搜索结果
找到约 462 项符合
algorithms 的查询结果
按分类筛选
- 全部分类
- 其他书籍 (66)
- 技术资料 (41)
- 人工智能/神经网络 (40)
- matlab例程 (31)
- 书籍 (21)
- 软件设计/软件工程 (18)
- 数值算法/人工智能 (17)
- 加密解密 (16)
- 数据结构 (15)
- 书籍源码 (13)
- 其他 (13)
- 软件工程 (13)
- 电子书籍 (13)
- 数学计算 (12)
- Java编程 (10)
- VC书籍 (10)
- 通讯编程文档 (9)
- 文章/文档 (9)
- 压缩解压 (8)
- Linux/Unix编程 (8)
- 微处理器开发 (6)
- 行业发展研究 (6)
- Java书籍 (5)
- DSP编程 (4)
- 编译器/解释器 (4)
- 文件格式 (4)
- 系统设计方案 (4)
- 通讯/手机编程 (3)
- 技术书籍 (3)
- 教程资料 (3)
- 单片机开发 (3)
- 其他行业 (3)
- 操作系统开发 (2)
- Matlab (2)
- 可编程逻辑 (2)
- 嵌入式/单片机编程 (2)
- VHDL/FPGA/Verilog (2)
- Delphi控件源码 (2)
- 手册 (1)
- C语言 (1)
- C/C++语言编程 (1)
- Linux/uClinux/Unix编程 (1)
- 数据库系统 (1)
- DSP工具/软件 (1)
- 传感与控制 (1)
- 嵌入式综合 (1)
- 工控技术 (1)
- 源码/资料 (1)
- Internet/网络编程 (1)
- 编辑器/阅读器 (1)
- 网络 (1)
- 技术管理 (1)
- 其他数据库 (1)
- FlashMX/Flex源码 (1)
- VxWorks (1)
- 生物技术 (1)
- 3G开发 (1)
行业发展研究 A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log
A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log preparation model enhances usage logs with semantic.The M arkov chain
mode1 based on ontology semantic measurement is used to identi.
ing which active session a request should belong to.The corn— ...
加密解密 It is an experimental testing for python M2Crypto module. M2Crypto is not well document. User may no
It is an experimental testing for python M2Crypto module. M2Crypto is not well document. User may not know how to use SHA256 when signing and verify with RSA. It also have not enough document to show how to use DES to encrypt and decrypt. Here also includes source codes for performance evaluation of ...
数值算法/人工智能 anb 版的LBM程序 This code was written to show beginners in a simple and c short way the relevant proce
anb 版的LBM程序 This code was written to show beginners in a simple and
c short way the relevant procedures of a lattice Boltzmann solver,
c pointing on how everything works "in principle". Nearly all
c procedures could be implemented other (and better) as it is done
c here, and even the algorithm ...
系统设计方案 1.an fpga implementation of the image space reconstruction algorithm for hyperspectral imaging analy
1.an fpga implementation of the image space reconstruction algorithm for hyperspectral imaging analysis
2. fpga implemention of a median filter
3. fpga implementation of digital filters
4.hardware acceleration of edge detection algorithm on fpgas
5.implementation and evaluation of image processing a ...
matlab例程 ADIAL Basis Function (RBF) networks were introduced into the neural network literature by Broomhead
ADIAL Basis Function (RBF) networks were introduced
into the neural network literature by Broomhead and
Lowe [1], which are motivated by observation on the local
response in biologic neurons. Due to their better
approximation capabilities, simpler network structures and
faster learning algorithms, R ...
电子书籍 A programmable digital signal processor (PDSP) is a special-purpose microprocessor with specialized
A programmable digital signal processor (PDSP) is a special-purpose microprocessor
with specialized architecture and instruction set for implementing DSP
algorithms. Typical architectural features include multiple memory partitions (onchip,
off-chip, data memory, program memory, etc.), multiple (gen ...
书籍 MULTI-CARRIER DIGITAL COMMUNICATIONS
Multi-carrier modulation‚ Orthogonal Frequency Division Multi-
plexing (OFDM) particularly‚ has been successfully applied to
a wide variety of digital communications applications over the past
several years. Although OFDM has been chosen as the physical layer
standard for a diversity of important ...
技术资料 Learn.More.Python.3.the.Hard.Way.2017.9.pdf
1. Getting Started: You learn quick hacks to start a project.
2. Data Structures: I don’t teach every single data structure, but I get you started down the path to learning them more completely.
3. Algorithms: Data structures are fairly pointless without a way to process them.
4. Parsing Text: The ...
其他书籍 This book covers the fundamental concepts of data mining, to demonstrate the potential of gathering
This book covers the fundamental concepts of data mining, to demonstrate the potential of gathering large sets of data, and analyzing these data sets to gain useful business understanding. The book is organized in three parts. Part I introduces concepts. Part II describes and demonstrates basic data ...
书籍 GNSS+Receivers+for+Weak+Signals
Many applications have required the positioning accuracy of a Global Navigation
Satellite System (GNSS). Some applications exist in environments that attenuate
GNSS signals, and, consequently, the received GNSS signals become very weak.
Examplesofsuchapplicationsarewirelessdevicepositioning,position ...