Results 281 to 290 of about 144,513 (307)
Image tampering detection using dynamic histogram equalization based LIOP features and novel scaled K-means + + clustering. [PDF]
Mehmood Z +5 more
europepmc +1 more source
A Study on Detection of Prohibited Items Based on X-Ray Images with Lightweight Model. [PDF]
Liang T +4 more
europepmc +1 more source
HBSP: a hybrid bilinear and semidefinite programming approach for aligning partially overlapping point clouds. [PDF]
Lian W, Ma F, Cui Z, Pan H.
europepmc +1 more source
A Group Affine-Based Inverse Alignment Method for High-Precision Rotational Inertial Navigation Systems. [PDF]
Liu C +9 more
europepmc +1 more source
Unveiling hidden particle-level defects in glasses. [PDF]
Hu YC, Tanaka H.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Learning affine transformations
Pattern Recognition, 1999Under the assumption of weak perspective, two views of the same planar object are related through an affine transformation. In this paper, we consider the problem of training a simple neural network to learn to predict the parameters of the affine transformation.
Michael Georgiopoulos +3 more
openaire +3 more sources
Affine Transformations in Bundles
Journal of Mathematical Sciences, 2020This paper is a review of results of studies of affine transformations in generalized spaces over real linear algebras over the past 15-20 years.
A. Ya. Sultanov, O. A. Monakhova
openaire +2 more sources
Affine transformation in cryptography
Journal of Discrete Mathematical Sciences and Cryptography, 2008Abstract The affine transformation is the generalized shift cipher. The shift cipher is one of the important techniques in cryptography. In this paper, we show that the total number of possible affine transformations is N k ϕ(N k), that is, , for k-letter block and prime factor p of N k . It has key length two and is computationally easy.
Hari Om, Rahul Patwa
openaire +2 more sources

