BackProp算法:經(jīng)典的B-P算法.
上傳時(shí)間: 2014-11-22
上傳用戶:xc216
by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for this book.) the text of Learning Perl, 3rd Edition. Table of Contents Copyright Page Preface Chapter 1: Introduction Chapter 2: Scalar Data Chapter 3: Lists and Arrays Chapter 4: Subroutines Chapter 5: Hashes Chapter 6: I/O Basics Chapter 7: Concepts of Regular Expressions Chapter 8: More About Regular Expressions Chapter 9: Using Regular Expressions Chapter 10: More Control Structures Chapter 11: Filehandles and File Tests Chapter 12: Directory Operations Chapter 13: Manipulating Files and Directories Chapter 14: Process Management Chapter 15: Strings and Sorting Chapter 16: Simple Databases Chapter 17: Some Advanced Perl Techniques Appendix A: Exercise Answers Appendix B: Beyond the Llama Index Colophon
標(biāo)簽: L. published Schwartz Edition
上傳時(shí)間: 2014-11-29
上傳用戶:kr770906
by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for this book.) Learning Perl, 3rd Edition. Table of Contents Copyright Page Preface Chapter 1: Introduction Chapter 2: Scalar Data Chapter 3: Lists and Arrays Chapter 4: Subroutines Chapter 5: Hashes Chapter 6: I/O Basics Chapter 7: Concepts of Regular Expressions Chapter 8: More About Regular Expressions Chapter 9: Using Regular Expressions Chapter 10: More Control Structures Chapter 11: Filehandles and File Tests Chapter 12: Directory Operations Chapter 13: Manipulating Files and Directories Chapter 14: Process Management Chapter 15: Strings and Sorting Chapter 16: Simple Databases Chapter 17: Some Advanced Perl Techniques Appendix A: Exercise Answers Appendix B: Beyond the Llama Index Colophon
標(biāo)簽: L. published Schwartz Edition
上傳時(shí)間: 2015-09-03
上傳用戶:lifangyuan12
This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 譯作:《黑客入侵的藝術(shù)》,也是從朋友的寶箱中搜來的,以前層大致瀏覽過,是難得一件的好資料。
標(biāo)簽: introduces the hacking science
上傳時(shí)間: 2013-12-28
上傳用戶:離殤
Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search main.cpp Then you can run it: ./search The input is loaded from a input file in.txt Here is the format of the input file: The first line of the input file shoud contain two chars indicate the source and destination city for breadth first and depth first algorithm. The second line of input file shoud be an integer m indicate the number of connections for the map. Following m lines describe the map, each line represents to one connection in this form: dist city1 city2, which means there is a connection between city1 and city2 with the distance dist. The following input are for A* The following line contains two chars indicate the source and destination city for A* algorithm. Then there is an integer h indicate the number of heuristic. The following h lines is in the form: city dist which means the straight-line distance from the city to B is dist.
標(biāo)簽: Implemented following compile command
上傳時(shí)間: 2014-01-01
上傳用戶:lhc9102
1.24位真彩色->256色灰度圖。 2.預(yù)處理:中值濾波。 3.二值化:用一個(gè)初始閾值T對圖像A進(jìn)行二值化得到二值化圖像B。 初始閾值T的確定方法是:選擇閾值T=Gmax-(Gmax-Gmin)/3,Gmax和Gmin分別是最高、最低灰度值。 該閾值對不同牌照有一定的適應(yīng)性,能夠保證背景基本被置為0,以突出牌照區(qū)域。 4.削弱背景干擾。對圖像B做簡單的相鄰像素灰度值相減,得到新的圖像G,即Gi,j=|Pi,j-Pi,j-1|i=0,1,…,439 j=0,1,…,639Gi,0=Pi,0,左邊緣直接賦值,不會影響整體效果。 5.用自定義模板進(jìn)行中值濾波 區(qū)域灰度基本被賦值為0。考慮到文字是由許多短豎線組成,而背景噪聲有一大部分是孤立噪聲,用模板(1,1,1,1,1)T對G進(jìn)行中值濾波,能夠得到除掉了大部分干擾的圖像C。 6.牌照搜索:利用水平投影法檢測車牌水平位置,利用垂直投影法檢測車牌垂直位置。 7.區(qū)域裁剪,截取車牌圖像。
上傳時(shí)間: 2014-01-08
上傳用戶:songrui
2005 Center for Biological & Computational Learning at MIT and MIT All rights reserved. Permission to copy and modify this data, software, and its documentation only for internal research use in your organization is hereby granted, provided that this notice is retained thereon and on all copies. This data and software should not be distributed to anyone outside of your organization without explicit written authorization by the author(s) and MIT.
標(biāo)簽: Computational Biological MIT Permissio
上傳時(shí)間: 2014-01-27
上傳用戶:gaome
《三江學(xué)院師資管理系統(tǒng)》 核心模塊功能簡介 《三江學(xué)院師資管理系統(tǒng)》是基于B/S架構(gòu)的Web應(yīng)用程序,校園網(wǎng)上任何合法用戶可以直接訪問。一期工程實(shí)現(xiàn)了該系統(tǒng)的核心功能模塊,包括安全認(rèn)證、教師信息維護(hù)、學(xué)科信息維護(hù)、部分報(bào)表打印等功能,該系統(tǒng)已投入試運(yùn)行。目前該系統(tǒng)安裝在計(jì)算機(jī)系應(yīng)用軟件開發(fā)組服務(wù)器上,內(nèi)網(wǎng)IP地址為192.168.xxx.xxx。需要訪問師資系統(tǒng)的用戶請?jiān)跒g覽器地址欄輸入
標(biāo)簽: Web 管理系統(tǒng) 核心 架構(gòu)
上傳時(shí)間: 2014-01-09
上傳用戶:獨(dú)孤求源
基于B樣條小波邊緣檢測算子的應(yīng)用研究,摘自圖形圖像學(xué)報(bào)
標(biāo)簽: 邊緣檢測 應(yīng)用研究
上傳時(shí)間: 2014-11-28
上傳用戶:來茴
四種加密解密算法的源代碼/*輾轉(zhuǎn)相除法求a,b的最大公因數(shù)*/
上傳時(shí)間: 2015-09-11
上傳用戶:GavinNeko
蟲蟲下載站版權(quán)所有 京ICP備2021023401號-1