虫虫首页|资源下载|资源专辑|精品软件
登录|注册

Assessment

Assessment是一个英文单词,名词,作名词时意为“评定;估价”。
  • The Assessment of JAVA in the Western Insititute Technology.

    The Assessment of JAVA in the Western Insititute Technology.

    标签: Insititute Technology Assessment Western

    上传时间: 2013-12-17

    上传用户:xaijhqx

  • the Assessment of western institude technology at terenaki.

    the Assessment of western institude technology at terenaki.

    标签: Assessment technology institude terenaki

    上传时间: 2015-03-21

    上传用户:ippler8

  • This Assessment requires the creation of three of the core classes of the auction project. Class Dat

    This Assessment requires the creation of three of the core classes of the auction project. Class Date, class Advertisement, and class Client are three of the fundamental classes in the system.

    标签: the Assessment requires creation

    上传时间: 2016-07-26

    上传用户:坏坏的华仔

  • This Assessment creates an initial version of the auction project that allows user to register, logi

    This Assessment creates an initial version of the auction project that allows user to register, login, and logout. Registered users can post items (advertisements) for auction.

    标签: Assessment register creates auction

    上传时间: 2013-12-22

    上传用户:star_in_rain

  • Sematic Assessment System: Java GUI application that store all data in an Ontology in protege.

    Sematic Assessment System: Java GUI application that store all data in an Ontology in protege.

    标签: application Assessment Ontology Sematic

    上传时间: 2014-06-19

    上传用户:netwolf

  • The existence of numerous imaging modalities makes it possible to present different data present in

    The existence of numerous imaging modalities makes it possible to present different data present in different modalities together thus forming multimodal images. Component images forming multimodal images should be aligned, or registered so that all the data, coming from the different modalities, are displayed in proper locations. The term image registration is most commonly used to denote the process of alignment of images , that is of transforming them to the common coordinate system. This is done by optimizing a similarity measure between the two images. A widely used measure is Mutual Information (MI). This method requires estimating joint histogram of the two images. Experiments are presented that demonstrate the approach. The technique is intensity-based rather than feature-based. As a comparative Assessment the performance based on normalized mutual information and cross correlation as metric have also been presented.

    标签: present modalities existence different

    上传时间: 2017-04-02

    上传用户:qunquan

  • pdf格式的英文文献

    pdf格式的英文文献,是关于认知无线电网络的,编者是加拿大桂尔夫大学的Qusay H. Mahmoud。ISBN:978-0-470-06196-1 章节内容: 1 Biologically Inspired Networking 2 The Role of Autonomic Networking in Cognitive Networks 3 Adaptive Networks 4 Self-Managing Networks 5 Machine Learning for Cognitive Networks: Technology Assessment and Research Challenges 6 Cross-Layer Design and Optimization in Wireless Networks 等,共计13章,全书348页,pdf文件383页。

    标签: 英文

    上传时间: 2014-01-26

    上传用户:daguda

  • Academic Writing English

    Writing essays and dissertations can be a major concern for overseas students studying at English-medium colleges and universities. Virtually all courses contain a large degree of written Assessment and it is essential to ensure that your writing skills meet the necessary standard. Academic Writing is a new kind of writing course for all international students who have to write exams or coursework in English. This practical book thoroughly explains the writing process and covers all the key writing skills.

    标签: Academic writing

    上传时间: 2015-11-13

    上传用户:blackbat

  • risk Assessment

    123456789101112131414516488665146514

    标签: Assessment risk

    上传时间: 2016-07-10

    上传用户:zjjhwylcd

  • Dynamic Security

    This book is written for engineers involved in the operation, control, and planning of electric power systems. In addition, the book provides information and tools for researchers working in the fields of power system security and stability. The book consists of two volumes. The first volume provides traditional techniques for the stability analysis of large scale power systems. In addition, an overview of the main drivers and requirements for modernization of the traditional methods for online applications are discussed. The second volume provides techniques for online security Assessment and corrective action studies. In addition, the impact of variable generation on the security of power systems is considered in the second volume. The first volume may be considered as a background builder while the second volume is intended for the coverage of edge techniques and methods for online dynamic security studies.

    标签: Security Dynamic

    上传时间: 2020-06-06

    上传用户:shancjb