-
This book is for all those people.
• For the person who thinks programming is too hard
• For the person who gets bogged down when writing or changing
larger scripts (our analyst)
• For the person who knows the wrong languages well (our programmer):
languages like Java, C#, C++, and C are perfectly fine
languages—in their niche.
標簽:
8226
programming
people
person
上傳時間:
2016-07-10
上傳用戶:lz4v4
-
The package includes 3 Matlab-interfaces to the c-code:
1. inference.m
An interface to the full inference package, includes several methods for
approximate inference: Loopy Belief Propagation, Generalized Belief
Propagation, Mean-Field approximation, and 4 monte-carlo sampling methods
(Metropolis, Gibbs, Wolff, Swendsen-Wang).
Use "help inference" from Matlab to see all options for usage.
2. gbp_preprocess.m and gbp.m
These 2 interfaces split Generalized Belief Propagation into the pre-process
stage (gbp_preprocess.m) and the inference stage (gbp.m), so the user may use
only one of them, or changing some parameters in between.
Use "help gbp_preprocess" and "help gbp" from Matlab.
3. simulatedAnnealing.m
An interface to the simulated-annealing c-code. This code uses Metropolis
sampling method, the same one used for inference.
Use "help simulatedAnnealing" from Matlab.
標簽:
Matlab-interfaces
inference
interface
the
上傳時間:
2016-08-27
上傳用戶:gxrui1991
-
Introduction
Computer security is undeniably important, and as new vulnerabilities are discovered and
exploited, the perceived need for new security solutions grows. "Trusted computing"
initiatives propose to solve some of today s security problems through hardware changes
to the personal computer. changing hardware design isn t inherently suspicious, but the
leading trusted computing proposals have a high cost: they provide security to users
while giving third parties the power to enforce policies on users computers against the
users wishes -- they let others pressure you to hand some control over your PC to
someone else. This is a "feature" ready-made for abuse by software authors who want to
anticompetitively choke off rival software.
It needn t be this way: a straightforward change to the plans of trusted computing vendors
could leave the security benefits intact while ensuring that a PC owner s
標簽:
vulnerabilities
Introduction
discovered
undeniably
上傳時間:
2014-01-05
上傳用戶:yph853211
-
1. This BSP can support 2443EVT0 board.
If you want to use EVT0 BSP, set followings.
In smdk2443\smdk2443.bat file
set BSP_EVT1=1
-> set BSP_EVT1=
In smdk2443\src\inc\bsp_cfg.h file
#define EVT1
-> #define EVT0
2. Default system tick mode is changed. The value is fixed tick.
Fixed tick means that tick interrupt is occurred every 1ms.
Variable tick means that timer interrupt period is changed when power mode is in idle.
For changing to variable tick
In smdk2443\src\inc\bsp_cfg.h file
#define FIXEDTICK
-> #define VARTICK
In smdk2443\src\Common\Timer\Sources file
SOURCES= timer_fixedtick.c watchdog.c
->
SOURCES= timer_vartick.c watchdog.c
標簽:
EVT0
followings
BSP
support
上傳時間:
2014-01-27
上傳用戶:fnhhs
-
The SL11RIDE is a low cost, high speed Universal Serial Bus RISC based Controller board. It contains a
16-bit RISC processor with built in SL11RIDE ROM to greatly reduce firmware development efforts. Its
serial flash EEPROM interface offers low cost storage for USB device configuration and customer product
specific functions. New functions can be programmed into the I2C by downloading it from a USB Host
PC. This unique architecture provides the ability to upgrade products, in the field, without changing the
peripheral hardware.
標簽:
Controller
Universal
contains
Serial
上傳時間:
2014-01-06
上傳用戶:15071087253
-
Hibernate: A Developer s Notebook shows you how to use Hibernate to automate persistence: you write natural Java objects and some simple configuration files, and Hibernate automates all the interaction between your objects and the database. You don t even need to know the database is there, and you can change from one database to another simply by changing a few statements in a configuration file. If you ve needed to add a database backend to your application, don t put it off. It s much more fun than it used to be, and Hibernate: A Developer s Notebook shows you why.
標簽:
Hibernate
persistence
Developer
you
上傳時間:
2017-08-17
上傳用戶:曹云鵬
-
It s an entire application that uses knowdledge of probabilistic and statistical math to generate and display radom variables characteristics and histograms...it includes a console too for changing or viewing general parameters in the form of commands sent to the application....Enjoy!
標簽:
probabilistic
application
statistical
knowdledge
上傳時間:
2014-01-01
上傳用戶:zhangliming420
-
This guide explains how data networks operate, why data systems are becoming more complicated, and how data networks are changing to permit broadband services and applications.
Table of Contents
Introduction To Data Networks—PDN, LAN, MAN, WAN, and Wireless Data, Technologies and Systems
Data Networks
List of Figures
標簽:
data
complicated
explains
becoming
上傳時間:
2017-09-26
上傳用戶:邶刖
-
Guided vehicles (GVs) are commonly used for the internal transportation of loads in warehouses, production plants and terminals. These guided vehicles can be routed with a variety of vehicle dispatching rules in an attempt to meet performance criteria such as minimizing the average load waiting times. In this research, we use simulation models of three companies to evaluate the performance of several real-time vehicle dispatching rules, in part described in the literature. It appears that there
is a clear difference in average load waiting time between the different dispatching rules in the different environments. Simple rules, based on load and vehicle proximity (distance-based) perform best for all cases. The penalty for this is a relatively high maximum load waiting time. A distance-based rule with time truncation, giving more priority to loads that have to wait longer than a time threshold, appears to yield the best possible overall performance. A rule that particularly considers load-waiting time performs poor overall. We also show that using little pre-arrival information of loads leads to a significant improvement in the performance of the dispatching rules without changing their performance ranking.
標簽:
Testing and classifying vehicle dispatching rules in three real-world settings
上傳時間:
2016-04-01
上傳用戶:五塊錢的油條
-
Emerging technologies such as WiFi and WiMAX are profoundly changing the
landscape of wireless broadband. As we evolve into future generation wireless
networks, a primary challenge is the support of high data rate, integrated multi-
media type traffic over a unified platform. Due to its inherent advantages in
high-speed communication, orthogonal frequency division multiplexing (OFDM)
has become the modem of choice for a number of high profile wireless systems
(e.g., DVB-T, WiFi, WiMAX, Ultra-wideband).
標簽:
Broadband
Wireless
Networks
上傳時間:
2020-05-26
上傳用戶:shancjb