------------------------------------17七、特殊进程描述 -------------------------------------------------------------------17第四章:一阶高花开叫后的叫牌 -----------------------------------------------------------18一、一盖一应叫---------------------------------------------------------------------18二、二盖一应叫(Two Over One Response)----------------------------------------------18三、弱跳应叫新花-------------------------------------------------------------------18四、逼叫性1NT应叫(Forcing Notrump)------------------------------------------------18五、高花加叫-----------------------------------------------------------------------19六、其他约定叫──(重点与补充) ----------------------------------------------------191、二盖一后的叫牌--------------------------------------------------------------192、巴特约定叫(bart) (用于1S-1NT;2C-?)----------------------------------------193、伯根全套高花加叫(Bergen)----------------------------------------------------20(1)伯根高花加叫(2)杰可贝2NT后续答叫(3)隐蔽斯普林特--------------------204、双路逆朱瑞及之后的进局试探--------------------------------------------------21(1)双路逆朱瑞(Two Way Rdrury) (2)朱瑞后的进局试探(3)其他叫品 ---------------215、库克什进局试探(Kokisk)------------------------------------------------------216、哈代加叫(Hardy Adjunct)(阻击、简单、限制性、逼局性、满贯兴趣)-----------------227、逼叫性1NT -------------------------------------------------------------------22第五章:高阶开叫 -----------------------------------------------------------------------23一、强2C开叫后的叫牌 --------------------------------------------------------------231、通常应叫 --------------------------------------------------------------------232、现代应叫---------------------------------------------------------------------24二、对弱2开叫后的叫牌 -------------------------------------------------------------241、奥古斯特(Ogust) 2NT约定叫 --------------------------------------------------242、应叫新花3、成局以下加叫4、加叫进局----------------------------------------25三、赌博性3NT开叫后的叫牌(GNT)-------------------------------------------------25四、对阻击开叫的应叫----------------------------------------------------------------25五、四阶低花开叫/四阶高花/五阶高花那米亚茨约定(逆司台曼Namyats) ------------------25六、4NT开叫/五阶低花---------------------------------------------------------------25第六章:满贯叫牌(Slam Bidding)--------------------------------------------------------26一、可以做满贯的叫牌过程------------------------------------------------------------26二、罗马盖勃问叫(Roman Key Card Gerber)--------------------------------------------26三、四种罗马关键张问叫 -------------------------------------------------------------261、4NT标准罗马关键张问叫(Roman Key Card Bidding ──RKC)-------------------262、反冲问叫 --------------------------------------------------------------------273、以取得同意的四阶低花作关键张问叫 --------------------------------------------274、排除关键张问叫 --------------------------------------------------------------275、双套式关键张问叫(补充)-----------------------------------------------------286、在关键张问叫中克服敌方的干扰-------------------------------------------------28四、控制问叫沃尔什问叫-------------------------------------------------------------28五、严肃的3NT满贯试探 ------------------------------------------------------------29六、跳叫到五阶高花(V oluntary Bid of Five in a major Suit ──V ol 5)----------------------29七、大满贯逼叫(Grand Slam Force)---------------------------------------------------29第七章:敌方争叫 -----------------------------------------------------------------------29一、对敌方的花色争叫 ---------------------------------------------------------------291、在一阶叫自己花色或无将的叫牌-------------------------------------------------292、加叫同伴---------------------------------------------------------------------293、自由叫品---------------------------------------------------------------------294、行动加倍(Action Double)------------------------------------------------------305、负加倍(Negative Double)------------------------------------------------------30二、对敌方的1NT争叫---------------------------------------------------------------30三、对敌方的2NT争叫(Unusual Over Unusual)-------------------------------------------30四、对敌方的技术性加倍 -------------------------------------------------------------301、1NT2、加叫同伴3、叫新花4、再加倍 -------------------------------------30五、对迈克扣叫 ---------------------------------------------------------------------31六、总墩数定律 ---------------------------------------------------------------------31七、莱本索尔约定叫(Lebensohl)------------------------------------------------------311、我方1NT开叫敌方干扰后的莱本索尔 -------------------------------------------312、同伴加倍敌方弱二开叫后的莱本索尔 --------------------------------------------323、好坏2NT---------------------------------------------------------------------32八、麦克凯博约定叫 -----------------------------------------------------------------32九、支持性加倍和再加倍(Support Double)---------------------------------------------32十、高限争叫加倍(Maximal Overcall Double)-------------------------------------------32十一、与负加倍相呼应的应答性加倍----------------------------------------------------32 十二、排除加倍 ---------------------------------------------------------------------321、第一种进程-------------------------------------------------------------------322、第二种进程-------------------------------------------------------------------33十三、敌方插叫后的哈代加叫 ---------------------------------------------------------33 1、敌方一阶高花做技术性加倍 2、敌方一阶高花争叫--------------------------------33第八章:敌方开叫我方争叫 ---------------------------------------------------------------33一、争叫(Competitive Bidding)-------------------------------------------------------331、无将争叫(Notrump Over Call)--------------------------------------------------332、花色争叫(Suit Over Call)------------------------------------------------------333、平衡叫(Balancing)-----------------------------------------------------------34二、技术性加倍(Take-out Double)-----------------------------------------------------34三、麦克尔斯扣叫(Michaels)--------------------------------------------------------35四、顶底扣叫(Top and Botton Cue Bid)--------------------------------------------------35五、高低花双套争叫------------------------------------------------------------------35六、应答性加倍(Responsive Double)-------------------------------------------------351、争叫者为技术性加倍2、争叫者为花色争叫3、注意-----------------------------35七、竞叫加倍 -----------------------------------------------------------------------36八、显示大牌的再加倍(Honor ReDouble)----------------------------------------------36九、卡培莱梯/汉米尔顿(Cappelletti / Hamilton)-----------------------------------------36十、海洛约定叫----------------------------------------------------------------------36十一、梅斯约定叫 (对付强梅花开叫)---------------------------------------------------36 十二、色级形约定叫 (对付强梅花开叫)-------------------------------------------------37 附录:整理说明 -------------------------------------------------------------------------37第一章:牌力估算与开叫一、关于牌力估算1、大牌点、防守赢墩与牌型点(上册P1)△基本算法:HCP:A=4,K=3,Q=2,J=1;△防守赢墩:A=1个,K=半个,AK=2个,AQ=1个半,KQ=1个;(简表?)△双张价值1点,单张2点,缺门3点;△比四张每多一张加1点。
144罗兰贝格
144罗兰贝格PPT标准档,可参考通过事业部制的引入来推动AA进一步成长通过事业部制的引入来推动进一步成长C 讨论稿 C BBAACC股份有限公司股份有限公司Roland Berger Partners C International Management ConsultantsBarcelona C Beijing C Berlin C Brussels C Bucharest C Budapest C Buenos Aires C Detroit C Düsseldorf C Frankfurt C Hamburg C Kiev C Lisbon C London Madrid C Milan C Moscow C Munich C New York C Paris C Prague C Riga C Rome C So Paulo C Shanghai C Stuttgart C Tokyo C Vienna C Warsaw C Zurich-1-SHA-4301-05227-06-14-y.PPTPPT标准档,可参考内容页码A. 成功企业的组织设计及特点B. AA事业部组织的设计要求及其参考形式事业部组织的设计要求及其参考形式3 16This document was created for the exclusive use of our clients. It is not plete unless supported by the underlying detailed analyses and oral presentation. It must not be passed on to third parties except with theexplicit prior consent of Roland Berger Partners.-2-SHA-4301-05227-06-14-y.PPTPPT标准档,可参考A.成功企业的组织设计及特点-3-SHA-4301-05227-06-14-y.PPTPPT标准档,可参考飞利浦在中国的各项业务采用事业部的形式来分类管理,飞利浦在中国的各项业务采用事业部的形式来分类管理,总部只是起到一个服务平台的作用,的作用,而具体监控则由荷兰事业总部直接负责飞利浦组织体系飞利浦投资中国有限公司财务部会计并表财务审核人力资源部招聘培训品牌管理部公共关系统一标识品牌保护资金部融资资金调拨法律部法律事务IT 信息平台建设及维护税务部税收咨询办公室管理部不动产租赁办公室管理消费电子1)各合资企业。
Thone托勒椅子经典设计精品PPT课件
技术发展
Michael Thonet 的技术发展主要分为四个发展时期,在每个发展时期,其技术的应用对家 具当时及现代的影响都非常深远。
技术发展四个时期
1830年开始用技术实验蒸汽弯曲木 1840年研制蒸汽木材软化法 1849年获得弯曲层压板的专利
1859年生产的第十四号椅子
托勒的技术与设计
设计发展
托勒椅(Thonet chair)
14号座椅易拆卸的特征与宜家家具可以平面封装家具的性质相 似,14号椅的出现填补了对咖啡椅的一种需求。由棕桐纤维制成 的带有洞孔的咖啡椅能够使洒在上面的液体快速蒸发。
接力棒ppt模板
Print master
• Your Text here
• Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat. Ut wisi enim ad minim veniam, quis nostrud exerci tation ullamcorper suscipit lobortis nisl ut aliquip ex ea commodo consequat.
Name of presentation
TS7:购物分享
Second page
• Your Text here • Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat. Ut wisi enim ad minim veniam, quis nostrud exerci tation ullamcorper suscipit lobortis nisl ut aliquip ex ea commodo consequat. • Duis autem vel eum iriure dolor in hendrerit in vulputate velit esse molestie consequat, vel illum dolore eu feugiat nulla facilisis at vero eros et accumsan et iusto odio dignissim qui blandit praesent luptatum zzril delenit augue duis dolore te feugait nulla facilisi.