切换至中文 Over 1 million code package, 10 million code file free download
  • [C/C++] NormalDistribution.zip ... correct. The three steps necessary to perform IBS were introduced by [1]: inspection of an on-line protocol, bug identification, and scoring. The final goal of this project is to create an automated Intention Based Score for each programming ...
    Category: Algorithm Upload User:hapsun_666 Size:4K
  • [Windows_Unix] ECG.zip ECG deflection identification
    Category: matlab Upload User:szdyoy Size:6K
  • [Windows_Unix] faturesdeflections.rar feature deflections identification
    Category: matlab Upload User:du948100 Size:3K
  • [PDF] a.rar Ear Biometric An Aid to Personal Identification
    Category: Project Design Upload User:haokun Size:16K
  • [PDF] c.rar _n_Human Identification using Low Resolution Outer Ear Images - A Multiple Connectionist Framework
    Category: Project Design Upload User:smile2112 Size:31K
  • [PDF] BananaDescriptors_en.rar ... provide the basic information used for the general management of the accession (including the registration at the genebank and other identification information) and describe parameters that should be observed when the accession is originally collected.
    Category: Other eBooks Upload User:feidie0722 Size:347K
  • [Java/JSP] src.zip java source code for chinese character identification
    Category: Other systems Upload User:kaideshuma Size:2576K
  • [PPT] BiometricSecurity.rar ... of accuracy, and delivers the following results: a false rejection rate (FRR) of 0.01 , and a false acceptance rate (FAR) of 0.00008 or lower. Palm vein authentication uses the vascular patterns of an individual’s palm as personal identification data.
    Category: Development Research Upload User:jindimei88 Size:764K
  • [Others] AMD64CPUID_25481.rar AMD64 Architecture processors CPU identification guide.
    Category: Other eBooks Upload User:ledzyb Size:102K
  • [PDF] research.rar ... position. However, this navigation problem includes several difficult phases that need to be overcome, such as obstacle avoidance, position identification, and so forth. As Ibrahim [17] pointed out, this problem can be broken in to several subtasks. A ...
    Category: AI-NN-PR Upload User:banjia Size:428K