Welcome![Sign In][Sign Up]
Location:
Search - pseudo

Search list

[Special EffectsVC_ImageProcessing

Description: 《Visual C++数字图像获取、处理及实践应用》杨枝灵、王开等编著。内容:第4章 图像增强(对比度增强、灰度变换法、直方图修整法、图像平滑、图像锐化、伪彩色和假彩色增强);第5章 图像复原(逆滤波复原、维纳滤波方法);第6章 图像处理中的正交变换(傅立叶变换、离散余弦变换(DCT)、沃尔什变换、基于特征向量的变换、霍特林(Hotelling)变换、SVD变换、小波变换、Mallat算法);第7章 图像压缩编码(霍夫曼(Huffman)编码、算术编码、游程编码(Run Length Coding)、位平面编码、预测编码、DPCM、JPEG 2000编码); 第8章 图像配准 第9章 目标检测与运动检测 第10章 图像形状特征分析(骨架检出、轮廓提取);第11章 图像分割(边界跟踪、阈值分割区域生长、分裂合并、Canny算子); 第12章 图像的模式识别-"Visual C digital image acquisition, processing and Practice" YANG Zhi Ling Wang Kai edited. Contents : Chapter 4 Image Enhancement (contrast enhancement, gray transform, histogram dressing, image smoothing, sharpening, Pseudo-color and false color enhancement); Chapter 5 of Image Restoration (inverse filter rehabilitation, Wiener filtering method); Chapter 6 of image processing orthogonal transformation (Fourier transform, discrete cosine transform (DCT), the Walsh transform, Based on the eigenvectors of transformation, Hotelling (Hotelling) transform, SVD transform, wavelet transform, Mallat algorithm); Chapter 7 Image Coding (Hoffman (Huffman) coding, arithmetic coding, RIc (Run Length Coding), the bit-plane coding, predictive coding, DPCM. JPEG 2000 encoding); Chapter 8 Image
Platform: | Size: 280370 | Author: 陈镇静 | Hits:

[Other resourceSpread

Description: 本程序应用了混沌序列作为伪码生成器对直接扩频系统进行了仿真,并在多用户情况下作了仿真-the application procedures as a chaotic sequence of pseudo-code generator directly to the spread spectrum system simulation, Multi-user and the circumstances made Simulation
Platform: | Size: 8228 | Author: 王也 | Hits:

[CSharpweicaise

Description: 将遥感图像转换为伪彩色的代码,希望对大家有所帮助。 欢迎做图像融合的朋友和我交流-of remote sensing images converted to pseudo-color code, we want to help. Image Fusion do welcome friends and I exchange
Platform: | Size: 901 | Author: 孙火华 | Hits:

[Other resourceMesdaghi - Pathing Tutorial

Description: PathPlannerApp Manual With Tutorial.doc is a path planning-tutorial that provides detailed explanation and pseudo-codes. In order to get the most out of the tutorial, you should start with the \"PathPlannerApp.base\" and avoid looking through the \"PathPlannerApp.solution\" untill you have completed the project.-PathPlannerApp Manual With Tutorial.doc planning is a path-tutorial that provides Degussa IIED explanation and pseudo-codes. In order to get the most out of the tutorial. you should start with the "PathPlannerApp.bas e "and avoid looking through the" PathPlannerA pp.solution "until you have completed the pro Campus.
Platform: | Size: 496361 | Author: 毛毛 | Hits:

[WEB Codeupds

Description: 直接序列扩频通信可以有效地抵抗来自信道中的窄带干扰。在一个直扩通信系统中,扩频是通过伪噪声序列(PN)对发送的信息数据进行调制来实现的。在接收端,原伪噪声序列和所收信号的相关运算可将窄带干扰扩展到DS信号的整个频带,使干扰等效为幅度较低频谱较平坦的噪声;同时,将DS信号解扩,恢复原始信息数据。-direct sequence spread spectrum communication can be effective resistance from the channel narrowband interference. In a DSSS system. Spreading through the sequence of pseudo-noise (PN) to send the right message to data modulation to achieve. On the receiving end, the original pseudo-noise sequence and the received signal may be related Operational narrowband interference signal DS extended to the whole band, make tampering equivalent to a lesser extent than the flat spectrum of noise; Meanwhile, the DS signal disspreaded restore the original data.
Platform: | Size: 111604 | Author: 赵艳朝 | Hits:

