虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

information-technology

  • This document contains a detailed description of the usage and configuration of the JSVM [Joint Scal

    This document contains a detailed description of the usage and configuration of the JSVM [Joint Scalable Video Model] software for the Scalable Video Coding [SVC] project of the Joint Video Team [JVT] of the ISO/IEC Moving Pictures Experts Group [MPEG] and the ITU-T Video Coding Experts Group [VCEG]. It provides information how to build the software on Windows32 and Linux platforms. It contains a description of the usage and configuration for the binaries built from the software package, including examples for spatial, SNR and combined scalability scenarios. Guidelines for the integration and validation of new tools in the software are provided.

    标签: configuration description the document

    上传时间: 2017-03-26

    上传用户:sz_hjbf

  • This book is an introduction to Ada 95. It uses an example-driven approach which gradually develops

    This book is an introduction to Ada 95. It uses an example-driven approach which gradually develops small trivial programs into large case-study type programs. The main emphasis of this book is on maintenance problems, and using object-oriented technology to write maintainable, extensible programs. Program design is introduced throughout the book, with hypothetical maintenance scenarios used to shoe design shortcomings. and revise them to accomodate maintenance needs. Practical issues such as debugging programs are tackled, and important Ada features not found in other languages are dealt with practically and early on in the text. These include exception handling, user-defined types, procedures, functions, packages and child packages.

    标签: example-driven introduction gradually approach

    上传时间: 2014-01-12

    上传用户:koulian

  • In the bank all the activities are being done manually .As the bank widens its services & it finds d

    In the bank all the activities are being done manually .As the bank widens its services & it finds difficult to manage its operations manually and hence this leads to the automation of some of its operations. Banking Information system is a windows based applications. This project mainly deals with managing there types of account such as Saving Account, Current Account and Recurring Deposits . In this project bank is seeking to manage these account through computer based system. Tasks involved in this project are opening the user accounts , recording the account holders transactions , modify, the user records and generating the reports . This project is having three module: ] 1. Bank Master Module 2. Transaction Module 3. Reports module

    标签: the bank activities manually

    上传时间: 2013-12-13

    上传用户:LouieWu

  • The existence of numerous imaging modalities makes it possible to present different data present in

    The existence of numerous imaging modalities makes it possible to present different data present in different modalities together thus forming multimodal images. Component images forming multimodal images should be aligned, or registered so that all the data, coming from the different modalities, are displayed in proper locations. The term image registration is most commonly used to denote the process of alignment of images , that is of transforming them to the common coordinate system. This is done by optimizing a similarity measure between the two images. A widely used measure is Mutual Information (MI). This method requires estimating joint histogram of the two images. Experiments are presented that demonstrate the approach. The technique is intensity-based rather than feature-based. As a comparative assessment the performance based on normalized mutual information and cross correlation as metric have also been presented.

    标签: present modalities existence different

    上传时间: 2017-04-03

    上传用户:qunquan

  • -The existence of numerous imaging modalities makes it possible to present different data present in

    -The existence of numerous imaging modalities makes it possible to present different data present in different modalities together thus forming multimodal images. Component images forming multimodal images should be aligned, or registered so that all the data, coming from the different modalities, are displayed in proper locations. Mutual Information is the similarity measure used in this case for optimizing the two images. This method requires estimating joint histogram of the two images. The fusion of images is the process of combining two or more images into a single image retaining important features from each. The Discrete Wavelet Transform (DWT) has become an attractive tool for fusing multimodal images. In this work it has been used to segment the features of the input images to produce a region map. Features of each region are calculated and a region based approach is used to fuse the images in the wavelet domain.

    标签: present modalities existence different

    上传时间: 2014-03-04

    上传用户:15736969615

  • In computer vision, sets of data acquired by sampling the same scene or object at different times, o

    In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessary in order to be able to compare or integrate the data obtained from different measurements. Image registration is the process of transforming the different sets of data into one coordinate system. To be precise it involves finding transformations that relate spatial information conveyed in one image to that in another or in physical space. Image registration is performed on a series of at least two images, where one of these images is the reference image to which all the others will be registered. The other images are referred to as target images.

    标签: different computer acquired sampling

    上传时间: 2013-12-28

    上传用户:来茴

  • 在网络安全中经常会遇到rootkit

    在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.

    标签: rootkit 网络安全

    上传时间: 2017-04-04

    上传用户:xaijhqx

  • very simple nonvisual Delphi component useful for shareware program developing. It uses crypted lic

    very simple nonvisual Delphi component useful for shareware program developing. It uses crypted license files containing information about exe file (size and crc), expired date and any additional information. As TArtLicense uses RSA asymmetric algorithm and TArtLicense knows only decryption key, nobody can change information inside license file.

    标签: developing nonvisual component shareware

    上传时间: 2017-04-08

    上传用户:561596

  • Mac OS X for Java Geeks delivers a complete and detailed look at the Mac OS X platform, geared speci

    Mac OS X for Java Geeks delivers a complete and detailed look at the Mac OS X platform, geared specifically at Java developers. Programmers using the 10.2 (Jaguar) release of Mac OS X, and the new JDK 1.4, have unprecedented new functionality available to them. Whether you are a Java newbie, working your way through Java Swing and classpath issues, or you are a Java guru, comfortable with digital media, reflection, and J2EE, this book will teach you how to get around on Mac OS X. You ll also get the latest information on how to build applications that run seamlessly, and identically, on Windows, Linux, Unix, and the Mac.

    标签: Mac delivers complete detailed

    上传时间: 2017-04-08

    上传用户:小码农lz

  • R1EX24xxx series are two-wire serial interface EEPROM (Electrically Erasable and Programmable ROM).

    R1EX24xxx series are two-wire serial interface EEPROM (Electrically Erasable and Programmable ROM). They realize high speed, low power consumption and a high level of reliability by employing advanced MNOS memory technology and CMOS process and low voltage circuitry technology. They also have a 128-byte page programming function to make their write operation faster. Note: Renesas Technology鈥檚 serial EEPROM are authorized for using consumer applications such as cellular phone, camcorders, audio equipment. Therefore, please contact Renesas Technology鈥檚 sales office before using industrial applications such as automotive systems, embedded controllers, and meters

    标签: Electrically Programmable interface Erasable

    上传时间: 2014-01-07

    上传用户:xiaohuanhuan