虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

pre-processing

  • During the past four years, most of our research activities have been focused on image but also vide

    During the past four years, most of our research activities have been focused on image but also video and 3-D objects processing for security applications (watermarking and biometrics) and communications (talking heads, interfaces), with a special emphasis on facial images. More about our work can be found at http://www.eurecom.fr/~image. Our research activities are conducted with the backing of several industrials, in particular France Telecom Research and STMicroelectronics. For the past few years, we have had a regular scientific collaboration on Fractal Image Coding, Watermarking and Biometrics with the University of California, Santa Barbara (UCSB), in particular with Prof. K. Ros

    标签: activities research focused During

    上传时间: 2014-11-26

    上传用户:123啊

  • 它是SourceForge上的一个开源项目

    它是SourceForge上的一个开源项目,使用Malib实现实时处理,CSU Face Identification Evaluation System进行人脸识别。算法包括:主成份分析(principle components analysis (PCA)),a.k.a eigenfaces算法,混合主成份分析,线性判别分析(PCA+LDA),图像差分分类器(IIDC),弹性图像匹配算法(EBGM)等等 Malic is realtime face recognition system that based on Malib and CSU Face Identification Evaluation System (csuFaceIdEval). Uses Malib library for realtime image processing and some of csuFaceIdEval for face recognition.

    标签: SourceForge 开源 项目

    上传时间: 2014-01-21

    上传用户:sz_hjbf

  • I. C. Wong, Z. Shen, J. G. Andrews, and B. L. Evans, ``A Low Complexity Algorithm for Proportional R

    I. C. Wong, Z. Shen, J. G. Andrews, and B. L. Evans, ``A Low Complexity Algorithm for Proportional Resource Allocation in OFDMA Systems , Proc. IEEE Int. Work. Signal Processing Systems, 针对这篇文章给出的源代码

    标签: I. C. B. G.

    上传时间: 2014-01-24

    上传用户:zhichenglu

  • Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in A

    Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in ARM!ˉs new Cortex family. With high performance and power efficiency, it targets a wide variety of mobile and consumer applications including mobile phones, set-top boxes, gaming consoles and automotive navigation/entertainment systems. The Cortex-A8 processor spans a range of performance points depending on the implementation, delivering over to 2000 Dhrystone MIPS (DMIPS) of performance for demanding consumer applications and consuming less than 300mW for low-power mobile devices. This translates into a large increase in processing capability while staying with the power levels of previous generations of mobile devices. Consumer applications will benefit from the reduced heat dissipation and resulting lower packaging and integration costs.

    标签: microprocessor Introduction applications Cortex

    上传时间: 2013-12-09

    上传用户:xzt

  • Written for engineering and computer science students and practicing engineers, this book provides t

    Written for engineering and computer science students and practicing engineers, this book provides the fundamental applications and mathematical techniques of signal processing. Topics covered include programming in MATLAB, filters, networking, and parallel processing. MATLAB is introduced and used to solve numerous examples in the book. Companion software available In addition, a set of MATLAB M-files is available on a CD bound in the book.

    标签: engineering practicing and engineers

    上传时间: 2017-07-28

    上传用户:fandeshun

  • A AVR USB download tool. It can download your target file to full series avr chip with only one pre

    A AVR USB download tool. It can download your target file to full series avr chip with only one press.

    标签: download target series chip

    上传时间: 2014-12-05

    上传用户:fredguo

  • A certification path is an ordered list of certificates starting with a certificate issued by the re

    A certification path is an ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509 and further defined in Internet Engineering Task Force (IETF) Request for Comments (RFC) 3280. Certification path processing verifies the binding between the subject distinguished name and/or subject alternative name and the subject public key defined in the target certificate. The binding is limited by constraints, which are specified in the certificates that comprise the path, and inputs that are specified by the relying party. To ensure secure interoperation of PKI-enabled applications, the path validation must be done in accordance with the X.509 and RFC 3280 specifications. This document provides the test assertions and the test cases for testing path validation software against these specifications.

    标签: certification certificates certificate starting

    上传时间: 2017-07-31

    上传用户:清风冷雨

  • When trying to extract information from SAR images, we need to distinguish two types of image prope

    When trying to extract information from SAR images, we need to distinguish two types of image property. The more important is where properties of the scene (e.g., its dielectric constant, its geometry, its motion, etc.) produce effects in the image measurements or examination of the image then can provide information about the scene. The second is generated purely by the system and the signal processing.

    标签: distinguish information extract trying

    上传时间: 2014-01-09

    上传用户:huyiming139

  • his procedure is the power spectral density of the simulation, 3 signal source on the specific circu

    his procedure is the power spectral density of the simulation, 3 signal source on the specific circumstances, see the "modern digital signal processing" Introduction to the first volume, P202, Exercise 5. Experimental Methods

    标签: the simulation procedure spectral

    上传时间: 2014-01-17

    上传用户:金宜

  • 主要操作过程: 建立一般的二叉链表

    主要操作过程: 建立一般的二叉链表,通过遍历进行线化,设p为当前处理结点,pre为p的前驱填标志: 若p无左:p->ltag=1;若p无右:p—>rtag=1;填线索:若p->ltag==1: p->lchild=pre 若pre->rtag== pre->rchild=p

    标签: 操作 过程

    上传时间: 2017-08-09

    上传用户:我们的船长