资源列表
v46-112
- The aim of this article is to explain how features of attacks could be extracted from the packets. It also explains how vectors could be built and then applied to the input of any analysis stage
PayPassMChipV1.3
- PayPass – M/Chip Technical Specifications
2008062710270155421
- ad hoc wireless networks-wireless
Inverted-pendulum-system
- Inverted pendulum system explicit model predictive control
AdaBoostApp
- 这个文档是台湾的一篇关于adabost的文章。文章主要讲述了adabost的思想。和这个思想用在人脸检测上的应用。通过这个文档能够很好的了解这个算法的思想。-This document is an article on Taiwan' s adabost article. This paper mainly describes adabost ideas. And this idea used in face detection on the application. Through th
Adaline
- adaline neural network training algorithm
SEADC
- This a document which says about Analog Digital Conversion.-This is a document which says about Analog Digital Conversion.
MT9M032
- Aptina MT9M032 Image sensor
1003.1599_3
- Harmony Search as a Metaheuristic Algorithm
vldb04-model.pdf
- Model-Driven Data Acquisition in Sensor Networks research paper
Final-Speech-Project
- speech processing using matlab
Untitled-Document1
- research paper on hadoop cloud computing