资源列表
xdcode2
- 地图模式识别是由计算机来对地图进行识别与理解,并借助一定的技术手段研究和分析地 图上的各种模式信息,获取地图要素的信息。其过程类似于人对地图的阅读,它是近年来在地图 制图领域中新兴起来的一门高技术,是信息时代人工智能、模式识别技术在地图制图中的具体 应用。由于它是传统地图制图迈向数字地图制图的一座桥梁,因此,地图模式识别代表了当前地 图制图领域发展的前沿和主攻方向,它与遥感技术、地理信息系统一起,被称为现代地图制图的 三大技术。-maps by computer patter
R-REC-BT.709-5-200204-I!!MSW-E
- about itu-709 video standard -about itu-709 video standard
Tcl_TkC
- 简要介绍了利用 Tcl/ Tk 开发 X Window 下的 GUI 的一般流程 ,重点说明 了 Tcl/ Tk 与 C 语言的接口 ,包括如何扩展 Tcl 命令及建立新的 Tk 组件。- On the basis of intrudution of development of GUI application under X Window system with Tcl/ Tk , the paper explains the interface between C and Tcl/
AI-chap6
- 专家系统 ExpertSystem ExpertSystem
SCOSTA_1
- document regarding SCOSTA crd operating system
Diffusion
- The diffusion filtering package is a free (GPL) MATLAB program that implements the linear anisotropic diffusion filtering based on structure tensors It features an easy-to-use user interface, and a computationally powerful algorithm. -The diffusion f
00812025
- All-optical wavelength converters are expected to become key components in future broadband networks. Several techniques have been proposed to achieve ,wavelength conversion in fiber-optic links such as direct electro-optic and all-optical wavele
tutorial-1
- fluent tutorial on laminar flow
Greedy-Hop-Distance-Routing-using-Tree-Recovery-o
- Sensor routing techniques
inter-carrier-interference-in-LTE
- inter carrier interference in LTE
develop_security_policies
- COLLABORATING IN BUILDING SECURITY POLICIES. Policies are the foundation of effective information security, but the task of policy creation is complicated by human and organizational resistance. Technology alone does not work. In changing human behav
cooperativecode
- 本文重点说明了 协作通信在移动网络中的应用。对其方法和具体过程进行了阐述。
