In this paper, we describe the development of a rapidly reconfigurable system in which the users’ tacit knowledge and requirements are elicited via a process of Interactive Evolution, finding the image processing parameters to achieve the required goals without any need for specialised knowledge of the machine vision system. We show that the resulting segmentation can be quickly and easily evolved from scratch, and achieves detection rates comparable to those of a hand-tuned system on a hot-rolled steel defect recognition problem.
资源简介:In this paper, we describe the development of a rapidly reconfigurable system in which the users’ tacit knowledge and requirements are elicited via a process of Interactive Evolution, finding the image processing parameters to achieve the...
上传时间: 2014-01-05
上传用户:hopy
资源简介:In this paper, we describe the development of a mobile butterfly-watching learning (BWL) system to realize outdoor independent learning for mobile learners. the mobile butterfly-watching learning system was designed in a wireless mobile a...
上传时间: 2014-11-26
上传用户:waizhang
资源简介:In this paper, we provide an overview of the security concerns introduced by wireless LANs, current approaches to wireless LAN security, their limitations, and the weaknesses of various “band aid” security solutions. We conclude by descri...
上传时间: 2015-11-02
上传用户:凌云御清风
资源简介:In this paper we describe a control methodology for catching a fast moving object with a robot manipulator, where visual information is employed to track the trajectory of the target. Sensing, planning and control are performed in real-...
上传时间: 2014-01-12
上传用户:qq521
资源简介:In this report we provide an overview of several closely related methods developed during the last few yers, to smooth, denoise, edit, compress, transmit, and animate very large polygonal models.
上传时间: 2013-12-16
上传用户:ippler8
资源简介:In this paper we propose to reduce the textural components by modelling the coefficients of a wedgelet based regression tree instead of the original pixel intensities
上传时间: 2015-10-22
上传用户:gxmm
资源简介:In this paper, we consider the problem of filtering in relational hidden Markov models. We present a compact representation for such models and an associated logical particle filtering algorithm. Each particle contains a logical formula ...
上传时间: 2016-01-02
上传用户:海陆空653
资源简介:This paper shows the development of a 1024-point radix-4 FFT VHDL core for applications in hardware signal processing, targeting low-cost FPGA technologies. the developed core is targeted into a Xilinx庐 Spartan鈩?3 XC3S200 FPGA with the i...
上传时间: 2013-12-21
上传用户:jichenxi0730
资源简介:Abstract—In this paper, we propose transform-domain algorithms to effectively classify the characteristics of blocks and estimate the strength of the blocky effect. the transform-domain algorithms require much lower computational comple...
上传时间: 2017-06-16
上传用户:zukfu
资源简介:in this paper,wo propose an extension of the zerotree-based space-frequency quantization algorithm by adding a wedgelet symbol to its tree-pruning optimization.
上传时间: 2015-10-22
上传用户:yxgi5
资源简介:in this paper,we show that an efficient multiscale wedgelet decomposition is possible if we carefully choose the set of possible wedgelet orientations.
上传时间: 2015-10-22
上传用户:qweqweqwe
资源简介:the development of a data acquisition card based on USB bus is introduced in this article.It first describes the configuration and principle of this card in the part of hardware design,and then the application program and device driver in t...
上传时间: 2015-12-07
上传用户:lijianyu172
资源简介:In this article, we present an overview of methods for sequential simulation from posterior distributions. these methods are of particular interest in Bayesian filtering for discrete time dynamic models that are typically nonlinear and no...
上传时间: 2015-12-31
上传用户:225588
资源简介:In this demo, we show how to use Rao-Blackwellised particle filtering to exploit the conditional independence structure of a simple DBN. the derivation and details are presented in A Simple Tutorial on Rao-Blackwellised Particle Filtering f...
上传时间: 2013-12-14
上传用户:小儒尼尼奥
资源简介:In this paper, we propose a hierarchical clustering method using visual, textual and link analysis. By using a vision-based page segmentation algorithm, a web page is partitioned into blocks, and the textual and link information of an i...
上传时间: 2014-01-07
上传用户:xiaoxiang
资源简介:In this paper, we present LOADED, an algorithm for outlier detection in evolving data sets containing both continuous and categorical attributes. LOADED is a tunable algorithm, wherein one can trade off computation for accuracy so that ...
上传时间: 2014-01-08
上传用户:aeiouetla
资源简介:Schematic for the development of a RFID reader with a TRF7960 reader.
上传时间: 2014-01-07
上传用户:gmh1314
资源简介:the advantages of automation can be exploited in order to solve or to minimize the needs of manual approach. In order to support the development of survey accurate cadastral system, an automatic programming approach will be adopted. Data...
上传时间: 2017-04-29
上传用户:520
资源简介:the purpose of this document is to present how to use the Timer for the generation of a PWM signal tunable in frequency and duty cycle. As an application example, this document is based on a basic “music” synthesizer through an external b...
上传时间: 2013-12-20
上传用户:z754970244
资源简介:A new type of cloak is discussed: one that gives all cloaked objects the appearance of a flat conducting sheet. It has the advantage that none of the parameters of the cloak is singular and can in fact be made isotropic. It makes broadban...
上传时间: 2017-03-30
上传用户:rishian
资源简介:the Kalman filter is an efficient recursive filter that estimates the state of a linear dynamic system from a series of noisy measurements. It is used in a wide range of engineering applications from radar to computer vision, and is an impo...
上传时间: 2017-08-06
上传用户:风之骄子
资源简介:In this talk we will consider two approaches in dealing with the risk of supplier bankruptcy. In the first model, we study the effects of supply disruption risk in a supply chain where one buyer deals with competing risky suppliers who may ...
上传时间: 2014-08-04
上传用户:lanjisu111
资源简介:In this program we calculate the sum of the incident and scattered fields in a 90 degree conducting wedge by using the analytic and Image theotem method
上传时间: 2014-10-27
上传用户:lizhen9880
资源简介:In this program we calculate the scattering field of a infinite dielectric cylinder by two methods. 1)Moment 2)Analytic
上传时间: 2017-03-30
上传用户:BIBI
资源简介:In this program we calculate the scattering field of a infinite rectangular surface. I use Physical Optic method and compare the result with exact solution.
上传时间: 2014-01-19
上传用户:362279997
资源简介:In this paper, the feasibility of replacing a chaos source by an equivalent digital pseudo-random generator realized using Linear Feedback Shift Register (LFSR) is studied. Particular emphasis is given on the digital implementation Piece-Wi...
上传时间: 2013-12-13
上传用户:从此走出阴霾
资源简介:In this book, we aim to give you an introduction to a wide variety of topics important to you as a developer using UNIX. the word Beginning in the title refers more to the content than to your skill level. We ve structured the book to help ...
上传时间: 2013-12-22
上传用户:youmo81
资源简介:This text surrounds the development of the electric power SCADA system exactly, aiming at the present condition of the our country electric power charged barbed wire net currently, according to the oneself at the e- lectric power protect th...
上传时间: 2014-10-28
上传用户:liuchee
资源简介:This paper introduces an affine invariant of trapezia, and the explicit constraint equation between the intrinsic matrix of a camera and the similarity invariants of a trapezium are established using the affine invariant. By this constraint...
上传时间: 2014-01-16
上传用户:6546544
资源简介:A system simulation environment in Matlab/Simulink of RFID is constructed in this paper. Special attention is emphasized on the analog/RF circuit.Negative effects are concerned in the system model,such as phase noise of the local oscillat...
上传时间: 2014-01-09
上传用户:zhangliming420