Improved face tracking algorithm using real-time update of the target image

Improved algorithm for object tracking is for using as part of the machine vision system of image acquisition and processing capable mobile robots. Classical implementation of normalized cross-correlation for face tracking. Experimental results.

Подобные документы

  • The technique of drawing up algorithms on elliptic curves, scalar multiplication on Koblitz curves and their effective implementation in reconfigurable devices. The basic architecture and methods for computing scalar multipfication in Hessian form.

    монография, добавлен 08.03.2014

  • Alan Mathison Turning - an English computer scientist, mathematician, cryptanalyst. He was highly influential in the development of theoretical computer science, providing a formalisation of the concepts of algorithm, computation with the Turing machine.

    презентация, добавлен 29.03.2016

  • Biometrics at a distance: issues, challenges, and prospects. Advanced technologies for touchless fingerprint recognition. Long-range facial image acquisition and quality. Detection of singularities in fingerprint images using linear phase portraits.

    книга, добавлен 08.03.2014

  • Electroencephalography and Magnetoencephalography provide insight into neuronal processes in the brain in a real-time scale. This renders these modalities particularly interesting for online analysis methods to visualize brain activity in real-time.

    статья, добавлен 23.06.2016

  • Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.

    статья, добавлен 28.05.2021

  • Linear Programming is concerned with maximizing or minimizing an equation over certain criteria. Mixed Integer Linear Programming: Techniques for Solving, Contribution of the Project, Solving Using Branch. Schematic for Branch and Cut algorithm.

    научная работа, добавлен 09.10.2012

  • Deep learning is one of the most active research fields in machine learning community. It has gained unprecedented achievements in fields such as computer vision, natural language processing and speech recognition. Сhallenges posed by Big Data analysis.

    статья, добавлен 18.02.2021

  • Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.

    книга, добавлен 08.03.2014

  • Human Insulin, PDB entry 1AIO. Image produced with PDB Structure Explorer, which is based on MolScript. Virus structure, superimposed over its PDB summary information. Image produced with PDB Structure Explorer, which is based on MolScript and Raster3D.

    учебное пособие, добавлен 25.11.2013

  • Robots as mechanical assistants of a person who are able to perform operations based on the program, embedded in them, and respond to the environment. Acquaintance with the transhumanist significance of robotics. Analysis of the scope of robots.

    презентация, добавлен 03.04.2018

  • Develop architecture for route construction, which allows philosophy of insertion and, more importantly, deletion of customer in route. Develop the structure of heuristic in such way, so the algorithm find satisfactory solution in acceptable time period.

    дипломная работа, добавлен 28.08.2016

  • The algorithm and program in MAPLE for the solution ordinary differential equations of IV order in the form of generalized power series. Some examples of the solution differential equations IV order. The singular regular points of differential equation.

    статья, добавлен 01.02.2019

  • Анализ клиентской части программного обеспечения для социальной сети "Image Poster". Выбор типовой архитектуры. Разработка UML–диаграмм для программного обеспечения для социальной сети. Интерфейс клиентской части. Загрузка и комментирование фотографий.

    дипломная работа, добавлен 25.05.2017

  • A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.

    книга, добавлен 08.03.2014

  • Clustering algorithms for very large database used in image processing and video. Search for groups (classes, clusters, segments) of the objects surveyed in the analyzed information arrays. Multidimensional vectors forming a traditional data table.

    статья, добавлен 14.01.2017

  • Consideration of the safety of autonomous systems and robots. Analysis of threats related to the use of artificial intelligence in autonomous vehicles, robots and other autonomous systems. Information flows in autonomous systems and communications.

    статья, добавлен 20.03.2024

  • The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.

    статья, добавлен 18.09.2020

  • Methods of classification of correlation extremal navigation systems, geophysical fields. The block diagram of CENS, which works in risk conditions. Dependence of posteriori probability on the quantity of key points and total error of its determination.

    статья, добавлен 26.06.2016

  • Target Server Memory Pool. A pool of memory on the target reserved for use by the Tornado tools. The target server manages the pool, keeping overhead such as block lists on the host. Additional memory is allocated from the system memory pool if needed.

    презентация, добавлен 03.06.2012

  • A technique for singular value decomposition of blocks of a cover matrix. Possible results of singular value decomposition operation. Mean values of separatenesses belonging to blocks singular values, received as a result of computing experiment.

    статья, добавлен 28.08.2016

  • Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.

    статья, добавлен 14.01.2017

  • Mathematical methods for finding object boundaries and measuring the size, color, speed of bubbles in the flotation foam. The possibility of the search for this signature by measuring the deviations of the center of mass of a number of sequential images.

    статья, добавлен 14.01.2017

  • Exploring different ways of assessing the value of hard currency. Calculating the hard currency exchange rate using a stack of technologies already used in the company. Distribution of income for game content. Improved dashboards for game producers.

    курсовая работа, добавлен 17.07.2020

  • Mobile devices as an integral part of a person’s daily life. Familiarize yourself with the basics for getting started developing applications, such as choosing an IDE and installing Java. Analysis of the history of creating the Android operating system.

    статья, добавлен 12.02.2019

  • Рассмотрение возможностей объектно-ориентированной библиотеки Turbo Vision, используемой для написания программ, работающих в среде DOS. Описание компонентов пользовательского интерфейса и элементов прикладной программы, построенной в Turbo Vision.

    реферат, добавлен 31.05.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.