搜索结果
找到约 22 项符合
propose 的查询结果
按分类筛选
单片机编程 基于PIC单片机的低功耗读卡器硬件设计
基于PIC单片机的低功耗读卡器硬件设计:本文提出了一个完整的基于串口的智能读卡器子系统设计方案并将其实现。读卡器的设计突出了小型化的要求,全部器件使用贴片封装。为了减小读卡器的体积,设计中还使用了串口窃电的技术,使用串口信号线直接给读卡器供电。为此,读卡器使用了省电的设计,采用了省电的集成电路,并大胆简 ...
VC书籍 This paper presents an interactive technique that produces static hairstyles by generating individu
This paper presents an interactive technique that
produces static hairstyles by generating individual hair strands
of the desired shape and color, subject to the presence of gravity
and collisions. A variety of hairstyles can be generated by
adjusting the wisp parameters, while the deformation is so ...
文件格式 Rao-Blackwellised Particle Filters (RBPFs) are a class of Particle Filters (PFs) that exploit condi
Rao-Blackwellised Particle Filters (RBPFs) are a class of Particle
Filters (PFs) that exploit conditional dependencies between
parts of the state to estimate. By doing so, RBPFs can
improve the estimation quality while also reducing the overall
computational load in comparison to original PFs. Howev ...
文件格式 The need for accurate monitoring and analysis of sequential data arises in many scientic, industria
The need for accurate monitoring and analysis of sequential data arises in many scientic, industrial
and nancial problems. Although the Kalman lter is effective in the linear-Gaussian
case, new methods of dealing with sequential data are required with non-standard models.
Recently, there has been re ...
Java编程 Abstract The Lucene Server project is an attempt to extend the Jakarta Lucene tool with server ca
Abstract
The Lucene Server project is an attempt to extend the Jakarta Lucene tool with server capabilities.
Lucene is a robust Java API that enables you creating indexes from text sources and perform powerful searches on these indexes. With Lucene, creating an index must be done programmatically ...
其他书籍 Sequential Monte Carlo without Likelihoods 粒子滤波不用似然函数的情况下 本文摘要:Recent new methods in Bayesian simu
Sequential Monte Carlo without Likelihoods
粒子滤波不用似然函数的情况下
本文摘要:Recent new methods in Bayesian simulation have provided ways of evaluating posterior distributions
in the presence of analytically or computationally intractable likelihood functions.
Despite representing a substantial ...
其他 Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a
Introduction
Computer security is undeniably important, and as new vulnerabilities are discovered and
exploited, the perceived need for new security solutions grows. "Trusted computing"
initiatives propose to solve some of today s security problems through hardware changes
to the personal computer. ...
其他书籍 Behavioral models are used in games and computer graphics for realistic simulation of massive crowd
Behavioral models are used in games and computer graphics for
realistic simulation of massive crowds. In this paper, we present a
GPU based implementation of Reynolds [1987] algorithm for simulating
flocks of birds and propose an extension to consider environment
self occlusion. We performed several ...
其他 传感器网络中基于到达时间差有效的凸松弛方法的稳健定位
We consider the problem of target localization by a
network of passive sensors. When an unknown target emits an
acoustic or a radio signal, its position can be localized with multiple
sensors using the time difference of arrival (TDOA) information.
In this paper, we consider the maximu ...
其他 Photonics for Smart Cities
We review the current applications of photonic technologies to Smart Cities. Inspired
by the future needs of Smart Cities, we then propose potential applications of advanced
photonic technologies. We find that photonics already has a major impact on Smart
Cities, in terms of smart lighting, sensing, ...