虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

multi-Processing

  • Text mining tries to solve the crisis of information overload by combining techniques from data mini

    Text mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth examination of core text mining and link detection algorithms and operations, this book examines advanced pre-processing techniques, knowledge representation considerations, and visualization approaches. Finally, it explores current real-world, mission-critical applications of text mining and link detection in such varied fields as M&A business intelligence, genomics research and counter-terrorism activities.

    标签: information techniques combining overload

    上传时间: 2014-01-02

    上传用户:Late_Li

  • 多点温度采集上位机程序(原程序),这是配合这是配套本人上传的“多点温度采集系统”的上位机程序

    多点温度采集上位机程序(原程序),这是配合这是配套本人上传的“多点温度采集系统”的上位机程序,一整套的东西,通这RS232接收下位机传来的数据,显示和画走势图,还可以控制下位机,通信协议在“Multi-point_temperature _system.rar”

    标签: 程序 多点 上位机 温度采集

    上传时间: 2013-12-09

    上传用户:我干你啊

  • 它是SourceForge上的一个开源项目

    它是SourceForge上的一个开源项目,使用Malib实现实时处理,CSU Face Identification Evaluation System进行人脸识别。算法包括:主成份分析(principle components analysis (PCA)),a.k.a eigenfaces算法,混合主成份分析,线性判别分析(PCA+LDA),图像差分分类器(IIDC),弹性图像匹配算法(EBGM)等等 Malic is realtime face recognition system that based on Malib and CSU Face Identification Evaluation System (csuFaceIdEval). Uses Malib library for realtime image processing and some of csuFaceIdEval for face recognition.

    标签: SourceForge 开源 项目

    上传时间: 2014-01-21

    上传用户:sz_hjbf

  • I. C. Wong, Z. Shen, J. G. Andrews, and B. L. Evans, ``A Low Complexity Algorithm for Proportional R

    I. C. Wong, Z. Shen, J. G. Andrews, and B. L. Evans, ``A Low Complexity Algorithm for Proportional Resource Allocation in OFDMA Systems , Proc. IEEE Int. Work. Signal Processing Systems, 针对这篇文章给出的源代码

    标签: I. C. B. G.

    上传时间: 2014-01-24

    上传用户:zhichenglu

  • Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in A

    Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in ARM!ˉs new Cortex family. With high performance and power efficiency, it targets a wide variety of mobile and consumer applications including mobile phones, set-top boxes, gaming consoles and automotive navigation/entertainment systems. The Cortex-A8 processor spans a range of performance points depending on the implementation, delivering over to 2000 Dhrystone MIPS (DMIPS) of performance for demanding consumer applications and consuming less than 300mW for low-power mobile devices. This translates into a large increase in processing capability while staying with the power levels of previous generations of mobile devices. Consumer applications will benefit from the reduced heat dissipation and resulting lower packaging and integration costs.

    标签: microprocessor Introduction applications Cortex

    上传时间: 2013-12-09

    上传用户:xzt

  • Written for engineering and computer science students and practicing engineers, this book provides t

    Written for engineering and computer science students and practicing engineers, this book provides the fundamental applications and mathematical techniques of signal processing. Topics covered include programming in MATLAB, filters, networking, and parallel processing. MATLAB is introduced and used to solve numerous examples in the book. Companion software available In addition, a set of MATLAB M-files is available on a CD bound in the book.

    标签: engineering practicing and engineers

    上传时间: 2017-07-28

    上传用户:fandeshun

  • hese are the zip files that are associated with application note ADSP-BF533 Blackfin Booting Pro

    hese are the zip files that are associated with application note ADSP-BF533 Blackfin Booting Process (EE-240) example.zip: Used throughout the EE-note to explain in detail the various booting modes. BF533 Ez Kit Multiple DXE Boot.zip: Multi-DXE Boot Example used with the ADSP-BF533 Ez-Kit Lite. Host Boot.zip: Example Host code to demonstrate SPI Slave Mode Booting Program_Atmel.zip: Example code that programs the Atmel DataFlashes via an ADSP-BF532 Processor All programs have been written for VisualDSP++ 3.5

    标签: application associated are Blackfin

    上传时间: 2017-07-30

    上传用户:tonyshao

  • A certification path is an ordered list of certificates starting with a certificate issued by the re

    A certification path is an ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509 and further defined in Internet Engineering Task Force (IETF) Request for Comments (RFC) 3280. Certification path processing verifies the binding between the subject distinguished name and/or subject alternative name and the subject public key defined in the target certificate. The binding is limited by constraints, which are specified in the certificates that comprise the path, and inputs that are specified by the relying party. To ensure secure interoperation of PKI-enabled applications, the path validation must be done in accordance with the X.509 and RFC 3280 specifications. This document provides the test assertions and the test cases for testing path validation software against these specifications.

    标签: certification certificates certificate starting

    上传时间: 2017-07-31

    上传用户:清风冷雨

  • When trying to extract information from SAR images, we need to distinguish two types of image prope

    When trying to extract information from SAR images, we need to distinguish two types of image property. The more important is where properties of the scene (e.g., its dielectric constant, its geometry, its motion, etc.) produce effects in the image measurements or examination of the image then can provide information about the scene. The second is generated purely by the system and the signal processing.

    标签: distinguish information extract trying

    上传时间: 2014-01-09

    上传用户:huyiming139

  • To identify distinguishable clusters of data in an n-dimensional pixel

    To identify distinguishable clusters of data in an n-dimensional pixel value image. Given: Samples of multi-spectral satellite images

    标签: distinguishable n-dimensional identify clusters

    上传时间: 2017-08-08

    上传用户:it男一枚