[CommunicationQPSK_TRANSMITTER

Description: M-file for simulating a QPSK transmitter by modulating with a pseudo random bit stream. A serial to parallel conversion of the pseudo random bit stream is performed with mapping of two bits per symbol. A cosine and sine carrier is configured and the I and Q symbols modulate these carriers. The I and Q carriers are combined and time and frequency domain plots are provided showing key waveforms at various positions in the QPSK transmitter. -M-file for simulating a QPSK transmitter b y modulating with a pseudo random bit stream. A s erial to parallel conversion of the pseudo rand om bit stream is performed with mapping of two bi ts per symbol. A cosine and sine carrier is CBMs gured and the I and Q symbols Modulate these CARR IERS. The I and Q carriers are combined and a time nd frequency domain plots are provided showing key waveforms at various positions in the QPSK t ransmitter.
Platform: | Size: 2170 | Author: xiaoying | Hits:

[Communicationsdr_model

Description: M-file for simulating a QPSK transmitter by modulating with a pseudo random bit stream. A serial to parallel conversion of the pseudo random bit stream is performed with mapping of two bits per symbol. A cosine and sine carrier is configured and the I and Q symbols modulate these carriers. The I and Q carriers are combined and time and frequency domain plots are provided showing key waveforms at various positions in the QPSK transmitter. -M-file for simulating a QPSK transmitter b y modulating with a pseudo random bit stream. A s erial to parallel conversion of the pseudo rand om bit stream is performed with mapping of two bi ts per symbol. A cosine and sine carrier is CBMs gured and the I and Q symbols Modulate these CARR IERS. The I and Q carriers are combined and a time nd frequency domain plots are provided showing key waveforms at various positions in the QPSK t ransmitter.
Platform: | Size: 28915 | Author: xiaoying | Hits:

[Other resourcerbfSrc

Description: This program demonstrates some function approximation capabilities of a Radial Basis Function Network. The user supplies a set of training points which represent some \"sample\" points for some arbitrary curve. Next, the user specifies the number of equally spaced gaussian centers and the variance for the network. Using the training samples, the weights multiplying each of the gaussian basis functions arecalculated using the pseudo-inverse (yielding the minimum least-squares solution). The resulting network is then used to approximate the function between the given \"sample\" points. -This program demonstrates some function a pproximation capabilities of a Radial Basis Fu nction Network. The user supplies a set of train ing points which represent some "sample" point s for some arbitrary curve. Next, the user specifies the number of equally spaced Response centers and the variance for the netwo rk. Using the training samples, the weights multiplying each of the Gaussian ba sis functions arecalculated using the pseudo - inverse (yielding the minimum least-squares s middleware). The resulting network is then used to approximate the function between the given "sa mple "points.
Platform: | Size: 18685 | Author: 陈伟 | Hits:

[OtherHashTableinDS

Description: 一:问题描述 针对某个集体(比如你所在的班级)中的“人名”设计一个哈希表,使得平均查找长度不超过R,完成相对的建表和查表程序。 二:基本要求 假设人名为中国人姓名的汉语拼音形式。待填入哈希表的人名共有30个,取平均查找长度的上限为2。哈希函数用除留余数法构造,用伪随机探测再散列法处理冲突。 三:实现提示 如果随机函数自行构造,则应首先调整好随机函数,使其分布均匀。人名的长度均不超过19个字符(最长的人名如:庄双双(ZHAGN SHUANG SHUANG)。字符的取码方法可直接利用C语言中的tosacii函数,并可对过长的人名先作折叠处理。 四:需求分析 本演示程序是对哈希表的建立和查找进行演示,主要数据来自自己编写的人名“A~~Z”等字母组成,拼音由开头的字母组成的词组,查找时用伪随机探测再散列法处理冲突。随机产生人名的位置。具体的程序内容在源程序里面有比较详细的解析。程序的运行在下列有详细的介绍。 -one : Problem description against any collective (such as your own classes) of "names" design a hash table. you make the average length of not more than R, completes the construction and Lookup Table procedures. Two : the assumption that the basic requirements were known as the Chinese name of Chinese pinyin form. Hash Table question Enter the names of a total of 30, you take the average length of a maximum of two. Hash functions with a few exception I stay constructed using pseudo-random re-hash detection method to resolve disputes. 3 : Achieving suggested random function on its own if the structure should first be adjusted his random function, it evenly distributed. Names not on the length of more than 19 characters (the longest names such as : both Chong (ZHAGN SHUANG SHUANG).
Platform: | Size: 2463 | Author: wjs | Hits:

[Crack HackLibTomCrypt

Description: LibTomCrypt是一个全面的、可扩展的密码学函数库。包括了各类主要的加密函数,单向摘要函数,伪随机数生成器,公钥加密函数。 你可以在这里下载到源文件及其说明:http://www.libtomcrypt.org libtomcrypt在C++builder6下编译为tomcrypt.lib -LibTomCrypt is a comprehensive, scalable cryptography libraries. Including the major types of encryption function, the one-way function summary, the pseudo-random number generator, public key encryption function. You can download the source of the document and its Note : http : / / in C www.libtomcrypt.org libtomcrypt builde r6 compiler for tomcrypt.lib
Platform: | Size: 306997 | Author: lucy | Hits:

