CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 文档资料 行业发展研究

资源列表

« 1 2 ... .11 .12 .13 .14 .15 416.17 .18 .19 .20 .21 ... 1013 »
  1. 219

    0下载:
  2. It is about matlab which depicts brain image segmentation
  3. 所属分类:Development Research

    • 发布日期:2017-04-25
    • 文件大小:133.24kb
    • 提供者:ramanan
  1. pca-fault

    0下载:
  2. 故障诊断方面的一篇文章,发表在Automatica上,具有很大的参考意义。-Fault diagnosis of an article published in Automatica, and has great reference value.
  3. 所属分类:Development Research

    • 发布日期:2017-04-16
    • 文件大小:399.71kb
    • 提供者:zhang
  1. Boosting_Color

    0下载:
  2. matlab code for boosting color in an image
  3. 所属分类:Development Research

    • 发布日期:2017-05-08
    • 文件大小:1.52mb
    • 提供者:avvTech
  1. final3

    0下载:
  2. THIS CODEIS USEFUL FOR COMPRESSION OF DATA USING BITMASK AND RLE
  3. 所属分类:Development Research

    • 发布日期:2017-04-13
    • 文件大小:1.76kb
    • 提供者:mdeep
  1. traveling-salesman-prolem

    0下载:
  2. In this paper I will discuss a genetic approach to fi nding near-optimal soltu- ions to Traveling Salesman Problems. I will also discuss how using a heuristic to generate an initial pool aff ects the run time and solutions found by my progr
  3. 所属分类:Development Research

    • 发布日期:2017-03-28
    • 文件大小:117.27kb
    • 提供者:mona arooj
  1. Classic-blog

    0下载:
  2. 很多大牛的博客,对学习linux,c++等相关技术研究很有帮助-Many large cattle blog, to learn linux, c++ other related technical research helpful! !
  3. 所属分类:Development Research

    • 发布日期:2017-05-18
    • 文件大小:4.83mb
    • 提供者:与的
  1. Detection-of-Syn-Flooding-Attacks-using-Linear-Pr

    0下载:
  2. This paper presents a simple but fast and effective method to detect TCP SYN flooding attacks. Linear prediction analysis is proposed as a new paradigm for DoS attack detection. The proposed SYN flooding detection mechanism makes use of the exp
  3. 所属分类:Development Research

    • 发布日期:2017-05-13
    • 文件大小:3.36mb
    • 提供者:ahmed
  1. Discrete-choice-analysis-of-spatial-attack-sites.

    0下载:
  2. This paper presents an algorithm for the complete specification of multinomial discrete choice models to predict the spatial preferences of attackers. The formulation employed is a modification of models previously applied in transportation flo
  3. 所属分类:Development Research

    • 发布日期:2017-05-02
    • 文件大小:531.45kb
    • 提供者:ahmed
  1. EFFECTIVENESS-OF-SUPPORT-VECTOR-MACHINE-FOR-CRIME

    0下载:
  2. Crime hot-spot location prediction is important for public safety. The output from the prediction can provide useful information to improve the activities aimed at detecting and preventing safety and security problems. Location prediction is a sp
  3. 所属分类:Development Research

    • 发布日期:2017-04-07
    • 文件大小:443.19kb
    • 提供者:ahmed
  1. Insider-threat-mitigation--preventing-unauthorize

    0下载:
  2. This paper investigates insider threat in relational database systems. It discusses the problem of inferring unauthorized information by insiders and proposes methods to prevent such threats. The paper defines various types of dependencies as
  3. 所属分类:Development Research

    • 发布日期:2017-04-01
    • 文件大小:549.32kb
    • 提供者:ahmed
  1. Internet-Threat-Detection--Prediction-and-Relevan

    0下载:
  2. With the development of Internet technology, the popularity of the malicious threat has grown beyond our imagination. The emergence of intelligent, sophisticated attack techniques makes the Internet services more vulnerable than ever, which b
  3. 所属分类:Development Research

    • 发布日期:2017-04-06
    • 文件大小:307.97kb
    • 提供者:ahmed
  1. Mapping-crime--Understanding-hot-spots

    0下载:
  2. Much of crime mapping is devoted to detecting high-crime-density areas known as hot spots. Hot spot analysis helps police identify high-crime areas, types of crime being committed, and the best way to respond.
  3. 所属分类:Development Research

    • 发布日期:2017-05-06
    • 文件大小:1.05mb
    • 提供者:ahmed
« 1 2 ... .11 .12 .13 .14 .15 416.17 .18 .19 .20 .21 ... 1013 »
搜珍网 www.dssz.com