搜索结果
找到约 716 项符合
IMAGE 的查询结果
按分类筛选
- 全部分类
- matlab例程 (121)
- 其他 (68)
- 其他书籍 (47)
- 压缩解压 (31)
- 软件设计/软件工程 (23)
- 行业发展研究 (22)
- 文件格式 (20)
- 电子书籍 (18)
- 文章/文档 (17)
- Java编程 (17)
- Linux/Unix编程 (16)
- 系统设计方案 (16)
- 单片机开发 (14)
- Delphi控件源码 (12)
- 数值算法/人工智能 (11)
- 嵌入式/单片机编程 (11)
- 技术资料 (11)
- 书籍源码 (10)
- 数学计算 (10)
- VC书籍 (9)
- 通讯编程文档 (8)
- 书籍 (8)
- 微处理器开发 (7)
- Windows CE (7)
- 通讯/手机编程 (6)
- 人工智能/神经网络 (6)
- 技术管理 (6)
- VHDL/FPGA/Verilog (6)
- Internet/网络编程 (6)
- 精品软件 (6)
- DSP编程 (5)
- 嵌入式Linux (5)
- 网络 (5)
- VIP专区 (5)
- 开发工具 (4)
- 汇编语言 (4)
- 驱动编程 (4)
- 软件工程 (4)
- *行业应用 (4)
- 加密解密 (4)
- CA认证 (4)
- 学术论文 (3)
- 技术书籍 (3)
- 可编程逻辑 (3)
- 源码/资料 (3)
- Symbian (3)
- Java书籍 (3)
- 数据结构 (3)
- 数据库系统 (3)
- Applet (3)
- SQL Server (3)
- 其他行业 (3)
- JavaScript (3)
- 实用工具 (2)
- 图形图像 (2)
- 多媒体处理 (2)
- 教程资料 (2)
- 教程资料 (2)
- 单片机编程 (2)
- 操作系统开发 (2)
- 游戏 (2)
- 其他数据库 (2)
- 其他嵌入式/单片机内容 (2)
- uCOS (2)
- BREW编程 (2)
- VxWorks (2)
- 传真(Fax)编程 (2)
- Jsp/Servlet (2)
- J2ME (2)
- 源码 (2)
- 手册 (2)
- 电源技术 (1)
- PCB相关 (1)
- 测试测量 (1)
- EDA相关 (1)
- USB编程 (1)
- 生物技术 (1)
- FlashMX/Flex源码 (1)
- 邮电通讯系统 (1)
- 交通/航空行业 (1)
- SCSI/ASPI (1)
- 企业管理 (1)
- 中间件编程 (1)
- 手机WAP编程 (1)
- 3G开发 (1)
- MTK (1)
- 教育系统应用 (1)
- 编译器/解释器 (1)
- STL (1)
- 家庭/个人应用 (1)
- 多国语言处理 (1)
- Delphi/CppBuilder (1)
- 软件测试 (1)
- 图形图像 (1)
- 软件 (1)
- 论文 (1)
- 教程 (1)
文章/文档 To review what a metaball is, and how to render them and to describe a new optimization I ve made
To review what a metaball is, and how to render them and to describe a
new optimization I ve made for rendering metaballs. For complex scenes,
it can render hundreds of times faster, though I m certain others have
discovered this trick as well. It does very slightly change the
characteristic ...
VC书籍 This sample shows different ways of performing anti-aliasing - both by using only the native hardwa
This sample shows different ways of performing anti-aliasing - both by using only
the native hardware AA support, and by mixing the hardware modes with additional
supersampling. There are various ways in which the supersampled image can be
down-sampled. The way we do the downsampling in this example ...
数值算法/人工智能 In this paper, we propose a hierarchical clustering method using visual, textual and link analysis
In this paper, we propose
a hierarchical clustering method using visual, textual and link
analysis. By using a vision-based page segmentation algorithm, a
web page is partitioned into blocks, and the textual and link information
of an image can be accurately extracted from the block containing
that ...
uCOS 这是某个项目中使用的ARM7TDMI平台上ucos系统的bootloader
这是某个项目中使用的ARM7TDMI平台上ucos系统的bootloader,将flash中存储的image解压缩并校验后,copy到ram中运行,已经在商用产品上应用,运行稳定,对于类似产品的开发有很好的参考价值
通讯/手机编程 In this program we calculate the sum of the incident and scattered fields in a 90 degree conducting
In this program we calculate the sum of the incident and scattered fields in a 90 degree conducting wedge by using the analytic and Image theotem method
行业发展研究 The existence of numerous imaging modalities makes it possible to present different data present in
The existence of numerous imaging modalities makes it possible to present different data present in different modalities together thus forming multimodal images. Component images forming multimodal images should be aligned, or registered so that all the data, coming from the different modalities, ar ...
行业发展研究 -The existence of numerous imaging modalities makes it possible to present different data present in
-The existence of numerous imaging modalities makes it possible to present different data present in different modalities together thus forming multimodal images. Component images forming multimodal images should be aligned, or registered so that all the data, coming from the different modalities, a ...
行业发展研究 In computer vision, sets of data acquired by sampling the same scene or object at different times, o
In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessa ...
行业发展研究 The purpose of this study is to compare between the to methods which is JPEG and JPEG2000 that are u
The purpose of this study is to compare between the to methods which is JPEG and JPEG2000 that are using in lossless image compression .
数学计算 pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small chang ...