亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Instances

  • The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of cla

    The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of classified examples a decision tree is induced, biased by the information gain measure, which heuristically leads to small trees. The examples are given in attribute-value representation. The set of possible classes is finite. Only tests, that split the set of Instances of the underlying example languages depending on the value of a single attribute are supported.

    標簽: algorithm induction decision top-down

    上傳時間: 2017-08-20

    上傳用戶:hzy5825468

  • libnids-Win32

    V1.16 Win32 July 2012 - Ported to Win32 C++ - Allow multiple Instances of libnids to coexist in the same process - Incorporate unofficial patch to track established TCP connections - Migration of calls to secure versions (i.e. strcpy to strcpy_s) - Compiles under Visual Studio 2010 with no warnings at W4 - Linux support well and truly broken, Linux specific code removed

    標簽: libnids-Win32

    上傳時間: 2016-07-30

    上傳用戶:mxgg126

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of Instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    標簽: Fundamental Limits Secure Class on of

    上傳時間: 2020-01-04

    上傳用戶:kddlas

  • Agile+Architecture+Revolution

    The core thrust of architecture has been to define core business requirements, and then construct the IT solution to meet those requirements, typically as Instances of software. While this seems like a simple concept, many in enter- prise IT went way off course in the last 10 to 15 years.

    標簽: Architecture Revolution Agile

    上傳時間: 2020-05-26

    上傳用戶:shancjb

  • Digital+Communication+over+Fading+Channels 1st

    Regardless of the branch of science or engineering, theoreticians have always been enamored with the notion of expressing their results in the form of closed-form expressions. Quite often, the elegance of the closed-form solution is overshadowed by the complexity of its form and the difficulty in evaluating it numerically. In such Instances, one becomes motivated to search instead for a solution that is simple in form and simple to evaluate. 

    標簽: Communication Channels Digital Fading over 1st

    上傳時間: 2020-05-27

    上傳用戶:shancjb

  • Digital+Communication+over+Fading+Channels,2nd

    Regardless of the branch of science or engineering, theoreticians have always been enamored with the notion of expressing their results in the form of closed-form expressions. Quite often the elegance of the closed-form solution is overshadowed by the complexity of its form and the difficulty in evaluating it numerically. In such Instances, one becomes motivated to search instead for a solution that is simple in form and likewise simple to evaluate. 

    標簽: Communication Channels Digital Fading over 2nd

    上傳時間: 2020-05-27

    上傳用戶:shancjb

  • VIP專區-嵌入式/單片機編程源碼精選合集系列(164)

    VIP專區-嵌入式/單片機編程源碼精選合集系列(164)資源包含以下內容:1. 嵌入式ARC平臺參考資料.2. c8051f020 ds1620 溫度傳感器 調通了 keil下開發.3. 讓蜂鳴器唱歌的程序,利用從音樂中提取出的文件資料,控制發音長短來實現.4. 基于凌陽單片機spmc75f2413的步進電機3軸聯動空間圓弧插補源程序.5. Oreilly出版的權威的dojo教材.6. 基于嵌入式操作系統的網絡監控系統.7. 基于arm的嵌入式開發程序設計.8. 一片關于ARM9處理器的bootloader的分析與設計論文.9. 用verilog寫的對OCMJ2X8液晶模塊控制代碼.10. 狀態機的應用。在嵌入式系統中狀態機使用非常頻繁.11. AD89C51單片機控制液晶顯示器LCD1602顯示時間。.12. T-Kernel 嵌入式系統源碼.13. 這是一個重要的CPLD文件 具有很高的參考價值.14. 利用ARM2103編寫的實時時鐘程序.15. minigui編程手冊.16. 用TEA5767 自己動手制作的收音機。效果很好.17. ARM嵌入式系統的通用bootloader的設計與實現.18. AVR驅動7219程序.19. cypress的開發框架.20. RFID讀卡終端C程序設計基于51單片機實現.21. ARM與嵌入式系統基礎教程 ARM與嵌入式系統基礎教程.22. GUI代碼,用與實現相關GUI的功能,如有需要即可自由下載!.23. 一個基于周立功EASYARM2000平臺的一個小程序 定時器來實現蜂鳴器的開關 各0.5s.24. TCP/IP協議棧原代碼(C語言)很好的理解TCP/IP的技術材料.25. c51+proteus 18B20 溫度傳感器實驗.26. i2c 總線詳細介紹及相關編程說明.27. c51+proteus仿真+7seg Max7221動態顯示.28. E: oolLAB Proteus實例播放音樂 說明:8051單片機播放音樂.29. linux是最好的嵌入式設計操作系統,資源開源,并且可以支持很多種嵌入式IC.30. CAN51開發板功能 1、 USB或DC+5V供電; 2、 89c52+sja1000+tja1050(tja1040)(p82c250);89c52+mcp2515+tja1050(t.31. RT73在嵌入式領域最穩定的驅動 官網已經取消下載.32. 這是用prolog語言開發的系統.33. 嵌入式C使用的匯總.34. 現在Arm系統是非常成熟和廣泛的嵌入式系統.本文是Arm嵌入式開發系統的介紹.35. 《LinuxuClinux+MiniGUI+嵌入式系統開發原理、工具及過程》.36. These Instances, whenmapped to an N-dimensional space, represent a core set that can be used to con.37. 一個用IO口來模擬串口通訊的軟件.38. 一個對93C46進行編程的軟件.39. 紅外解碼 LCD顯示程序,用處廣泛 此程序僅用于學習交流使用,.40. 圖解電子器件 學習嵌入式系統的朋友.

    標簽: 紅外探測器

    上傳時間: 2013-04-15

    上傳用戶:eeworm

主站蜘蛛池模板: 隆昌县| 饶阳县| 安图县| 揭阳市| 通州市| 邢台县| 徐州市| 英吉沙县| 邳州市| 共和县| 祥云县| 阳信县| 吴川市| 扶绥县| 孙吴县| 永平县| 平南县| 霍山县| 自治县| 平江县| 手游| 南宁市| 胶州市| 许昌市| 临清市| 乌恰县| 西安市| 三河市| 扬州市| 兴国县| 阿拉善右旗| 正安县| 临武县| 营山县| 新疆| 南溪县| 达州市| 漳平市| 个旧市| 金乡县| 芜湖县|