虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

existence

  • Check customer the legitimacy of the importation Check this book number whether already existence

    Check customer the legitimacy of the importation Check this book number whether already existence

    标签: Check importation legitimacy the

    上传时间: 2013-12-17

    上传用户:cmc_68289287

  • The existence of numerous imaging modalities makes it possible to present different data present in

    The existence of numerous imaging modalities makes it possible to present different data present in different modalities together thus forming multimodal images. Component images forming multimodal images should be aligned, or registered so that all the data, coming from the different modalities, are displayed in proper locations. The term image registration is most commonly used to denote the process of alignment of images , that is of transforming them to the common coordinate system. This is done by optimizing a similarity measure between the two images. A widely used measure is Mutual Information (MI). This method requires estimating joint histogram of the two images. Experiments are presented that demonstrate the approach. The technique is intensity-based rather than feature-based. As a comparative assessment the performance based on normalized mutual information and cross correlation as metric have also been presented.

    标签: present modalities existence different

    上传时间: 2017-04-03

    上传用户:qunquan

  • -The existence of numerous imaging modalities makes it possible to present different data present in

    -The existence of numerous imaging modalities makes it possible to present different data present in different modalities together thus forming multimodal images. Component images forming multimodal images should be aligned, or registered so that all the data, coming from the different modalities, are displayed in proper locations. Mutual Information is the similarity measure used in this case for optimizing the two images. This method requires estimating joint histogram of the two images. The fusion of images is the process of combining two or more images into a single image retaining important features from each. The Discrete Wavelet Transform (DWT) has become an attractive tool for fusing multimodal images. In this work it has been used to segment the features of the input images to produce a region map. Features of each region are calculated and a region based approach is used to fuse the images in the wavelet domain.

    标签: present modalities existence different

    上传时间: 2014-03-04

    上传用户:15736969615

  • Windows CE 编程(英文第二版)

    ·Ive been working with Windows CE for almost as long as its been in existence. A Windows programmer for many years, Im amazed by the number of different, typically quite small, systems to which I can a

    标签: nbsp Windows CE 编程

    上传时间: 2013-04-24

    上传用户:Zxcvbnm

  • 平均因子分解法

    平均因子分解法,适用于正定矩阵First, let s recall the definition of the Cholesky decomposition: Given a symmetric positive definite square matrix X, the Cholesky decomposition of X is the factorization X=U U, where U is the square root matrix of X, and satisfies: (1) U U = X (2) U is upper triangular (that is, it has all zeros below the diagonal). It seems that the assumption of positive definiteness is necessary. Actually, it is "positive definite" which guarantees the existence of such kind of decomposition.

    标签: 分解

    上传时间: 2013-12-24

    上传用户:啊飒飒大师的

  • Student result management system Use the C language realization system 2, the data structure mak

    Student result management system Use the C language realization system 2, the data structure making use of the structure body several realization student s result design 3, the system have increment, search, insert, row preface etc. basic function 4, the each function mold piece request of system use the form of function realization 5, completion design mission combine write a course a design report. 6, student the existence document of the result information in

    标签: system realization management structure

    上传时间: 2013-11-29

    上传用户:1966640071

  • Constitution lord the headline of the window way Record the managing person of the debarkationManag

    Constitution lord the headline of the window way Record the managing person of the debarkationManaging person s number of your importation already existence, please afresh importation

    标签: the debarkationManag Constitution headline

    上传时间: 2015-11-08

    上传用户:星仔

  • Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by E

    Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document.

    标签: investigation IPR including Pursuant

    上传时间: 2013-12-12

    上传用户:英雄

  • JASML is a java byte code compiler, providing yet another approach to view, write and edit java clas

    JASML is a java byte code compiler, providing yet another approach to view, write and edit java classes, even without the existence of a java source file - using the java macro instructions, those described in The Java Language Specification.

    标签: java providing approach compiler

    上传时间: 2016-06-13

    上传用户:youth25

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    标签: Fundamental Limits Secure Class on of

    上传时间: 2020-01-04

    上传用户:kddlas