This approach addresses two difficulties simultaneously: 1)
the range limitation of mobile robot sensors and 2) the difficulty of detecting buildings in
monocular aerial images. With the suggested method building outlines can be detected
faster than the mobile robot can explore the area by itself, g ...
PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A components) those variables that do not carry any relevant information to model Y. The criterion used to trace the un-informative variables is the reliability of the regression coefficients: c_j=mean(b_j)/std ...
There are several problems related to the properties of
the triangular mesh representation that describes a
surface of an object. Sometimes, the surface is represented
just as a set of triangles without any other
information and the STL file format, which is used for
data exchanges, is a typicalexam ...
浅谈VB.NET的密码算法及其在信息安全中的应用
Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity
,介绍了Microsoft的最新开发工具Visual Basic 2005(简称VB.NET)中与密码算法相关的System.Security.Cryptography命名空间(简称SSC).举例说明了利用SSC提供的类编写信息安全程 ...
MICROSOFT FOUNDATION CLASS LIBRARY : 学生管理系统
========================================================================
AppWizard has created this 学生管理系统 application for you. This application
not only demonstrates the basics of using the Microsoft Foundation classes
but is also a starting ...
BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You ll learn that the BlackBerry is capable of things you never thought possible, and you ll learn how to make it an even better email and web workhorse:
Get the most out of the built-in applications
Take control of em ...
The System Management BIOS Reference Specification addresses how motherboard and system vendors present
management information about their products in a standard format by extending the BIOS interface on Intel
architecture systems. The information is intended to allow generic instrumentation to deli ...
Please read this document before attempting to compile and run the libraries and applications! The projects
must be compiled in a particular order. Standard support questions are about compiler and/or linker errors
that are generated when users try to compile the projects in the wrong order. Other i ...
加密算法实现
Pegwit is a program for performing public key file encryption
and authentication.
Encryption means that pegwit allows you to keep the information
in files you send by email (or other means) confidential.
Eavesdroppers will not be able to read the email.
Authentication allows you to c ...