资源列表
projectdocumentation3
- the 3rd part..think this will work
booking
- You can select the Brush Transform tool by clicking and holding the Gradient tool until the Brush Transform tool appears. When it does, select it. Basically, this tool allows you to transform the gradient brush, while the Gradient tool allows yo
dianliqiyeyejiguanlizixunbaogao
- 该报告简单介绍了中国电力企业业绩管理的现状,并提出了改善该系统的原则、流程以及方案等
tracking
- 目标跟踪算法介绍,发展,及总结-Target tracking algorithm introduction, development, and summary
hmm
- 基于隐马尔科夫的学习资料,里面有关于隐马尔可夫模型的基本知识-Based on Hidden Markov learning materials, there are basic knowledge about hidden Markov model..
lecture-06-genetic-algorithm-done
- Implementation Genetic algorithm in data mining to optimize our decision in our daily life
Modifying_Memory_Security_Keys_TMS470
- This document shows how to reprogram the Memory Security Module (MSM) keys on the TMS470 evices. These examples are intended as a reference to enable the user to modify the MSM keys and unlock the part using the IAR tools. The reference design inc
sas
- 视频检索综述,对视频检索目前的发展,以前视频检索技术的总结-Video Retrieval System, the development of video retrieval, a summary of the previous video retrieval technology
Quantization
- This article tells about the Quantization used in approximations.
kalman fi
- Wind Turbine System Requirements These are example requirements, and are intended solely to show how requirements documents can be linked to the model.
电话语音报警技术在安防系统中的应用
- 电话语音报警技术在安防系统中的应用.PDF电话语音报警技术在安防系统中的应用.PDF
lecture-03-clustering-done
- Data mining clustering massive data into specified group