Please read your package and describe it at least 40 bytes. System will automatically delete the directory of debug and release, so please do not put files on these two directory.
标签: automatically describe package Please
上传时间: 2013-12-27
上传用户:wqxstar
Please read your package and describe it at least 40 bytes. System will automatically delete the directory of debug and release, so please do not put files on these two directory.
标签: automatically describe package Please
上传时间: 2014-01-02
上传用户:ynsnjs
伸展树,基本数据结构,The tree is drawn in such a way that both of the edges down from a node are the same length. This length is the minimum such that the two subtrees are separated by at least two blanks.
标签: 树
上传时间: 2017-05-07
上传用户:JIUSHICHEN
AdaBoost, Adaptive Boosting, is a well-known meta machine learning algorithm that was proposed by Yoav Freund and Robert Schapire. In this project there two main files 1. ADABOOST_tr.m 2. ADABOOST_te.m to traing and test a user-coded learning (classification) algorithm with AdaBoost. A demo file (demo.m) is provided that demonstrates how these two files can be used with a classifier (basic threshold classifier) for two class classification problem.
标签: well-known algorithm AdaBoost Adaptive
上传时间: 2014-01-15
上传用户:qiaoyue
AdaBoost, Adaptive Boosting, is a well-known meta machine learning algorithm that was proposed by Yoav Freund and Robert Schapire. In this project there two main files
标签: well-known algorithm AdaBoost Adaptive
上传时间: 2013-12-31
上传用户:jiahao131
Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two main problems seriously darken the future of this technology though. Firstly, the large number of attacks and weaknesses which appear as fast as new algorithms are proposed, emphasizes the limits of this technology and in particu-lar the fact that it may not match users expectations. Secondly, the requirements, tools and methodologies to assess the current technologies are almost non-existent. The lack of benchmarking of current algorithms is bla-tant. This confuses rights holders as well as software and hardware manufacturers and prevents them from using the solution appropriate to their needs. Indeed basing long-lived protection schemes on badly tested watermarking technology does not make sense.
标签: Watermarking watermarking evaluation presented
上传时间: 2013-12-04
上传用户:thinode
Video-DVM is a very cheap DVM that shows how an output as complex as a videocomposite signal can be generated entirely in software: two I/O pins and three resistors are all the hardware required. Connected to any TV set it displays voltages, included max and min peaks, using both giant digits and an analog bar-display . A serial data output for computer data logging is provided, too.
标签: videocomposite Video-DVM complex output
上传时间: 2014-12-09
上传用户:xuan‘nian
ystem will automatically delete the directory of debug and release, so please do not put files on these two directory.
标签: automatically directory release delete
上传时间: 2014-01-07
上传用户:yyq123456789
Please read your package and describe it at least 40 bytes. System will automatically delete the directory of debug and release, so please do not put files on these two directory.
标签: automatically describe package Please
上传时间: 2013-12-06
上传用户:dave520l
Jpeg Steganography Please read your package and describe it at least 40 bytes. System will automatically delete the directory of debug and release, so please do not put files on these two directory.
标签: Steganography describe package automat
上传时间: 2013-12-17
上传用户:努力努力再努力