亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

f-and-f

  • k-meansy算法源代碼。This directory contains code implementing the K-means algorithm. Source code may be f

    k-meansy算法源代碼。This directory contains code implementing the K-means algorithm. Source code may be found in KMEANS.CPP. Sample data isfound in KM2.DAT. The KMEANS program accepts input consisting of vectors and calculates the given number of cluster centers using the K-means algorithm. Output is directed to the screen.

    標簽: code implementing directory algorithm

    上傳時間: 2016-04-07

    上傳用戶:shawvi

  • This demo nstrates how to use the sequential Monte Carlo algorithm with reversible jump MCMC steps t

    This demo nstrates how to use the sequential Monte Carlo algorithm with reversible jump MCMC steps to perform model selection in neural networks. We treat both the model dimension (number of neurons) and model parameters as unknowns. The derivation and details are presented in: Christophe Andrieu, Nando de Freitas and Arnaud Doucet. Sequential Bayesian Estimation and Model Selection Applied to Neural Networks . Technical report CUED/F-INFENG/TR 341, Cambridge University Department of Engineering, June 1999. After downloading the file, type "tar -xf version2.tar" to uncompress it. This creates the directory version2 containing the required m files. Go to this directory, load matlab5 and type "smcdemo1". In the header of the demo file, one can select to monitor the simulation progress (with par.doPlot=1) and modify the simulation parameters.

    標簽: sequential reversible algorithm nstrates

    上傳時間: 2014-01-18

    上傳用戶:康郎

  • This demo nstrates the use of the reversible jump MCMC algorithm for neural networks. It uses a hier

    This demo nstrates the use of the reversible jump MCMC algorithm for neural networks. It uses a hierarchical full Bayesian model for neural networks. This model treats the model dimension (number of neurons), model parameters, regularisation parameters and noise parameters as random variables that need to be estimated. The derivations and proof of geometric convergence are presented, in detail, in: Christophe Andrieu, Nando de Freitas and Arnaud Doucet. Robust Full Bayesian Learning for Neural Networks. Technical report CUED/F-INFENG/TR 343, Cambridge University Department of Engineering, May 1999. After downloading the file, type "tar -xf rjMCMC.tar" to uncompress it. This creates the directory rjMCMC containing the required m files. Go to this directory, load matlab5 and type "rjdemo1". In the header of the demo file, one can select to monitor the simulation progress (with par.doPlot=1) and modify the simulation parameters.

    標簽: reversible algorithm the nstrates

    上傳時間: 2014-01-08

    上傳用戶:cuibaigao

  • The algorithms are coded in a way that makes it trivial to apply them to other problems. Several gen

    The algorithms are coded in a way that makes it trivial to apply them to other problems. Several generic routines for resampling are provided. The derivation and details are presented in: Rudolph van der Merwe, Arnaud Doucet, Nando de Freitas and Eric Wan. The Unscented Particle Filter. Technical report CUED/F-INFENG/TR 380, Cambridge University Department of Engineering, May 2000. After downloading the file, type "tar -xf upf_demos.tar" to uncompress it. This creates the directory webalgorithm containing the required m files. Go to this directory, load matlab5 and type "demo_MC" for the demo.

    標簽: algorithms problems Several trivial

    上傳時間: 2014-01-20

    上傳用戶:royzhangsz

  • a screen handling program to provide a flashing message. You will have to design a screen layout f

    a screen handling program to provide a flashing message. You will have to design a screen layout for where messages are placed on the screen. You will also have to consider when to delay the program in order to give the user time to read the messages. That is, the program will use the curses library, signals and the sleep function.

    標簽: screen handling flashing program

    上傳時間: 2016-05-04

    上傳用戶:chongcongying

  • Using LabVIEW 8.5 Language to control Tektronix AWG520. This program can select gain, sample rate, f

    Using LabVIEW 8.5 Language to control Tektronix AWG520. This program can select gain, sample rate, frequency and offset.

    標簽: Tektronix Language LabVIEW control

    上傳時間: 2013-11-26

    上傳用戶:invtnewer

  • This is a simple GPS tracer developed for Window Mobile 2005/2003 on Compact Framework 2.0 SDK. So f

    This is a simple GPS tracer developed for Window Mobile 2005/2003 on Compact Framework 2.0 SDK. So first of all, you need VisualStudio 2005 and Windows Mobile CE 5 SDK. You can develop it on emulator devices or on a real device. As you can see in that photo, I developed that application on a read device: the great Asus MyPal 636N.

    標簽: Framework developed Compact Mobile

    上傳時間: 2016-08-11

    上傳用戶:gxf2016

  • 命令提示符下md5計算,支持文件 =========================================== MD5計算程序 v2.0 -by E17- ===========

    命令提示符下md5計算,支持文件 =========================================== MD5計算程序 v2.0 -by E17- =========================================== Usage: md5 EncryptData. md5 -f DataFile C:\Documents and Settings\Einstein>

    標簽: md5 MD5 2.0 計算

    上傳時間: 2016-10-21

    上傳用戶:ikemada

  • This GUI can be used by entering nu at the MATLAB command prompt. The user can either select a funct

    This GUI can be used by entering nu at the MATLAB command prompt. The user can either select a function (f(x)) of their choice or a statistical distribution probability distribution function to plot over a user defined range. The function s integral can be evaluated over a user defined range by using: The composite trapezium, simpsons and gauss-legendre rules. This is useful for calculating accurate probabilities that one might see in statistical tables.

    標簽: can entering command MATLAB

    上傳時間: 2016-11-07

    上傳用戶:偷心的海盜

  • The literature of cryptography has a curious history. Secrecy, of course, has always played a centra

    The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.

    標簽: cryptography literature has Secrecy

    上傳時間: 2016-12-08

    上傳用戶:fxf126@126.com

主站蜘蛛池模板: 收藏| 遂平县| 吕梁市| 武穴市| 福安市| 荣昌县| 阜康市| 右玉县| 桂林市| 文水县| 资溪县| 南投县| 洛宁县| 宣威市| 彭泽县| 闽清县| 平邑县| 金门县| 威宁| 阜新市| 若羌县| 赤水市| 凤台县| 桐城市| 汉阴县| 西林县| 黎平县| 历史| 毕节市| 拉孜县| 武强县| 建湖县| 平武县| 清涧县| 呼图壁县| 拜城县| 景谷| 抚顺县| 梨树县| 天门市| 五河县|