虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Pre-processing

  • 前面我们通过Veritas Cluster Server for DB2双机-入门一文已经向大家介绍了DB2双机的基本原理和配置方法

    前面我们通过Veritas Cluster Server for DB2双机-入门一文已经向大家介绍了DB2双机的基本原理和配置方法,本文将接续上文,继续介绍DB2的高级需求-大规模并行处理(Massively Parallel Processing, MPP)-环境下,用户如何利用VCS配置双机互备环境。 

    标签: DB2 Veritas Cluster Server

    上传时间: 2014-09-04

    上传用户:libinxny

  • NeC4.5 is a variant of C4.5 decision tree, which could generate decision trees more accurate than st

    NeC4.5 is a variant of C4.5 decision tree, which could generate decision trees more accurate than standard C4.5 decision trees, through regarding a neural network ensemble as a pre-process of C4.5 decision tree.

    标签: decision 4.5 accurate generate

    上传时间: 2013-12-10

    上传用户:anng

  • Boost provides free peer-reviewed portable C++ source libraries. We emphasize libraries that work

    Boost provides free peer-reviewed portable C++ source libraries. We emphasize libraries that work well with the C++ Standard Library. Boost libraries are intended to be widely useful, and usable across a broad spectrum of applications. The Boost license encourages both commercial and non-commercial use. We aim to establish "existing practice" and provide reference implementations so that Boost libraries are suitable for eventual standardization. Ten Boost libraries are already included in the C++ Standards Committee s Library Technical Report (TR1) as a step toward becoming part of a future C++ Standard. More Boost libraries are proposed for the upcoming TR2. Boost works on almost any modern operating system, including UNIX and Windows variants. Follow the Getting Started Guide to download and install Boost. Popular Linux and Unix distributions such as Fedora, Debian, and NetBSD include pre-built Boost packages. Boost may also already be available on your organization s internal web server.

    标签: libraries peer-reviewed emphasize provides

    上传时间: 2016-12-05

    上传用户:semi1981

  • The TMS320LF240xA and TMS320LC240xA devices, new members of the TMS320C24x generation of dig

    The TMS320LF240xA and TMS320LC240xA devices, new members of the TMS320C24x generation of digital signal processor (DSP) controllers, are part of the TMS320C2000 platform of fixed-point DSPs. The 240xA devices offer the enhanced TMS320 DSP architectural design of the C2xx core CPU for low-cost, low-power, and high-performance processing capabilities. Several advanced peripherals, optimized for digital motor and motion control applications, have been integrated to provide a true single-chip DSP controller. While code-compatible with the existing C24x DSP controller devices, the 240xA offers increased processing performance (40 MIPS) and a higher level of peripheral integration. See the TMS320x240xA Device Summary section for device-specific features.

    标签: TMS 320 generation 240

    上传时间: 2013-12-16

    上传用户:GavinNeko

  • This document accompanies a sample co-installer that can be used in conjunction with an INF file to

    This document accompanies a sample co-installer that can be used in conjunction with an INF file to install additional device INF files on the target system during a device installation. The instructions herein apply to the Microsoft Windows 2000 and Windows XP and Windows Server 2003 operating systems. The sample co-installer described in this article interprets CopyINF directives in a [DDInstall] section in an INF file. The sample demonstrates using a co-installer to perform processing after a device has been installed, parsing the INF section that is being used for the installation, and the use of the SetupCopyOEMInf, SetupGetInfInformation, SetupQueryInfOriginalFileInformation and SetupDiGetActualSectionToInstall APIs.

    标签: co-installer accompanies conjunction document

    上传时间: 2014-02-28

    上传用户:gououo

  • This tutorial white-paper illustrates practical aspects of FIR filter design and fixed-point implem

    This tutorial white-paper illustrates practical aspects of FIR filter design and fixed-point implementation along with the algorithms available in the Filter Design Toolbox and the Signal Processing Toolbox for this purpose.

    标签: illustrates fixed-point white-paper practical

    上传时间: 2016-12-14

    上传用户:15071087253

  • PDTDFB toolbox The filter bank is described in: The Shiftable Complex Directional Pyramid—Pa

    PDTDFB toolbox The filter bank is described in: The Shiftable Complex Directional Pyramid—Part I: Theoretical Aspects The Shiftable Complex Directional Pyramid—Part II: Implementation and Applications IEEE transaction on singnal processing, Oct. 2008 Other related papers and software are available at: nttruong.googlepages.com Acknowledgement: The code development is based on the matlab code of the contourlet toolbox and the steerable pyramid.

    标签: Directional The Shiftable described

    上传时间: 2017-01-08

    上传用户:924484786

  • 本文档介绍了如何使用各种内嵌工具

    本文档介绍了如何使用各种内嵌工具,函数和其他一些小技巧来加强使用matlab的速度和效率,是广大爱好者必读的文档。具体内容请参阅文档。 Learn how to use the Profiler tool, vectorized functions, and other tricks to writing efficient MATLAB code. This article includes how to convert any array into a column vector, bounding a value without if statements, and repeating/tiling a vector without repmat. Contents: * The Profiler * Array Preallocation * JIT Acceleration * Vectorization * Inlining Simple Functions * Referencing Operations * Numerical Integration * Signal Processing * Miscellaneous Tricks

    标签: 文档 如何使用 内嵌

    上传时间: 2013-12-11

    上传用户:cuiyashuo

  • Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features:

    Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/

    标签: open-source encryption Features software

    上传时间: 2013-12-20

    上传用户:123啊

  • In this paper, we describe the development of a rapidly reconfigurable system in which the users’ ta

    In this paper, we describe the development of a rapidly reconfigurable system in which the users’ tacit knowledge and requirements are elicited via a process of Interactive Evolution, finding the image processing parameters to achieve the required goals without any need for specialised knowledge of the machine vision system. We show that the resulting segmentation can be quickly and easily evolved from scratch, and achieves detection rates comparable to those of a hand-tuned system on a hot-rolled steel defect recognition problem.

    标签: reconfigurable development the describe

    上传时间: 2014-01-05

    上传用户:hopy