Study of two 3D face representation algorithms using range image and curvature-based representations
The analysis of algorithms for image representation to recognition of 3D face scans with the presence of facial expressions. The input point cloud based on curvature analysis and range image representation to achieve a representation of the face features.
Подобные документы
Описание алгоритмов кластеризации, реализующих задачу поиска изображений по содержанию –Content-Based Image Retrieval. Определение признаков изображения, по которым формируются кластеры изображений и рассмотрение способов извлечения данных признаков.
статья, добавлен 29.07.2017Requirements for users support. Approaches to user modeling. Problems of adaptive help. Techniques for knowledge representation. Implementation of advisory strategies. Demands for effective presentation. The need for system-oriented documentation.
презентация, добавлен 28.12.2013A bird's-eye view of modern cryptography. Preliminaries and Defining security in cryptography. Elementary number theory and algebra background. Approximations using partial Greatest common divisors computations. Birthday-based algorithms for functions.
книга, добавлен 08.03.2014Using Duraton-Overman test to study detailed location patterns of the forestry and agricultural industry in Russia. Data analysis package. The first article on geocoding. Methods for measuring localization. Distance-based localization measurement.
курсовая работа, добавлен 11.02.2017Analysis of the model of forced exhalation and Fourier transform. Determination of the frequency spectrum of its air volume velocity. Calculation of the error in measuring the process parameters with a spirometer with characteristics in the range 0-15 Hz.
статья, добавлен 30.01.2017- 56. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
статья, добавлен 06.05.2018 Concept of algorithm and its appointment. Algorithmic method - precisely established procedure or a set of instructions which can be applied to all cases of a problem. Mathematical properties of algorithms described by the British mathematician Turing.
реферат, добавлен 31.10.2012Computer science as the theory of representation, processing and use of the information, main directions of development of science, its subject, ikomponenty. Properties and coding information. Rules of conversion from binary to decimal number system.
презентация, добавлен 18.11.2015Describe the architecture for building a cloud-based SaaS application platform, the main characteristics of the services. Creating a software template for the device of communication inherited of air transport, the use of algebras of real-time processes.
статья, добавлен 25.10.2016Analysis opportunities for using cloud technologies in higher education in Ukraine. The main task of cloud technologies, strategic and tactical goals of cloud computing at the technical universities. The typical structure of a technical university.
статья, добавлен 05.04.2019Questionnaires are the tools uses in lexical typology with collect data for low-resourced languages, for which there are no large corpora or detailed dictionaries. Algorithm for automatically collect visual stimuli for lexico-typological research.
дипломная работа, добавлен 04.12.2019Development of the program, applying the technique of surface voxelization of 3D-models based on graphic processes. Review of existing methods voxelization 3D-scenes view of the art surface voxelization. Analysis and results of performance tests.
дипломная работа, добавлен 11.07.2016Analysis of affine coordinates for pairing computation. Construction of designated connfirmer signature and its application to optimistic fair exchange. Designing a code generator for pairing based cryptographic functions and efficient constructions.
книга, добавлен 08.03.2014A proposed public key distribution protocol, which is based on diffie-hellman problem is a two-pass protocol and has many of desirable secrity; the protocol is an extension diffie-hellman key exchange using random numbers and establishes a shared key K.
курс лекций, добавлен 08.03.2014New computer arithmetics doing the parallel process of multiplying and division. A scoring in accuracy of representation of numbers is as result of the development of arithmetics. Factorizations of operands is in a basis of parallel computer arithmetics.
статья, добавлен 10.08.2013A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.
статья, добавлен 15.09.2012Analysis of the prospects for using artificial intelligence technologies in the field of photo processing. Research of modern technologies and AI methods that are used in processing photo materials. Review of areas of AI use in image processing.
статья, добавлен 08.06.2024Description of the mathematical model of technological processes of variational inequalities. Search for the maximum of the Hamiltonian function of the state space functions. Development of a method for numerical realization of mathematical models.
статья, добавлен 22.12.2016Analysis of the model for creating irregular 3D objects. Structural model of a compact reverse engineering system. The possibilities of formalizing and automating the creation of complex 3D objects. Mathematical model of digitization of complex objects.
статья, добавлен 03.02.2019A computer based decision support system is proposed the basic tasks of which are adaptive model constructing of financial processes. The system is developed with the use of system analysis principles, forming alternatives for models and forecasts.
статья, добавлен 20.01.2017Modelling Rich Interaction: status–event analysis, sensor-based systems, rich environments in task analysis. Screen-button – HIT, MISS, widget. GTA - conceptual framework, tools, elicitation techniques. The main functions placeholders, its types.
презентация, добавлен 28.12.2013The article provides guidance on choosing cloud-based ML and data science solutions that meet operational strategies and crisis management needs. Further research is encouraged to examine the long-term effects on business innovation and market dynamics.
статья, добавлен 20.07.2024Radix-22 Algorithms has been chosen to implement and the different blocks in the architecture. After implementing the blocks, the complex multiplier implementation has been done in four different approaches starting from the basic complex multiplication.
дипломная работа, добавлен 01.04.2010Describing the main synthesis of fault-tolerant topologies, the consideration of the possibilities of using their features and the analysis of the main characteristics in comparison with each other and with classic versions based on binary code.
статья, добавлен 19.07.2020Features of testing on the usability, functionality and acceptability of an interactive system. Some approaches, based on expert evaluation: review, query techniques, analytic and model-based methods. Principles of choosing ways of measurements.
презентация, добавлен 28.12.2013