论文部分内容阅读
Face Recognition via Adaptive Image Combination
【机 构】
:
College of Information Engineering,Shanghai Maritime University,Shanghai 201306,China
【出 处】
:
上海交通大学学报(英文版)
【发表日期】
:
2010年5期
其他文献
Authentication is the basis of the security of IEEE 802.11i standard. The authentication process in 802.11i involves two important protocols: a 4-way handshake and a group key handshake. A formal analysis of authentication in 802.11i is given via a belief
With life cycle assessment (LCA) methodology, a life cycle model of coal-based vehicle fuels (CBVFs) including coal-based dimethyl ether (CBDME) and coal-based diesel (CBD) is established. Their primary energy consumption (PEC) and global warming potentia
Capacity and QoS Based Codebook Construction for MIMO Precoded Spatial Multiplexing Systems with Lim
This paper deals with the design and performance analysis of transmit precoder optimization for multiple input multiple output (MIMO) systems with limited feedback of channel state information. A capacity criterion based optimal codebook construction algo
Multivariate hash functions are a type of hash functions whose compression function is explicitly defined as a sequence of multivariate equations. Billet et al designed the hash function MQ-HASH and Ding et al proposed a similar construction. In this pape