-
Investigation_on_Model_Selection_Criteria_for_Spe
Speaker recognition is the task of validating individual s identity using invariant features extracted from their voices print. Speaker recognition technology common applications include authentication, surveillance and forensic applications. This Paper investigates the performance of three automatic model selections based on Gaussian Mixture Model (GMM). These approaches are Bayesian information criterion (BIC), Bayesian Ying–Yang harmony empirical learning criterion (BYY-HEC) and Bayesian Ying–Yang harmony data smoothing learning criterion (BYY-HDS). Experimental evaluation of these methods is presented.
- 2010-06-23 03:07:11下载
- 积分:1
-
system_design_and_modeling_with_simulink
ebook about system design and modeling with simulink
- 2009-03-05 17:46:14下载
- 积分:1
-
BasicTutorialFlute
教你怎样吹笛子:详细介绍了竹笛的基本吹奏法和详细技巧,内有五十首练习曲,李小逸编著
(Teach you how to play the flute: flute introduces the basic skills of playing methods and detailed, the Fifty Etudes, Li Xiaoyi ed)
- 2010-09-29 19:58:39下载
- 积分:1
-
Decluster_CentreModifie
declustering algorithm of FCM
- 2010-11-01 20:06:49下载
- 积分:1
-
ROC
I like it
When i say "ji"
you say "sus"
- 2012-11-06 22:30:21下载
- 积分:1
-
严重降水指数是干旱分析领域的重要指标SPI_DROUGHT
严重降水指数是干旱分析领域的重要指标 Severity Precipitation Index is very useful for drought analysis field
- 2020-07-07 23:58:57下载
- 积分:1
-
molituihuo
说明: 此文件为模理退火的matlab源代码,适合参加数学建模的同学使用(This document is the rationale for the mode of annealing matlab source code, suitable for students to participate in the use of mathematical modeling)
- 2008-09-09 10:43:11下载
- 积分:1
-
TDOATaylorAlgorithm
TDOA定位算法,用于实现无线定位中的TAYLOR算法(TDOA location algorithm for wireless location algorithm TAYLOR)
- 2014-01-10 02:59:30下载
- 积分:1
-
BA6
展示了如何生成一个随机无标度网络图,基本结构分析,包括度分布、聚类系数等。观察两种类型的攻击对网络的影响:随机攻击(所有的几点有相同的概率从网络中删除)、有目标地选择连接度最大的节点(节点度最大的节点从网络中删除)。(Shows how to generate a random scale-free network graph, basic structural analysis, including degree distribution, clustering coefficients, etc. Observe the impact of two types of attacks on the network: Random attacks (all points have the same probability of being removed from the network), and select the node with the highest degree of connectivity (the node with the highest node degree is removed from the network).)
- 2018-05-18 10:06:04下载
- 积分:1
-
cross-correlation
This code can crosscorrelate seismic data togther.
- 2009-11-12 15:26:32下载
- 积分:1