搜索结果
找到约 309 项符合
zuninewton methods 的查询结果
其他书籍 This set of simulation files performs a computational complexity performance comparison of the two m
This set of simulation files performs a computational complexity performance comparison of the two methods mentioned in the paper. The source is ANSI-C compliant, hence any C-compiler can be used to compile the source code. It has been tested using Visual Studio.net C++ and TI code composer studio C ...
文章/文档 Electromagnetic scattering from the trees above a tilted rough ground plane generated by the stochas
Electromagnetic scattering from the trees above a tilted rough ground plane generated by the stochastic Lidenmayer system is studied by Monte Carlo simulations in this paper.The scattering coefficients are calculated in three methods:coherent addition approximation,tree-independent scattering,and in ...
人工智能/神经网络 ReBEL is a Matlabtoolkit of functions and scripts, designed to facilitate sequential Bayesian infer
ReBEL is a Matlabtoolkit of functions and scripts, designed to
facilitate sequential Bayesian inference (estimation) in general state
space models. This software consolidates research on new methods for
recursive Bayesian estimation and Kalman filtering by Rudolph van der
Merwe and Eric A. Wan. The ...
Java编程 JDiff is a Javadoc doclet which generates an HTML report of all the packages, classes, constructors,
JDiff is a Javadoc doclet which generates an HTML report of all the packages, classes, constructors, methods, and fields which have been removed, added or changed in any way, including their documentation, when two APIs are compared. This is very useful for describing exactly what has changed betwee ...
行业发展研究 The standard optimum Kalman filter demands complete knowledge of the system parameters, the input f
The standard optimum Kalman filter demands complete
knowledge of the system parameters, the input forcing functions, and
the noise statistics. Several adaptive methods have already been devised
to obtain the unknown information using the measurements and
the filter residuals.
*行业应用 Klaas Gadeyne, a Ph.D. student in the Mechanical Engineering Robotics Research Group at K.U.Leuven,
Klaas Gadeyne, a Ph.D. student in the Mechanical Engineering Robotics Research Group at K.U.Leuven, has developed a C++ Bayesian Filtering Library that includes software for Sequential Monte Carlo methods, Kalman filters, particle filters, etc.
Java编程 A Java package (library/API) to connect and use the Yahoo Instant Messager and Chat protocols (YMSG)
A Java package (library/API) to connect and use the Yahoo Instant Messager and Chat protocols (YMSG), in a reasonably coder-friendly and abstract way. Although methods the API exposes are closely matched to Yahoo IM features, the API attempts to hide
Download jYMSG API - Yahoo IM
Jars
系统设计方案 The purpose of this chapter is to present a survey of recent publications concerning medical image
The purpose of this chapter is to present a survey of recent publications concerning medical
image registration techniques. These publications will be classified according to a model based
on nine salient criteria, the main dichotomy of which is extrinsic versus intrinsic methods
Linux/Unix编程 About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based o
About WepDecrypt:
Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed.
WepDecrypt highlights:
- Implemented packet filters.
- Only on ...
Linux/Unix编程 Chessboard Cover,On a chessboard
Chessboard Cover,On a chessboard,only one square is different, called specific.Use the Divide-and-Conquer methods to solve the Chessboard Cover Problem.