DL : 0
// copyright by Peter Huber, Singapore, 2006
// this code is provided as is, bugs are probable, free for any use at own risk, no
// responsibility accepted. All rights, title and interest in and to the accompanying content retained. :-)
Update : 2008-10-10
Size : 6.43kb
Publisher : qyn2008
DL : 0
// this code is provided as is, bugs are probable, free for any use at own risk, no
// responsibility accepted. All rights, title and interest in and to the accompanying content retained. :-)
Update : 2008-10-10
Size : 7.66kb
Publisher : qyn2008
DL : 0
recnet is a complete speech recognition system for the DARPA TIMIT and
Resource Management tasks. It uses recurrent networks to estimate phone
probabilities and Markov models to find the most probable sequence of phones
or words.-recnet is a complete speech recognition system for the DARPA TIMIT and Resource Management tasks. It uses recurrent networks to estimate phone probabilities and Markov models to find the most probable sequence of phones or words
Update : 2008-10-13
Size : 581.74kb
Publisher : 站长
DL : 0
New users and old of optimization in MATLAB will find useful tips and tricks in this document, as well as examples one can use as templates for their own problems.
Use this tool by editing the file optimtips.m, then execute blocks of code in cell mode from the editor, or best, publish the file to HTML. Copy and paste also works of course.
Some readers may find this tool valuable if only for the function pleas - a partitioned least squares solver based on lsqnonlin.
This is a work in progress, as I fully expect to add new topics as I think of them or as suggestions are made. Suggestions for topics I ve missed are welcome, as are corrections of my probable numerous errors. The topics currently covered are listed below
Update : 2008-10-13
Size : 89.41kb
Publisher : 阳关
DL : 0
GNU CPP 4
Update : 2025-02-19
Size : 79kb
Publisher : 施展
DL : 0
recnet is a complete speech recognition system for the DARPA TIMIT and
Resource Management tasks. It uses recurrent networks to estimate phone
probabilities and Markov models to find the most probable sequence of phones
or words.-recnet is a complete speech recognition system for the DARPA TIMIT and Resource Management tasks. It uses recurrent networks to estimate phone probabilities and Markov models to find the most probable sequence of phones or words
Update : 2025-02-19
Size : 582kb
Publisher : 站长
DL : 0
Update : 2025-02-19
Size : 78kb
Publisher : zjw
DL : 0
New users and old of optimization in MATLAB will find useful tips and tricks in this document, as well as examples one can use as templates for their own problems.
Use this tool by editing the file optimtips.m, then execute blocks of code in cell mode from the editor, or best, publish the file to HTML. Copy and paste also works of course.
Some readers may find this tool valuable if only for the function pleas - a partitioned least squares solver based on lsqnonlin.
This is a work in progress, as I fully expect to add new topics as I think of them or as suggestions are made. Suggestions for topics I ve missed are welcome, as are corrections of my probable numerous errors. The topics currently covered are listed below-New users and old of optimization in MATLAB will find useful tips and tricks in this document, as well as examples one can use as templates for their own problems.
Use this tool by editing the file optimtips.m, then execute blocks of code in cell mode from the editor, or best, publish the file to HTML. Copy and paste also works of course.
Some readers may find this tool valuable if only for the function pleas- a partitioned least squares solver based on lsqnonlin.
This is a work in progress, as I fully expect to add new topics as I think of them or as suggestions are made. Suggestions for topics I ve missed are welcome, as are corrections of my probable numerous errors. The topics currently covered are listed below
Update : 2025-02-19
Size : 89kb
Publisher : 阳关
DL : 0
observable distribution grid are investigated. A distribution
grid is observable if the state of the grid can be fully determined.
For the simulations, the modified 34-bus IEEE test feeder is used.
The measurements needed for the state estimation are generated
by the ladder iterative technique. Two methods for the state
estimation are analyzed: Weighted Least Squares and Extended
Kalman Filter. Both estimators try to find the most probable
state based on the available measurements. The result is that
the Kalman filter mostly needs less iterations and calculation
time. The disadvantage of the Kalman filter is that it needs some
foreknowlegde about the state.
