亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲(chóng)蟲(chóng)首頁(yè)| 資源下載| 資源專(zhuān)輯| 精品軟件
登錄| 注冊(cè)

instances

  • The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of cla

    The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of classified examples a decision tree is induced, biased by the information gain measure, which heuristically leads to small trees. The examples are given in attribute-value representation. The set of possible classes is finite. Only tests, that split the set of instances of the underlying example languages depending on the value of a single attribute are supported.

    標(biāo)簽: algorithm induction decision top-down

    上傳時(shí)間: 2017-08-20

    上傳用戶(hù):hzy5825468

  • libnids-Win32

    V1.16 Win32 July 2012 - Ported to Win32 C++ - Allow multiple instances of libnids to coexist in the same process - Incorporate unofficial patch to track established TCP connections - Migration of calls to secure versions (i.e. strcpy to strcpy_s) - Compiles under Visual Studio 2010 with no warnings at W4 - Linux support well and truly broken, Linux specific code removed

    標(biāo)簽: libnids-Win32

    上傳時(shí)間: 2016-07-30

    上傳用戶(hù):mxgg126

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    標(biāo)簽: Fundamental Limits Secure Class on of

    上傳時(shí)間: 2020-01-04

    上傳用戶(hù):kddlas

  • Agile+Architecture+Revolution

    The core thrust of architecture has been to define core business requirements, and then construct the IT solution to meet those requirements, typically as instances of software. While this seems like a simple concept, many in enter- prise IT went way off course in the last 10 to 15 years.

    標(biāo)簽: Architecture Revolution Agile

    上傳時(shí)間: 2020-05-26

    上傳用戶(hù):shancjb

  • Digital+Communication+over+Fading+Channels 1st

    Regardless of the branch of science or engineering, theoreticians have always been enamored with the notion of expressing their results in the form of closed-form expressions. Quite often, the elegance of the closed-form solution is overshadowed by the complexity of its form and the difficulty in evaluating it numerically. In such instances, one becomes motivated to search instead for a solution that is simple in form and simple to evaluate. 

    標(biāo)簽: Communication Channels Digital Fading over 1st

    上傳時(shí)間: 2020-05-27

    上傳用戶(hù):shancjb

  • Digital+Communication+over+Fading+Channels,2nd

    Regardless of the branch of science or engineering, theoreticians have always been enamored with the notion of expressing their results in the form of closed-form expressions. Quite often the elegance of the closed-form solution is overshadowed by the complexity of its form and the difficulty in evaluating it numerically. In such instances, one becomes motivated to search instead for a solution that is simple in form and likewise simple to evaluate. 

    標(biāo)簽: Communication Channels Digital Fading over 2nd

    上傳時(shí)間: 2020-05-27

    上傳用戶(hù):shancjb

  • VIP專(zhuān)區(qū)-嵌入式/單片機(jī)編程源碼精選合集系列(164)

