资源列表
20091211
- 电缆桥架安装和桥架内电缆敷设工程施工工艺标准-Cable tray installation in cable laying and bridge construction technology standards
tms-doc
- guia pratico e básico para utilizacao de componetes tms intraweb
value-at-risk-analysis
- Value at Risk analysis and least square tail estimation
FACE3D-Series
- Abstract—Recently, a 3D face recognition approach based on geometric invariant signatures, has been proposed. The key idea of the algorithm is a representation of the facial surface, invariant to isometric deformations, such as those result
PhotovoltaicmodulesafetyqualificationPart2Requirem
- IEC61730-2光伏组件安全鉴定(实验方法)-IEC61730-2 PV modules security identification (experimental method)
An_Improveme_of_LEACH_Routing_Protocol_Based_on_T
- Abstract—LEACH is a hierarchy routing protocol for WSN (wireless sensor networks), which is superior to direct communication protocol, minimum-transmission-energy protocol and static clustering protocol. owever, LEACH itself has some defects. In this
radar_jammer_in_matlab
- matlab code for jammer modelisation
2009 年中国IC设计公司调查
- 于2009年6月进行了网上和电话调查,调查对象是 419 家从事 IC 设计的中国大陆公司。本次调查的目的旨在了解这些公司目前的业务运营状况以及设计的复杂程度。
05319598
- Image Denoising Algorithm Based on Independent Component Analysis
ADC_APP_NOTE
- you can learn the basics of adc application
ECE815_fall05_fdr_intro_v3
- 7 designs have been developed by a team of students of two, each group is responsible for design and implementation of a VLSI subsystem
Chinese-word-segmentation
- 基于n-gram和机器学习的汉语分词算法 理论研究-Chinese word segmentation