搜索:ART+algorithm
找到约 1,418 项符合「ART+algorithm」的查询结果
结果 1,418
按分类筛选
- 全部
- matlab例程 (154)
- 人工智能/神经网络 (117)
- 数学计算 (78)
- 加密解密 (70)
- 技术资料 (59)
- 数值算法/人工智能 (51)
- 其他 (42)
- 其他书籍 (40)
- 数据结构 (31)
- 压缩解压 (27)
- Java编程 (27)
- 软件设计/软件工程 (19)
- 书籍源码 (18)
- 通讯/手机编程 (16)
- Linux/Unix编程 (14)
- 通讯编程文档 (14)
- 文章/文档 (14)
- 电子书籍 (13)
- 软件工程 (11)
- 技术管理 (11)
- VC书籍 (10)
- DSP编程 (9)
- 文件格式 (9)
- 单片机开发 (9)
- VHDL/FPGA/Verilog (9)
- 系统设计方案 (8)
- 汇编语言 (7)
- JavaScript (6)
- 行业发展研究 (6)
- 操作系统开发 (5)
- 编辑器/阅读器 (5)
- CA认证 (5)
- 驱动编程 (4)
- 多国语言处理 (4)
- 其他数据库 (4)
- 嵌入式/单片机编程 (4)
- 其他嵌入式/单片机内容 (4)
- 书籍 (4)
- 编译器/解释器 (3)
- STL (3)
- 其他行业 (3)
- GPS编程 (3)
- 并行计算 (3)
- 游戏 (2)
- *行业应用 (2)
- 网络 (2)
- Java书籍 (2)
- 中间件编程 (2)
- Linux/uClinux/Unix编程 (1)
- 设计相关 (1)
- 数据库系统 (1)
- 教程资料 (1)
- Internet/网络编程 (1)
- Modem编程 (1)
- 语音压缩 (1)
- 磁盘编程 (1)
- 企业管理 (1)
- Applet (1)
- 微处理器开发 (1)
- J2ME (1)
- FlashMX/Flex源码 (1)
- 家庭/个人应用 (1)
- 生物技术 (1)
- Jsp/Servlet (1)
- RFID编程 (1)
- 3G开发 (1)
- 源码 (1)
- 论文 (1)
- 习题答案 (1)
https://www.eeworm.com/dl/617/132266.html
压缩解压
This scheme is initiated by Ziv and Lempel [1]. A slightly modified version is described by Storer a
This scheme is initiated by Ziv and Lempel [1]. A slightly modified version is described by Storer and Szymanski [2]. An implementation using a binary tree is proposed by Bell [3]. The algorithm is quite simple: Keep a ring buffer, which initially contains "space" characters only ...
https://www.eeworm.com/dl/648/193645.html
单片机开发
* DEFINITION * This is the header file for a library module used to calculate the median * of a
* DEFINITION
* This is the header file for a library module used to calculate the median
* of a list of values. It finds the value that would be in the center if
* the list were sorted. If the list contains an even number of values, the
* lower of the two center values is rep ...
https://www.eeworm.com/dl/527/342747.html
通讯/手机编程
用于汽车巡航控制系统的模糊控制算法
用于汽车巡航控制系统的模糊控制算法,以及如何利用梯度下降法和卡尔曼滤波来优化模糊控制器的算法。The files illustrate a simple fuzzy control algorithm as applied to an automobile cruise control system. The files also illustrate how gradient descent and Kalman filtering can be used t ...
https://www.eeworm.com/dl/665/370242.html
matlab例程
This demo shows the BER performance of linear, decision feedback (DFE), and maximum likelihood seque
This demo shows the BER performance of linear, decision feedback (DFE), and maximum likelihood sequence estimation (MLSE) equalizers when operating in a static channel with a deep null. The MLSE equalizer is invoked first with perfect channel knowledge, then with an imperfect, al ...
https://www.eeworm.com/dl/650/192600.html
人工智能/神经网络
Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search ma
Implemented BFS, DFS and A*
To compile this project, use the following command:
g++ -o search main.cpp
Then you can run it:
./search
The input is loaded from a input file in.txt
Here is the format of the input file:
The first line of the input file shoud contain two chars ind ...
https://www.eeworm.com/dl/kbcluoji/40089.html
可编程逻辑
XAPP953-二维列序滤波器的实现
 
This application note describes the implementation of a two-dimensional Rank Order filter. Thereference design includes the RTL VHDL implementation of an efficient sorting algorithm. Thedesign is parameterizable for input/output precision, color standards, filter kerne ...
https://www.eeworm.com/dl/650/206920.html
人工智能/神经网络
A .NET Path Finder Library Path Finder Library is a .NET library that currently contains one type c
A .NET Path Finder Library
Path Finder Library is a .NET library that currently contains one type called SimplePathFinder. SimplePathFinder is a very simple and basic implementation of the A* path finding algorithm. It is extremely easy to use and integrate in your applications. ...
https://www.eeworm.com/dl/686/413130.html
VC书籍
This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message ...
https://www.eeworm.com/dl/519/413134.html
加密解密
This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message ...
https://www.eeworm.com/dl/522507.html
书籍
Guide to Convolutional Neural Networks
General paradigm in solving a computer vision problem is to represent a raw image
using a more informative vector called feature vector and train a classifier on top of
feature vectors collected from training set. From classification perspective, there are
several off-the-shelf m ...