k-meansy算法源代碼。This directory contains code implementing the K-means algorithm. Source code may be found in KMEANS.CPP. Sample data isfound in KM2.DAT. The KMEANS program accepts input consisting of vectors and calculates the given number of cluster centers using the K-means algorithm. Output is directed to the screen.
標簽: code implementing directory algorithm
上傳時間: 2016-04-07
上傳用戶:shawvi
This demo nstrates how to use the sequential Monte Carlo algorithm with reversible jump MCMC steps to perform model selection in neural networks. We treat both the model dimension (number of neurons) and model parameters as unknowns. The derivation and details are presented in: Christophe Andrieu, Nando de Freitas and Arnaud Doucet. Sequential Bayesian Estimation and Model Selection Applied to Neural Networks . Technical report CUED/F-INFENG/TR 341, Cambridge University Department of Engineering, June 1999. After downloading the file, type "tar -xf version2.tar" to uncompress it. This creates the directory version2 containing the required m files. Go to this directory, load matlab5 and type "smcdemo1". In the header of the demo file, one can select to monitor the simulation progress (with par.doPlot=1) and modify the simulation parameters.
標簽: sequential reversible algorithm nstrates
上傳時間: 2014-01-18
上傳用戶:康郎
This demo nstrates the use of the reversible jump MCMC algorithm for neural networks. It uses a hierarchical full Bayesian model for neural networks. This model treats the model dimension (number of neurons), model parameters, regularisation parameters and noise parameters as random variables that need to be estimated. The derivations and proof of geometric convergence are presented, in detail, in: Christophe Andrieu, Nando de Freitas and Arnaud Doucet. Robust Full Bayesian Learning for Neural Networks. Technical report CUED/F-INFENG/TR 343, Cambridge University Department of Engineering, May 1999. After downloading the file, type "tar -xf rjMCMC.tar" to uncompress it. This creates the directory rjMCMC containing the required m files. Go to this directory, load matlab5 and type "rjdemo1". In the header of the demo file, one can select to monitor the simulation progress (with par.doPlot=1) and modify the simulation parameters.
標簽: reversible algorithm the nstrates
上傳時間: 2014-01-08
上傳用戶:cuibaigao
The algorithms are coded in a way that makes it trivial to apply them to other problems. Several generic routines for resampling are provided. The derivation and details are presented in: Rudolph van der Merwe, Arnaud Doucet, Nando de Freitas and Eric Wan. The Unscented Particle Filter. Technical report CUED/F-INFENG/TR 380, Cambridge University Department of Engineering, May 2000. After downloading the file, type "tar -xf upf_demos.tar" to uncompress it. This creates the directory webalgorithm containing the required m files. Go to this directory, load matlab5 and type "demo_MC" for the demo.
標簽: algorithms problems Several trivial
上傳時間: 2014-01-20
上傳用戶:royzhangsz
a screen handling program to provide a flashing message. You will have to design a screen layout for where messages are placed on the screen. You will also have to consider when to delay the program in order to give the user time to read the messages. That is, the program will use the curses library, signals and the sleep function.
標簽: screen handling flashing program
上傳時間: 2016-05-04
上傳用戶:chongcongying
Using LabVIEW 8.5 Language to control Tektronix AWG520. This program can select gain, sample rate, frequency and offset.
標簽: Tektronix Language LabVIEW control
上傳時間: 2013-11-26
上傳用戶:invtnewer
This is a simple GPS tracer developed for Window Mobile 2005/2003 on Compact Framework 2.0 SDK. So first of all, you need VisualStudio 2005 and Windows Mobile CE 5 SDK. You can develop it on emulator devices or on a real device. As you can see in that photo, I developed that application on a read device: the great Asus MyPal 636N.
標簽: Framework developed Compact Mobile
上傳時間: 2016-08-11
上傳用戶:gxf2016
命令提示符下md5計算,支持文件 =========================================== MD5計算程序 v2.0 -by E17- =========================================== Usage: md5 EncryptData. md5 -f DataFile C:\Documents and Settings\Einstein>
上傳時間: 2016-10-21
上傳用戶:ikemada
This GUI can be used by entering nu at the MATLAB command prompt. The user can either select a function (f(x)) of their choice or a statistical distribution probability distribution function to plot over a user defined range. The function s integral can be evaluated over a user defined range by using: The composite trapezium, simpsons and gauss-legendre rules. This is useful for calculating accurate probabilities that one might see in statistical tables.
標簽: can entering command MATLAB
上傳時間: 2016-11-07
上傳用戶:偷心的海盜
The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.
標簽: cryptography literature has Secrecy
上傳時間: 2016-12-08
上傳用戶:fxf126@126.com