在室內環境中可結合式子母機器人系統,子機為一多功能平臺,可放置各種家庭所需之設備,而母機為一輪式機器人,經由兩者的結合,可提供高機動性與多功能的服務。在結合的技術面,傳統的吸塵器機器人與充電站之間的導航系統使用紅外線感測作為依據,當兩者間有障礙物阻擋時,紅外線感測器導航系統將會失效。因此本系統利用聲源方向做為機器人決定移動方向的依據,由於聲波傳遞的特性,即使在有障礙物的情況下,依然可以有效地偵測。此外,在移動的過程中,本系統利用光流偵測法判斷是否遭遇障礙物或是利用Support Vector Machine分類判斷與聲源之間為是否有障礙物的阻隔;若發現前方有障礙物,則啟動避障策略,用有效的方式繼續往目標移動。最後,當母機接近子機時,可根據多種紅外線感測器資訊進行子母機器人的結合,結合成功後,母機將可搭載子機成為一自由行動之機器人。
標簽: 系統
上傳時間: 2013-12-19
上傳用戶:mhp0114
FatFs06.rar FatFs is a generic file system module to implement the FAT file system to small embedded systems. The FatFs is written in compliance with ANSI C, therefore it is independent of hardware architecture. It can be incorporated into cheap microcontrollers, such as 8051, PIC, AVR, SH, Z80, H8, ARM and etc..., without any change.
標簽: system FatFs file implement
上傳時間: 2016-11-17
上傳用戶:chenxichenyue
If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction disallowing scripts to run in files opened on your local machine. When you first try to run the examples, you will most likely get a message saying, "To help protect your security, Internet Explorer has restricted this file from showing active content that could access your computer." To see the example, you must click on the message and select "Allow Blocked Content". JavaScript高級程序設計 里面自代源碼
標簽: restriction Explorer Internet security
上傳時間: 2016-11-18
上傳用戶:源弋弋
rc5的decryption,同樣帶state machine,同樣有四個狀態
標簽: decryption rc5
上傳時間: 2016-11-22
上傳用戶:llandlu
These instances, whenmapped to an N-dimensional space, represent a core set that can be used to construct an approximation to theminimumenclosing ball. Solving the SVMlearning problem on these core sets can produce a good approximation solution in very fast speed. For example, the core-vector machine [81] thus produced can learn an SVM for millions of data in seconds.
標簽: N-dimensional whenmapped instances represent
上傳時間: 2016-11-23
上傳用戶:lixinxiang
Many of the pattern fi nding algorithms such as decision tree, classifi cation rules and clustering techniques that are frequently used in data mining have been developed in machine learning research community. Frequent pattern and association rule mining is one of the few excep- tions to this tradition. The introduction of this technique boosted data mining research and its impact is tremendous. The algorithm is quite simple and easy to implement. Experimenting with Apriori-like algorithm is the fi rst thing that data miners try to do.
標簽: 64257 algorithms decision pattern
上傳時間: 2014-01-12
上傳用戶:wangdean1101
Semantic analysis of multimedia content is an on going research area that has gained a lot of attention over the last few years. Additionally, machine learning techniques are widely used for multimedia analysis with great success. This work presents a combined approach to semantic adaptation of neural network classifiers in multimedia framework. It is based on a fuzzy reasoning engine which is able to evaluate the outputs and the confidence levels of the neural network classifier, using a knowledge base. Improved image segmentation results are obtained, which are used for adaptation of the network classifier, further increasing its ability to provide accurate classification of the specific content.
標簽: multimedia Semantic analysis research
上傳時間: 2016-11-24
上傳用戶:蟲蟲蟲蟲蟲蟲
The VGA example generates a 320x240 diffusion-limited-aggregation (DLA) on Altera DE2 board. A DLA is a clump formed by sticky particles adhering to an existing structure. In this design, we start with one pixel at the center of the screen and allow a random walker to bounce around the screen until it hits the pixel at the center. It then sticks and a new walker is started randomly at one of the 4 corners of the screen. The random number generators for x and y steps are XOR feedback shift registers (see also Hamblen, Appendix A). The VGA driver, PLL, and reset controller from the DE2 CDROM are necessary to compile this example. Note that you must push KEY0 to start the state machine.
標簽: diffusion-limited-aggregation DLA generates 320x240
上傳時間: 2014-01-16
上傳用戶:225588
The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.
標簽: cryptography literature has Secrecy
上傳時間: 2016-12-08
上傳用戶:fxf126@126.com
虛擬機設計與實現——C/C++,即Virtual Machine Design and Implementation in C/C++ ,隨書光盤源碼,HEC虛擬機的源代碼
標簽: 虛擬機
上傳時間: 2016-12-22
上傳用戶:洛木卓