搜索结果

找到约 75 项符合 Along 的查询结果

其他 SVMhmm: Learns a hidden Markov model from examples. Training examples (e.g. for part-of-speech taggi

SVMhmm: Learns a hidden Markov model from examples. Training examples (e.g. for part-of-speech tagging) specify the sequence of words along with the correct assignment of tags (i.e. states). The goal is to predict the tag sequences for new sentences.
https://www.eeworm.com/dl/534/230047.html
下载: 82
查看: 1092

数值算法/人工智能 遗传算法和“货郎担” 问题: "The traveling salesman problem, or TSP for short, is this: given a finite number of

遗传算法和“货郎担” 问题: "The traveling salesman problem, or TSP for short, is this: given a finite number of cities along with the cost of travel between each pair of them, find the cheapest way of visiting all the cities and returning to your starting point."
https://www.eeworm.com/dl/518/289394.html
下载: 111
查看: 1084

其他书籍 Abstract—In this paper, we propose transform-domain algorithms to effectively classify the characte

Abstract—In this paper, we propose transform-domain algorithms to effectively classify the characteristics of blocks and estimate the strength of the blocky effect. The transform-domain algorithms require much lower computational complexity and much less memory than the spatial ones. Along with the ...
https://www.eeworm.com/dl/542/453752.html
下载: 189
查看: 1070

其他数据库 This program demonstrates how to do disconnected briefcase applications with ADO. When the Connected

This program demonstrates how to do disconnected briefcase applications with ADO. When the Connected checkbox is unchecked the application is switched into offline mode. If the application is exited at that point then the data is persisted to a file on disk (along with any edits to the data). When t ...
https://www.eeworm.com/dl/645/132584.html
下载: 141
查看: 1097

压缩解压 FCP takes a file, generates a random 2048 bit key and encrypts the file with a RC4 stream cipher. T

FCP takes a file, generates a random 2048 bit key and encrypts the file with a RC4 stream cipher. The encrypted file is written to a new file along with the decryption stub and key. When the output file is executed it decrypts and executes the encrypted file. It s written in Delphi 6, enjoy the so ...
https://www.eeworm.com/dl/617/348232.html
下载: 26
查看: 1091

金融证券系统 PURPOSE OF THE PROJECT: This Application would facilitate the huge process of managing the Ad detai

PURPOSE OF THE PROJECT: This Application would facilitate the huge process of managing the Ad details along with the Preview of the Ad (Audio storage and retrieval). The Application has the following functions User Validation. Viewing Advertisement details. Registration of New User. Reviewing Advert ...
https://www.eeworm.com/dl/638/484579.html
下载: 41
查看: 1127

电源技术 光纤激光器的电流源分析

  A large group of fiber optic lasers are powered by DCcurrent. Laser drive is supplied by a current source withmodulation added further along the signal path. Thecurrent source, although conceptually simple, constitutesan extraordinarily tricky design problem. There are anumber of practica ...
https://www.eeworm.com/dl/505/24381.html
下载: 178
查看: 1069

matlab例程 The purpose of this Primer is to help you begin to use MATLAB. It is not intended to be a substitu

The purpose of this Primer is to help you begin to use MATLAB. It is not intended to be a substitute for the online help facility or the MATLAB documentation (such as Getting Started with MATLAB, available in printed form and online). The Primer can best be used hands-on. You are encouraged to work ...
https://www.eeworm.com/dl/665/337648.html
下载: 151
查看: 1114

VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/686/413130.html
下载: 134
查看: 1101

加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/519/413134.html
下载: 97
查看: 1093