资源列表
Ant-Based Cyber Security
- 蚂蚁算法的安全问题,运用蚂蚁算法,解决黑客,防盗等安全问题(ant-based cyber--describe a swarming-agent-based, mixedinitiative approach to infrastructure defense where teams of humans and software agents defend cooperating organizations in tandem by sharing insights and solutio
合并图纸工具
- 主要用tekla合图专用,dxf,dwg都可以合并(Mainly use tekla graph is special, DXF, DWG can be merged)
1meg_mod
- EPROM Programmer part 1
eprom
- EPROM Programmer part2
epromdoc
- EPROM Programmer part3
i2ccode
- EPROM Programmer part4
i2crom
- EPROM Programmer part5
pceb115
- EPROM Programmer part6
2013-02-11-FAST-Tutorial
- fast tutorial on erasure decoding and raptor codes
fountain_codes_slides
- a presentation for fountain codes
FountainCodes +impelementation
- steps to explain and implement fountain codes
机器学习实战
- 讲解机器学习,用个大案例进行学习分心,包括代码编写,训练,模型建立,模型使用方法(Explain machine learning, use a large case for learning distractions, including code writing, training, model building, and model use)
