搜索结果
找到约 434 项符合
Non-linear 的查询结果
嵌入式/单片机编程 这是LLE的原始算法
这是LLE的原始算法,原文的参考文献是:S.T.Roweis and L.K.Saul. Nonlinear dimensionality reduction by locally linear embedding. Science,
290, 2000.
数学计算 数值分析高斯——列主元消去法主程序 说明如下: % a----input,matrix of coefficient % b----input,right vector % sol----o
数值分析高斯——列主元消去法主程序
说明如下:
% a----input,matrix of coefficient
% b----input,right vector
% sol----output,returns the solution of linear equation
数据结构 密码学界牛人Victor Shoup用C++编写数论类库。 NTL is a high-performance, portable C++ library providing data struct
密码学界牛人Victor Shoup用C++编写数论类库。
NTL is a high-performance, portable C++ library providing data structures and algorithms for arbitrary length integers for vectors, matrices, and polynomials over the integers and over finite fields and for arbitrary precision floating point arithmetic.
N ...
数学计算 cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used
cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used to calculate a whole range of scientific functions including sin, cos, tan, arctan, arcsin, arccos, sinh, cosh, tanh, arctanh, log, exp, square root and even multiply and divide.
the method dates ba ...
其他书籍 An introduction to some of the key ideas in computer graphics is given. Modeling, 2D and 3D viewing,
An introduction to some of the key ideas in computer graphics is given. Modeling, 2D and 3D viewing,
transformations and related ideas from linear algebra are presented.
matlab例程 统计模式识别工具箱(Statistical Pattern Recognition Toolbox)包含: 1
统计模式识别工具箱(Statistical Pattern Recognition Toolbox)包含:
1,Analysis of linear discriminant function
2,Feature extraction: Linear Discriminant Analysis
3,Probability distribution estimation and clustering
4,Support Vector and other Kernel Machines
通讯/手机编程 WSNs being energy constrained systems, one major problem is to employ the sensor nodes in such a man
WSNs being energy constrained systems, one major problem is to employ the sensor nodes in such a manner so as to ensure maximum coverage and connectivity with minimal or optimal number of nodes and furthermore elongate network lifetime with maximum energy utilization.
The problem addressed has b ...
文章/文档 Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to c
Watermarking schemes evaluation
Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two main problems seriously darken the future of this technology though.
Firstly, the large number of at ...
数学计算 This is a code of Pseudo-Arc Length Continuation Method , the method can be used for solving the non
This is a code of Pseudo-Arc Length Continuation Method , the method can be used for solving the nonlinear equations, the principle can re found in some text books.
In the code,I prove the agreement of the code with other methods
人工智能/神经网络 Heapsort 1.A heap is a binary tree satisfying the followingconditions: -This tree is completely ba
Heapsort
1.A heap is a binary tree satisfying the followingconditions:
-This tree is completely balanced.
-If the height of this binary tree is h, then leaves can be at level h or level h-1.
-All leaves at level h are as far to the left as possible.
-The data associated with all descendants of a nod ...