【摘 要】
:
3D object detection based on point cloud has an important application prospect in automatic driving technology. Aiming at the low precision of 3D object detection based on point cloud and the poor rea
【机 构】
:
School of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 2100
【出 处】
:
Chinese Journal of Electronics
论文部分内容阅读
3D object detection based on point cloud has an important application prospect in automatic driving technology. Aiming at the low precision of 3D object detection based on point cloud and the poor real-time performance caused by large numbers of 3D con
其他文献
自上个世纪六十年代诞生以来,解构主义的哲学思想就在不断的发展与完善.在这个过程中,解构主义对于整个社会有着很重要的作用.相同的,解构主义的流行还陆续波及到了绘画、服装、建筑行业.解构主义风格具有代表性的服装设计师在西方有侯赛因·卡拉扬、亚历山大·麦昆等,东方有名的设计师包括三宅一生、川久保玲等.
美是一个感性具体的存在,而审美是人类社会活动最重要的行为之一.审美活动包括审美主体、审美客体、社会生活实践、情感价值关系和形象性显现等构成要素.审美意识的产生是基于审美活动之下的人的思维意识生成.本文在此基础上进一步探究审美意识与人的实践活动之间的关系,并以光影美学为例进行一个简要的论证.
中国自古就被称为“衣冠之国、礼仪之邦”,中国服饰蕴含博大精深的中华文化,传统服饰文化是中国传统文化实现创新和国际化传播的重要载体.在当今的读图时代,服饰文化的视觉化构建是一种趋势,能够产生更广泛的传播效应,随着媒体技术的发展,我们需要与时俱进.服饰成语集故事、服饰、人物、环境和思想为一体,有血有肉,生动有趣,对之进行准确的视觉化构建,无疑是实现中国传统文化传播的有效途径.本文从唐代服饰成语入手,运用服装史、艺术学、设计学和计算机等相关知识,探讨用视觉构建的手段直观正确地阐释唐代服饰成语故事的相关问题,包括
Carotid artery stenosis is a serious medical condition that can lead to stroke.Using machine learning method to construct classifier model,carotid artery stenosis can be diagnosed with transcranial doppler data.We propose an improved fuzzy support vector
As the physical size of metal-oxide-semiconductor field effect transistor approaches the end of scaling down,the effect of process-induced variations such as gate edge roughness on device performance cannot be neglected.For gate-all-around devices,the thr
温度是影响超级电容器寿命的关键因素.为了掌握超级电容储能电源柜在正常工作载荷下的温度分布情况,暴露散热设计中的缺陷,针对性地提出优化设计方案,采用有限元仿真软件ANSYS/ICEPAK建立了超级电容储能电源柜的有限元三维模型,获得了超级电容储能电源柜在工作载荷下的温度随时间分布曲线,计算出了储能系统各区域温度到达稳定状态的时间,分析了超级电容储能电源柜的瞬态温度场分布特点.结合实际测量数据,验证了有限元仿真结果的有效性.根据仿真结果,提出了超级电容储能电源柜的优化设计方案.
Secret sharing is an important concept in cryptography,however it is a difficult problem to determine the access structure of the secret sharing scheme based on a linear code.In this work,we construct two-weight linear codes over finite field by using lin
Several Coronaviruses (CoVs) are epidem-ic pathogens that cause severe respiratory syndrome and are associated with significant morbidity and mortality.In this paper,a machine learning method was developed for predicting the risk of human infection posed
Aggregate signature schemes enable anyone to compress many signatures into one.Besides the unforgeability of aggregate signature,another property called aggregate extraction sometimes is useful.In sequential aggregate signature schemes,the aggregate signa
In recent years,adversarial examples has become one of the most important security threats in deep learning applications.For testing the security of deep learning models in adversarial environment,many researches focus on generating adversarial examples q