搜索结果

找到约 631 项符合 NETWORKS-research 的查询结果

软件设计/软件工程 Here are two newest published articles talking about joint source channel coding, in which source co

Here are two newest published articles talking about joint source channel coding, in which source coding is invovled scalable video coding. They are very useful for people who are doing research about it.
https://www.eeworm.com/dl/684/353567.html
下载: 128
查看: 1072

通讯编程文档 With the advent of multimedia, digital signal processing (DSP) of sound has emerged from the shadow

With the advent of multimedia, digital signal processing (DSP) of sound has emerged from the shadow of bandwidth-limited speech processing. Today, the main appli- cations of audio DSP are high quality audio coding and the digital generation and manipulation of music signals. They share common resear ...
https://www.eeworm.com/dl/646/358921.html
下载: 121
查看: 1044

通讯/手机编程 UIT - Secteur de la normalisation des télécommunications ITU - Telecommunication Standardization Se

UIT - Secteur de la normalisation des télécommunications ITU - Telecommunication Standardization Sector UIT - Sector de Normalización de las Telecomunicaciones Study Period 1997-2000 Commission d études Study Group Comisión de Estudio 16 Contribution tardive Delayed Contribution Contribución ...
https://www.eeworm.com/dl/527/364634.html
下载: 167
查看: 1038

微处理器开发 Many of the pattern &#64257 nding algorithms such as decision tree, classi&#64257 cation rules and c

Many of the pattern &#64257 nding algorithms such as decision tree, classi&#64257 cation rules and clustering techniques that are frequently used in data mining have been developed in machine learning research community. Frequent pattern and association rule mining is one of the few excep- tions to ...
https://www.eeworm.com/dl/655/370113.html
下载: 49
查看: 1042

其他书籍 另一本介绍贝叶斯网络的经典教材

另一本介绍贝叶斯网络的经典教材,可以与Learning Bayesian Networks配合使用,相得益彰。
https://www.eeworm.com/dl/542/371407.html
下载: 141
查看: 1065

电子书籍 The literature of cryptography has a curious history. Secrecy, of course, has always played a centra

The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. A ...
https://www.eeworm.com/dl/cadence/ebook/376273.html
下载: 34
查看: 1051

人工智能/神经网络 * Lightweight backpropagation neural network. * This a lightweight library implementating a neura

* Lightweight backpropagation neural network. * This a lightweight library implementating a neural network for use * in C and C++ programs. It is intended for use in applications that * just happen to need a simply neural network and do not want to use * needlessly complex neural network librar ...
https://www.eeworm.com/dl/650/380453.html
下载: 127
查看: 1065

人工智能/神经网络 % Train a two layer neural network with the Levenberg-Marquardt % method. % % If desired, it is p

% Train a two layer neural network with the Levenberg-Marquardt % method. % % If desired, it is possible to use regularization by % weight decay. Also pruned (ie. not fully connected) networks can % be trained. % % Given a set of corresponding input-output pairs and an initial % network, % ...
https://www.eeworm.com/dl/650/384092.html
下载: 168
查看: 1031

matlab例程 This function applies the Optimal Brain Surgeon (OBS) strategy for % pruning neural network models

This function applies the Optimal Brain Surgeon (OBS) strategy for % pruning neural network models of dynamic systems. That is networks % trained by NNARX, NNOE, NNARMAX1, NNARMAX2, or their recursive % counterparts.
https://www.eeworm.com/dl/665/384105.html
下载: 191
查看: 1040

matlab例程 Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Ne

Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Newton"). Also pruned (i.e., not fully % connected) networks can be trained. % % The activation functions can either be linear or tanh. The network % architecture is defined by the matrix NetDef , w ...
https://www.eeworm.com/dl/665/384109.html
下载: 78
查看: 1074