亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

reader-Writer-problem

  • face detection Face detection can be regarded as a more general case of face localization In face

    face detection Face detection can be regarded as a more general case of face localization In face localization, the task is to find the locations and sizes of a known number of faces (usually one). In face detection, one does not have this additional information. Early face-detection algorithms focused on the detection of frontal human faces, whereas newer algorithms attempt to solve the more general and difficult problem of multi-view face detection. That is, the detection of faces that are either rotated along the axis from the face to the observer (in-plane rotation), or rotated along the vertical or left-right axis (out-of-plane rotation),or both.

    標簽: detection face localization regarded

    上傳時間: 2014-01-10

    上傳用戶:wfeel

  • This file for experiment of C8051 Microcontroller(SILABS company) with USB interface that use keil p

    This file for experiment of C8051 Microcontroller(SILABS company) with USB interface that use keil programming if you have some problem for this file, please contact me with sofa24@hotmail.com

    標簽: Microcontroller experiment interface company

    上傳時間: 2017-08-24

    上傳用戶:woshini123456

  • 卡耐基.梅隆大學的牛發寫的關于孤立點和數據清洗的文章

    卡耐基.梅隆大學的牛發寫的關于孤立點和數據清洗的文章,全英文,2003年完成,Probabilistic Noise Identification and Data Cleaning,Real world data is never as perfect as we would like it to be and can often suffer from corruptions that may impact interpretations of the data, models created from the data, and decisions made based on the data. One approach to this problem is to identify and remove records that contain corruptions. Unfortunately, if only certain fields in a record have been corrupted then usable, uncorrupted data will be lost. In this paper we present LENS, an approach for identifying corrupted fields and using the remaining noncorrupted fields for subsequent modeling and analysis.

    標簽: 大學 數據

    上傳時間: 2017-08-29

    上傳用戶:thinode

  • The Fortran 90 Handbook is a definitive and comprehensive guide to Fortran 90 and its use. Fortran

    The Fortran 90 Handbook is a definitive and comprehensive guide to Fortran 90 and its use. Fortran 90, the latest standard version of Fortran, has many excellent new features that will assist the programmer in writing efficient, portable, and maintainable programs. The Fortran 90 Handbook is an informal description of Fortran 90, developed to provide not only a readable explanation of features, but also some rationale for the inclusion of features and their use. In addition, “models” give the reader better insight as to why things are done as they are in the language.

    標簽: Fortran comprehensive definitive and

    上傳時間: 2014-01-14

    上傳用戶:huannan88

  • RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digit

    RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key. RSA was created by Rivest, Shamir, and Adleman in 1977. Every user have a pair of key, public key and private key. Public key (e) . You may choose any number for e with these requirements, 1< e <Æ (n), where Æ (n)= (p-1) (q-1) ( p and q are first-rate), gcd (e,Æ (n))=1 (gcd= greatest common divisor). Private key (d). d=(1/e) mod(Æ (n)) Encyption (C) . C=Mª mod(n), a = e (public key), n=pq Descryption (D) . D=C° mod(n), o = d (private key

    標簽: crypthograph information Adleman Rivest

    上傳時間: 2017-09-01

    上傳用戶:chfanjiang

  • The many variants of the Unix operating system require use of a mode of thought that s significantly

    The many variants of the Unix operating system require use of a mode of thought that s significantly different from the one that s required by simpler operating systems. Think Unix introduces readers to important fundamental and intermediate Unix commands and, in the process, inculcates them in the Unix way of thinking. It s a worthy goal in a world with more Linux users than ever, and author Jon Lasser accomplishes it. He s both a capable writer and a knowledgeable user of Unix shell commands. Lasser uses bash under Red Hat Linux in most examples--which usually apply equally well to other Unix variants--and makes asides about other shells and environments, as needed.

    標簽: significantly operating variants of

    上傳時間: 2017-09-04

    上傳用戶:qq521

  • A sparse variant of the Levenberg-Marquardt algorithm implemented by levmar has been applied to bund

    A sparse variant of the Levenberg-Marquardt algorithm implemented by levmar has been applied to bundle adjustment, a computer vision/photogrammetry problem that typically involves several thousand variables

    標簽: Levenberg-Marquardt implemented algorithm applied

    上傳時間: 2013-12-23

    上傳用戶:wqxstar

  • JAVA_3

    JAVA_3,read and writer JAVA_3,read and writer JAVA_3,read and writer

    標簽: JAVA

    上傳時間: 2017-09-26

    上傳用戶:cjf0304

  • 水中機器人路徑規劃綜述-夏慶鋒

    自主移動機器人是目前機器人發展的主流,隨著其應用領域的不斷擴展和自動化程度的進一步提高,對機器人的功能提出了更高的要求,特別是需要各種具有不同智能程度的機器人,能夠設定自己的目標,規劃并執行自己的任務動作,不斷適應環境的變化。在移動機器人相關技術研究中,導航技術是其核心,而路徑規劃是導航技術研究的一個重要環節和組成部分。路徑規劃是智能移動機器人研究的核心內容之一,它起始于20世紀70年代,迄今為止,已有大量的研究成果報道[1]。大多數國內外文獻將此問題稱為Path Planning,Find-Path Problem, Collision-Free,Obstacle Avoidance,Motion Planning,etc.。所謂移動機器人路徑規劃技術,是指移動機器人在一定的環境(通常具有障礙物)中,能夠按照某種標準,如工作代價最小、行走路線最短、行走時間最短等,自行規劃出一條到達指定終點的無碰路徑,同時高效完成作業任務。

    標簽: 機器人;路徑

    上傳時間: 2015-03-16

    上傳用戶:Freesky1

  • convex優化

    Convex optimization problem

    標簽: Convex optimization

    上傳時間: 2015-03-23

    上傳用戶:飛來大貨車

主站蜘蛛池模板: 木里| 龙川县| 安多县| 岳西县| 西林县| 乐清市| 肇东市| 南丹县| 庆城县| 天长市| 丽江市| 新民市| 和平县| 安溪县| 宁乡县| 万源市| 天门市| 石柱| 于田县| 商水县| 永宁县| 潢川县| 建平县| 抚远县| 洛南县| 囊谦县| 西安市| 二连浩特市| 平江县| 石楼县| 庆阳市| 堆龙德庆县| 朝阳区| 安岳县| 江油市| 塔河县| 锡林郭勒盟| 保定市| 开原市| 日土县| 朝阳区|