Object detection using background subtraction method for pick-and-place operation of robot manipulator
Analysis of the need for sensors to detect the working environment and collect the necessary information to perform specific tasks in industrial robotics. Object detection algorithm using background subtraction methods for the operation of a robotic arm.
Подобные документы
The analysis of the existing training methods of multilayer neural network of computing structures is carried out. Recommendations of selected methods usage by examples of multilayer approximation tasks for technology of beneficiation were given.
??????, добавлен 28.02.2016Development of an algorithm for obtaining a video depth map using the method of image division. Using web cameras to determine the object and calculate the distance to it. Development of software code for streaming video of the experimental setup.
??????, добавлен 13.07.2022The terminology and requirements for safe, reliable operation of critical IT infrastructure were defined. The generalized structure of critical information technology infrastructure, by its basic level, sub levels and functionality were described.
??????, добавлен 07.12.2016Concept of algorithm and its appointment. Algorithmic method - precisely established procedure or a set of instructions which can be applied to all cases of a problem. Mathematical properties of algorithms described by the British mathematician Turing.
???????, добавлен 31.10.2012The problem is to find the reliable sensor for detection of dangerous tilt angle. Task is to identify the sensor properties as sensitivity, zero shift and also uncertainty of measurement. Before using it is necessary to identify sensor properties.
??????, добавлен 26.08.2020???????? ?????????????? ??????? ?????? ???????? ?? ????? Object Pascal. ??????? ?????????. ????????? ? ??????????? ?????????, ?? ?????????????. ????????????? ????? ??????, ?????????? ?????. ?????? ???? ??????. ????????? ? ???????? ??? ????. ???? ?????.
??????????? ??????, добавлен 19.11.2011The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.
??????, добавлен 24.03.2016???????????? ? ?????? ????????????? GPSS, ??????? ???????? ??? ???????? ???????? ?????????-?????????? ??????, ????????????? ??????? ????????. ???????????? ?????????????? ? ???????? ?????????? Object GPSS ? ????????? ? ??????? ??????? ?????????????.
??????? ???????, добавлен 20.05.2014???????? ??????????? ? ?????????? ????????? ??? ????????-??????????????? ????? ????????????????: Smalltalk, Object Pascal, Common Lisp Object System, Eiffel ? Ada. ??????? ???????? ???????????????? ????? ?????????????. ????????????? ??????? ???????.
???????? ??????, добавлен 07.05.2012A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.
?????, добавлен 08.03.2014Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.
?????, добавлен 08.03.2014Analysis of the specific features of automatic code generation for diagrams in the Dragon programming language. Computer’s training by creating an expert system as very different form of human learning. The algorithm of a trip by bus on Python 2.7.
??????, добавлен 10.08.2018?????????? ????????? ????????? if ? Object Pascal ??? ?????????? (????????????) ???????? ???? ? ??????????? ?? ???????. ????????????? ????????? case. ???? for ? ????????????? ??????????? ??? ?????????? ??????????. ????????? ????? ? ?????????????? ????.
??????????? ??????, добавлен 13.03.2012??????? ??????????? ???? Object Pascal, ?? ???????? ?? ??????. ?????? ???? ?????. ???????????? ??? ??? ??????????? ?????? ? ???????? ??’?????? ????. ????????? ????????/????????? ????? ? ??????????? ??????. ???????? ????????’???? ??? ???????????.
??????? ???????, добавлен 25.04.2014?????????????????? ???????????? ??? ????????????? RAD-??????. ??????? ????? Delphi ??? ????????? ???????? ????? ????? ???????. ????????????? ???????? Object Pascal ?? ?++. ??????? ????????? ????? Delphi, ?????????? ????? ?????????? ???????? Lazarus.
???????????, добавлен 17.04.2014A bird's-eye view of modern cryptography. Preliminaries and Defining security in cryptography. Elementary number theory and algebra background. Approximations using partial Greatest common divisors computations. Birthday-based algorithms for functions.
?????, добавлен 08.03.2014The method and algorithm for realization of arithmetic operations in the system of remainder classes. The principal advantage of the suggested method. The algorithms for realization of arithmetic operations of summation, deduction and multiplication.
??????, добавлен 14.07.2016????? ???????? ?????????? ? ???? ???????? ????? 16-?????????? ????????????, ?????????? ?? ?????? Object Linking and Embedding (OLE). ?????????????????? ?????????? ????????? ?????????? ????????? ?? ?????? ?????????. ??????? ??? ????????? ??????????.
??????, добавлен 14.02.2014Analysis of information modeling processes and tasks, and options for improvement using extensive programming capabilities. Characteristics of the main methods of automating and speeding up the design process using programming and their properties.
??????, добавлен 30.08.2022Computer science as the theory of representation, processing and use of the information, main directions of development of science, its subject, ikomponenty. Properties and coding information. Rules of conversion from binary to decimal number system.
???????????, добавлен 18.11.2015Building a full map of the mental activity of the human brain. Various sensors detect the pressure pulses, temperature. Mind reading machine - a coordination of human psychology and computer techniques. Extract safe and confidential information.
???????????, добавлен 30.05.2015Description of the differential circuits compute checksums. Collision detection for a set of hash functions (MD4, MD5). Reconstructing the Chinese method of encryption. Check internal differences files and conditions for pair of colliding messages.
??????, добавлен 15.03.2014??????????? ????????????? ?????????? ??????? ? ????????? ????????, ????????, ?????? ?????????? Excel ? ????????? ?????? MS Equation. ??????? ????????? ???????? ? ????????. ???????? ???????? ????????? ? ?????????? ???????? ? ????????? ????????? Word.
???????, добавлен 12.05.2015Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.
?????, добавлен 08.03.2014???????? ????? ??????????? ?????? ? ????????????? ????????????? ? ??????????? ? ???????????? ? ????????? ?????? ? ??????? ?????????? Object ARX. ?????????? ???????????? ????????? ? ??????? ????? ???????????????? Visual C++, ??? ????????????? ? AutoCAD.
??????, добавлен 28.05.2017
