Welcome![Sign In][Sign Up]
Location:
Search - attention detection

Search list

[OS programVC使用CRT调试功能来检测内存泄漏

Description: VC使用CRT调试功能来检测内存泄漏 C/C++ 编程语言的最强大功能之一便是其动态分配和释放内存,但是中国有句古话:“最大的长处也可能成为最大的弱点”,那么 C/C++ 应用程序正好印证了这句话。在 C/C++ 应用程序开发过程中,动态分配的内存处理不当是最常见的问题。其中,最难捉摸也最难检测的错误之一就是内存泄漏,即未能正确释放以前分配的内存的错误。偶尔发生的少量内存泄漏可能不会引起我们的注意,但泄漏大量内存的程序或泄漏日益增多的程序可能会表现出各种 各样的征兆:从性能不良(并且逐渐降低)到内存完全耗尽。更糟的是,泄漏的程序可能会用掉太多内存,导致另外一个程序垮掉,而使用户无从查找问题的真正根源。此外,即使无害的内存泄漏也可能殃及池鱼。-VC use CRT debugging functions to detect memory leaks C / C programming language one of the most powerful features is its dynamic memory allocation and release, but there is a Chinese saying : "The greatest strengths may also become the biggest weakness," then the C / C applications coincides with this sentence. In the C / C application development process, the dynamic allocation of memory improper handling is the most common problem. One of the most detection harder and harder to understand the most difficult one of the mistakes is a memory leak, unable to correctly before the release of allocated memory error. The occasional leakage of a small amount of memory may not arouse our attention, but the leakage of a large amount of memory leakage procedures or increasing the procedur
Platform: | Size: 4989 | Author: 小朱 | Hits:

[Graph RecognizeTextDetect

Description: 云行TextDetection.exe程序,打开任意一幅bmp文件。点击“操作  检测文本区域”, 变会弹出文本检测的结果框。框内设定显示前六个文本区域的二值化结果,注意该框不要移动。关闭该框,BMP文件原始图像中用红色矩形框显示出检测出的文本区域。-cloud OK TextDetection.exe procedures, arbitrary opened a bmp file. Click on the "operational# 61664 Detection text zones," would change the text pop-up box test results. Box set shows that the former six regional version of the two values, the attention of the box not moving. Closure of the box, BMP file original image using red rectangular box shows the text detected region.
Platform: | Size: 4848640 | Author: 向慧 | Hits:

[Graph RecognizeFaceDetectionAndTrackingTechniquesInCompressed-Dom

Description: Abstract: Effective data processing is required with the fast development of multimedia technology. Compressed-domain images/video processing techniques have captured the attention of many researchers in recent years, and research on face detection and tracking in compressed-domain video becomes a new trend. Based on the analysis of the background and research status, some important future directions are presented. Key words: face detection;face tracking;compressed domain -Abstract : Effective data processing is required with the fast development of multimedia technology. Co. mpressed-domain images/video processing Edge (have captured the attention of many res earchers in recent years, and research on face detection and tracking in c Item-domain video becomes a new trend. Ba sed on the analysis of the background and resear ch status, some important future directions are presente d. Key words : face detection; face tracking; compressed domain
Platform: | Size: 145408 | Author: 黄永 | Hits:

[Special EffectsVAmodel

Description: 一种基于小波的vision attention saliency map 检测源码。分别有灰度,方向,颜色,纹理三个channel.-A Wavelet-based detection of vision attention saliency map source. Have gray, respectively, direction, color, texture three channel.
Platform: | Size: 172032 | Author: Flora | Hits:

[OS programface

Description: opencv做的人脸检测程序,代码很简单啊,效果也不错,注意使用前把库装好-do opencv face detection procedures, the code is very simple ah, the effect is also true that attention to the use of libraries installed before
Platform: | Size: 340992 | Author: 姜磊 | Hits:

