搜索结果
找到约 77 项符合
semi-natural 的查询结果
单片机开发 Its functions are: n order within (excluding n) At the same time, 3 and 7 can be integral to all nat
Its functions are: n order within (excluding n) At the same time, 3 and 7 can be integral to all natural and a few of the square root of s, and function as a value to return, the final result s output to file out.dat China.
其他书籍 After the successful global introduction during the past decade of the second generation (2G) digita
After the successful global introduction during the past decade of the second generation (2G) digital
mobile communications systems, it seems that the third generation (3G) Universal Mobile Communication
System (UMTS) has finally taken off, at least in some regions. The plethora of new services that ...
数值算法/人工智能 state of art language modeling methods: An Empirical Study of Smoothing Techniques for Language Mod
state of art language modeling methods:
An Empirical Study of Smoothing Techniques for Language Modeling.pdf
BLEU, a Method for Automatic Evaluation of Machine Translation.pdf
Class-based n-gram models of natural language.pdf
Distributed Language Modeling for N-best List Re-ranking.pdf
Distributed ...
人工智能/神经网络 很经典的一个算法。大家做工程和通信用的着。遗传算法(Genetic Algorithm)是模拟达尔文的遗传选择和自然淘汰的生物进化过程的计算模型
很经典的一个算法。大家做工程和通信用的着。遗传算法(Genetic Algorithm)是模拟达尔文的遗传选择和自然淘汰的生物进化过程的计算模型,是一种通过模拟自然进化过程搜索最优解的方法,它是有美国Michigan大学J.Holland教授于1975年首先提出来的,并出版了颇有影响的专著《Adaptation in Natural and Artificial Systems》 ...
其他书籍 The main MIPS processor of SMP8630 comes with a JTAG interface, allowing: access to caches and da
The main MIPS processor of SMP8630 comes with a JTAG interface, allowing:
access to caches and data bus (DRAM) with a bandwidth of about 200kbit/s
examining the processor state whatever the execution mode (monice)
connecting to monice using mdi-server and using a gdb client on the processor to st ...
matlab例程 Spread-spectrum techniques are methods by which electromagnetic energy generated in a particular ban
Spread-spectrum techniques are methods by which electromagnetic energy generated in a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with a wider bandwidth. These techniques are used for a variety of reasons, including the establishment of secure communica ...
其他书籍 Text mining tries to solve the crisis of information overload by combining techniques from data mini
Text mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth examination of core text mining and link detection algorithms a ...
行业发展研究 Abstract—The contourlet transform is a new two-dimensional extension of the wavelet transform using
Abstract—The contourlet transform is a new two-dimensional
extension of the wavelet transform using multiscale and direc-
tional &#64257 lter banks. The contourlet expansion is composed of
basis images oriented at various directions in multiple scales,
with &#64258 exible aspect ratios. Given this ...
Java编程 Hibernate: A Developer s Notebook shows you how to use Hibernate to automate persistence: you write
Hibernate: A Developer s Notebook shows you how to use Hibernate to automate persistence: you write natural Java objects and some simple configuration files, and Hibernate automates all the interaction between your objects and the database. You don t even need to know the database is there, and you ...
其他 C programming is a craft that takes years to perfect. A reasonably sharp person can learn the basics
C programming is a craft that takes years to perfect. A reasonably sharp person can learn the basics of
C quite quickly. But it takes much longer to master the nuances of the language and to write enough
programs, and enough different programs, to become an expert. In natural language terms, this is ...