-
隐马尔可夫模型(HMM)在现实中处处存在,且对于推断和预测很有指导意义,其理论比较艰深,这是一个浅显易懂的浙江大学的讲稿,希望对大家有所帮助。...
隐马尔可夫模型(HMM)在现实中处处存在,且对于推断和预测很有指导意义,其理论比较艰深,这是一个浅显易懂的浙江大学的讲稿,希望对大家有所帮助。-Hidden Markov Model (HMM) in reality is all about, and for inference and forecasting is very instructive, its theoretical comparison difficult, it is an easy to understand the speech of Zhejiang University, I hope all of us help.
- 2022-04-30 09:58:57下载
- 积分:1
-
网络管理,自己使用过,觉得比较简洁,而且很清晰,所以拿出来共享...
网络管理,自己使用过,觉得比较简洁,而且很清晰,所以拿出来共享-network management, their use and felt that the relatively simple, but very clear, so to share the show
- 2022-07-14 14:17:10下载
- 积分:1
-
VC教程下载 VC教程下载
VC教程下载 VC教程下载-download VC Guide Directory Download Guide downloaded VC VC VC Guide Directory Download Download
- 2022-05-16 15:53:22下载
- 积分:1
-
Visual c++程序设计培训教程――源代码
书籍对应可在网上下载...
Visual c++程序设计培训教程――源代码
书籍对应可在网上下载-Visual Programming Training Guide-- corresponding source code books can be downloaded on the Internet
- 2022-02-03 02:08:15下载
- 积分:1
-
和我一起学makefile,想学习makefile可以自己看看,比较不错。
和我一起学makefile,想学习makefile可以自己看看,比较不错。-Join me in school makefile, want to learn makefile can see a good comparison.
- 2022-06-27 17:14:22下载
- 积分:1
-
Delphi经典编程入门
Delphi经典编程入门-classic entry
- 2022-02-21 23:29:53下载
- 积分:1
-
此程序应用于Simulink和PHD 数据库之间的通讯,并能实现实时仿真。打开压缩保中的simulink模型直接就可以运行。...
此程序应用于Simulink和PHD 数据库之间的通讯,并能实现实时仿真。打开压缩保中的simulink模型直接就可以运行。-procedure used Simulink and PHD communications between databases, and real-time simulation. Open compression of Bulgaria Simulink model directly on the run.
- 2022-06-17 18:48:19下载
- 积分:1
-
不上传不让下载,晕死了,易语言的模块教程,大家自己看吧...
不上传不让下载,晕死了,易语言的模块教程,大家自己看吧-not upload from download, shocks, the Yi language module guides, we all Look here
- 2022-02-25 00:09:50下载
- 积分:1
-
LabWindows/CVI基础教程 简明易懂
LabWindows/CVI基础教程 简明易懂-LabWindows/CVI-based tutorial easy to understand
- 2023-06-04 09:15:03下载
- 积分:1
-
While cryptography can still be a controversial topic in the programming communi...
While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.
This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in application
- 2022-05-15 03:54:08下载
- 积分:1