face detection Face detection can be regarded as a more general case of face localization In face localization, the task is to find the locations and sizes of a known number of faces (usually one). In face detection, one does not have this additional information. Early face-detection algorithms focused on the detection of frontal human faces, whereas newer algorithms attempt to solve the more general and difficult problem of multi-view face detection. That is, the detection of faces that are either rotated along the axis from the face to the observer (in-plane rotation), or rotated along the vertical or left-right axis (out-of-plane rotation),or both.
標簽: detection face localization regarded
上傳時間: 2014-01-10
上傳用戶:wfeel
This file for experiment of C8051 Microcontroller(SILABS company) with USB interface that use keil programming if you have some problem for this file, please contact me with sofa24@hotmail.com
標簽: Microcontroller experiment interface company
上傳時間: 2017-08-24
上傳用戶:woshini123456
卡耐基.梅隆大學的牛發寫的關于孤立點和數據清洗的文章,全英文,2003年完成,Probabilistic Noise Identification and Data Cleaning,Real world data is never as perfect as we would like it to be and can often suffer from corruptions that may impact interpretations of the data, models created from the data, and decisions made based on the data. One approach to this problem is to identify and remove records that contain corruptions. Unfortunately, if only certain fields in a record have been corrupted then usable, uncorrupted data will be lost. In this paper we present LENS, an approach for identifying corrupted fields and using the remaining noncorrupted fields for subsequent modeling and analysis.
上傳時間: 2017-08-29
上傳用戶:thinode
The Fortran 90 Handbook is a definitive and comprehensive guide to Fortran 90 and its use. Fortran 90, the latest standard version of Fortran, has many excellent new features that will assist the programmer in writing efficient, portable, and maintainable programs. The Fortran 90 Handbook is an informal description of Fortran 90, developed to provide not only a readable explanation of features, but also some rationale for the inclusion of features and their use. In addition, “models” give the reader better insight as to why things are done as they are in the language.
標簽: Fortran comprehensive definitive and
上傳時間: 2014-01-14
上傳用戶:huannan88
RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key. RSA was created by Rivest, Shamir, and Adleman in 1977. Every user have a pair of key, public key and private key. Public key (e) . You may choose any number for e with these requirements, 1< e <Æ (n), where Æ (n)= (p-1) (q-1) ( p and q are first-rate), gcd (e,Æ (n))=1 (gcd= greatest common divisor). Private key (d). d=(1/e) mod(Æ (n)) Encyption (C) . C=Mª mod(n), a = e (public key), n=pq Descryption (D) . D=C° mod(n), o = d (private key
標簽: crypthograph information Adleman Rivest
上傳時間: 2017-09-01
上傳用戶:chfanjiang
The many variants of the Unix operating system require use of a mode of thought that s significantly different from the one that s required by simpler operating systems. Think Unix introduces readers to important fundamental and intermediate Unix commands and, in the process, inculcates them in the Unix way of thinking. It s a worthy goal in a world with more Linux users than ever, and author Jon Lasser accomplishes it. He s both a capable writer and a knowledgeable user of Unix shell commands. Lasser uses bash under Red Hat Linux in most examples--which usually apply equally well to other Unix variants--and makes asides about other shells and environments, as needed.
標簽: significantly operating variants of
上傳時間: 2017-09-04
上傳用戶:qq521
A sparse variant of the Levenberg-Marquardt algorithm implemented by levmar has been applied to bundle adjustment, a computer vision/photogrammetry problem that typically involves several thousand variables
標簽: Levenberg-Marquardt implemented algorithm applied
上傳時間: 2013-12-23
上傳用戶:wqxstar
JAVA_3,read and writer JAVA_3,read and writer JAVA_3,read and writer
標簽: JAVA
上傳時間: 2017-09-26
上傳用戶:cjf0304
自主移動機器人是目前機器人發展的主流,隨著其應用領域的不斷擴展和自動化程度的進一步提高,對機器人的功能提出了更高的要求,特別是需要各種具有不同智能程度的機器人,能夠設定自己的目標,規劃并執行自己的任務動作,不斷適應環境的變化。在移動機器人相關技術研究中,導航技術是其核心,而路徑規劃是導航技術研究的一個重要環節和組成部分。路徑規劃是智能移動機器人研究的核心內容之一,它起始于20世紀70年代,迄今為止,已有大量的研究成果報道[1]。大多數國內外文獻將此問題稱為Path Planning,Find-Path Problem, Collision-Free,Obstacle Avoidance,Motion Planning,etc.。所謂移動機器人路徑規劃技術,是指移動機器人在一定的環境(通常具有障礙物)中,能夠按照某種標準,如工作代價最小、行走路線最短、行走時間最短等,自行規劃出一條到達指定終點的無碰路徑,同時高效完成作業任務。
標簽: 機器人;路徑
上傳時間: 2015-03-16
上傳用戶:Freesky1
Convex optimization problem
標簽: Convex optimization
上傳時間: 2015-03-23
上傳用戶:飛來大貨車