Update : 2025-02-19
Size : 248kb
Publisher : chowzaisun
DL : 0
我们设计了一个新的计算算法,借助后续的导联7,8,9导联信号V7,V8,V9,以改善心电检测中孤立和心肌梗死信号的检测。-We designed a new computer algorithm to improve ECG detection of isolated and
combined posterior myocardial infarct using extended posterior leads V7, V8 and V9. ECG criteria for PMI include “age” (acute, recent, age indeterminate or old) and probability” (consider, probable or definite) infarct.
Update : 2025-02-19
Size : 300kb
Publisher : 牛莉
DL : 0
本书介绍了一些常用的图论模型以及图论在通信,统计,优化,图像处理,机器学习等方面的应用-The formalism of probabilistic graphical models provides a unifying
framework for capturing complex dependencies among random
variables, and building large-scale multivariate statistical models.
Graphical models have become a focus of research in many statistical,
computational and mathematical fields, including bioinformatics,
communication theory, statistical physics, combinatorial optimization,
signal and image processing, information retrieval and statistical
machine learning. Many problems that arise in specific instances —
including the key problems of computing marginals and modes of
probability distributions — are best studied in the general setting.
Working with exponential family representations, and exploiting the
conjugate duality between the cumulant function and the entropy
for exponential families, we develop general variational representations
of the problems of computing likelihoods, marginal probabilities
and most probable configurations. We describe how
Update : 2025-02-19
Size : 1.73mb
Publisher : 万毅
DL : 0
The present report outlines the design, implementation and performance of the application of Hough
Transform (HT) to detect circles in arbitrary pictures.
Detecting circles in arbitrary pictures involves a two step process in this project. First, edges within the
image have to be detected then, by means of a voting mechanism the most probable circles will be
located.
Edge detection goal is to look for boundary locations that naturally happen between objects. Objects
normally have continuous intensity values therefore sudden changes in that pattern might indicate a
boundary condition. Changes of intensity in one direction can be calculated by the gradient operator
however, noise can alter meaningful edges. Convolution is then normally applied to account for a small
amount of smoothing, thus reducing noise.-The present report outlines the design, implementation and performance of the application of Hough
Transform (HT) to detect circles in arbitrary pictures.
Detecting circles in arbitrary pictures involves a two step process in this project. First, edges within the
image have to be detected then, by means of a voting mechanism the most probable circles will be
located.
Edge detection goal is to look for boundary locations that naturally happen between objects. Objects
normally have continuous intensity values therefore sudden changes in that pattern might indicate a
boundary condition. Changes of intensity in one direction can be calculated by the gradient operator
however, noise can alter meaningful edges. Convolution is then normally applied to account for a small
amount of smoothing, thus reducing noise.
Update : 2025-02-19
Size : 1.06mb
Publisher : donna
DL : 0
Reliable communication is mission critical to Emergency and Rescue operations.
MANET technology allowing communication where fixed infrastructure is not available
is very attractive for this setting. Emergency and Rescue operations may take place in
both hostile as well as benign environment. The communication system must handle
both situations. Security attacks can be launched towards any layer of the protocol
stack. What is new with wireless ad hoc networks is the network layer routing
information as a more probable target for security attacks. A reliable network service
cannot be provided without embracing routing information security. The primary
challenge is to decide which routing information can be trusted. The answer so far is
cryptographically signed routing messages. The possession of cryptographic keys serves
as proof of trustworthiness. A proper key management service is thus a critical factor
for the success of wireless ad hoc networks.
Update : 2025-02-19
Size : 69kb
Publisher : Rishi
DL : 0
MessageBoxIndirect is a little known API function defined in user32.dll, that lets you customize message boxes just that little bit more (and it’s highly probable that MessageBox itself uses MessageBoxIndirect internally).
