搜索结果

找到约 48 项符合 Resulting 的查询结果

其他 The problem of image registration subsumes a number of problems and techniques in multiframe image

The problem of image registration subsumes a number of problems and techniques in multiframe image analysis, including the computation of optic flow (general pixel-based motion), stereo correspondence, structure from motion, and feature tracking. We present a new registration algorithm based on spli ...
https://www.eeworm.com/dl/534/248919.html
下载: 153
查看: 1040

Internet/网络编程 DELPHIBOX The ImageHTML converts images to ASCII characters in HTML format. The output image is in

DELPHIBOX The ImageHTML converts images to ASCII characters in HTML format. The output image is in three formats: true color, grayscale, and mono color. The ImageHTML is provided "AS IS " without any warranty of any kind, either express or implied. The entire risk as to the quality and performance ...
https://www.eeworm.com/dl/620/250319.html
下载: 158
查看: 1071

文章/文档 http://wordnet.princeton.edu/ WordNet is a large lexical database of English, developed under the d

http://wordnet.princeton.edu/ WordNet is a large lexical database of English, developed under the direction of George A. Miller. Nouns, verbs, adjectives and adverbs are grouped into sets of cognitive synonyms (synsets), each expressing a distinct concept. Synsets are interlinked by means of concept ...
https://www.eeworm.com/dl/652/269130.html
下载: 142
查看: 1049

邮电通讯系统 This program simulates the bit-error-rate (BER) performance of OSTBC with L=4 antennas over the fr

This program simulates the bit-error-rate (BER) performance of OSTBC with L=4 antennas over the frequency flat Rayleigh block fading channel The code is developed for real orthogonal design, code rate 1/2 modulation- 16 QAM with gray coding resulting in 2 bits/sec/Hz.
https://www.eeworm.com/dl/690/272493.html
下载: 45
查看: 1066

人工智能/神经网络 基于PCA和LDA的人脸识别。% Main function that reads in files, applies pre-processing, calls face % recognitio

基于PCA和LDA的人脸识别。% Main function that reads in files, applies pre-processing, calls face % recognition algorithm, and then plots resulting accuracy.
https://www.eeworm.com/dl/650/295357.html
下载: 83
查看: 1057

通讯/手机编程 There are two files in the zip folder. bpsk_spread.m and jakesmodel.m Steps for simulation: 1] Run

There are two files in the zip folder. bpsk_spread.m and jakesmodel.m Steps for simulation: 1] Run jakesmodel.m first 2] Then run bpsk_spread.m . 3] Note that during the first run bpsk_spread.m has no rayleigh fading.This is because the corresponding code has been commented 4] The resulting performa ...
https://www.eeworm.com/dl/527/297786.html
下载: 192
查看: 1049

其他书籍 This manual documents the interfaces of the libxml library and has some short notes to help get you

This manual documents the interfaces of the libxml library and has some short notes to help get you up to speed with using the library. Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. ...
https://www.eeworm.com/dl/542/363849.html
下载: 183
查看: 1056

单片机开发 In this paper, we describe the development of a rapidly reconfigurable system in which the users’ ta

In this paper, we describe the development of a rapidly reconfigurable system in which the users’ tacit knowledge and requirements are elicited via a process of Interactive Evolution, finding the image processing parameters to achieve the required goals without any need for specialised knowledge of ...
https://www.eeworm.com/dl/648/405428.html
下载: 132
查看: 1075

文章/文档 We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f

We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fiel ...
https://www.eeworm.com/dl/652/421406.html
下载: 90
查看: 1076

压缩解压 ) Compression using huffman code -with a number of bits k per code word -provide huffma

) Compression using huffman code -with a number of bits k per code word -provide huffman table Huffman coding is optimal for a symbol-by-symbol coding with a known input probability distribution.This technique uses a variable-length code table for encoding a source symbol. The table is d ...
https://www.eeworm.com/dl/617/446746.html
下载: 109
查看: 1036