A one-dimensional calibration object consists of three or more collinear points with known relative positions. It is generally believed that a camera can be calibrated only when a 1D calibration object is in planar motion or rotates around a ¯ xed point. In this paper, it is proved that when a multi-camera is observing a 1D object undergoing general rigid motions synchronously, the camera set can be linearly calibrated. A linear algorithm for the camera set calibration is proposed,and then the linear estimation is further re¯ ned using the maximum likelihood criteria. The simulated and real image experiments show that the proposed algorithm is valid and robust.
标签: one-dimensional calibration collinear consists
上传时间: 2014-01-12
上传用户:璇珠官人
Ajax, the popular term for Asynchronous JavaScript and XML, is one of the most important combinations of technologies for web developers to know these days. With its rich grouping of technologies, Ajax developers can create interactive web applications with XML-based web services, using JavaScript in the browser to process the web server response.
标签: Asynchronous combination JavaScript the
上传时间: 2015-11-20
上传用户:qazxsw
One program to simulation light passing through a glass sphere. It is interesting and can be used in geometric optics.
标签: interesting simulation program passing
上传时间: 2014-12-07
上传用户:璇珠官人
First of all, the Applet-phone is a SIP User-Agent with audio and text messaging capabilities. But i s also embedded in an applet where you can use it as usual if your firewall allow you to use the UDP transport. If not, you can use TCP to carry your voice in a voice messaging fashion. Your voice is recorded and encoded locally then sent as a message, decoded and played back by your peer. Voice messaging allow you to go through any firewall, so that you can continue to chat and talk with your friends from an applet !
标签: Applet-phone capabilities User-Agent messaging
上传时间: 2014-01-11
上传用户:c12228
This book was written to provide a single reference for network administration in a Linux environment. Beginners and experienced users alike should find the information they need to cover nearly all important administration activities required to manage a Linux network configuration.
标签: administration environmen reference provide
上传时间: 2013-12-20
上传用户:225588
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)
标签: Sometimes the contents desire
上传时间: 2013-12-25
上传用户:playboys0
MemoryMonitor demonstrates the use of the java.lang.management API in observing the memory usage of all memory pools consumed by the application. This simple demo program queries the memory usage of each memory pool and plots the memory usage history graph. To run the MemoryMonitor demo java -jar <JDK_HOME>/demo/management/MemoryMonitor.jar
标签: the MemoryMonitor demonstrates management
上传时间: 2015-12-04
上传用户:bcjtao
This document contains a general overview in the first few sections as well as a more detailed reference in later sections for SVMpython. If you re already familiar with SVMpython, it s possible to get a pretty good idea of how to use the package merely by browsing through svmstruct.py and multiclass.py. This document provides a more in depth view of how to use the package. Note that this is not a conversion of SVMstruct to Python. It is merely an embedding of Python in existing C code. All code other than the user implemented API functions is still in C, including optimization.
标签: document contains detailed overview
上传时间: 2013-12-14
上传用户:希酱大魔王
In this talk we will consider two approaches in dealing with the risk of supplier bankruptcy. In the first model, we study the effects of supply disruption risk in a supply chain where one buyer deals with competing risky suppliers who may default during their production lead-times.
标签: approaches bankruptcy the consider
上传时间: 2014-08-04
上传用户:lanjisu111
In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadline violations. Priority inheritance protocol is one of the approaches to reduce priority inversion. Unfortunately, RTOS like uC/OS can’t support priority inheritance protocol since it does not allow kernel to have multiple tasks at the same priority. Although it has different ways to avoid priority inversion such as priority ceiling protocol, developers still have some difficulties in programming real time applications with it. In this paper, we redesign the uC/OS kernel to provide the ability to support round robin scheduling and implement priority inheritance semaphore on the modified kernel. As result, we port new kernel with priority inheritance semaphore to evaluation board, and evaluate the execution time of each of the kernel service as well as verify the operations of our implementation.
标签: priority preemptive inversion problem
上传时间: 2015-12-14
上传用户:气温达上千万的