• 검색 결과가 없습니다.

6. 개인 정보가 노출된 목표 객체의 블로킹 알고리즘

N/A
N/A
Protected

Academic year: 2021

Share "6. 개인 정보가 노출된 목표 객체의 블로킹 알고리즘"

Copied!
7
0
0

로드 중.... (전체 텍스트 보기)

전체 글

Loading

수치

Fig. 1. Overall flow of the suggested algorithm
Fig. 2. Structure of the suggested CNN model
Fig. 3. Mean-based mosaic block
Fig. 5. Performance comparison 다시  말해,  사전에  정의된  피부  색상  분포  모델만을  사용하여  검출한  얼굴  영역들에  대해  모자이크  처리를  수행하는  방법은  정의된  피부  색상  모델의  한계로  인해  얼굴  영역  검출이  정확하게  진행되지  않는  경우가  발생 하므로  시스템의  전체적인  정확도가  상대적으로  낮았다

참조

관련 문서

In this paper, it is implemented the image retrieval method based on interest point of the object by using the histogram of feature vectors to be rearranged.. Following steps

In this study, using concept mapping of a variety of learning techniques in the area of science, especially biology, has a positive effect on learning

This study has a distinguished meaning from existing studies in that it presented a learning method and a teaching plan that are helpful for

(Attached to a noun) This is used to indicate an object has the characteristics and qualities of both a preceding and succeeding

In this paper, we introduce different types of software reliability models and propose a sequential probability ratio test as a technique for determining

– Example, for a desert project, the engineer might have to go as high as 6% above the optimum water content as a target for all water application calculations so that

In the proposed method, the motion of focused object and the background is identified and then the motion vector information is extracted by using the 9

The object of this paper is to examine resistance against the ruling ideology as a means of true survival in the novel Cat’s Eye by the iconic