虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

image processing

  • Text mining tries to solve the crisis of information overload by combining techniques from data mini

    Text mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth examination of core text mining and link detection algorithms and operations, this book examines advanced pre-processing techniques, knowledge representation considerations, and visualization approaches. Finally, it explores current real-world, mission-critical applications of text mining and link detection in such varied fields as M&A business intelligence, genomics research and counter-terrorism activities.

    标签: information techniques combining overload

    上传时间: 2014-01-02

    上传用户:Late_Li

  • Objectives The purpose of this notebook is to give you a brief introduction to the DiscreteWav

    Objectives The purpose of this notebook is to give you a brief introduction to the DiscreteWavelets Toolbox and show you how to use it to load images. Some basic image manipulation is illustrated as well. You will also learn how to use measures and tools such as cumulative energy, entropy, PSNR, and Huffman coding. Help on the DiscreteWavelets Toolbox Help for the toolbox is available by clicking on Help and then Product Help (or press F1) and then clicking on the DiscreteWavelets Toolbox. Several demos and examples are available as well by clicking on the Demos tab on the Help menu. Image Basics The DiscreteWavelets Toolbox comes with 18 grayscale images and 9 color images for you to use. There are three functions available to tell you more about these images. The first function is called |ImageList|. This function can tell you the names and sizes of the digital images in the Toolbox.

    标签: introduction DiscreteWav Objectives notebook

    上传时间: 2017-06-30

    上传用户:康郎

  • The idea is to track mouse cursor movement over the screen, and show enlarged (2x to 8x) section aro

    The idea is to track mouse cursor movement over the screen, and show enlarged (2x to 8x) section around the cursor, in the image control

    标签: enlarged movement section cursor

    上传时间: 2017-07-04

    上传用户:cc1

  • I. C. Wong, Z. Shen, J. G. Andrews, and B. L. Evans, ``A Low Complexity Algorithm for Proportional R

    I. C. Wong, Z. Shen, J. G. Andrews, and B. L. Evans, ``A Low Complexity Algorithm for Proportional Resource Allocation in OFDMA Systems , Proc. IEEE Int. Work. Signal Processing Systems, 针对这篇文章给出的源代码

    标签: I. C. B. G.

    上传时间: 2014-01-24

    上传用户:zhichenglu

  • web_based.rar

    Web based binary image upload for ARM LPC2366 controller. Toolchain is Keil Realview MDK ARM ver 3.2 with RL ARM Real time Lib 3.40. RAR file contains webiap2.cgi file and HTTP_cgi file. HTTP_cgi file is modified in cgi_process_data to upload binary image of application using HTTP protcol. File upload is using HTML syntax method=\"post\" ENCTYPE=\"multipart/form-data\

    标签: web_based

    上传时间: 2013-12-17

    上传用户:ukuk

  • Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in A

    Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in ARM!ˉs new Cortex family. With high performance and power efficiency, it targets a wide variety of mobile and consumer applications including mobile phones, set-top boxes, gaming consoles and automotive navigation/entertainment systems. The Cortex-A8 processor spans a range of performance points depending on the implementation, delivering over to 2000 Dhrystone MIPS (DMIPS) of performance for demanding consumer applications and consuming less than 300mW for low-power mobile devices. This translates into a large increase in processing capability while staying with the power levels of previous generations of mobile devices. Consumer applications will benefit from the reduced heat dissipation and resulting lower packaging and integration costs.

    标签: microprocessor Introduction applications Cortex

    上传时间: 2013-12-09

    上传用户:xzt

  • Written for engineering and computer science students and practicing engineers, this book provides t

    Written for engineering and computer science students and practicing engineers, this book provides the fundamental applications and mathematical techniques of signal processing. Topics covered include programming in MATLAB, filters, networking, and parallel processing. MATLAB is introduced and used to solve numerous examples in the book. Companion software available In addition, a set of MATLAB M-files is available on a CD bound in the book.

    标签: engineering practicing and engineers

    上传时间: 2017-07-28

    上传用户:fandeshun

  • The radially averaged power spectrum (RAPS) is the direction-independent mean spectrum, i.e. the ave

    The radially averaged power spectrum (RAPS) is the direction-independent mean spectrum, i.e. the average of all possible directional power spectra. This function computes and plots the RAPS of an input image. The function was written to produce the RAPS for square weather radar reflectivity images so you will have to relabel the plot axes and title to suit your needs. The radially averaged power spectrum provides a convenient means to view and compare information contained in 2D spectra in 1D

    标签: spectrum direction-independent i.e. the

    上传时间: 2013-12-17

    上传用户:watch100

  • A certification path is an ordered list of certificates starting with a certificate issued by the re

    A certification path is an ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509 and further defined in Internet Engineering Task Force (IETF) Request for Comments (RFC) 3280. Certification path processing verifies the binding between the subject distinguished name and/or subject alternative name and the subject public key defined in the target certificate. The binding is limited by constraints, which are specified in the certificates that comprise the path, and inputs that are specified by the relying party. To ensure secure interoperation of PKI-enabled applications, the path validation must be done in accordance with the X.509 and RFC 3280 specifications. This document provides the test assertions and the test cases for testing path validation software against these specifications.

    标签: certification certificates certificate starting

    上传时间: 2017-07-31

    上传用户:清风冷雨

  • This C++ code example demonstrates how to localise an application to adapt to the selected phone lan

    This C++ code example demonstrates how to localise an application to adapt to the selected phone language. The example application has two sets of localised strings (English and German) for the application name, labels, text, and image. The application also includes number, currency, date, and time localisation, in which the TLocale method is used for localisation even if the selected phone language is neither one of the two application languages. The updated example has been tested to support S60 5th Edition and touch UI.

    标签: demonstrates application to localise

    上传时间: 2013-12-17

    上传用户:shanml