资源列表
machinelearning
- 机器学习和数据挖掘有密切的联系,本文放在一起做一个粗浅的介绍-Machine learning and data mining are closely linked, the paper together to make a crude descr iption
LSVM
- 基于LSVM(Lagrangian Support Vector Machine)分类算法分析,设计了通用的银行个人信用特征数据-Based LSVM (Lagrangian Support Vector Machine) classification algorithm analysis, design of the common features of personal credit data bank
fMRI
- fMRI 介绍文件 原理和应用 包括MRI系统组成及算法
IF_RF
- 在无线通讯系统中,根据频率,可以分成射频(PF:Radio Frequency)、中频(IF:Intermediate Frequency)和基带(Base Band)信号-In the wireless communication system, according to frequency, can be divided into radio frequency (PF: Radio Frequency), IF (IF: Intermediate Frequency) and baseba
2010lisanyuxian
- 使用delphi开发的关于dct算法程序,希望能帮到大家,多多下载!-Developed using the delphi program on dct algorithm, hope can help everyone, lots of downloads!
3
- 信息论学科的概述、信息论研究的目的、信息论研究的内容、信息论的应用举例-Overview of information theory discipline, information theory research purposes, information theory content of the study, the application of information theory example
ECS_CW-10
- The goal of this coursework is to utilise web services to compose a travel agency. The travel agency consists of three independent services: flight booking, hotel reservation, and currency conversion. You will build the first two application se
ImpedanceMatchingCalculator
- Impedance Matching calculator Matching T Attenuator Calculator and Matching Pi Attenuator Calculator-Impedance Matching calculator Matching T Attenuator Calculator and Matching Pi Attenuator Calculator
EM78P468Nzaiyaokongqizhongdeyingyong
- EM78P468N在空调遥控器中的应用,文章还不错,值得一看,欢迎交流。-EM78P468N in the air conditioning remote control application, the article also well worth a visit, please share.
Okumura-Hata.MUDS
- 里面是论文,做毕业设计是能用到的,关于无线电损耗的-Which is the thesis, the final project is to be put to use, and on the radio loss
POS_doc
- Detailed descr iption of usage of open source POS(Point of Sale Software). Swedish language.
AnAnomalyBasedApproachforIntrusion
- A new system for web attack detection is presented. It follows the anomaly-based approach, therefore known and unknown attacks can be detected. The system relies on a XML file to classify the incoming requests as normal or anomalous. The XML