虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Provide

  • Semantic analysis of multimedia content is an on going research area that has gained a lot of atten

    Semantic analysis of multimedia content is an on going research area that has gained a lot of attention over the last few years. Additionally, machine learning techniques are widely used for multimedia analysis with great success. This work presents a combined approach to semantic adaptation of neural network classifiers in multimedia framework. It is based on a fuzzy reasoning engine which is able to evaluate the outputs and the confidence levels of the neural network classifier, using a knowledge base. Improved image segmentation results are obtained, which are used for adaptation of the network classifier, further increasing its ability to Provide accurate classification of the specific content.

    标签: multimedia Semantic analysis research

    上传时间: 2016-11-24

    上传用户:虫虫虫虫虫虫

  • Boost Provides free peer-reviewed portable C++ source libraries. We emphasize libraries that work

    Boost Provides free peer-reviewed portable C++ source libraries. We emphasize libraries that work well with the C++ Standard Library. Boost libraries are intended to be widely useful, and usable across a broad spectrum of applications. The Boost license encourages both commercial and non-commercial use. We aim to establish "existing practice" and Provide reference implementations so that Boost libraries are suitable for eventual standardization. Ten Boost libraries are already included in the C++ Standards Committee s Library Technical Report (TR1) as a step toward becoming part of a future C++ Standard. More Boost libraries are proposed for the upcoming TR2. Boost works on almost any modern operating system, including UNIX and Windows variants. Follow the Getting Started Guide to download and install Boost. Popular Linux and Unix distributions such as Fedora, Debian, and NetBSD include pre-built Boost packages. Boost may also already be available on your organization s internal web server.

    标签: libraries peer-reviewed emphasize Provides

    上传时间: 2016-12-05

    上传用户:semi1981

  • The TMS320LF240xA and TMS320LC240xA devices, new members of the TMS320C24x generation of dig

    The TMS320LF240xA and TMS320LC240xA devices, new members of the TMS320C24x generation of digital signal processor (DSP) controllers, are part of the TMS320C2000 platform of fixed-point DSPs. The 240xA devices offer the enhanced TMS320 DSP architectural design of the C2xx core CPU for low-cost, low-power, and high-performance processing capabilities. Several advanced peripherals, optimized for digital motor and motion control applications, have been integrated to Provide a true single-chip DSP controller. While code-compatible with the existing C24x DSP controller devices, the 240xA offers increased processing performance (40 MIPS) and a higher level of peripheral integration. See the TMS320x240xA Device Summary section for device-specific features.

    标签: TMS 320 generation 240

    上传时间: 2013-12-16

    上传用户:GavinNeko

  • "The GRAPHICS GEMS Series" was started in 1990 by Andrew Glassner. The vision and purpose of the Ser

    "The GRAPHICS GEMS Series" was started in 1990 by Andrew Glassner. The vision and purpose of the Series was - and still is - to Provide tips, techniques, and algorithms for graphics programmers. All of the gems are written by programmers who work in the field and are motivated by a common desire to share interesting ideas and tools with their colleagues. Each volume Provides a new set of innovative solutions to a variety of programming problems.

    标签: The GRAPHICS Glassner started

    上传时间: 2016-12-18

    上传用户:firstbyte

  • This document is a "practical guide" to very quickly setup CVS/RCS source code control system. This

    This document is a "practical guide" to very quickly setup CVS/RCS source code control system. This document has custom shell scripts which are wrappers on top of CVS. These scripts Provide an easy user interface for CVS. Several shell scripts are Provided to make RCS more easy to use. The information in this document applies to Linux and as well as to all other flavors of Unix liks Solaris, HPUX, AIX, SCO, Sinix, BSD, SCO, etc.. and BeOS.

    标签: This practical document control

    上传时间: 2014-01-16

    上传用户:gxmm

  • ucos2 is a file system for embedded applications which can be used on any media, for which you can p

    ucos2 is a file system for embedded applications which can be used on any media, for which you can Provide basic hardware access functions. µ C/FS is a high performance library that has been optimized for minimum memory consumption in RAM and ROM, high speed and versatility. It is written in ANSI C and can be used on any CPU.

    标签: which applications can for

    上传时间: 2017-01-04

    上传用户:偷心的海盗

  • ucos2 is a file system for embedded applications which can be used on any media, for which you can p

    ucos2 is a file system for embedded applications which can be used on any media, for which you can Provide basic hardware access functions. µ C/FS is a high performance library that has been optimized for minimum memory consumption in RAM and ROM, high speed and versatility. It is written in ANSI C and can be used on any CPU.

    标签: which applications can for

    上传时间: 2017-01-04

    上传用户:13517191407

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they Provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    标签: vulnerabilities Introduction discovered undeniably

    上传时间: 2014-01-05

    上传用户:yph853211

  • Description The MUSIC algorithm, proposed by Schmidt, first estimates a basis for the noise subspace

    Description The MUSIC algorithm, proposed by Schmidt, first estimates a basis for the noise subspace and then determines the peaks the associated angles Provide the DOA estimates. The MATLAB code for the MUSIC algorithm is sampled by creating an array of steering vectors corresponding to the angles in the vector angles.

    标签: Description algorithm estimates proposed

    上传时间: 2013-12-08

    上传用户:hgy9473

  • This document Provides guidelines and describes how to easily port S60 2nd Edition C++ application

    This document Provides guidelines and describes how to easily port S60 2nd Edition C++ applications to S60 3rd Edition. The document has been written based on experiences of porting regular S60 2nd Edition applications, such as the S60 Platform: POP/IMAP Example [4] that can be downloaded from Forum Nokia. Code snippets from the example are shown in Chapter 8, “Application build changes,” and in Appendix A, “Code example." In addition, Appendix B, "Commonly used functions that require capabilities," and Appendix C, "Commonly used interfaces that have been changed or removed," Provide useful information on some frequently used functions and interfaces in third-party applications.

    标签: application guidelines describes document

    上传时间: 2017-01-29

    上传用户:wang5829