搜索结果
找到约 11 项符合
classified 的查询结果
按分类筛选
软件设计/软件工程 英文名 Arithmetic coded vector SPIHT with classified tree-multistage VQ for color image coding很好的关于spih
英文名 Arithmetic coded vector SPIHT with classified tree-multistage VQ for color image coding很好的关于spiht的改进算法关于彩色图像编码
教程资料 XAPP520将符合2.5V和3.3V I/O标准的7系列FPGA高性能I/O Bank进行连接
XAPP520将符合2.5V和3.3V I/O标准的7系列FPGA高性能I/O Bank进行连接 
The I/Os in Xilinx® 7 series FPGAs are classified as either high range (HR) or high performance (HP) banks. HR I/O banks can be operated from 1.2V to 3.3V, whereas HP I/O banks are optimized for operation between 1.2V and ...
可编程逻辑 XAPP520将符合2.5V和3.3V I/O标准的7系列FPGA高性能I/O Bank进行连接
XAPP520将符合2.5V和3.3V I/O标准的7系列FPGA高性能I/O Bank进行连接 
The I/Os in Xilinx® 7 series FPGAs are classified as either high range (HR) or high performance (HP) banks. HR I/O banks can be operated from 1.2V to 3.3V, whereas HP I/O banks are optimized for operation between 1.2V and ...
系统设计方案 The purpose of this chapter is to present a survey of recent publications concerning medical image
The purpose of this chapter is to present a survey of recent publications concerning medical
image registration techniques. These publications will be classified according to a model based
on nine salient criteria, the main dichotomy of which is extrinsic versus intrinsic methods
其他 This data set contains WWW-pages collected from computer science departments of various universities
This data set contains WWW-pages collected from computer science departments of various universities in January 1997 by the World Wide Knowledge Base (Web->Kb) project of the CMU text learning group. The 8,282 pages were manually classified into the following categories:
student (1641)
faculty (11 ...
加密解密 This is the source code for encryption using the latest AES algorithm. AES algorithm is also called
This is the source code for encryption using the latest AES algorithm.
AES algorithm is also called Rijndael algorithm. AES algorithm is
recommended for non-classified use by the National Institute of Standards
and Technology(NIST), USA. Now-a-days AES is being used for almost
all encryption appl ...
单片机开发 This course is about "distributed algorithms".Distributed algorithms include a wide range of paralle
This course is about "distributed algorithms".Distributed algorithms include a wide range of parallel algorithms,which can be classified by a variety of attributes.
数值算法/人工智能 The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of cla
The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of classified examples a decision tree is induced, biased by the information gain measure, which heuristically leads to small trees. The examples are given in attribute-value representation. The set of poss ...
书籍 Attachment+Transmission+in+Wireless+Networks
Wireless penetration has witnessed explosive growth over the last two decades.
Accordingly, wireless devices have become much denser per unit area, resulting
in an overcrowded usage of wireless resources. To avoid radio interferences and
packet collisions, wireless stations have to exchange control ...
书籍 RFID_Security_and_Privacy_Concepts
In the first chapter, the topic of this book is classified into the area of pervasive com-
puting. Further, security and privacy in the scope of RFID technology is motivated
and the vision that guides the remainder of this book is introduced.