Feature selection is a preprocessing technique frequently used in data mining and machine learning tasks. It can reduce dimensionality, remove irrelevant data, increase learning accuracy, and improve results comprehensibility. FCBF is a fast correlation-based filter algorithm designed for high-dimensional data and has been shown effective in removing both irrelevant features and redundant features
標簽: preprocessing frequently selection technique
上傳時間: 2014-01-19
上傳用戶:lindor
In this paper, we consider the problem of filtering in relational hidden Markov models. We present a compact representation for such models and an associated logical particle filtering algorithm. Each particle contains a logical formula that describes a set of states. The algorithm updates the formulae as new observations are received. Since a single particle tracks many states, this filter can be more accurate than a traditional particle filter in high dimensional state spaces, as we demonstrate in experiments.
標簽: relational filtering consider problem
上傳時間: 2016-01-02
上傳用戶:海陸空653
Surface profile measurement by noncontact optical methods has been extensively studied because of its importance in automated manufacturing, component quality control, medicine, and robotics. In most of these methods a known periodic pattern,
標簽: measurement extensively noncontact Surface
上傳時間: 2016-01-02
上傳用戶:561596
《為Windows Vista編寫安全的代碼》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars
上傳時間: 2016-01-07
上傳用戶:zxc23456789
bulk endpoint endless source/sink firmware. EP2OUT will always accept a bulk OUT EP4OUT will always accept a bulk OUT EP6IN will always return a 512 byte packet. The packet contains an incrementing byte starting at 0x02. Since EP6 always returns a 512 byte packet, this endpoint should never be accessed except with a high-speed host controller. EP8IN will continuously return the packet most recently written to EP4OUT
標簽: bulk will endpoint firmware
上傳時間: 2016-01-14
上傳用戶:sk5201314
ARMask.The ARM has six operating modes: • User (unprivileged mode under which most tasks run) • FIQ (entered when a high priority (fast) interrupt is raised) • IRQ (entered when a low priority (normal) interrupt is raised) • Supervisor (entered on reset and when a Software Interrupt instruction is executed) • Abort (used to handle memory access violations) • Undef (used to handle undefined instructions) * ARM Architecture Version 4 adds a seventh mode: • System (privileged mode using the same registers as user mode)
標簽: unprivileged operating ARMask modes
上傳時間: 2013-12-24
上傳用戶:bcjtao
The TMS320C64x™ DSPs (including the TMS320DM642 device) are the highest-performance fixed-point DSP generation in the TMS320C6000™ DSP platform. The TMS320DM642 (DM642) device is based on the second-generation high-performance, advanced VelociTI™ very-long-instruction-word (VLIW) architecture (VelociTI.2™ ) developed by Texas Instruments (TI), making these DSPs an excellent choice for digital media applications. The C64x™ is a code-compatible member of the C6000™ DSP platform.
標簽: highest-performance fixed-point TMS 320
上傳時間: 2013-12-21
上傳用戶:watch100
TI warrants performance of its products to the specifications applicable at the time of sale in accordance with TI’s standard warranty. Testing and other quality control techniques are utilized to the extent TI deems necessary to support this warranty. Specific testing of all parameters of each device is not necessarily performed, except those mandated by government requirements.
標簽: specifications performance applicable the
上傳時間: 2016-01-16
上傳用戶:weixiao99
This program compress and recostruct using wavelets. We can select level of decomposition(here maximum 4 levels are given) of images using selected wavelet. For eg:-wavelets can be haar, db1, db2,dmey............... Decomposition can be viewed in figure. (Please note that select 256X256 image for better result.) Then compression can performed, PERFL2 give compression score. Then reconstruction can be performed. Each decompsition we can choose different threshold values. For each threshold value we can calculate mse,psnr,pq(picture quality), bit ratio etc. To get pq install pqs function .
標簽: decomposition recostruct compress wavelets
上傳時間: 2016-01-22
上傳用戶:liuchee
The Linux Enterprise Cluster explains how to take a number of inexpensive computers with limited resources, place them on a normal computer network, and install free software so that the computers act together like one powerful server. This makes it possible to build a very inexpensive and reliable business system for a small business or a large corporation. The book includes information on how to build a high-availability server pair using the Heartbeat package, how to use the Linux Virtual Server load balancing software, how to configure a reliable printing system in a Linux cluster environment, and how to build a job scheduling system in Linux with no single point of failure. The book also includes information on high availability techniques that can be used with or without a cluster, making it helpful for System Administrators even if they are not building a cluster. Anyone interested in deploying Linux in an environment where low cost computer reliability is important will find this book useful.
標簽: inexpensive Enterprise computers explains
上傳時間: 2014-11-29
上傳用戶:zhangliming420