Neural Networks at your Fingertips.rar =============== Network: Adaline Network =============== Application: Pattern Recognition Classification of Digits 0-9 Author: Karsten Kutza Date: 15.4.96 Reference: B. Widrow, M.E. Hoff Adaptive Switching Circuits 1960 IRE WESCON Convention Record, IRE, New York, NY, pp. 96-104, 1960
標簽: Network Fingertips Networks Adaline
上傳時間: 2014-12-22
上傳用戶:lizhizheng88
復接入,B/W雙用戶使用直接擴頻序列 % >>>multiple access b/w 2 users using DS CDMA % >>>format is : cdmamodem(user1,user2,snr_in_dbs) % >>>user1 and user2 are vectors and they should be of equal length % >>>e.g. user1=[1 0 1 0 1 0 1] , user2=[1 1 0 0 0 1 1],snr_in_dbs=-50 % >>>or snr_in_dbs=50 just any number wud do % Waqas Mansoor % NUST , Pakistan
標簽:
上傳時間: 2014-11-22
上傳用戶:zl5712176
【問題描述】 設計一個利用哈夫曼算法的編碼和譯碼系統,重復地顯示并處理以下項目,直到選擇退出為止。 【基本要求】 (1)初始化:鍵盤輸入字符集大小n、n個字符和n個權值,建立哈夫曼樹; (2)編碼:利用建好的哈夫曼樹生成哈夫曼編碼; (3)輸出編碼; (4)設字符集及頻度如下表: 字符:A B C D E F 頻度:4 9 23 2 17 15 字符:G H I J K 頻度:1 2 3 3 4
上傳時間: 2017-03-07
上傳用戶:qwe1234
本程序是ARM7系列下LPC2148的例程,通過K7I開發板實現的數碼管顯示 1-2-3-4-5-6-7-8-9-0-A-b-C-d-E-F
上傳時間: 2017-03-30
上傳用戶:1966640071
We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.
標簽: effectiveness analytically numerically cloaking
上傳時間: 2017-03-30
上傳用戶:zxc23456789
Creating barcodes in Microsoft廬 Office has never been easier. With BarCodeWiz Toolbar you can add barcodes to Microsoft廬 Office applications with a click of a button. In Microsoft廬 Word, create single barcodes, pages of labels, or mail merge documents. In Microsoft廬 Excel廬, select a range of cells and automatically convert each cell to a barcode. In Microsoft廬 Access廬, create reports with barcodes based on your data tables.
標簽: BarCodeWiz Microsoft Creating barcodes
上傳時間: 2013-12-18
上傳用戶:asddsd
Although some FX1-based devices may use the FX1鈥檚 CPU to process USB data directly (Port I/O Mode), most applica- tions use the FX1 simply as a conduit between the USB and external data-processing logic (e.g., an ASIC or DSP, or the IDE controller on a hard disk drive).
標簽: Although directly devices process
上傳時間: 2014-01-08
上傳用戶:2467478207
ITU-T G.729 Annex C+ - Reference C code for floating point implementation of G.729 at 6.4/8/11.8 kbit/s with DTX functionality (integration of Annexes B, D and E)
標簽: implementation 729 Reference floating
上傳時間: 2017-04-10
上傳用戶:cccole0605
為 了提高用戶身份認證和授權管理的靈活性,從We b 應用系統的安全性角度出發,討論了 一 種在. N E T F r a me w o r k下保證應用程序安全性的身份驗證和授權模型,并給出了模型的具體實現方法。 該模型利用 F o r ms身份驗證方法對用戶的身份進行鑒別。在授權處理上,模型結合統一資源定位( u . J f o r m R e s o u r c e L o c a t o r , U R L ) 授權模式和用戶所具有的系統角色,分別從頁面級和頁面操作級對用戶的訪問進行 控制。該模型在企業局域網環境內能夠提供比較靈活的身份認證和基于角色的授權服務。實際應用表明, 基于該模型的We b應用系統能夠對用戶的訪問進行有效的控制,從而保證了系統的安全性
上傳時間: 2013-12-31
上傳用戶:VRMMO
課程設計: 1.求出在一個n×n的棋盤上,放置n個不能互相捕捉的國際象棋“皇后”的所有布局。 2.設計一個利用哈夫曼算法的編碼和譯碼系統,重復地顯示并處理以下項目,直到選擇退出為止。 【基本要求】 1) 將權值數據存放在數據文件(文件名為data.txt,位于執行程序的當前目錄中) 2) 分別采用動態和靜態存儲結構 3) 初始化:鍵盤輸入字符集大小n、n個字符和n個權值,建立哈夫曼樹; 4) 編碼:利用建好的哈夫曼樹生成哈夫曼編碼; 5) 輸出編碼; 6) 設字符集及頻度如下表: 字符 空格 A B C D E F G H I J K L M 頻度 186 64 13 22 32 103 21 15 47 57 1 5 32 20 字符 N O P Q R S T U V W X Y Z 頻度 57 63 15 1 48 51 80 23 8 18 1 16 1
標簽:
上傳時間: 2017-04-24
上傳用戶:zhyiroy