Welcome![Sign In][Sign Up]
Location:
Search - backward and forward

Search list

[Speech/Voice recognition/combineForward-BackwardAlgorithm

Description: HMM模型训练用的Forward-Backward Algorithm,包括几年WAV文件和测试用的TCL脚本文件-HMM training with the Forward-Backward Algorithm. years, including WAV and test the TCL script file
Platform: | Size: 184738 | Author: liangtao | Hits:

[Speech/Voice recognition/combineForward-BackwardAlgorithm

Description: HMM模型训练用的Forward-Backward Algorithm,包括几年WAV文件和测试用的TCL脚本文件-HMM training with the Forward-Backward Algorithm. years, including WAV and test the TCL script file
Platform: | Size: 184320 | Author: liangtao | Hits:

[OtherMATLAB_EKF_UKF

Description: documentation for optimal filtering toolbox for mathematical software package Matlab. The methods in the toolbox include Kalman filter, extended Kalman filter and unscented Kalman filter for discrete time state space models. Also included in the toolbox are the Rauch-Tung-Striebel and Forward-Backward smoother counter-parts for each filter, which can be used to smooth the previous state estimates, after obtaining new measurements. The usage and function of each method are illustrated with five demonstrations problems. 1-documentation for optimal filtering toolbox for mathematical softwarepackage Matlab. The methods in the toolbox include Kalman filter, extended Kalman filterand unscented Kalman filter for discrete time state space models. Als
Platform: | Size: 640000 | Author: eestarliu | Hits:

[Documentsecho5

Description: Increasing Payload of Echo Hiding Scheme Using Dual Backward and Forward Delay Kernels
Platform: | Size: 440320 | Author: ashraf | Hits:

[Windows Develops01-2

Description: An overview of the EAP-based handover procedures of the IEEE 802.16e standard is introduced and their security vulnerabilities are analyzed. Possible solutions for secure handover in IEEE 802.16e networks that guarantee a backward and forward secrecy are described and formally verified using Scyther, a specialized model checker for security protocols. These solutions showed a few drawbacks in the verified procedure and some modifications are proposed for a more secure and efficient handover protocol.
Platform: | Size: 626688 | Author: serag | Hits:

[Energy industryzc33

Description: 使用matlab编写的 配电网前推回代潮流计算程序 使用IEEE 33节点配电系统作为算例,可实现弱环网情况下的潮流计算-Matlab prepared using forward and backward substitution distribution network power flow calculation program uses IEEE 33 node power distribution system as an example, can be realized in case of weak-link network flow calculation
Platform: | Size: 1024 | Author: kone_zhang | Hits:

[JSP/JavaCS416-HW2-A2460

Description: Use console input and output. • Instead of hard coding n=50000, you need to get the value of n from user input. • You need to check the value of n and make sure it’s a positive integer. Keep prompting for value of n until you receive a positive integer number. • You need to print out the difference between the results of backward and forward computations using the standard scientific notation.-Use console input and output. • Instead of hard coding n=50000, you need to get the value of n from user input. • You need to check the value of n and make sure it’s a positive integer. Keep prompting for value of n until you receive a positive integer number. • You need to print out the difference between the results of backward and forward computations using the standard scientific notation.
Platform: | Size: 2048 | Author: 小九 | Hits:

[Other1196-Web-Navigation

Description: 这是一道有关于网页前进后退的简单程序问题。-Standard web browsers contain features to move backward and forward among the pages recently visited. One way to implement these features is to use two stacks to keep track of the pages that can be reached by moving backward and forward. In this problem, you are asked to implement this.
Platform: | Size: 1024 | Author: 海南 | Hits:

[Software EngineeringAccess-Control-Scheme-in-Cloud

Description: :云服务中现有访问控制方案对可信第三方具有强烈依赖性。针对该问题,提出一个基于属性的分布式云访问控制方案。建立云访 问控制模型,采用ABE的加密树方式构造访问控制策略,并给出用户撤销及策略更新方法。安全性分析表明,该方案能够抵抗共谋攻击, 具有数据保密性以及后向前向保密性。-Now existing access control scheme has the strong dependence to trusty third party in cloud.With regard to this problem,this paper proposes all access control scheme based on attribute.It designs an access control model in cloud,constructs all access control policy which adopts the way of Attribute—based Encryption(ABE)tree,and presents a method of user revocation and policy updates.Security analysis indicates that the scheme has the features ofcollusion—resistance,data confidentiality and backward and forward secrecy.
Platform: | Size: 379904 | Author: 橙子 | Hits:

[Chess Poker gameschecker

Description: 英国国际跳棋(英国英语)或跳棋(美国英语、加拿大英语),又称美国跳棋或直棋,是一种棋盘游戏棋。它是在一个8×8方板(共六十四平方)每侧有十二块。棋子的移动和捕获对角。他们可能只前进直到他们到达的板的另一端,当他们加冕,然后可以移动和捕获的向后和向前的。-English draughts (British English) or checkers (American English and Canadian English), also called American checkers or Straight checkers, is a form of the board game draughts. It is played on an 8×8 square board (with sixty-four total squares) with twelve pieces on each side. The pieces move and capture diagonally. They may only move forward until they reach the opposite end of the board, when they are crowned and may thereafter move and capture both backward and forward.
Platform: | Size: 5120 | Author: albert | Hits:

