Technique
共 142 篇文章
Technique 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 142 篇文章,持续更新中。
OFDM Signal generation and decoding using 16-QAM .64QAM as the modulation technique. This type of OF
OFDM Signal generation and decoding using 16-QAM .64QAM as the modulation technique. This type of OFDM is particularly useful for WiMAX and other Wireless and Multimedia Standards. Just run the Model
We introduce a novel data mining technique for the analysis of gene expression. Gene expression is t
We introduce a novel data mining technique for the analysis of gene expression. Gene expression is the effective
production of the protein that a gene encodes.
3D shape reconstruction matlab code. It used shape from defocus technique with least squares. You ca
3D shape reconstruction matlab code. It used shape from defocus technique with least squares. You can reconstruct 3D shape with only two different depth images.
a kind converts a technique according to the simple speech A_D of ADM principle
a kind converts a technique according to the simple speech A_D of ADM principle
measure through the cross-entropy of test data. In addition, we introduce two novel smoothing tech
measure through
the cross-entropy of test data. In addition,
we introduce two novel smoothing techniques,
one a variation of Jelinek-Mercer
smoothing and one a very simple linear interpolation
te
Displaying a large bitmap file on a dialog box, in its original size, is quite difficult in the VC++
Displaying a large bitmap file on a dialog box, in its original size, is quite difficult in the VC++ environment. However, it is possible to display a large bitmap to a predefined area of the dialog b
AntColony Optimization --- Artificial Ants a Computational Intelligence Technique 蚁群算法大牛编写的书籍
AntColony Optimization --- Artificial Ants a Computational Intelligence Technique
蚁群算法大牛编写的书籍,对于想了解蚁群算法的人有很大帮助
一个socks5的开发库 contains implementation of the TCP Tunneling technique for connection through Socks 4,
一个socks5的开发库
contains implementation of the TCP Tunneling technique for connection through Socks 4, 4a, 5, and HTTPS Proxy Servers.
Decompilation Dos Program is a technique that allows you to recover lost source code. It is also nee
Decompilation Dos Program is a technique that allows you to recover lost source code. It is also needed in some cases for computer security.
matlabBank-Based Kalman Filtering Technique for] - A Filter-Bank-Based Kalman Filtering Technique fo
matlabBank-Based Kalman Filtering Technique for] - A Filter-Bank-Based Kalman Filtering Technique for Wavelet Estimation and Decomposition of Random Signals.pdf
[DIP_dg.rar] - JPEG图像压缩像素之扫描方法之一(zigz
C++ From Scratch: An Object-Oriented Approach is designed to walk novice programmers through the ana
C++ From Scratch: An Object-Oriented Approach is designed to walk novice programmers through the analysis, design and implementation of a functioning object-oriented application using C++. You will le
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the poss
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same techn
It is a document which is very new today, It discribe recommender System that use trust technique in
It is a document which is very new today, It discribe recommender System that use trust technique in Recommender System!
AC Induction Motor Control Using Constant V/Hz Principle and Space Vector PWM Technique with TMS3
AC Induction Motor Control
Using Constant V/Hz Principle
and Space Vector PWM
Technique with TMS320C240
几篇最经典的运动搜索算法的IEEE论文:A1. Enhanced Hexagonal Search for Fast Block Motion Estimation;A2. Hexagon-based
几篇最经典的运动搜索算法的IEEE论文:A1. Enhanced Hexagonal Search for Fast Block Motion Estimation;A2. Hexagon-based search pattern for fast block motion estimation;A3. Predictive Motion Vector Field Adaptive Search
Computes BER v EbNo curve for convolutional encoding / soft decision Viterbi decoding scheme assum
Computes BER v EbNo curve for convolutional encoding / soft decision
Viterbi decoding scheme assuming BPSK.
Brute force Monte Carlo approach is unsatisfactory (takes too long)
to find the BER cu
(1 . Higher Educati on Admissi on Committee Office of L ianyungang,L ianyungang 222006, China 2 .
(1 . Higher Educati on Admissi on Committee Office of L ianyungang,L ianyungang 222006, China
2 . Modern Educati on Technique Center, Huaihai I nstitute of Technol ogy, L ianyungang 222005, China)
This paper presents an interactive technique that produces static hairstyles by generating individu
This paper presents an interactive technique that
produces static hairstyles by generating individual hair strands
of the desired shape and color, subject to the presence of gravity
and collisions.
This paper deals with the problem of speech enhancement when only a corrupted speech signal is avai
This paper deals with the problem of speech enhancement when
only a corrupted speech signal is available for processing. Kalman
filtering is known as an effective speech enhancement technique,
in w
Time-domain [FEFDTD] technique for solving complex electromagnetic problems.rar
Time-domain [FEFDTD] technique for solving complex electromagnetic problems.rar