当前位置:网站首页>[Reading stereo matching papers] [III] ints
[Reading stereo matching papers] [III] ints
2022-07-07 14:10:00 【Stool flower*】
explain
This blog can be understood as the translation and summary of the thesis , And try to add some understanding found in other blogs ,PPT You can download at the end of the text .PPT I created it myself , I hope I can help you .
The paper
notes : The meaning here should be that when a pixel is aggregated, there is no way to aggregate all the global pixels through only one iteration , Because some pixels will be missed in eight directions . But if we do another aggregation based on the first iteration , Basically, all global pixels can be aggregated when aggregating this pixel . That is, nonlocal method .
The difference between nonlocal method and global method : Nonlocal method is to link all pixels in the whole image for aggregation , But the global method is to build an energy function for the whole image , Find the minimum and extreme value .
Data download
1.Xu Huang, Yongjun Zhang, and Zhaoxi Yue. Image-guided non-local dense matching with three-steps optimization. ISPRS Congress 2016.
2.PPT download
边栏推荐
- [daily training] 648 Word replacement
- Leecode3. Longest substring without repeated characters
- Sliding rail stepping motor commissioning (national ocean vehicle competition) (STM32 master control)
- 118. 杨辉三角
- ES日志报错赏析-Limit of total fields
- [network security] SQL injection syntax summary
- call undefined function openssl_ cipher_ iv_ length
- Learning breakout 2 - about effective learning methods
- Oracle advanced (V) schema solution
- PERT图(工程网络图)
猜你喜欢
Hands on Teaching: XML modeling
Mathématiques avancées - - chapitre 8 différenciation des fonctions multivariables 1
PERT图(工程网络图)
最长上升子序列模型 AcWing 1014. 登山
2022-7-7 Leetcode 844. Compare strings with backspace
通过 iValueConverter 给datagrid 的背景颜色 动态赋值
118. Yanghui triangle
Xshell connection server changes key login to password login
常用数字信号编码之反向不归零码码、曼彻斯特编码、差分曼彻斯特编码
2022-7-7 Leetcode 34.在排序数组中查找元素的第一个和最后一个位置
随机推荐
"Song of ice and fire" in the eleventh issue of "open source Roundtable" -- how to balance the natural contradiction between open source and security?
[high frequency interview questions] difficulty 2.5/5, simple combination of DFS trie template level application questions
Wired network IP address of VMware shared host
手里的闲钱是炒股票还是买理财产品好?
PC端页面如何调用QQ进行在线聊天?
2022-7-7 Leetcode 844.比较含退格的字符串
Excerpt from "misogyny: female disgust in Japan"
高等數學---第八章多元函數微分學1
数据流图,数据字典
Social responsibility · value co creation, Zhongguancun network security and Information Industry Alliance dialogue, wechat entrepreneur Haitai Fangyuan, chairman Mr. Jiang Haizhou
Is it safe to open an account online now? Which securities company should I choose to open an account online?
交换机和路由器的异同
.net core 关于redis的pipeline以及事务
SAKT方法部分介绍
ES日志报错赏析-Limit of total fields
Excellent open source system recommendation of ThinkPHP framework
Excuse me, as shown in the figure, the python cloud function prompt uses the pymysql module. What's the matter?
c#通过frame 和 page 切换页面
What are the principles for distinguishing the security objectives and implementation methods that cloud computing security expansion requires to focus on?
. Net core about redis pipeline and transactions