搜索资源列表
datamining03
- 文本挖掘的起源 文本挖掘的过程 特征建立 特征集缩减 知识模式提取 模型评价 国内外研究状况 -Text Mining Text Mining the origin of the process of establishing reduced feature set of knowledge extraction model to evaluate the model at home and abroad Research
Analysis_and_Detection_of_Shadows_in_Video_Streams
- Robustnesstochangesinilluminationconditionsaswellas viewing perspectives is an important requirement formany computer vision applications. One of the key fac-ors in enhancing the robustness of dynamic scene analy-sis that of accurate and reliable mea
mS07033
- 自己看吧,,.看到了就知道好与不好了 不懂的就不要评价..谢谢 -themselves Look here. See on the do not know or not know that it will not evaluate .. Thank you
failure
- This paper addresses a stochastic-#ow network in which each arc or node has several capacities and may fail. Given the demand d, we try to evaluate the system reliability that the maximum #ow of the network is not less than d. A simple algorithm
constraint
- This paper addresses a stochastic-#ow network in which each arc or node has several capacities and may fail. Given the demand d, we try to evaluate the system reliability that the maximum #ow of the network is not less than d. A simple algorithm
budget
- This paper addresses a stochastic-#ow network in which each arc or node has several capacities and may fail. Given the demand d, we try to evaluate the system reliability that the maximum #ow of the network is not less than d. A simple algorithm
unreliable
- This paper addresses a stochastic-#ow network in which each arc or node has several capacities and may fail. Given the demand d, we try to evaluate the system reliability that the maximum #ow of the network is not less than d. A simple algorithm
1
- In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadline violations. Priority inheritance protocol is one of the approaches to reduce priority inversion. Unfortunately, RTOS like uC/OS can’t suppo
DMC1500.rar
- The DSKs or eZdspTM LF2407 and the DMC1500 make up a table top motor development system which allows engineers and software developers to evaluate certain characteristics of the TMS320F240, TMS320F243, and TMS320LF2407 DSPs to determine if the pro
Evacuation_simulation
- 本文主要研究了面向紧急疏散的群体仿真相关技术,建立起了从建模到评价的一套群体仿真系统-This paper mainly studies the groups for the emergency evacuation simulation related technologies, from modeling to evaluate established a set of groups of simulation system
A_Synthetic_Evaluation_fo_Antijamming_Ability_of_t
- 摘要:实战条件下如何评价短波跳频通信系统的抗干扰性能是构建短波跳频通信系统的重要环rr-}J。由于不 能得到精确的指标评价值,采川组合赋权法给出了系统抗干扰性能的评价算法已经不能适川。给出了一种模糊综 合评价方法,该方法有如下优点:为避兔专家赋指标权值的卞观随意性,将德尔菲(Delphi)法和层次分析法(AHP)相结合来确定指标权值 为了便于专家较准确地作出评判,给出了指标评价等级,并利川模糊评价法给出指标评价矩 阵,最后得到评价结果。评价实例表明了该方法的有效性。 -Abst
Antenna_Web_Design_Studio_crack_serial_keygen
- dsp application and program methodology to evaluate and pratice dsp code
P2P
- p2p成果出来以后,要对p2p算法和性能进行评价,p2p模拟器可以正确性验证并对协议的性能进行分析,本文就介绍几种常用的模拟器。-After the results from p2p, p2p algorithm and to evaluate the performance, p2p simulator can verify the correctness and analyze the performance of the agreement, this article will intro
InterferenceevaluatioofBluetoothandIEEE802.11bsyst
- Interference evaluation of Bluetooth and IEEE 802.11 b systems-The emergence of several radio technologies, such as Bluetooth and IEEE 802.11, operating in the 2.4 GHz unlicensed ISM frequency band, may lead to signal interference and result
CMMI_Standard
- "软件能力成熟度模型CMM标准"定义了用于衡量一个组织的软件能力的成熟度的模型,即软件能力成熟度模型。本标准适用于组织对自己的软件过程进行改进,也适用于第3方对一个组织的软件能力成熟度进行评估。-CMM difines the model to evaluate the maturity of software and is the standard accepted by the software industry.
Gaussian
- The numerical integration methods described so far are based on a rather simple choice of evaluation points for the function f(x). They are particularly suited for regularly tabulated data, such as one might measure in a laboratory, or obtain fro
Noninvasivebeattobeatcardiacoutputmonitoringmeasur
- 该论文论述了一种新型的无创估计心输出量的方法-经胸电阻抗方法。 尽管有很多无创估计心输出量的方法,但是这些方法都有明显的缺陷,没有应用于临床。本文介绍的方法比较新颖,估计精确度较高,操作相对简单。 -The proposed method show us a new method to evaluate the cardiac output noninvasively. Althourgh several methods have been proposed, they are some
ASegmentationAlgorithmforContrast-EnhancedImages.r
- 基于Graph Cut的一种分割方法,比较著名的论文。-Graph Cut based on a segmentation method to compare the famous paper.
THE_FAST_HANDOVER_RESEARCH_of_wimax_network
- 本文正是在研究WIMAX/802.16e协议和FMIPv6协议的基础之 上,提出了基于FMIPv6的WIMAX网络快速切换机制,该方案采用跨 层切换的思想,MAC层联合网络层同时进行切换,在链路尚未断开 之前即完成新转交地址(NCOA)获取等功能,从而加快了切换进程, 减小了切换时延和切换时的丢包率。在提出本切换机制的基础上,本 文在NSZ仿真平台上对所提出的切换方案做了系统性的性能仿真,通 过仿真结果验证了方案的可行性和优越性。 - In this paper
how-to-evaluate-embedded-test-tools
- 嵌入式软件测试,尤其是自动化软件测试,对于软件的质量越来越重要,本文详细论述,如何评估一个嵌入式软件测试产品,应该考察嵌入式测试软件哪些技术细节?-Embedded software testing, especially the automation of software testing, software quality is more and more important for, in this paper, how to evaluate a test of embedded sof