function [U,V,num_it]=fcm(U0,X) % MATLAB (Version 4.1) Source Code (Routine fcm was written by Richard J. % Hathaway on June 21, 1994.) The fuzzification constant % m = 2, and the stopping criterion for successive partitions is epsilon =??????. %*******Modified 9/15/04 to have epsilon = 0.00001 and fix univariate bug******** % Purpose:The function fcm attempts to find a useful clustering of the % objects represented by the object data in X using the initial partition in U0.
標簽: fcm function Version Routine
上傳時間: 2014-11-30
上傳用戶:二驅蚊器
The FM24C256/C256L/C256LZ devices are 256 Kbits CMOS nonvolatile electrically erasable memory. These devices offer the designer different low voltage and low power options. They conform to all requirements in the Extended IIC 2-wire protocol. Furthermore, they are designed to minimize device pin count and simplify PC board layout requirements.
標簽: 256 electrically nonvolatile erasable
上傳時間: 2016-12-11
上傳用戶:lps11188
The TMS320LF240xA and TMS320LC240xA devices, new members of the TMS320C24x generation of digital signal processor (DSP) controllers, are part of the TMS320C2000 platform of fixed-point DSPs. The 240xA devices offer the enhanced TMS320 DSP architectural design of the C2xx core CPU for low-cost, low-power, and high-performance processing capabilities. Several advanced peripherals, optimized for digital motor and motion control applications, have been integrated to provide a true single-chip DSP controller. While code-compatible with the existing C24x DSP controller devices, the 240xA offers increased processing performance (40 MIPS) and a higher level of peripheral integration. See the TMS320x240xA Device Summary section for device-specific features.
標簽: TMS 320 generation 240
上傳時間: 2013-12-16
上傳用戶:GavinNeko
Origin 擬合曲線教程 Contents 1. ORIGIN BASIC FUNCTIONS 2. CHROMATOGRAPHY FUNCTIONS 3. EXPONENTIAL FUNCTIONS 4. GROWTH/SIGMOIDAL 5. HYPERBOLA FUNCTIONS 6. LOGARITHM FUNCTIONS 7. PEAK FUNCTIONS93 8. PHARMACOLOGY FUNCTIONS 9. POWER FUNCTIONS 10. RATIONAL FUNCTIONS140 11. SPECTROSCOPY FUNCTIONS155 12. WAVEFORM FUNCTIONS....................................................................................................................... 163
標簽: FUNCTIONS CHROMATOGRAPHY EXPONENTIAL Contents
上傳時間: 2016-12-15
上傳用戶:qazxsw
手機基本原理: ETACS、GSM蜂窩手機是一個工作在雙工狀態下的收發信機。一部移動電話包括無線接收機(Receiver)、發射機(Transmitter)、控制模塊(Controller)及人機界面部分(Interface)和電源(Power Supply)。
標簽: Transmitter Controller Receiver ETACS
上傳時間: 2014-01-04
上傳用戶:wang5829
Java is the first language to provide a cross-platform I/O library that is powerful enough to handle all these diverse tasks. Java is the first programming language with a modern, object-oriented approach to input and output. Java s I/O model is more powerful and more suited to real-world tasks than any other major language used today. Java I/O is the first and still the only book to fully expose the power and sophistication of this library.
標簽: cross-platform language powerful provide
上傳時間: 2014-01-07
上傳用戶:pompey
學生信息管理系統,Power builder
標簽: 信息管理系統
上傳時間: 2014-01-23
上傳用戶:來茴
Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provides the practical solutions developers need to design powerful and portable Web-based applications. Featuring step-by-step examples, this book focuses on harnessing the power of Java(TM) and XML together to streamline the development process. XML and Java(TM), Second Edition provides new coverage of emerging areas such as document management, databases, messaging, servlets, JDBC, data binding, security, and more. It begins with an overview of XML programming techniques, standard APIs, and tools. Building upon this foundation, the book goes on to cover the latest technologies, including DOM Level 2, SAX2, XSLT, SOAP, WSDL, and UDDI. It explores the role of these major middleware technologies in XML and Java-based Web application development, as well as the limitations and potential pitfalls.
標簽: technologies and standards Edition
上傳時間: 2014-01-05
上傳用戶:hj_18
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
標簽: vulnerabilities Introduction discovered undeniably
上傳時間: 2014-01-05
上傳用戶:yph853211
The Cyclone® III PCI development board provides a hardware platform for developing and prototyping low-power, high-performance, logic-intensive PCI-based designs. The board provides a high-density of the memory to facilitate the design and development of FPGA designs which need huge memory storage, and also includes Low-Voltage Differential Signaling (LVDS) interface of the High-Speed Terasic Connectors (HSTCs) for extra high-speed interface application.
標簽: development developing prototypi provides
上傳時間: 2017-01-29
上傳用戶:jjj0202