The software implements particle filtering and Rao Blackwellised particle filtering for conditionally Gaussian Models. The RB algorithm can be interpreted as an efficient stochastic mixture of Kalman filters. The software also includes efficient state-of-the-art resampling routines. These are generic and suitable for any application.
標簽: filtering particle Blackwellised conditionall
上傳時間: 2013-12-17
上傳用戶:zsjzc
Easy to use SMS/MMS Messaging Gateway to develop Content Delivery Platforms by GSM Operators,Content Providers and even non-telecom guys. Uses file system for data flow.Written for .NET 2.0 in C#
標簽: Content Messaging Platforms Operators
上傳時間: 2014-01-01
上傳用戶:1109003457
Coriander is a GUI for controlling a Digital Camera (in the sense of the IIDC specs issued by the 1394 Trade Association [1]). Due to the properties of the IEEE1394 protocol, Coriander can control an IEEE1394 camera without interferring with the image flow from that camera. It can thus be used to setup a camera with Coriander while the video flow is used by another application
標簽: the controlling Coriander Digital
上傳時間: 2015-08-07
上傳用戶:TF2015
Electromagnetic scattering from the trees above a tilted rough ground plane generated by the stochastic Lidenmayer system is studied by Monte Carlo simulations in this paper.The scattering coefficients are calculated in three methods:coherent addition approximation,tree-independent scattering,and independent scattering.
標簽: Electromagnetic scattering generated the
上傳時間: 2013-12-06
上傳用戶:xieguodong1234
PSTN to PSTN Dialing via SIP Network.This is a representation, as a slide show, of the SIP examples detailed in RFC 3666 - RFC3666 SIP PSTN Call Flow.
標簽: PSTN representation SIP examples
上傳時間: 2015-08-30
上傳用戶:weixiao99
書名:基本商業程序的建模 Essential Business Process Modeling (Paperback) 作者: Mike Havey 出版商:O Reilly 1 edition (August 18, 2005) 內容介紹: Ten years ago, groupware bundled with email and calendar applications helped track the flow of work from person to person within an organization. Workflow in today s enterprise means more monitoring and orchestrating massive systems. A new technology called Business Process Management, or BPM, helps software architects and developers design, code, run, administer, and monitor complex network-based business processes. BPM replaces those sketchy flowchart diagrams that business analysts draw on whiteboards with a precise model that uses standard graphical and XML representations, and an architecture that allows it converse with other services, systems, and users.
標簽: Essential Paperback Business Modeling
上傳時間: 2015-10-21
上傳用戶:zhangyigenius
This paper presents an interactive technique that produces static hairstyles by generating individual hair strands of the desired shape and color, subject to the presence of gravity and collisions. A variety of hairstyles can be generated by adjusting the wisp parameters, while the deformation is solved efficiently, accounting for the effects of gravity and collisions. Wisps are generated employing statistical approaches. As for hair deformation, we propose a method which is based on physical simulation concepts but is simplified to efficiently solve the static shape of hair. On top of the statistical wisp model and the deformation solver, a constraint-based styler is proposed to model artificial features that oppose the natural flow of hair under gravity and hair elasticity, such as a hairpin. Our technique spans a wider range of human hairstyles than previously proposed methods, and the styles generated by this technique are fairly realistic.
標簽: interactive hairstyles generating technique
上傳時間: 2013-12-20
上傳用戶:sssl
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)
標簽: Sometimes the contents desire
上傳時間: 2013-12-25
上傳用戶:playboys0
圖像處理的關于Snakes : Active Contour Models算法和水平集以及GVF的幾篇文章,文章列表為: [1]Snakes Active Contour Models.pdf [2]Multiscale Active Contours.pdf [3]Snakes, shapes, and gradient vector flow.pdf [4]Motion of level sets by mean curvature I.pdf [5]Spectral Stability of Local Deformations Spectral Stability of Local Deformations.pdf [6]An active contour model for object tracking using the previous contour.pdf [7]Volumetric Segmentation of Brain Images Using Parallel Genetic AlgorithmsI.pdf [8]Segmentation in echocardiographic sequences using shape-based snake model.pdf [9]Active Contours Without Edges.pdf 學習圖像處理的人必看的幾篇文章
標簽: Contour Snakes Active Models
上傳時間: 2014-01-15
上傳用戶:wqxstar
Fit a multivariate gaussian mixture by a cross-entropy method. Cross-Entropy is a powerfull tool to achieve stochastic multi-extremum optimization.
標簽: Cross-Entropy cross-entropy multivariate powerfull
上傳時間: 2014-12-20
上傳用戶:love_stanford