[image recognition] fingerprint feature extraction based on morphology matlab source code

1, Morphology Morphological operation is actually to change the shape of an object. For example, corrosion is "getting thinner" and expansion is "getting fatter". You can see from the following figure: (http://ex2tron.wang/opencv-python-erode-and-dilate/) Experience: morphological operations generally act on binary gr ...

Posted by Unknown_Striker on Sat, 04 Sep 2021 18:18:25 -0700

Multiprocessing - multitasking and multiprocessing notes

In the previous section, we talked about the concept of multiprocessing. Just look at multithreading in the previous section. Multi process mainly uses multiprocessing library. The main code flow is as follows 1. Import library: import multiprocessing 2. Create process: t1 = multiprocessing.Process(target=test1) t1.start() import multiprocessi ...

Posted by ManicMax on Sat, 04 Sep 2021 14:40:11 -0700

Similarity Retrieval Faiss Model

1. faiss role The general solution to the problem of similarity retrieval for TopK is violent retrieval, which iterates through all vectors to compute similarity and derive TopK. However, when the number of vectors is large, this method and its time-consuming, Faiss's appearance solves this problem well. 2. Introduction to faiss The full nam ...

Posted by hjunw on Sat, 04 Sep 2021 09:27:17 -0700

Python machine learning -- Classification \ Regression -- decision tree algorithm

Decision tree algorithm type Decision tree is a series of algorithms, not an algorithm. The decision tree includes ID3 classification algorithm, C4.5 Classification Algorithm, Cart classification tree algorithm and Cart regression tree algorithm. Decision tree can be used as both classification algorithm and regression algorithm. Therefore, de ...

Posted by palito on Fri, 03 Sep 2021 19:20:09 -0700

Django deployed online Ubuntu + nginx + uwsgi + django3.1 + Python 3.8

Django project deployment Online preface Because many pits were taken during the deployment of Django project, write down the pits encountered in the deployment process for reference only. Environment and third party Library The deployment environment and third-party libraries used in this article are as follows: (different environments and ...

Posted by garek007 on Fri, 03 Sep 2021 17:48:05 -0700

Python_ Built in method

1. Life cycle of del methods and objects Introduce the built-in methods of two objects. In Python, there is another initialization method__ init__ Corresponding methods__ del__ Method. Before an object is to be destroyed from memory, the so-called destroy from memory is to click the object from memory. Before the object leaves memory, the syst ...

Posted by breadcom on Fri, 03 Sep 2021 16:56:51 -0700

Pthon Daily Algorithms|Examples of detailed Hill algorithms, try to study Hill algorithms, maybe circle the math world!

 It's not easy to create. The guests come to pay attention to it, collect it and subscribe to it three times at a time❤😜       Preface Program = data structure + algorithm, algorithm is a mixture of mathematical theory and engineering implementation, is a very interesting and amazing knowledge.Understand ...

Posted by sanderphp on Fri, 03 Sep 2021 09:53:55 -0700

Python implements a common VRP solution algorithm -- adaptive large neighborhood search algorithm (ALNS)

Reference notes https://github.com/PariseC/Algorithms_for_solving_VRP 1. Applicable scenarios Solve CVRPSingle vehicle typeThe vehicle capacity shall not be less than the maximum demand of the demand nodeSingle vehicle base 2. Problem analysis The solution of CVRP problem is a set of paths of multiple vehicles that meet the needs of demand ...

Posted by hwttdz on Thu, 02 Sep 2021 11:21:44 -0700

[card recognition] gray binary card recognition [Matlab 464]

1, Introduction 1 grayscale The process of converting color image into gray image is called image graying. The pixel value in the color image is determined by the three RGB components, and each component has 0-255 (256) choices. In this way, the pixel value of a pixel can have 16 million possibilities (256256256), while the pixel value of the ...

Posted by mykmallett on Wed, 01 Sep 2021 21:47:38 -0700

Actual app - analyze and restore the interface algorithm

Shelling Because I analyzed the app in advance, I shelled it first. Run ADB shell dumpsys activities | grep mresumedactivity to obtain a current activity Then use friddex_ After dump is shelled, it is filtered, and grep -ril "PassWordLoginActivity" gets the dex file we want Grab bag Firstly, packet capture analysis is carried out ...

Posted by Roggan on Wed, 01 Sep 2021 18:37:49 -0700