The tca package is a Matlab program that implements the tree-dependent component analysis (TCA) algorithms that extends the independent component analysis (ICA), where instead of looking for a linear transform that makes the data components independent, we are looking for components that can be best fitted in a tree structured graphical model. The TCA model can be applied in any situation where the data can be assumed to have been transformed by an unknown linear transformation.
标签: tree-dependent implements component analysis
上传时间: 2016-09-17
上传用户:cazjing
The main features of the considered identification problem are that there is no an a priori separation of the variables into inputs and outputs and the approximation criterion, called misfit, does not depend on the model representation. The misfit is defined as the minimum of the l2-norm between the given time series and a time series that is consistent with the approximate model. The misfit is equal to zero if and only if the model is exact and the smaller the misfit is (by definition) the more accurate the model is. The considered model class consists of all linear time-invariant systems of bounded complexity and the complexity is specified by the number of inputs and the smallest number of lags in a difference equation representation. We present a Matlab function for approximate identification based on misfit minimization. Although the problem formulation is representation independent, we use input/state/output representations of the system in order
标签: identification considered features separati
上传时间: 2016-09-20
上传用户:FreeSky
In the previous article, we presented an approach for capturing similarity between words that was concerned with the syntactic similarity of two strings. Today we are back to discuss another approach that is more concerned with the meaning of words. Semantic similarity is a confidence score that reflects the semantic relation between the meanings of two sentences. It is difficult to gain a high accuracy score because the exact semantic meanings are completely understood only in a particular context.
标签: similarity presented capturing previous
上传时间: 2013-12-13
上传用户:wcl168881111111
SQLite is a small, fast, embeddable database. What makes it popular is the combination of the database engine and interface into a single library as well as the ability to store all the data in a single file. Its functionality lies between MySQL and PostgreSQL, however it is faster than both databases.
标签: combination embeddable the database
上传时间: 2014-01-19
上传用户:yimoney
creat a certificate using makecert creat a PKCS#12.pfx file to store the private key Encrypte data using the public Key in Certificate Decrypt data using the private key in a PKCS#12.pfx file
标签: creat certificate Encrypte makecert
上传时间: 2016-10-28
上传用户:agent
This a GUI that manages DSP analysis functions for wav-files (e.g., speech signals). Two functions (plotps.m and spect.m) are included for starters. You may write your own functions and integrate that into the GUI without much hassle (see instructions in the accompanying readme.txt file). Additional features like the snipper lets you trim the time series and save it as a separate wav-file. The GUI is a great tool for instructors in a DSP course and DSP researchers alike!
标签: functions wav-files analysis manages
上传时间: 2016-11-09
上传用户:从此走出阴霾
The DSKs or eZdspTM LF2407 and the DMC1500 make up a table top motor development system which allows engineers and software developers to evaluate certain characteristics of the TMS320F240, TMS320F243, and TMS320LF2407 DSPs to determine if the processor meets the designers application requirements. Evaluators can create software to execute onboard or expand the system in a variety of ways.
标签: development eZdspTM system allow
上传时间: 2013-12-24
上传用户:zhuoying119
This book is designed to teach you the best practices in developing Windows DNA applications. We have avoided making this book a primer on every technology associated with Windows DNA. If we had followed this course, this would be an encyclopedia set. Everyone has their favorite authors and books on the various technical subject areas. The market is full of books to teach you the basics, the how, this book tries to be different in that we pull out the important points to teach you about the why. If you need training in a particular technology covered in this book, Sams has a number of 24-hour and 21-day books that cover a wide range of topics.
标签: applications developing practices designed
上传时间: 2016-11-27
上传用户:yyq123456789
The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.
标签: cryptography literature has Secrecy
上传时间: 2016-12-08
上传用户:fxf126@126.com
neural network utility is a Neural Networks library for the C++ Programmer. It is entirely object oriented and focuses on reducing tedious and confusing problems of programming neural networks. By this I mean that network layers are easily defined. An entire multi-layer network can be created in a few lines, and trained with two functions. Layers can be connected to one another easily and painlessly.
标签: Programmer Networks entirely network
上传时间: 2013-12-24
上传用户:liuchee