Visual tracking is one of the key components for robots to accomplish a given task in a dynamic environment, especially when independently moving objects are included. This paper proposes an extension of Adaptive Visual Servoing (hereafter, AVS) for unknown moving object tracking. The method utilizes binocular stereo vision, but does not need the knowledge of camera parameters. Only one assumption is that the system need stationary references in the both images by which the system can predict the motion of unknown moving objects. The basic ideas how we extended the AVS method such that it can track unknown moving objects are given and formalized into a new AVS system. The experimental results with proposed control architecture are shown and a discussion is given.
标签: components accomplish tracking dynamic
上传时间: 2013-12-11
上传用户:lizhen9880
FCP takes a file, generates a random 2048 bit key and encrypts the file with a RC4 stream cipher. The encrypted file is written to a new file along with the decryption stub and key. When the output file is executed it decrypts and executes the encrypted file. It s written in Delphi 6, enjoy the source code.
标签: file generates encrypts cipher
上传时间: 2013-12-08
上传用户:爺的气质
creat a certificate using makecert creat a PKCS#12.pfx file to store the private key Encrypte data using the public Key in Certificate Decrypt data using the private key in a PKCS#12.pfx file
标签: creat certificate Encrypte makecert
上传时间: 2016-10-28
上传用户:agent
加密算法实现 Pegwit is a program for performing public key file encryption and authentication. Encryption means that pegwit allows you to keep the information in files you send by email (or other means) confidential. Eavesdroppers will not be able to read the email. Authentication allows you to check that a file has not been tampered with (changed) since it was signed.
标签: authentication encryption performing program
上传时间: 2016-12-12
上传用户:franktu
xyzzy is a program for the Nintendo Wii which will read a console s OTP key storage and dump out the private encryption keys to screen and to SD card. This is useful information in case your Wii ever gets bricked and you need to re-initialize the firmware.
标签: the Nintendo console program
上传时间: 2013-12-19
上传用户:清风冷雨
This function takes a 16-, 24-, or 32-byte key and generates the RC6 key schedule in array S.
上传时间: 2013-12-16
上传用户:wl9454
This book focuses on a hot and growing topic: integration using messaging. Not only is messaging key to integration, but it will most likely be the predominant focus in Web services for years to come.
标签: messaging integration focuses growing
上传时间: 2017-04-04
上传用户:虫虫虫虫虫虫
A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certificate status information. PKI users select one or more certificate issuers as trust anchors, and establish security services based on certificates that may be validated using one of their trust anchors.
标签: Infrastructure cryptographic entities physical
上传时间: 2017-07-31
上传用户:561596
This book is about using Python to get jobs done on Windows.This intended to be a practical book focused on tasks. It doesn t aim to teach Python programming, although we do provide a brief tutorial. Instead, it aims to cover:How Python works on Windows The key integration technologies supported by Python on Windows, such as the Win32 extensions, which let you call the Windows API, and the support for COM Examples in many topic areas showing what Python can do and how to put it to work.
标签: This book practical intended
上传时间: 2015-05-10
上传用户:ddddddos
Expert Choice represents a significant contribution to the decision making process 工t assists a decision maker in solving complex problems involving many criteria and several courses of action . An Expert Choice solution to a problem reflects the expertise of the decision maker , not the computer . Behavioral scientists have spent many years studying the human mind and how it makes decisions . They have found that humans are influenced by their previous experiences and this causes them to have biases . Basic instincts , preferences and environmental factors also play key roles in how we analyze data and make decisions . There 15 way to remove these factors from human decision making , nor would we necessarily want to , but as the problems of our world become more and more complex , it 15 necessary for us to employ a framework to help make more logical and less biased decisions while still taking our feelings and intuition into consideration .
标签: contribution significant represents decision
上传时间: 2015-06-02
上传用户:gmh1314