Standard geometry element fitting software is a critical important part of the coordinate measuring machine ( CMM ). It is used for coordinate data processing and data evaluation. At present, the commercial fitting software of the coordinate machine manufacturer is not disclosed to the public. So it is inconvenient to develop secondary applications. This work developed a kind of geometric element fitting software based on open source code. The software can be used to fit CMM measurement data to common geometric elements including lines, circles, planes, spheres, cylinders, and cones. The core algorithm of software is based on a least-squares algorithm and a Gauss-Newton iterative algorithm. Least squares is a data optimization technique that seeks the best function match of the data by the sum of the squares of the smallest errors. The basic idea of the Gauss-Newton iteration method is to replace the nonlinear regression model with the Taylor series expansion approximation. Then through multiple iterations, the regression coefficient is modified several times so that the regression coefficient continuously approaches the optimal regression coefficient of the nonlinear regression model. Finally, the residual square sum of the original model is minimized. The accuracy of fitting results are verified with the standard reference data developed by national institute of standards and technology. The software can be used to the geometry element measurement uncertainty evaluation.
Close range digital photogrammetry is being widely used in industrial measurements. The measurements are usually carried out with a mobile retro-reflector target, which is consists of a shaft and reflective target fixed in the center of the shaft. When the center of the target and the axis of the shaft is not consistent, it will introduce measurement error. Therefore, the concentricity of target is an important parameter for the measurement results. To achieve the concentricity of retro-reflector target a multi-sensor coordinate measurement machine with imaging probe and touch probe is used. In this combined measurement system the touch probe measure the axis of the shaft, and imaging probe measure the center of reflective target. An artifact is designed to evaluate the performance of combined system. This artifact is defined as a sharp edged hole in a metal plate. It is suitable to measure with touch probe as well as imaging probe. The touch probe measures 25 points on the hole and then with the imaging probe. With all the points measured by two kinds of probe the evaluation parameters including combination size error, form error and location error are calculated. These parameters are consistent with the ISO standard 10360-9. It indicates that combined measurement uncertainty is 3.2 microns which can meet the calibration requirements of target concentricity.
For the ball plate calibration method with coordinate measurement machine (CMM) equipped with laser interferometer, it is essential to adjust the ball plate parallel to the direction of laser beam. It is very time-consuming. To solve this problem, a method based on coordinate transformation between machine system and object system is presented. With the fixed points’ coordinates of the ball plate measured in the object system and machine system, the transformation matrix between the coordinate systems is calculated. The laser interferometer measurement data error due to the placement of ball plate can be corrected with this transformation matrix. Experimental results indicate that this method is consistent with the handy adjustment method. It avoids the complexity of ball plate adjustment. It also can be applied to the ball beam calibration.
A new method for determining line centre is proposed within a microscope imaging measurement system. Due to the
optical diffraction effect the image of each line on the scale is stripe shaped. The strip can be molded as two edges that
close together. With the gradient algorithm all the local maximum and minimum in the line scale image are detected.
Therefore the rising and falling edge can be positioned in pixel level. The line centre is then the middle of between the
rising and falling edge. To achieve a high level accuracy of the centre position, with the points near the line centre in the
gradient image a least-squares line fitting algorithm is used. The zero gradient magnitude is located with sub-pixel
resolution. Experiments have been performed with a standard line scale under different objectives. Results indicate the
effectiveness of the method.
The methods for performance evaluation of Articulated Arm Coordinate Measuring Machine (AACMM) have been
published. Non-arm Coordinate Measuring Machine (NACMM) is similar with AACMM in function, and then the
performance evaluation methods should be also similar. The research based on comparing the principle and error
resources of the both systems, set up a new combination of the position, orientation and test number, try to locate a more
reasonable procedure in evaluate the performance of NACMMs which can be comparable with ASME B89.4.22-2004,
but better for find the characteristic of accuracy changing in measurement volume. The procedure is confirmed by testing
of different NACMMs.
A known-plaintext attack on the double phase encryption scheme implemented with parallel hardware is presented. The
double random phase encoding (DRPE) is one of the most representative optical cryptosystems developed in mid of 90's
and derives quite a few variants since then. Although the DRPE encryption system has a strong power resisting to a
brute-force attack, the inherent architecture of DRPE leaves a hidden trouble due to its linearity nature. Recently the real
security strength of this opto-cryptosystem has been doubted and analyzed from the cryptanalysis point of view. In this
presentation, we demonstrate that the optical cryptosystems based on DRPE architecture are vulnerable to known-plain
text attack. With this attack the two encryption keys in the DRPE can be accessed with the help of the phase retrieval
technique. In our approach, we adopt hybrid input-output algorithm (HIO) to recover the random phase key in the object
domain and then infer the key in frequency domain. Only a
plaintext-ciphertext pair is sufficient to create vulnerability.
Moreover this attack does not need to select particular plaintext. The phase retrieval technique based on HIO is an
iterative process performing Fourier transforms, so it fits very much into the hardware implementation of the digital
signal processor (DSP). We make use of the high performance DSP to accomplish the known-plaintext attack. Compared
with the software implementation, the speed of the hardware implementation is much fast. The performance of this DSP-based
cryptanalysis system is also evaluated.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.