虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

widely

  • A Tutorial on Principal Component Analysis.Principal component analysis (PCA) is a mainstay of moder

    A Tutorial on Principal Component Analysis.Principal component analysis (PCA) is a mainstay of modern data analysis - a black box that is widely used but poorly understood. The goal of this paper is to dispel the magic behind this black box.

    标签: Principal Component component Tutorial

    上传时间: 2016-04-14

    上传用户:aysyzxzm

  • Recent advances in experimental methods have resulted in the generation of enormous volumes of data

    Recent advances in experimental methods have resulted in the generation of enormous volumes of data across the life sciences. Hence clustering and classification techniques that were once predominantly the domain of ecologists are now being used more widely. This book provides an overview of these important data analysis methods, from long-established statistical methods to more recent machine learning techniques. It aims to provide a framework that will enable the reader to recognise the assumptions and constraints that are implicit in all such techniques. Important generic issues are discussed first and then the major families of algorithms are described. Throughout the focus is on explanation and understanding and readers are directed to other resources that provide additional mathematical rigour when it is required. Examples taken from across the whole of biology, including bioinformatics, are provided throughout the book to illustrate the key concepts and each technique’s potential.

    标签: experimental generation advances enormous

    上传时间: 2016-10-23

    上传用户:wkchong

  • Semantic analysis of multimedia content is an on going research area that has gained a lot of atten

    Semantic analysis of multimedia content is an on going research area that has gained a lot of attention over the last few years. Additionally, machine learning techniques are widely used for multimedia analysis with great success. This work presents a combined approach to semantic adaptation of neural network classifiers in multimedia framework. It is based on a fuzzy reasoning engine which is able to evaluate the outputs and the confidence levels of the neural network classifier, using a knowledge base. Improved image segmentation results are obtained, which are used for adaptation of the network classifier, further increasing its ability to provide accurate classification of the specific content.

    标签: multimedia Semantic analysis research

    上传时间: 2016-11-24

    上传用户:虫虫虫虫虫虫

  • Boost provides free peer-reviewed portable C++ source libraries. We emphasize libraries that work

    Boost provides free peer-reviewed portable C++ source libraries. We emphasize libraries that work well with the C++ Standard Library. Boost libraries are intended to be widely useful, and usable across a broad spectrum of applications. The Boost license encourages both commercial and non-commercial use. We aim to establish "existing practice" and provide reference implementations so that Boost libraries are suitable for eventual standardization. Ten Boost libraries are already included in the C++ Standards Committee s Library Technical Report (TR1) as a step toward becoming part of a future C++ Standard. More Boost libraries are proposed for the upcoming TR2. Boost works on almost any modern operating system, including UNIX and Windows variants. Follow the Getting Started Guide to download and install Boost. Popular Linux and Unix distributions such as Fedora, Debian, and NetBSD include pre-built Boost packages. Boost may also already be available on your organization s internal web server.

    标签: libraries peer-reviewed emphasize provides

    上传时间: 2016-12-05

    上传用户:semi1981

  • This work briefly explains common cryptosystems and details two most popular private-key ciphers: DE

    This work briefly explains common cryptosystems and details two most popular private-key ciphers: DES ,which is probably the most widely used, and AES, which is intended to replace DES.

    标签: cryptosystems private-key explains briefly

    上传时间: 2013-12-20

    上传用户:xfbs821

  • This software performs code conversion of Chinese characters, including GB2312/GBK and BIG5. It a

    This software performs code conversion of Chinese characters, including GB2312/GBK and BIG5. It also supports some encodings of Chinese character code which are used widely in Japan, such as Chinese Writer, cWnn, Nihao, Zhongwen Qigao, etc.

    标签: characters conversion including software

    上传时间: 2014-01-05

    上传用户:GavinNeko

  • Create a Delaunay triangulation or Voronoi diagram by clicking points. Delaunay triangulations and V

    Create a Delaunay triangulation or Voronoi diagram by clicking points. Delaunay triangulations and Voronoi diagrams are among the most widely used data structures in the field of Computational Geometry. These are Java-oriented source codes.

    标签: Delaunay triangulations triangulation clicking

    上传时间: 2013-11-25

    上传用户:zhaiye

  • The existence of numerous imaging modalities makes it possible to present different data present in

    The existence of numerous imaging modalities makes it possible to present different data present in different modalities together thus forming multimodal images. Component images forming multimodal images should be aligned, or registered so that all the data, coming from the different modalities, are displayed in proper locations. The term image registration is most commonly used to denote the process of alignment of images , that is of transforming them to the common coordinate system. This is done by optimizing a similarity measure between the two images. A widely used measure is Mutual Information (MI). This method requires estimating joint histogram of the two images. Experiments are presented that demonstrate the approach. The technique is intensity-based rather than feature-based. As a comparative assessment the performance based on normalized mutual information and cross correlation as metric have also been presented.

    标签: present modalities existence different

    上传时间: 2017-04-03

    上传用户:qunquan

  • The Data Encryption Standard (DES) is a published federal encryption standard created to protect unc

    The Data Encryption Standard (DES) is a published federal encryption standard created to protect unclassified computer data and communications. The DES algorithm is the most widely used encryption algorithm in the world

    标签: Encryption encryption published Standard

    上传时间: 2017-04-18

    上传用户:lili123

  • If a tree falls in the forest, and there s nobody there to hear, does it make a sound? This classic

    If a tree falls in the forest, and there s nobody there to hear, does it make a sound? This classic conundrum was coined by George Berkeley (1685-1753), the Bishop and influential Irish philosopher whose primary philosophical achievement is the advancement of what has come to be called subjective idealism. He wrote a number of works, of which the most widely-read are Treatise Concerning the Principles of Human Knowledge (1710) and Three Dialogues between Hylas and Philonous (1713) (Philonous, the "lover of the mind," representing Berkeley himself).

    标签: there classic forest nobody

    上传时间: 2013-11-26

    上传用户:stvnash