B類型液晶資料,為使用的同志們提供詳細的說明資料!
標簽: 液晶
上傳時間: 2014-08-13
上傳用戶:haoxiyizhong
PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A components) those variables that do not carry any relevant information to model Y. The criterion used to trace the un-informative variables is the reliability of the regression coefficients: c_j=mean(b_j)/std(b_j), obtained by jackknifing. The cutoff level, below which c_j is considered to be too small, indicating that the variable j should be removed, is estimated using a matrix of random variables.The predictive power of PLS models built on the retained variables only is evaluated over all 1-a dimensions =(yielding RMSECVnew).
標簽: from eliminates PRINCIPLE algorithm
上傳時間: 2016-11-27
上傳用戶:凌云御清風
Inside the C++ Object Model Inside the C++ Object Model focuses on the underlying mechanisms that support object-oriented programming within C++: constructor semantics, temporary generation, support for encapsulation, inheritance, and "the virtuals"-virtual functions and virtual inheritance. This book shows how your understanding the underlying implementation models can help you code more efficiently and with greater confidence. Lippman dispells the misinformation and myths about the overhead and complexity associated with C++, while pointing out areas in which costs and trade offs, sometimes hidden, do exist. He then explains how the various implementation models arose, points out areas in which they are likely to evolve, and why they are what they are. He covers the semantic implications of the C++ object model and how that model affects your programs.
上傳時間: 2013-12-24
上傳用戶:zhouli
2007高教社杯全國大學生數學建模競賽題目B題
上傳時間: 2014-01-26
上傳用戶:ayfeixiao
完整龍族的無錯反外掛登陸器,b編譯后直接直接就可以放在客戶端下運行,記主要修改服務端驗證程序和端口
上傳時間: 2013-12-19
上傳用戶:onewq
A stability analysis is presented for staggered schemes for the governing equations of compressible flow. The method is based on Fourier analysis. The approximate nature of pressure-correction solution methods is taken into account. 2001 IMACS. Published by Elsevier Science B.V. All rights reserved
標簽: compressible stability for equations
上傳時間: 2016-12-02
上傳用戶:yph853211
A SOFT MODEL-ORDER SUBSPACE BASED SPEECH ENHANCEMENT ALGORITHM
標簽: MODEL-ORDER ENHANCEMENT ALGORITHM SUBSPACE
上傳時間: 2016-12-07
上傳用戶:金宜
微機8255并行口硬件實驗 8255A的A口作為輸入口,與邏輯電平開關相連。8255A的B口作為輸出口,與發光二極管相連。編寫程序,使得邏輯電平開關的變化在發光二極管上顯示出來。
上傳時間: 2014-01-18
上傳用戶:zhaoq123
Simulating Nuclear Events in a TCAD Model of a High-Density SEU Hardened SRAM Technology.pdf
標簽: High-Density Simulating Technology Hardened
上傳時間: 2016-12-13
上傳用戶:lili123
MS Access is commonly thought of as the little brother of Database engines, and not a lot of material has been published about methods used for exploiting it during a penetration test. The aim of this paper is to bring a lot of disparate information together into one guide.
標簽: Database commonly of brother
上傳時間: 2014-01-04
上傳用戶:dreamboy36