[Otherd3d_AlphaBlending

Description: 在DirectX 3D中使用Alpha Blending的方式来实现伪运动模糊的效果-in DirectX 3D Alpha Blending the use of the method to achieve pseudo-campaign mode Paste results
Platform: | Size: 30848 | Author: weiguian | Hits:

[Search Engineturbo_cwcshop

Description: 系统搭建在Utility-Layer Framework之上 整个系统基于UTF8编码,全面国际化支持,适合任何语言 商城适合销售任何商品 顾客购物流程非常流畅,不产生阻塞感,有良好的购物体验 (Utility-Layer Framework特性之一) 支持注册和非注册用户购物 优良的缓存特性和特别的异步更新数据设计提供了大负载的支持 (Utility-Layer Framework特性之一) 对GOOGLE有最好的亲和度 - 通过独特的URL重写技术,对所有商品页面和商品列表页面做了伪静态处理,大大提高了来自搜索引擎的流量,这个对于一个网店来说非常重要 支持海量商品多字段高性能全文检索 - 通过使用lucene技术,实现对商品名称、简介和详细介绍进行全文索引,从而实现用普通数据库不可能实现的多字段全文检索 支持通过Excel批量导入商品 提供HTML文件式邮件模版管理和编辑 清晰的日志体系,有助对异常问题的分析和攻击分析 创新的商品群组概念,令你更灵活地个性化排版网站 插件式的开放设计,开发用户可自行开发扩充自己的支付方式 基于AOP的开放设计,开发用户可拦截任何方法,在该方法执行前/后做出特定处理 -system structures in the Utility-Layer Framework top of the whole system is based on U TF8 coding, comprehensive international support. any suitable language for business customers to sell any goods to flow very smooth, no obstructions flu, a good shopping experience (Utility-Layer Framework one of the properties) to support registration and non-registered users to cache excellent characteristics and special design of asynchronous updating data provide a large load of support (Uti - lity-Layer Framework one of the characteristics) GOOGLE has the best pro-degree-Link unique URL rewriting technique of all goods and commodities pages listing pages done a pseudo-static, greatly increasing the search engine from the flow This added industries, for a very important commodity to support massive m
Platform: | Size: 7320756 | Author: wenwu | Hits:

[Special Effectspseudocolor1

Description: (医学伪彩色处理)vc++源代码,需要的下-(Medical pseudo-color processing) vc source code, under the
Platform: | Size: 859 | Author: 朱奇俊 | Hits:

[OtherBAM_NN

Description: 用外积和法设计的权矩阵,不能保证p对模式全部正确的联想。若对记忆模式对加以限制(即要求p个记忆模式Xk是两两正交的),则用外积和法设计的BAM网具有较好的联想能力。 在难以保证要识别的样本(或记忆模式)是正交的情况下,如何求权矩阵,并保证具有较好的联想能力?这个问题在用BAM网络实现对字符的识别程序仿真中得到体现。我们做过尝试,用伪逆法求权矩阵,虽然能对未加干扰的字符全部进行识别,但对加有噪声的字符识别效果很差。至于采用改变结构和其他算法的方法来求权矩阵,将是下一步要做的工作。-foreign plot and the design of the power matrix, p is no guarantee that all the correct pattern association. If memory model, the limit (that is, p-memory model Xk is orthogonal to the February 2), then foreign plot and design of the BAM network has good ability to think. It is difficult to ensure the samples to identify (or memory mode) is orthogonal circumstances, the right to seek ways matrix, and to ensure that the association has good ability? The problem with the BAM network of characters identification procedures simulation can be manifested. We did try to use pseudo - inverse matrix for the right, although they would not increase the interference of the characters in the identification of all, However, a pair of noise increases the effects of poor character recognition. As for the
Platform: | Size: 231686 | Author: 东方云 | Hits:

