资源列表
219
- It is about matlab which depicts brain image segmentation
no6
- 高集成的编辑器调整 C 和 DSP 汇编代码: CCS5000 的内建编辑器支持 C 和汇编文件的动态语法加亮显示。使用户能很容 易地阅读代码和当场发现语法错误。 -Each lesson contains an overview section that provides a summary of the lesson, the learning objectives, the tutorial example used, the applica
pca-fault
- 故障诊断方面的一篇文章,发表在Automatica上,具有很大的参考意义。-Fault diagnosis of an article published in Automatica, and has great reference value.
Boosting_Color
- matlab code for boosting color in an image
final3
- THIS CODEIS USEFUL FOR COMPRESSION OF DATA USING BITMASK AND RLE
traveling-salesman-prolem
- In this paper I will discuss a genetic approach to fi nding near-optimal soltu- ions to Traveling Salesman Problems. I will also discuss how using a heuristic to generate an initial pool aff ects the run time and solutions found by my progr
Classic-blog
- 很多大牛的博客,对学习linux,c++等相关技术研究很有帮助-Many large cattle blog, to learn linux, c++ other related technical research helpful! !
Detection-of-Syn-Flooding-Attacks-using-Linear-Pr
- This paper presents a simple but fast and effective method to detect TCP SYN flooding attacks. Linear prediction analysis is proposed as a new paradigm for DoS attack detection. The proposed SYN flooding detection mechanism makes use of the exp
Discrete-choice-analysis-of-spatial-attack-sites.
- This paper presents an algorithm for the complete specification of multinomial discrete choice models to predict the spatial preferences of attackers. The formulation employed is a modification of models previously applied in transportation flo
EFFECTIVENESS-OF-SUPPORT-VECTOR-MACHINE-FOR-CRIME
- Crime hot-spot location prediction is important for public safety. The output from the prediction can provide useful information to improve the activities aimed at detecting and preventing safety and security problems. Location prediction is a sp
GAPatrol--An-Evolutionary-Multiagent-Approach-for
- In this work, we present a novel evolutionary multiagent-based simulation tool, named as GAPatrol. Such system is devoted to the specification of effective police patrol route strategies for coping with criminal activities happening in a given
Insider-threat-mitigation--preventing-unauthorize
- This paper investigates insider threat in relational database systems. It discusses the problem of inferring unauthorized information by insiders and proposes methods to prevent such threats. The paper defines various types of dependencies as