基于基本遺傳算法的函數最優化SGA.C A Function Optimizer using Simple Genetic Algorithm developed from the Pascal SGA code presented by David E.Goldberg
標簽: Algorithm Optimizer developed Function
上傳時間: 2015-05-29
上傳用戶:aa54
某幼兒園按如下方法依次給A,B,C,D,E五個小孩發糖果。將全部糖果的一半再加二分之一塊糖果發給第一個小孩;將剩下糖果的三分之一再加三分之一塊糖果發給第二個小孩;將剩下糖果的四分之一再加四分之一塊糖果發給第三個小孩;將剩下糖果的五分之一再加五分之一塊糖果發給第四個小孩;將最后剩下的11塊糖果發給第五個小孩。每個小孩得到的糖果數均為整數。試確定原來共有多少塊糖果?每個小孩各得到多少塊糖果? 要求結果的輸出格式為 sum=糖果總數 xa=A得到的糖果數 xb=B得到的糖果數 xc=C得到的糖果數 xd=D得到的糖果數 xe=E得到的糖果數
標簽:
上傳時間: 2015-06-02
上傳用戶:葉山豪
89S51 與數碼管顯示器以及鍵盤SW 對應引腳的聯機為: P0.0-------------------------數碼管顯示器的a腳 P0.1-------------------------數碼管顯示器的b腳 P0.2-------------------------數碼管顯示器的c腳 P0.3-------------------------數碼管顯示器的d腳 P0.4-------------------------數碼管顯示器的e腳 P0.5-------------------------數碼管顯示器的f腳 P0.6-------------------------數碼管顯示器的g腳 P0.7-------------------------數碼管顯示器的dp腳 ; P2.2-------------------------數碼管顯示器1的驅動腳 P2.3-------------------------數碼管顯示器2的驅動腳 P2.4-------------------------數碼管顯示器3的驅動腳 P2.5-------------------------數碼管顯示器4的驅動腳 P2.6-------------------------數碼管顯示器5的驅動腳 P2.7-------------------------數碼管顯示器6的驅動腳 ; P2.2-------------------------鍵盤SW1 P2.3-------------------------鍵盤SW2 P2.4-------------------------鍵盤SW3 P2.5-------------------------鍵盤SW4 P2.6-------------------------鍵盤SW5 P2.7-------------------------鍵盤SW6
上傳時間: 2013-12-29
上傳用戶:1583060504
本書第一部分講述的是傳統的網絡接口N e t B I O S、重定向器以及通過重定向器進行的各類 網絡通信。盡管本書大部分內容均圍繞Wi n s o c k編程這一主題展開,但是, A P I比起Wi n s o c k 來,仍然具有某些獨到之處
上傳時間: 2015-07-08
上傳用戶:戀天使569
本附錄介紹一些新的A P I函數,有了這些函數,便可在自己的計算機上對I P協議統計情況 進行查詢和管理。它們有助于獲得下面的能力: ■ I p c o n f i g . e x e(或適用于微軟Windows 95的Wi n i p c f g . e x e):顯示I P配置信息,允許釋放 和更新D H C P分配的I P地址。 ■ N e t s t a t . e x e:顯示T C P連接表、U D P監聽者表以及I P協議統計情況。 ■ R o u t e . e x e:顯示并處理網絡路由表。 ■ A r p . e x e:顯示并修改供“地址解析協議”(A R P)使用的I P到物理地址翻譯表。
標簽: 函數
上傳時間: 2014-01-12
上傳用戶:569342831
加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]
標簽: Cryptographic Primitives generate Library
上傳時間: 2015-07-16
上傳用戶:wqxstar
pop3代理服務器源代碼One of the most powerful features of Pop3 Agent is a naive Bayes filter, that is capable of recognizing spam e-mails after appropriate training. Pop3 Agent uses an embedded Firebird database server. Of course, you can configure Pop3 Agent to work with an existing server if there is another Interbase/Firebird installation available in your network. Open the Pop3 Agent home directory, delete or rename gds32.dll and ib_util.dll, and set the INI file parameter FBembedded=0.
標簽: features powerful filter Agent
上傳時間: 2014-01-10
上傳用戶:yoleeson
Metalog is a modern replacement for syslogd and klogd. The logged messages can be dispatched according to their facility, urgency, program name and/or Perl-compatible regular expressions. Log files can be automatically rotated when they exceed a certain size or age. External shell scripts (e.g., mail) can be launched when specific patterns are found. Metalog is easier to configure than syslogd and syslog-ng, accepts unlimited number of rules and has (switchable) memory bufferization for maximal performance.
標簽: replacement dispatched messages Metalog
上傳時間: 2014-01-03
上傳用戶:腳趾頭
[2005最新C++經典著作].John.Wiley.and.Sons.You.Can.Do.It.A.Beginners.Introduction.to.Computer.Programming.eBook-DDU
標簽: Introduction Programming Beginners Computer
上傳時間: 2013-12-17
上傳用戶:源弋弋
This section contains a brief introduction to the C language. It is intended as a tutorial on the language, and aims at getting a reader new to C started as quickly as possible. It is certainly not intended as a substitute for any of the numerous textbooks on C. 2. write a recursive function FIB (n) to find out the nth element in theFibanocci sequence number which is 1,1,2,3,5,8,13,21,34,55,…3. write the prefix and postfix form of the following infix expressiona + b – c / d + e * f – g * h / i ^ j4. write a function to count the number of nodes in a binary tr
標簽: introduction the contains intended
上傳時間: 2013-12-23
上傳用戶:liansi