这是T Katayama 在2005年写的关于系统辨识的英语书籍,里面介绍了子空间辨识的材料,是一个新的辨识算法。非常适合用状态方程表示的系统的辨识问题。适合高年级的阅读。
2021-09-10 19:39:49 13.17MB Subspace Identify
1
Summary of the de-embedding methods 去嵌入总结.pdf
2021-09-09 18:01:36 823KB 射频
1
Open Source Intelligence Methods and Tools focuses on building a deep understanding of how to exploit open source intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support intelligence analysis. The harvested data can be used in different scenarios such as financial, crime,and terrorism investigations as well as in more regular tasks such as analyzing business competitors, running background checks, and acquiring intelligence about individuals and other entities. This book will also improve your skills in acquiring information online from the surface web, the deep web, and the darknet. Many estimates show that 90 percent of useful information acquired by intelligence services comes from public sources (in other words, OSINT sources). Social media sites open up numerous opportunities for investigations because of the vast amount of useful information located in one place. For example, you can get a great deal of personal information about any person worldwide by just checking their Facebook page. This book will show you how to conduct advanced social media investigations to access content believed to be private, use advanced search engines queries to return accurate results, search historical deleted versions of websites, track individuals online using public record databases and people-searching tools, locate information buried in the deep web, access and navigate the dark web, collect intelligence from the dark web, view multiple historic satellite images and street views of any location, search geolocation information within popular social media sites, and more. In short, you will learn how to use a plethora of techniques, tools, and free online services to gather intelligence about any target online. OSINT-gathering activities should be conducted secretly to avoid revealing the searcher’s identity. Therefore, this book will teach you how to conceal your digital identity and become anonymous online
2021-09-06 16:56:56 8MB Intelligence Open Source
1
本教程介绍了经济理论中使用的基本数学工具。 假定掌握基本演算。
2021-09-04 15:37:15 128B 计算机科学
1
有限元方法与应用,适合有一定基础的有限元朋友,国外流行的有限元教程。
2021-09-04 12:40:31 3.64MB Finite Element Methods and
1
vue的基本选项的作用
2021-09-02 22:02:46 2KB vue
1
IEC 62552-1_3:2020 Household refrigerating appliances - Characteristics and test methods.7z
2021-09-02 12:01:44 33.52MB 资料
IEC 60749-1_44 Semiconductor devices – Mechanical and climatic test methods -包含全部45份最新英文版标准文件.7z
2021-09-02 12:01:37 48.15MB 资料
ISO 11452(1-11) Road vehicles — Component test methods for electrical disturbances from narrowband radiated electromagnetic energy - 完整英文版(1-11共10份文件).7z
2021-09-02 12:01:29 73.19MB 资料
Graph Neural Networks: Methods, Applications, and Opportunities 在过去十年左右的时间里,我们见证了深度学习重振机器学习领域。它以最先进的性能解决了计算机视觉、语音识别、自然语言处理和各种其他任务领域的许多问题。数据通常在这些域中的欧几里得空间中表示。各种其他域符合非欧几里得空间,图是其中的理想表示。图适用于表示各种实体之间的依赖关系和相互关系。传统上,图形的手工特征无法从这种复杂的数据表示中为各种任务提供必要的推理。最近,出现了利用深度学习中的各种进步来绘制基于数据的任务的趋势。本文对每个学习设置中的图神经网络 (GNN) 进行了全面调查:监督学习、无监督学习、半监督学习和自监督学习。每个基于图的学习设置的分类都提供了属于给定学习设置的方法的逻辑划分。从理论和经验的角度分析每个学习任务的方法。此外,我们提供了构建 GNN 的通用架构指南。还提供了各种应用程序和基准数据集,以及仍然困扰 GNN 普遍适用性的开放挑战。
1