[Special Effectsimgapp

Description: 边缘检测是数字图象处理、图象分析和识别领域中的重要课题。近年来,由于彩色图象的广泛应用,使彩色数字图象处理技术日益收到关注,彩色图象边缘检测是在众多的彩色图象处理中极为重要的方法,这是因为图象分割、识别等大量的高层次彩色图象处理均建立在低层次边缘检测的基础上。本实验是将彩色RGB图象首先转换为灰度图象,然后利用经典的边缘检测算Canny算子来实现边缘检测,然后再统计出边界方向的直方图。-Edge detection is a digital image processing, image analysis and identification of important issues in the field. In recent years, due to the extensive application of color images, so color digital image processing technology increasingly received attention, color image edge detection in color image processing a large number of extremely important ways, this is because the image segmentation, identification such a large number of high-level color image processing are built on low-level edge detection based on. This experiment is the first color RGB image is converted to grayscale images, and then use the classical Canny edge detector operator to realize edge detection, and then the statistics of the histogram of the direction of the border.
Platform: | Size: 8410112 | Author: 周倩 | Hits:

[Special Effectsface_tracking_based_on_Camshift_and_morphology

Description: 基于kalman滤波和人脸形态约束的人脸跟踪算法实现,可在快速人脸跟踪的同时很好的去除类肤色的干扰,注意是基于OpenCV函数库的程序。-Based on kalman filtering and face shape Face Tracking bound algorithm may face in the fast track at the same time remove the category of very good color interference, the attention is based on the OpenCV library procedures.
Platform: | Size: 23552 | Author: 王亮亮 | Hits:

[OtherAfrequentpatternDiscoveryMethodforOutlierDetection

Description: 一个异常点是相当不同的或不符合一个数据集的其余部分数据。检测离群点是非常重要的许多应用中,并在最近引起了广泛关注 在数据挖掘研究界。在本文中,提出了一种方法检测发现异常数据的频繁模式(或频繁项目集-An outlier in a dataset is an observation or a point that is considerably dissimilar to or inconsistent with the remainder of the data. Detection of outliers is important for many applications and has recently attracted much attention in the data mining research community. In this paper, we present a new method to detect outliers by discovering frequent patterns (or frequent itemsets) from the data set
Platform: | Size: 259072 | Author: suivy | Hits:

[Special EffectslargestRectangleArea

Description: 求一个图像的最大内接矩形面积。 步骤: 1.相机标定。首先根据物像关系式求出其中的参数。注意参数求出后要进行参数校验。 2.从背景中分离出目标 3.边缘检测 4.目标形状参数计算。-For an image of the largest inscribed rectangle area. Steps: 1. Camera calibration. First of all object-image relationship in accordance with the parameters obtained. Attention to the parameters obtained after parameter calibration. 2. From the context of isolated target 3. Edge detection 4. Target shape parameters.
Platform: | Size: 4096 | Author: cui ju | Hits:

[OtherMIMO_Radar_Signal_Processing

Description: Multiple-input multiple-output (MIMO) radar has been receiving increasing attention in recent years from researchers, practitioners, and funding agencies. MIMO radar is characterized by using multiple antennas to simultaneously transmit diverse (possibly linearly independent) waveforms and by utilizing multiple antennas to receive the reflected signals. Like MIMO communications, MIMO radar offers a new paradigm for signal processing research. MIMO radar possesses significant potentials for fading mitigation, resolution enhancement, and interference and jamming suppression. Fully exploiting these potentials can result in significantly improved target detection, parameter estimation, as well as target tracking and recognition performance.
Platform: | Size: 7849984 | Author: 可难 | Hits:

[Speech/Voice recognition/combineattentionModel

Description: attention model for saliency detection.
Platform: | Size: 259072 | Author: yaqing | Hits:

[Special Effectsedge

Description: 小波变换自80年代发展至今,一直得到人们的关注,本程序利用提升小波,进行边缘检测-80 years since the development of wavelet transform has been received attention, the procedures used wavelet, edge detection
Platform: | Size: 1024 | Author: mini | Hits:

