In this paper, we propose
a hierarchical clustering method using visual, textual and link
analysis. By using a vision-based page segmentation algorithm, a
web page is partitioned into blocks, and the textual and link information
of an image can be accurately extracted from the block containing
that ...
All of Java s Input/Output (I/O) facilities are based on streams, which provide simple ways to read and write data of different types. Java provides many different kinds of streams, each with its own application. The universe of streams is divided into four large categories: input streams and output ...
cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used to calculate a whole range of scientific functions including sin, cos, tan, arctan, arcsin, arccos, sinh, cosh, tanh, arctanh, log, exp, square root and even multiply and divide.
the method dates ba ...
Fingerprint Verification System an easy to use library that allows programmers to integrate fingerprint technology into their software without specific know-how. Fast, easy to use, and small great for embedded systems.
stepldr .S3C244X equipped with an internal SRAM buffer called 鈥楽teppingstone鈥? When booting, the first 4
KBytes of the NAND flash memory will be loaded into Steppingstone and the boot code loaded into Steppingstone
will be executed.
Many CAD users dismiss schematic capture as a necessary evil in the process of creating
PCB layout but we have always disputed this point of view. With PCB layout now offering
automation of both component placement and track routing, getting the design into the
computer can often be the most time co ...
Genetic Algorithm example using Java
You have 10 cards numbered 1 to 10.
You have to divide them into 2 piles so that:
The sum of the first pile is as close as possible to 36 and the product of all in second pile is as close as poss to 360.
The concept of the Altera Nios II embedded processor implementation inside Field Programmable Gate Array [FPGA] of the CCD camera for the “Pi of the Sky” experiment is presented. The digital board of the CCD camera, its most important components, current implementation of firmware [VHDL] inside th ...
simple ATM [Automatic Teller Machine] system the basic functions Login including write-offs, inquiries, deposits, withdrawals and alter the code. Simulation of ATM terminal users logged in, their account numbers and passwords through the ATM network to transmit to the server, ATM database server bas ...
XTHIDE is a GUI that allows the user to hide a text message in an image file.
The user will be asked for a key that will be used to both encode and decode the text into an image.
The key can be of length from 2 to 900 characters.
The encryption pattern for a key hell is not a subset of the encr ...