[Graph Drawingdraw

Description: 简单的画图功能,不过,里面涉及了一些序列化操作的程序,可以实现后退和前进的功能-Simple drawing functions, however, which involves a number of sequences of operating procedures, can achieve backward and forward functions
Platform: | Size: 4643840 | Author: 芍药 | Hits:

[Industry researchL01-Introduction-to-Deregulation-1

Description: backward and forward distribution load flow coding distributed generation introduction power system deregulation introduction -backward and forward distribution load flow coding distributed generation introduction power system deregulation introduction
Platform: | Size: 319488 | Author: Arulraj | Hits:

[assembly languagepuenteh

Description: This program is intended for making a H Bridge, so you can make a power inverter with 60Hz frequency or you can modify it for controlling a electric motor backward and forward
Platform: | Size: 1024 | Author: Leop54 | Hits:

[Windows Developbackward_forward_sweep

Description: BACKWARD AND FORWARD SWEEP APPROACH
Platform: | Size: 2048 | Author: rukman | Hits:

[Otherweb-text-information-extraction

Description: ,提出了逆序解析DOM树算法。并结合【)【)M树相似理论和传统的顺序解析算法,从部分目标信息开始 分别向后顺序和向前逆序解析IX)M树。同时定位并获取其他目标信息。利用该方法提取网页正文信息,一方面只需 解析部分19()M树,从而减少了解析树结构花费的时闯。另一方面不需要遍历整个IX)M树查找目标信息,从而节省了 查找时间,大大提高了信息提取速度。最后,通过实验证实了该方法的优越性。-Proposed reverse parse DOM tree algorithm. Combined with [) [) M tree sequence similarity theory and traditional analytic algorithms, part of the target information the beginning Backward and forward, respectively, in reverse order of parsing IX) M tree. Meanwhile locate and obtain additional target information. Using this method to extract text information page, on the one hand only Analysis section 19 () M tree, thus reducing the time it takes to break the parse tree structure. On the other hand does not need to traverse the entire IX) M tree to find the target information, thus saving Seek time, greatly improving the speed of information extraction. Finally, the experiment proved the superiority of this method.
Platform: | Size: 365568 | Author: 吴为 | Hits:

[Software Engineeringformant_estimation

Description: his MATLAB exercises illustrates an algorithm for estimating the locations of the formants of voiced speech intervals based on the locations of the speech polynomial roots as obtained a frame-based analysis of a speech signal using the method of Linear Prediction Analysis. A key aspect f this algorithm is finding regions of quasi-contiguous speech frames (where the first three formants form a contiguous region over the duration of the voiced region), and then extending these regions (both backward and forward) based on a somewhat weaker criterion for contiguous behavior of the formants. The file 4.7 Formant Estimation.pdf provides a User s Guide for this exercise.-his MATLAB exercises illustrates an algorithm for estimating the locations of the formants of voiced speech intervals based on the locations of the speech polynomial roots as obtained a frame-based analysis of a speech signal using the method of Linear Prediction Analysis. A key aspect f this algorithm is finding regions of quasi-contiguous speech frames (where the first three formants form a contiguous region over the duration of the voiced region), and then extending these regions (both backward and forward) based on a somewhat weaker criterion for contiguous behavior of the formants. The file 4.7 Formant Estimation.pdf provides a User s Guide for this exercise.
Platform: | Size: 2832384 | Author: BIN TENG | Hits:

[matlab01-Spread-Spectrum

Description: matlab code audio Echo Hiding Echo Hiding - Single Echo Kernel Echo Hiding - Negative and Positive Echo Kernels Echo Hiding - Backward and Forward Echo Kernels Echo Hiding - Mirrored Echo Kernels Time Spread Echo Hiding
Platform: | Size: 3974144 | Author: majasdf | Hits:

[matlabDGdS

Description: 基于前推回代潮流计算,计算配电网中加入发电机对电网网损的影响(Based on the forward backward and forward power flow calculation, the influence of generator on the grid loss in distribution network is calculated.)
Platform: | Size: 3072 | Author: cold_space | Hits:

[Windows Developqiantuihuidai

Description: 实现前推回代潮流计算,可以用于配电网重构的目标函数,加入迭代次数限制,以验证完全可用。(The realization of forward backward and forward power flow calculation can be used in the objective function of distribution network reconfiguration, and the iteration number is added to verify that it is completely available.)
Platform: | Size: 3072 | Author: 阿斌4959 | Hits:

[matlabieee33潮流计算

Description: 前推回代潮流计算,任意网络结构下均可以计算,内带IEEE33节点算例(The forward backward and forward power flow calculation can be calculated under any network structure, and the IEEE33 node with inner band can be calculated.)
Platform: | Size: 2048 | Author: 同学是呆逼 | Hits:
« 12 3 4 5 6 7 8 9 10 ... 23 »

CodeBus www.codebus.net