[Special Effectssaliency-object-or-region-detection

Description: 该文件夹包括代码及其对应的论文。其作用在于模拟人类视觉系统的生理特性--视觉注意机制,按照人眼观察外界的方式,检测视觉显著性物体和区域,并阐述了显著性区域的显著性密度和尺度之间的关系,可应用于生物视觉模拟、视觉目标检测、视觉目标跟踪、视觉智能监控,以及视觉生理学和视觉心理学等的研究中。-This document contains codes and the corresponding paper. The aim is to simulate a physiological characteristic of human visual system called visual attention mechanism. The code is used to detect salient objects or regions following the way human eye observes the world. The relation between density and scale of salient object/region is described. It has found widespread use in numerous applications such as biological vision simulation, visual object detection, visual object tracking, visual intelligent surveillance, visual physiological, and visual psychology.
Platform: | Size: 4237312 | Author: 朱亮亮 | Hits:

[Graph RecognizeMorphology-Plate-Detection

Description: The title paper is "A hybrid License Plate Extraction Method Based On Edge Statistics and Morphology" . Thanks for your attention
Platform: | Size: 337920 | Author: faisal | Hits:

[Special EffectsVisual-attention-driven-analysis-

Description: 视觉注意驱动的基于混沌分析的运动检测方法,matlab论文,功能详细-Visual attention-driven analysis based on chaotic motion detection method, matlab thesis, Feature Details
Platform: | Size: 512000 | Author: Rock | Hits:

[matlabIntrusion-Detection

Description: The problem of intrusion detection has been studied and received a lot of attention in machine learning and data mining in the literature survey. The existing techniques are not effective to improve the classification accuracy and to reduce high false alarm rate. Therefore, it is necessary to propose new technique for IDS. In this work, we propose a new K-means clustering method with a different Preprocessing and Genetic Algorithm for identifying intrusion and classification for both anomaly and misuse. The experiments of the proposed IDS are performed with KDD cup’99 data set. The experiments will clearly results the proposed method provides better classification accuracy over existing method.
Platform: | Size: 400384 | Author: Sumit | Hits:

[matlabEmbedded-Target-Detection-System-Based-on-Visible

Description: Visual surveillance in a fixed and movable environment has drawn a great deal of attention nowadays. It spans a wide research spectrum, such as for access control, human or vehicle detection and identification, detection of anomalous behaviors, crowd statistics or congestion analysis, human machine interaction in an intelligent space, etc.
Platform: | Size: 575488 | Author: Gowri | Hits:

[Industry researchALTERED-FINGERPRINTS-ANALYSIS-AND-DETECTION

Description: The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that these systems are not compromised. While several issues related to fingerprint system security have been investigated, including the use of fake fingerprints for masquerading identity, the problem of fingerprint alteration or obfuscation has received very little attention. Fingerprint obfuscation refers to the deliberate alteration of the fingerprint pattern by an individual for the purpose of masking his identity. Several cases of fingerprint obfuscation have been reported in the press. Fingerprint image quality assessment software (e.g., NFIQ) cannot always detect altered fingerprints since the implicit image quality due to alteration may not change significantly.
Platform: | Size: 56320 | Author: jayesh | Hits:

[Special EffectsVisual-Attention

Description: 这是我自己根据Visual Attention Detection in Video Sequences Using Spatiotemporal Cues这篇文章写的matlab程序,比较好用,但是效果还有待完善,贴出来大家看看,有好的改进办法欢迎留言。压缩文件里面包含论文以及LC算法的代码。-This is based on my own Using Visual Attention Detection in Video Sequences Spatiotemporal Cues This article was written matlab program, relatively easy to use, but the results have yet to be improved, stickers we look, there is a good way to improve the welcome message. Zip file which contains the papers, and LC algorithm code.
Platform: | Size: 1298432 | Author: slaim | Hits:

[Consoleattention

Description: 一个注意力检测程序,在9*9方格内,将81个数随机排列,依次输出1至81位于哪一行哪一列。输出时间,考验注意力-A attention detection program, in the 9*9 grid, the 81 number of random permutations, which in turn 1 to 81, which is located in which row. Output time, test attention
Platform: | Size: 527360 | Author: 司家鑫 | Hits:
« 12 3 4 »

CodeBus www.codebus.net