Here’s some sample code that shows how you can show a message box with a custom icon :-
Update : 2025-02-19
Size : 3kb
Publisher : kamalraj.s
DL : 0
In probability theory, a stochastic process, or sometimes random process, is the counterpart to a deterministic process (or deterministic system). Instead of dealing with only one possible reality of how the process might evolve under time (as is the case, for example, for solutions of an ordinary differential equation), in a stochastic or random process there is some indeterminacy in its future evolution described by probability distributions. This means that even if the initial condition (or starting point) is known, there are many possibilities the process might go to, but some paths may be more probable and others less.
Update : 2025-02-19
Size : 3kb
Publisher : hazhiriq200
DL : 0
维特比算法
寻找最可能的隐藏状态序列(Finding most probable sequence of hidden states)
对于一个特殊的隐马尔科夫模型(HMM)及一个相应的观察序列,我们常常希望能找到生成此序列最可能的隐藏状态序列。
-Viterbi algorithm to find the most likely hidden state sequence (Finding most probable sequence of hidden states) for a particular hidden Markov model (HMM) and a corresponding observation sequence, we often want to find the most likely generated the sequence hidden state sequence.
Update : 2025-02-19
Size : 51kb
Publisher : machinery
DL : 0
产生一个10000位的bipolar信号并画出bit error performance的模拟图像,求出BER-The source generates equally probable bits, P(0) = P(1) = 0.5.
(a) Construct a program to generate 10000 bits with bipolar signaling.
(b) Use your program to simulate the bit error performance of the system with
Eb/N0 = 0, 2, 4, 6, 8, 10 dB.
(c) Compare your simulated performance with the analytical expression for the
bit error rate (BER):
Update : 2025-02-19
Size : 3kb
Publisher : Yan Li
DL : 0
本文利用模糊理论中的高斯隶属
度函数来获得模糊观测下具有概率特性的似然函数,并且由此似然函数得到每个传感器提供信息的可信度;再将各传感器的可
信度转化成基本概率赋值函数即mass 函数;最后利用证据理论对多传感器信息进行融合。对目标识别的仿真试验表明该方法获
得的结果比直接结果具有更高的精度和可靠性。-The method uses fuzzy theory in the Gaussian
fuzzy membership function to obtain a probable characteristic under observation likelihood function,and the resulting likelihood
function gets the credibility of the information provided by the sensors.Then the reliability of each sensor is changed
to a mass function.Finally,multi-sensor information is combined by using evidence theory.Simulation of target recognition
shows that the results obtained have higher accuracy and reliability.
Update : 2025-02-19
Size : 1.35mb
Publisher : coral
DL : 0
Introduction
dePCB.org project aims at helping people reverse engineer unknown electronic equipment faster and more easily.
We plan to provide a collaborative platform where people can identify components, IC, annotate parts of a PCB and discuss a probable use or receive suggestions about further enquiry (JTAG, UART serial, glitching, ...).
Use case #1
Upload image to depcb.org
OCR the image to retrieve any text (and display it on the web page, next to the image)
Position on the image where each text portion was recognized
Query an IC DB to fetch IC function / characteristics.
-Introduction
dePCB.org project aims at helping people reverse engineer unknown electronic equipment faster and more easily.
We plan to provide a collaborative platform where people can identify components, IC, annotate parts of a PCB and discuss a probable use or receive suggestions about further enquiry (JTAG, UART serial, glitching, ...).
Use case #1
Upload image to depcb.org
OCR the image to retrieve any text (and display it on the web page, next to the image)
Position on the image where each text portion was recognized
Query an IC DB to fetch IC function / characteristics.
Update : 2025-02-19
Size : 10kb
Publisher : jhi
DL : 0
It is a sample java program to find the duplicates in a csv file and create an output csv with number of probable duplicates.
Update : 2025-02-19
Size : 3.77mb
Publisher : d s n murthy
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus All Rights Reserved.