Sort by
  1. Language:All
  2. Category:Algorithm
  3. Time:ALL
  4. View:All
Remove all
Language More Hide
Category More Hide

DTW-based speech recognition algorithm source code and documentation

This is a speech recognition algorithm based on DTW's c language implementation of the code, feature extraction and acoustic analysis...

Wireless location algorithm based on RFID

Mainly for RFID positioning landmarc, bvire, nvire, VIRE more code, such as algorithms and algorithm of error, is a very good study of RFID positioning procedures...

Pure soft motion control source code, including the algorithm (control board and PC through USB connection)

Application backgroundIn order to source, buy the control board, to share with you.USB control and control of 16.1 can be used for multi axis engraving machine for high-speed motion control. Can automatically reset automatic breakpoint record, dropped connection. The default support 8 axis linkage,...

EHMM face recognition as an example, OPENCV, MFC

Examples of face recognition program based EHMM. Executable, error-free. Environment: VC ++ 6.0, OPENCV1.0. Incidental ORL, FERET face image database of face images, the test results are correct rate is close to 100%. Graduation Design reply to....

SM2 algorithm source code contains test procedures and instructions for use

SM2 algorithm source code, which contains testing procedures and instructions for use encryption and decryption and signature verification check generates a key pair   very convenient and can be placed directly into the program after you use can also be compiled into a DLL called   in line...

Professor Lin Zhiren libsvm-mat-2.89-3

Need to do research using SVM friends. ... Can be used for machine learning algorithms and classification research, can be used for face recognition, facial recognition, and so on. SVM is a training machine learning algorithms that can be used to solve classification and regression problems ... ......

ECC encryption algorithm for c source code

ECC encryption algorithm c source code ECC encryption algorithm c source code ECC encryption algorithm c source code...

IBE identity based encryption system

IBE identity-based encryption system of the identity of extraction procedures, using VC6.0 development, namely, the identity into a point on the elliptic curve...


CascadeSVM is a hierarchical SVM and SVM is a way of distributed processing, it can achieve rapid training and testing, and improve the performance of single-node...

Image de-noising of the variational method and partial differential equations, including the TV model and PM models and four-YK model.

Image de-noising of the variational method and partial differential equations, including TV model (second-order PDE) and PM models (second-order PDE), YK model (four-order PDE) of Matlab code. Can be implemented directly. References available online (such as Baidu) download. Are the classic method....

prev 1 2 3 4 5 6 7 8 9 10 ... 633 next


Don't have an account? Register now
Need any help?
Mail to:


CodeForge Chinese Version
CodeForge English Version

Where are you going?

^_^"Oops ...

Sorry!This guy is mysterious, its blog hasn't been opened, try another, please!

Warm tip!

CodeForge to FavoriteFavorite by Ctrl+D