    VIP專(zhuān)區(qū)-嵌入式/單片機(jī)編程源碼精選合集系列(164)資源包含以下內(nèi)容:1. 嵌入式ARC平臺(tái)參考資料.2. c8051f020 ds1620 溫度傳感器 調(diào)通了 keil下開(kāi)發(fā).3. 讓蜂鳴器唱歌的程序,利用從音樂(lè)中提取出的文件資料,控制發(fā)音長(zhǎng)短來(lái)實(shí)現(xiàn).4. 基于凌陽(yáng)單片機(jī)spmc75f2413的步進(jìn)電機(jī)3軸聯(lián)動(dòng)空間圓弧插補(bǔ)源程序.5. Oreilly出版的權(quán)威的dojo教材.6. 基于嵌入式操作系統(tǒng)的網(wǎng)絡(luò)監(jiān)控系統(tǒng).7. 基于arm的嵌入式開(kāi)發(fā)程序設(shè)計(jì).8. 一片關(guān)于ARM9處理器的bootloader的分析與設(shè)計(jì)論文.9. 用verilog寫(xiě)的對(duì)OCMJ2X8液晶模塊控制代碼.10. 狀態(tài)機(jī)的應(yīng)用。在嵌入式系統(tǒng)中狀態(tài)機(jī)使用非常頻繁.11. AD89C51單片機(jī)控制液晶顯示器LCD1602顯示時(shí)間。.12. T-Kernel 嵌入式系統(tǒng)源碼.13. 這是一個(gè)重要的CPLD文件 具有很高的參考價(jià)值.14. 利用ARM2103編寫(xiě)的實(shí)時(shí)時(shí)鐘程序.15. minigui編程手冊(cè).16. 用TEA5767 自己動(dòng)手制作的收音機(jī)。效果很好.17. ARM嵌入式系統(tǒng)的通用bootloader的設(shè)計(jì)與實(shí)現(xiàn).18. AVR驅(qū)動(dòng)7219程序.19. cypress的開(kāi)發(fā)框架.20. RFID讀卡終端C程序設(shè)計(jì)基于51單片機(jī)實(shí)現(xiàn).21. ARM與嵌入式系統(tǒng)基礎(chǔ)教程 ARM與嵌入式系統(tǒng)基礎(chǔ)教程.22. GUI代碼,用與實(shí)現(xiàn)相關(guān)GUI的功能,如有需要即可自由下載!.23. 一個(gè)基于周立功EASYARM2000平臺(tái)的一個(gè)小程序 定時(shí)器來(lái)實(shí)現(xiàn)蜂鳴器的開(kāi)關(guān) 各0.5s.24. TCP/IP協(xié)議棧原代碼(C語(yǔ)言)很好的理解TCP/IP的技術(shù)材料.25. c51+proteus 18B20 溫度傳感器實(shí)驗(yàn).26. i2c 總線(xiàn)詳細(xì)介紹及相關(guān)編程說(shuō)明.27. c51+proteus仿真+7seg Max7221動(dòng)態(tài)顯示.28. E: oolLAB Proteus實(shí)例播放音樂(lè) 說(shuō)明:8051單片機(jī)播放音樂(lè).29. linux是最好的嵌入式設(shè)計(jì)操作系統(tǒng),資源開(kāi)源,并且可以支持很多種嵌入式IC.30. CAN51開(kāi)發(fā)板功能 1、 USB或DC+5V供電; 2、 89c52+sja1000+tja1050(tja1040)(p82c250);89c52+mcp2515+tja1050(t.31. RT73在嵌入式領(lǐng)域最穩(wěn)定的驅(qū)動(dòng) 官網(wǎng)已經(jīng)取消下載.32. 這是用prolog語(yǔ)言開(kāi)發(fā)的系統(tǒng).33. 嵌入式C使用的匯總.34. 現(xiàn)在Arm系統(tǒng)是非常成熟和廣泛的嵌入式系統(tǒng).本文是Arm嵌入式開(kāi)發(fā)系統(tǒng)的介紹.35. 《LinuxuClinux+MiniGUI+嵌入式系統(tǒng)開(kāi)發(fā)原理、工具及過(guò)程》.36. These instances, whenmapped to an N-dimensional space, represent a core set that can be used to con.37. 一個(gè)用IO口來(lái)模擬串口通訊的軟件.38. 一個(gè)對(duì)93C46進(jìn)行編程的軟件.39. 紅外解碼 LCD顯示程序,用處廣泛 此程序僅用于學(xué)習(xí)交流使用,.40. 圖解電子器件 學(xué)習(xí)嵌入式系統(tǒng)的朋友.

    標(biāo)簽: 紅外探測(cè)器

    上傳時(shí)間: 2013-04-15

    上傳用戶(hù):eeworm

主站蜘蛛池模板: 瓮安县| 察哈| 方正县| 宝坻区| 衢州市| 丰原市| 留坝县| 天峻县| 灵山县| 隆化县| 山东省| 东莞市| 长春市| 谢通门县| 米泉市| 安平县| 宁城县| 雷山县| 绿春县| 中山市| 阳高县| 中山市| 定兴县| 剑河县| 休宁县| 南溪县| 当涂县| 荔浦县| 定襄县| 嵊州市| 石台县| 吉首市| 合作市| 巴中市| 武宁县| 巴彦县| 平凉市| 温宿县| 宜宾县| 孟州市| 石楼县|