搜索结果

找到约 68 项符合 widely 的查询结果

文章/文档 A Tutorial on Principal Component Analysis.Principal component analysis (PCA) is a mainstay of moder

A Tutorial on Principal Component Analysis.Principal component analysis (PCA) is a mainstay of modern data analysis - a black box that is widely used but poorly understood. The goal of this paper is to dispel the magic behind this black box.
https://www.eeworm.com/dl/652/283647.html
下载: 194
查看: 1056

其他书籍 Recent advances in experimental methods have resulted in the generation of enormous volumes of data

Recent advances in experimental methods have resulted in the generation of enormous volumes of data across the life sciences. Hence clustering and classification techniques that were once predominantly the domain of ecologists are now being used more widely. This book provides an overview of these i ...
https://www.eeworm.com/dl/542/357867.html
下载: 44
查看: 1046

单片机开发 Semantic analysis of multimedia content is an on going research area that has gained a lot of atten

Semantic analysis of multimedia content is an on going research area that has gained a lot of attention over the last few years. Additionally, machine learning techniques are widely used for multimedia analysis with great success. This work presents a combined approach to semantic adaptation of neur ...
https://www.eeworm.com/dl/648/370773.html
下载: 113
查看: 1038

Linux/Unix编程 Boost provides free peer-reviewed portable C++ source libraries. We emphasize libraries that work

Boost provides free peer-reviewed portable C++ source libraries. We emphasize libraries that work well with the C++ Standard Library. Boost libraries are intended to be widely useful, and usable across a broad spectrum of applications. The Boost license encourages both commercial and non-commercial ...
https://www.eeworm.com/dl/619/375190.html
下载: 44
查看: 1054

加密解密 This work briefly explains common cryptosystems and details two most popular private-key ciphers: DE

This work briefly explains common cryptosystems and details two most popular private-key ciphers: DES ,which is probably the most widely used, and AES, which is intended to replace DES.
https://www.eeworm.com/dl/519/391402.html
下载: 194
查看: 1041

多国语言处理 This software performs code conversion of Chinese characters, including GB2312/GBK and BIG5. It a

This software performs code conversion of Chinese characters, including GB2312/GBK and BIG5. It also supports some encodings of Chinese character code which are used widely in Japan, such as Chinese Writer, cWnn, Nihao, Zhongwen Qigao, etc.
https://www.eeworm.com/dl/637/405850.html
下载: 152
查看: 1081

JavaScript Create a Delaunay triangulation or Voronoi diagram by clicking points. Delaunay triangulations and V

Create a Delaunay triangulation or Voronoi diagram by clicking points. Delaunay triangulations and Voronoi diagrams are among the most widely used data structures in the field of Computational Geometry. These are Java-oriented source codes.
https://www.eeworm.com/dl/685/407603.html
下载: 129
查看: 1055

行业发展研究 The existence of numerous imaging modalities makes it possible to present different data present in

The existence of numerous imaging modalities makes it possible to present different data present in different modalities together thus forming multimodal images. Component images forming multimodal images should be aligned, or registered so that all the data, coming from the different modalities, ar ...
https://www.eeworm.com/dl/692/422741.html
下载: 133
查看: 1056

系统设计方案 The Data Encryption Standard (DES) is a published federal encryption standard created to protect unc

The Data Encryption Standard (DES) is a published federal encryption standard created to protect unclassified computer data and communications. The DES algorithm is the most widely used encryption algorithm in the world
https://www.eeworm.com/dl/678/429178.html
下载: 190
查看: 1076

文章/文档 If a tree falls in the forest, and there s nobody there to hear, does it make a sound? This classic

If a tree falls in the forest, and there s nobody there to hear, does it make a sound? This classic conundrum was coined by George Berkeley (1685-1753), the Bishop and influential Irish philosopher whose primary philosophical achievement is the advancement of what has come to be called subjective id ...
https://www.eeworm.com/dl/652/442331.html
下载: 116
查看: 1103