[Special Effectsyueguang

Description: 分而治之方法还可以用于实现另一种完全不同的排序方法,这种排序法称为快速排序(quick sort)。在这种方法中, n 个元素被分成三段(组):左段l e f t,右段r i g h t和中段m i d d l e。中段仅包含一个元素。左段中各元素都小于等于中段元素,右段中各元素都大于等于中段元素。因此l e f t和r i g h t中的元素可以独立排序,并且不必对l e f t和r i g h t的排序结果进行合并。m i d d l e中的元素被称为支点( p i v o t )。图1 4 - 9中给出了快速排序的伪代码,,Delphi 赫夫曼编码.rar.rar - 用delhi做的程序实现了哈夫曼编码,做的还不错。,,Delphi -divide and rule method can be used to achieve an entirely different sort of way This sorting called Quick Sort (quick sort). In this approach, n elements is divided into three (group) : Left of the l e f t, Right of g h i r t and middle m i d e d l. Middle contains only one element. Left of the elements are less than equal to the middle element of the right elements are larger than the middle element. So l and f t e r t h i g of elemental independent sort, and no need to l and f t e r t h i g ranking results merger. M i d e d l The element known as Fulcrum (p i v o t). Figure 1 4-9 is given a quick sort of pseudo-code. Delphi Hefuman coding. rar.rar - delhi do with the realization of Huffman coding. doing quite well. ,, Delphi
Platform: | Size: 2489430 | Author: 罗成芝 | Hits:

[Special Effectspseudocolor2-cpp

Description: 对图像进行遥感伪彩色处理的源代码,编译后的可执行文件须带参数运行-of remote sensing images pseudo-color processing of source code, the compiled executable file parameters required to bring Operation
Platform: | Size: 1384 | Author: 李金宝 | Hits:

[Other resourcecss2.0dfd-4581

Description: 本手册是 Rainer s DHTML Library 产品的一部分。   本手册针对的是已有一定网页设计制作经验的读者。其目的是提供完整清晰的样式表内容的快速索引及进阶帮助。所以对于网页制作和样式表的基础知识,仅简单介绍,恕不赘述。   手册提供了完整的 CSS2.0 的属性(Properties)、规则(At-Rules)、伪类(Pseudo-Classes)、伪元素(Pseudo-Elements)、声明(Declarations)、单位(Units)、选择符(Selectors)的介绍。其内容涵括了 W3C 的 CSS2.0 标准,以及 Internet Explorer 和 Netscape 各自的私有内容。出于种种众所周知的原因考虑,本手册以浏览器的事实标准—— Internet Explorer 为主。   手册中为几乎所有的已被支持的属性、伪类、单位等,除了基本的语法示范外,都度身制作了可以对照源代码即时察看运行演示的实例。   本手册的升级信息与版权声明请参阅关于本书页面。   限于篇幅,对于一些过于繁杂的相关内容,如动态样式属性(Dynamic Properties),滤镜(Filters),行为(Behaviors)请参阅我的其它相关著作。   本书中涉及到的所有HTML对象(Object,Element),HTML属性(Attributes)和特性(Properties)请参阅我的相关著作。 -the manual is Rainer's DHTML Library part of the product. This manual is against a certain website design experience of the reader. Their purpose is to provide complete and clear style sheet as fast indexing and advanced help. Therefore website template and the production of basic knowledge, only a brief introduction, without repeat. The manual provides a complete CSS2.0 attributes (Properties). Rules (At - Rules), the pseudo-category (Pseudo-Classes), pseudo-elements (Pseudo-Elements), the statement (Declarations). units (Units), the choice of site (Selectors) presentation. Its content includes the CSS2.0 the W3C standards, and the Internet Explorer and Netscape as their own private. For various reasons known to all considerations, the manual to the fact that the browser standards --
Platform: | Size: 548870 | Author: wangtx | Hits:

[Other resourceMyDib_ColorImageProcess

Description: 彩色图像处理,主要包括:灰度化,伪彩色,单色处理,霓虹,浮雕,滤波(低通,高通)处理等-color image processing, including : gray, pseudo-color, monochrome, neon, relief, filtering (low pass, Qualcomm) processing
Platform: | Size: 76305 | Author: 梁俊龙 | Hits:

[Special EffectsDllKAveToColor

Description: 一个K均值算法实现图像分割的DLL程序,并采用伪彩色的方法实现对分割结果的表示!可以用来处理8位的BMP图像!-a K-means algorithm for image segmentation DLL procedures, and the use of pseudo-color method of the results of the division said. Can be used to deal with eight of BMP images!
Platform: | Size: 43331 | Author: 徐敏 | Hits:

[Other resourceTFRGABOR

Description: 伪魏格勒分布源代码.适合于非稳态的时频联合分析,可直接用于MATLAB编程,无解压密码.-pseudo-source code distribution. Suited to the non-steady-state joint time-frequency analysis can be used directly in MATLAB programming, without extracting passwords.
Platform: | Size: 2322 | Author: 王杜 | Hits:
« 1 2 ... 4 5 6 7 8 910 11 12 13 14 ... 50 »

CodeBus www.codebus.net