-
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.
標簽:
perceptual
implementation
algorithms
fingerpr
上傳時間:
2013-12-08
上傳用戶:星仔
-
This program implements a PIC-based fuzzy inference engine for the Fudge fuzzy development system from Motorola.
It works by taking the output from Fudge for the 68HC11 processor, and converting it to a MPASM compatible assembler file using the convert
batch file.
This file can then be incorporated with fuzzy.asm to create a fuzzy inference engine.
Tool chain
----------
FUDGE -> Fuzzy Rules -> MC68HC11.ASM -> CONVERT.BAT -> RULES.ASM
-> MPASM FUZZY.ASM -> INTEL HEX
Fuzzy input registers
---------------------
current_ins 1..8 x 8-bit raw inputs
Fuzzy inference function
------------------------
FuzzyEngine
Fuzzy output registers
----------------------
cog_outs 1..8 x 8-bit raw outputs
標簽:
fuzzy
development
implements
PIC-based
上傳時間:
2014-01-18
上傳用戶:caozhizhi
-
具有檢測FIR濾波器單位脈沖響應h[n]中零系數(zero tap detection)功能的LMS算法自適應均衡器,可處理相關輸入(colored inputs)和獨立輸入(white inputs). 檢測出零系數的個數和位置,減少后續計算次數,提高算法效率。
標簽:
detection
zero
FIR
tap
上傳時間:
2014-08-20
上傳用戶:tzl1975
-
Two scripts are included here.
1. convsys.m - combines the state space representation of two systems connected in series.
[Ao,Bo,Co,Do]=convsys(A1,B1,C1,D1,A2,B2,C2,D2)
This algorithm gives the convolution of two state space representations
| A1 B1 | | A2 B2 |
u ==> | | ==> | | ==> y
| C1 D1 | | C2 D2 |
The algorithm also accepts state space objects as inputs and gives out a state space object as output.
2. sysfeedbk.m
[Ao,Bo,Co,Do]=convsys(A1,B1,C1,D1,A2,B2,C2,D2)
Gives the closed loop state space representation for two systems connected with negative feedback in the following manner.
| A1 B1 |
u ==> | | ==> y
+ o | C1 D1 | |
- | |
| | A2 B2 | |
|= | |= |
| C2 D2 |
The zip file also contains checkcompatibility.m , which checks the compatibility of matrix dimensions in the system and cleanss.m which can be used to clean a state space representation.
標簽:
representation
included
combines
scripts
上傳時間:
2017-07-25
上傳用戶:semi1981
-
RS_latch using vhdl,
When using static gates as building blocks, the most fundamental latch is the simple SR latch, where S and R stand for set and reset. It can be constructed from a pair of cross-coupled NOR (Not OR) logic gates. The stored bit is present on the output marked Q.
Normally, in storage mode, the S and R inputs are both low, and feedback maintains the Q and Q outputs in a constant state, with Q the complement of Q. If S (Set) is pulsed high while R is held low, then the Q output is forced high, and stays high when S returns to low similarly, if R (Reset) is pulsed high while S is held low, then the Q output is forced low, and stays low when R returns to low.
標簽:
using
fundamental
the
RS_latch
上傳時間:
2017-07-30
上傳用戶:努力努力再努力
-
A certification path is an ordered list of certificates starting with a certificate issued by the relying
party s trust root, and ending with the target certificate that needs to be validated. Certification
path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509
and further defined in Internet Engineering Task Force (IETF) Request for Comments (RFC)
3280. Certification path processing verifies the binding between the subject distinguished name
and/or subject alternative name and the subject public key defined in the target certificate. The
binding is limited by constraints, which are specified in the certificates that comprise the path,
and inputs that are specified by the relying party. To ensure secure interoperation of PKI-enabled
applications, the path validation must be done in accordance with the X.509 and RFC 3280
specifications. This document provides the test assertions and the test cases for testing path
validation software against these specifications.
標簽:
certification
certificates
certificate
starting
上傳時間:
2017-07-31
上傳用戶:清風冷雨
-
This function is used to evaluate the max height and the max
distance of a projectile and plot the trajectory.
inputs
v0 : The initial velocity in m/s
theta: The angle at which the projectile is fired in degrees
Outputs
hmax : The maximum hieght in m
dmax : The maximum distance in m
標簽:
projectile
and
the
max
上傳時間:
2013-12-22
上傳用戶:dongbaobao
-
Hardware random number generators attempt to extract
randomness directly from complex physical systems. In this way they create random outputs without requiring any seed inputs. In this paper we describe how to use Physical Random Functions (or Physical Unclonable Functions, PUFs) to create a candidate hardware random number generator.
標簽:
generators
randomness
Hardware
directly
上傳時間:
2013-12-20
上傳用戶:縹緲
-
VideoMan (Video Manager) is an open-source C++ library that helps you developing video based applications. We created VideoMan to increase our productivity developing computer vision applications, but it can be used in many other ways.
With VideoMan is very easy and fast to initialize any kind of video input like webcams, video files, frame grabbers, IEEE 1394 cameras and so on. You can initialize multiple inputs at the same time and show them in the screen. Also, you can show the results of the processing steps of your computer vision algorithm (extracted edges, back projections, detected blobs...) This way you can see the results of what are you coding, checking the results of your algorithm steps. Moreover, the implemented visualization scheme make easier to combine computer graphics with video, for example to show a 3d model on top of video for augmented reality applications.
標簽:
open-source
developing
VideoMan
Manager
上傳時間:
2014-01-21
上傳用戶:chongcongying
-
A design about 8051 (running at 12MHz) based system with 3 7-Seg displays and two buttons to implement the following functions.
1. When press the + button, the display C = A+B.
2. When press the button, the display C = A - B.
“A” and “B” are 8-bit inputs when “C” is 9-bit output.
標簽:
ISIS
AT89C52
上傳時間:
2015-05-05
上傳用戶:guoxiy