In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessary in order to be able to compare or integrate the data obtained from different measurements. Image registration is the process of transforming the different sets of data into one coordinate system. To be precise it involves finding transformations that relate spatial information conveyed in one image to that in another or in physical space. Image registration is performed on a series of at least two images, where one of these images is the reference image to which all the others will be registered. The other images are referred to as target images.
标签: different computer acquired sampling
上传时间: 2013-12-28
上传用户:来茴
it consist of PCF8583 assembly driver, Proteus RTC example that is schematic, Proteus library and model files
标签: Proteus schematic assembly consist
上传时间: 2017-04-03
上传用户:
SA Encryption and Decryption using Matlab The program set contains thirteen files listed below. errormeg.fig errormsg.m helpmsg.fig helpmsg.m inputmsg.fig inputmsg.m mesgcut.m pro2.fig pro2.m rsacore.m readme.txt screenshot.gif In order to run the program please call pro2.m under Matlab 6.0 Environment. System Requirement Matlab version 6.0 and if necessary, Maple version 6.0 on any platform PentiumII 300 MHz or equivalent.
标签: Encryption Decryption contains thirteen
上传时间: 2017-04-06
上传用户:dreamboy36
1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click on Security button in order to Add/Remove users and set user rights. Once you entered Security dialog you may select your Supervisor password. 2. Click OK when finished configuring users. Don t forget to disable some features in order to see what happens with GUI elements - menus, and buttons.
标签: SecurityBuilderDemo directory password located
上传时间: 2014-01-23
上传用户:chongcongying
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths. Note that, these paths are not vertex-disjoint i.e., the vertices may repeat but they are all edge-disjoint i.e., no two paths have the same edges. The input is the adjacency matrix of a directed acyclic graph and a pair(s) of source and destination vertices and the output should be the number of such disjoint paths and the paths themselves on separate lines. In case of multiple paths the output should be in order of paths with minimum vertices first. In case of tie the vertex number should be taken in consideration for ordering.
标签: fault-tolerant algorithms redundant underlyin
上传时间: 2013-12-18
上传用户:jkhjkh1982
Fortran 90 versions of all the Numerical Recipes routines appear in the following Chapters B1 through B20, numbered in correspondence with Chapters 1 through 20 in Volume 1. Within each chapter, the routines appear in the same order as in Volume 1, but not broken out separately by section number within Volume 1鈥檚 chapters. There are commentaries accompanying many of the routines, generally following the printed listing of the routine to which they apply. These are of two kinds: issues related to parallelizing the algorithm in question, and issues related to the Fortran 90 implementation. To distinguish between these two, rather different, kind
标签: Numerical following the Chapters
上传时间: 2017-04-12
上传用户:6546544
The paper describes the concept and realization of the DOOCS control software for FPGAbased TESLA cavity controller and simulator (SIMCON). It bases on universal software components, created for laboratory purposes and used in MATLAB based control environment. These modules have been recently adapted to the DOOCS environment to ensure a unified software to hardware communication model. The presented solution can be also used as a general platform for control algorithms development. The proposed interfaces between MATLAB and DOOCS modules allow to check the developed algorithm in the operation environment before implementation in the FPGA. As the examples two systems have been presented.
标签: realization FPGAbased describes the
上传时间: 2017-04-16
上传用户:koulian
The files adi_ssl_init.h and adi_ssl_init.c are used to define the functions adi_ssl_Init() and 慳di_ssl_Terminate()?which initialize and terminate all the Blackfin System Services in the appropriate order, for a particular EZ-Kit, depending on the Blackfin processor used.
标签: adi_ssl_init adi_ssl_Init functions define
上传时间: 2014-01-21
上传用户:sammi
C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and example projects files facilitate writing C/C++ Code for the TI鈥檚 28xx MCUs. The code can be used as a learning tool or as the basis for a development platform depending on the current needs of the user. We suggest that you immediately download these header files in order for an easier transition to understanding the 28xx peripherals.
标签: Peripheral peripheral and Examples
上传时间: 2014-01-24
上传用户:fandeshun
2007年全国大学生电子设计大赛,A题音频信号分析仪的全部源程序。 单片机为c8051f120,系统时钟倍频至96MHZ。 main.c是一个包含五级菜单的主函数。 FFT.C是进行fft变换,将时域信号变换成频域信号。 flash.c是读写片外flash存储器的程序,可以将分析结果保存,以备调用. z7290.c是周立功7290键盘芯片的驱动程序. FFT_xgjis.c是对变换后的频谱进行分析和运算. FFT_CodeTable.c是一个正弦表,在FFT的时候调用. LCD320240.c是320*240的液晶驱动程序,液晶的控制器是SED1335. 所有的.h文件提供了子函数的定义. 本程序用KEIL3 802版本编译通过,将所有的.C文件添加到工程中,并编译main.c 注意两点:1.器件选择c8051f120. 2.在target中将时钟设为96M.同时必须将Memory Model 改成large--XDATA.默认的是small. 因为本设计占用的资源是非常大的. Program Size: data=81.3 xdata=6811 code=43056
上传时间: 2014-01-05
上传用户:manlian