The purpose of this study is to explore the possibilities offered by current Artificial Neural Net(ANN) structures and topologies and determine their strengths and weaknesses.
標簽: possibilities Artificial purpose explore
上傳時間: 2014-11-02
上傳用戶:ommshaggar
configure HID devices like USB mouse with A91SAM7SE CPU. Inlcude initilization for necessary peripherials. Developer can modify this piece code to do their development on HID devices. This is speically for GNU
標簽: initilization configure necessary Inlcude
上傳時間: 2017-06-02
上傳用戶:waitingfy
USBHostSlave is a USB 1.1 host and Device IP core. – Supports full speed (12Mbps) and low speed (1.5Mbps) operation. – USB Device has four endpoints, each with their own independent FIFO. – Supports the four types of USB data transfer control, bulk, interrupt, and isochronous transfers. – Host can automatically generate SOF packets. – 8-bit Wishbone slave bus interface. – FIFO depth configurable via paramters.
標簽: speed USBHostSlave and Supports
上傳時間: 2014-01-17
上傳用戶:sxdtlqqjl
Migma intends to help teachers to get several different multiple-choice exams based on the user?s original. This command line program quickly generates a number of different new tests (and their respective answer sheets
標簽: multiple-choice different teachers intends
上傳時間: 2013-12-17
上傳用戶:Miyuki
Software-defined radios (SDRs) have been around for more than a decade. The first complete Global Positioning System (GPS) implementation was described by Dennis Akos in 1997. Since then several research groups have presented their contributions.We therefore find it timely to publish an up-to-date text on the subject and at the same time include Galileo, the forthcoming European satellitebased navigation system. Both GPS and Galileo belong to the category of Global Navigation Satellite Systems (GNSS).
標簽: Software-defined complete Global radios
上傳時間: 2017-06-08
上傳用戶:wkchong
If you d like to know where visitors to your site live, add this to your feedback forms. They just choose a region, and the second menu changes appropriately, allowing them to choose their country. (If they choose USA, it allows them to select their state) Neat!
上傳時間: 2017-06-11
上傳用戶:wfeel
As I write this foreword, I am collaborating with four leading user interface (UI) component vendors on a presentation for the 2004 JavaOneSM conference. In our presentation, the vendors will show how they leverage JavaServerTM Faces technology in their products. While developing the presentation, I am learning some things about the work we’ve been doing on JavaServer Faces for the past three years. The vendors have their own set of concerns unique to adapting their product for JavaServer Faces, but they all voice one opinion loud and clear: they are very relieved to finally have a standard for web-based user interfaces.
標簽: collaborating component interface foreword
上傳時間: 2014-08-27
上傳用戶:時代電子小智
The book consists of three sections. The first, foundations, provides a tutorial overview of the principles underlying data mining algorithms and their application. The presentation emphasizes intuition rather than rigor. The second section, data mining algorithms, shows how algorithms are constructed to solve specific problems in a principled manner. The algorithms covered include trees and rules for classification and regression, association rules, belief networks, classical statistical models, nonlinear models such as neural networks, and local memory-based models. The third section shows how all of the preceding analysis fits together when applied to real-world data mining problems. Topics include the role of metadata, how to handle missing data, and data preprocessing.
標簽: foundations The consists sections
上傳時間: 2017-06-22
上傳用戶:lps11188
bubble sort quick sort selection sort developed to measure time performance of each sorting and compare their results with each other for very large data set 2
標簽: sort performance developed selection
上傳時間: 2014-01-08
上傳用戶:xuan‘nian
VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.
標簽: implementation twofish cipher VHDL
上傳時間: 2017-06-25
上傳用戶:王小奇