搜索结果

找到约 308 项符合 methods 的查询结果

其他书籍 This set of simulation files performs a computational complexity performance comparison of the two m

This set of simulation files performs a computational complexity performance comparison of the two methods mentioned in the paper. The source is ANSI-C compliant, hence any C-compiler can be used to compile the source code. It has been tested using Visual Studio.net C++ and TI code composer studio C ...
https://www.eeworm.com/dl/542/183644.html
下载: 21
查看: 1044

文章/文档 Electromagnetic scattering from the trees above a tilted rough ground plane generated by the stochas

Electromagnetic scattering from the trees above a tilted rough ground plane generated by the stochastic Lidenmayer system is studied by Monte Carlo simulations in this paper.The scattering coefficients are calculated in three methods:coherent addition approximation,tree-independent scattering,and in ...
https://www.eeworm.com/dl/652/189960.html
下载: 123
查看: 1060

人工智能/神经网络 ReBEL is a Matlabtoolkit of functions and scripts, designed to facilitate sequential Bayesian infer

ReBEL is a Matlabtoolkit of functions and scripts, designed to facilitate sequential Bayesian inference (estimation) in general state space models. This software consolidates research on new methods for recursive Bayesian estimation and Kalman filtering by Rudolph van der Merwe and Eric A. Wan. The ...
https://www.eeworm.com/dl/650/191082.html
下载: 195
查看: 1049

Java编程 JDiff is a Javadoc doclet which generates an HTML report of all the packages, classes, constructors,

JDiff is a Javadoc doclet which generates an HTML report of all the packages, classes, constructors, methods, and fields which have been removed, added or changed in any way, including their documentation, when two APIs are compared. This is very useful for describing exactly what has changed betwee ...
https://www.eeworm.com/dl/633/193219.html
下载: 150
查看: 1028

行业发展研究 The standard optimum Kalman filter demands complete knowledge of the system parameters, the input f

The standard optimum Kalman filter demands complete knowledge of the system parameters, the input forcing functions, and the noise statistics. Several adaptive methods have already been devised to obtain the unknown information using the measurements and the filter residuals.
https://www.eeworm.com/dl/692/193695.html
下载: 141
查看: 1058

*行业应用 Klaas Gadeyne, a Ph.D. student in the Mechanical Engineering Robotics Research Group at K.U.Leuven,

Klaas Gadeyne, a Ph.D. student in the Mechanical Engineering Robotics Research Group at K.U.Leuven, has developed a C++ Bayesian Filtering Library that includes software for Sequential Monte Carlo methods, Kalman filters, particle filters, etc.
https://www.eeworm.com/dl/631/193987.html
下载: 144
查看: 1065

Java编程 A Java package (library/API) to connect and use the Yahoo Instant Messager and Chat protocols (YMSG)

A Java package (library/API) to connect and use the Yahoo Instant Messager and Chat protocols (YMSG), in a reasonably coder-friendly and abstract way. Although methods the API exposes are closely matched to Yahoo IM features, the API attempts to hide Download jYMSG API - Yahoo IM Jars
https://www.eeworm.com/dl/633/196885.html
下载: 94
查看: 1056

系统设计方案 The purpose of this chapter is to present a survey of recent publications concerning medical image

The purpose of this chapter is to present a survey of recent publications concerning medical image registration techniques. These publications will be classified according to a model based on nine salient criteria, the main dichotomy of which is extrinsic versus intrinsic methods
https://www.eeworm.com/dl/678/198825.html
下载: 173
查看: 1059

Linux/Unix编程 About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based o

About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only on ...
https://www.eeworm.com/dl/619/201822.html
下载: 188
查看: 1111

Linux/Unix编程 Chessboard Cover,On a chessboard

Chessboard Cover,On a chessboard,only one square is different, called specific.Use the Divide-and-Conquer methods to solve the Chessboard Cover Problem.
https://www.eeworm.com/dl/619/205688.html
下载: 65
查看: 1022