... for moving objects detection and tracking. For this, we use additive minimax similarity function. Background reconstruction algorithm is developed. Moving and tracking objects detection algorithms ... moving object detection and tracking. Keywords: Moving Objects Detection, Tracking, Background Reconstruction , Minimax Similarity Function 1. Introduction Moving objects...
Ngày tải lên: 22/03/2014, 11:20
... signal-peaks detection. Hence, Part III is structured into three chapters: 8, 9 and 10. Chapter 8 reviews some of the important properties and definitions of probability theory and random processes ... conventional, laser and secondary radar performance and detec- tion of targets of variable radar cross-sections and mobility in Chapter 5. I understand during my years of engineeri...
Ngày tải lên: 18/04/2014, 12:29
real-time detection and tracking
... Billinghurst, and M. Ollila, “Face to Face Collaborative AR on Mobile Phones,” Proc. Int’l Symp. Mixed and Augmented Reality (ISMAR ’05), pp. 80-89, 2005. WAGNER ET AL.: REAL-TIME DETECTION AND TRACKING ... the WAGNER ET AL.: REAL-TIME DETECTION AND TRACKING FOR AUGMENTED REALITY ON MOBILE PHONES 365 Fig. 9. Testing the PatchTracker against losing target, occlusion, tilt,...
Ngày tải lên: 28/04/2014, 10:02
Detection and Locking
... some form of change detection is also needed. In this section, we'll take what we've learned about locking and detection and formulate two pessimistic solutions and one optimistic ... tactics you can employ for detection. Let me clarify that we are no longer discussing locking, but detection. Detection is mutually exclusive of locking. The first two detection tac...
Ngày tải lên: 29/09/2013, 09:20
13-signal-detection-and-classification-13803335538269
... Gains • Signal Detection: Unknown Gains • Signal Detection: Random Gains • Signal Detection: Single Signal 13.6 Spatio-Temporal Signals Detection: Known Gains and Known Spatial Covariance • Detection: ... and Hero, A.O., Optimal simultaneous detection and estimation under a false alarm constraint, IEEE Trans. Inform. Theory, 41(3): 688–703, 1995. [11] Kassam, S. and Thomas, J....
Ngày tải lên: 05/11/2013, 17:20
13-signal-detection-and-classification-13804470939958
... Gains • Signal Detection: Unknown Gains • Signal Detection: Random Gains • Signal Detection: Single Signal 13.6 Spatio-Temporal Signals Detection: Known Gains and Known Spatial Covariance • Detection: ... and Hero, A.O., Optimal simultaneous detection and estimation under a false alarm constraint, IEEE Trans. Inform. Theory, 41(3): 688–703, 1995. [11] Kassam, S. and Thomas, J....
Ngày tải lên: 05/11/2013, 17:20
13 Signal Detection and Classification
... Gains • Signal Detection: Unknown Gains • Signal Detection: Random Gains • Signal Detection: Single Signal 13.6 Spatio-Temporal Signals Detection: Known Gains and Known Spatial Covariance • Detection: ... and Hero, A.O., Optimal simultaneous detection and estimation under a false alarm constraint, IEEE Trans. Inform. Theory, 41(3): 688–703, 1995. [11] Kassam, S. and Thomas, J....
Ngày tải lên: 08/11/2013, 12:15
Tài liệu lecture 09: Error Sources, Detection and Correction doc
... 1999 Lecture-09 Error Sources, Detection and Correction Error Detection Methods: • Parity Checking The oldest, simplest and least effective method of error detection is parity checking. One ... Introduction to Telecommunications, Fall 1999 Lecture-09 Error Sources, Detection and Correction Error Sources, Detection and Correction The Data Link Layer [Ref: Chap-5 Fitz...
Ngày tải lên: 10/12/2013, 08:15
Tài liệu Intrusion Detection and Prevention ppt
... Intrusion Detection and Prevention Because network traffic must cross the firewall to reach the end systems, the ... appropriate. For many years, firewall vendors such as Cisco Systems, Inc. and Check Point have been including intrusion detection system (IDS) capabilities to their firewalls. These devices were ... through a port on a switch, and the interface that connects to...
Ngày tải lên: 26/01/2014, 04:20
Tài liệu Chapter 10 Error Detection and Correction docx
... this coding scheme, k = 4 and n = 5. As we saw, we have 2 k = 16 datawords and 2 n = 32 codewords. We saw that 16 out of 32 codewords are used for message transfer and the rest are either ... unused. Example 10.1 10.16 Figure 10.6 Process of error detection in block coding 10.17 Let us assume that k = 2 and n = 3. Table 10.1 shows the list of datawords and codewords. Later,...
Ngày tải lên: 16/02/2014, 20:20