虫虫首页|资源下载|资源专辑|精品软件
登录|注册

self-organising

  • pdf格式的英文文献

    pdf格式的英文文献,是关于认知无线电网络的,编者是加拿大桂尔夫大学的Qusay H. Mahmoud。ISBN:978-0-470-06196-1 章节内容: 1 Biologically Inspired Networking 2 The Role of Autonomic Networking in Cognitive Networks 3 Adaptive Networks 4 Self-Managing Networks 5 Machine Learning for Cognitive Networks: Technology Assessment and Research Challenges 6 Cross-Layer Design and Optimization in Wireless Networks 等,共计13章,全书348页,pdf文件383页。

    标签: 英文

    上传时间: 2014-01-26

    上传用户:daguda

  • Exceptional C++ shows by example how to go about solid software engineering. Along with a lot of oth

    Exceptional C++ shows by example how to go about solid software engineering. Along with a lot of other material, this book includes expanded versions of the first 30 issues of the popular Internet C++ feature Guru of the Week (or, in its short form, GotW), a series of self-contained C++ engineering problems and solutions that illustrate specific design and coding techniques.

    标签: Exceptional engineering software example

    上传时间: 2017-06-06

    上传用户:yt1993410

  • wxPython In Action

    wxPython In Action,By combining introductions, overviews, and how-to examples, the In Action books are designed to help learning and remembering. According to research in cognitive science, the things people remember are things they discover during self-motivated exploration.

    标签: wxPython Action In

    上传时间: 2013-12-19

    上传用户:a6697238

  • A fractal is generally "a rough or fragmented geometric shape that can be split into parts, each of

    A fractal is generally "a rough or fragmented geometric shape that can be split into parts, each of which is (at least approximately) a reduced-size copy of the whole,"[1] a property called self-similarity. The term was coined by Benoî t Mandelbrot in 1975 and was derived from the Latin fractus meaning "broken" or "fractured." A mathematical fractal is based on an equation that undergoes iteration, a form of feedback based on recursion.[2]

    标签: fragmented generally geometric fractal

    上传时间: 2014-01-17

    上传用户:as275944189

  • This Symbian C++ code example demonstrates how to easily use the onboard camera with zoom and autofo

    This Symbian C++ code example demonstrates how to easily use the onboard camera with zoom and autofocus, utilising an accompanying CameraWrapper made by Forum Nokia. The Camera Wrapper supports all Nokia s S60 devices based on S60 3rd Edition and newer, providing a unified interface for various Symbian and S60 camera APIs some of which have previously been Feature Pack specific or only available via an SDK plug-in. The example application supports the use of both the keypad and touch UI. The application can be self-signed, but it also provides an option to use the dedicated camera key (Symbian signing required). The example application replaces the separate examples published for S60 3rd Edition, FP1 (S60 Platform: Camera Example with AutoFocus Support v2.2) and FP2 (S60 Camera Example AutoFocus 3rd Ed FP2).

    标签: demonstrates Symbian example onboard

    上传时间: 2013-12-11

    上传用户:hopy

  • Abstract-In this paper, simple autonomous chaotic circuits coupled by resistors are investigated. B

    Abstract-In this paper, simple autonomous chaotic circuits coupled by resistors are investigated. By carrying out computer calculations and circuit experiments, irregular self-switching phenomenon of three spatial patterns characterized by the phase states of quasi-synchronization of chaos can be observed from only four simple chaotic circuits. This is the same phenomenon as chaotic wandering of spatial patterns observed very often from systems with a large number of degrees of freedom. Namely, one of spatial-temporal chaos observed from systems of large size can be also generated in the proposed system consisting of only four chaotic circuits. A six subcircuits case and a coupled chaotic circuits networks are also studied, and such systems are confirmed to produce more complicated spatio-temporal phenomena.

    标签: investigated Abstract-In autonomous resistors

    上传时间: 2014-06-09

    上传用户:h886166

  • Behavioral models are used in games and computer graphics for realistic simulation of massive crowd

    Behavioral models are used in games and computer graphics for realistic simulation of massive crowds. In this paper, we present a GPU based implementation of Reynolds [1987] algorithm for simulating flocks of birds and propose an extension to consider environment self occlusion. We performed several experiments and the results showed that the proposed approach runs up to three times faster than the original algorithm when simulating high density crowds, without compromising significantly the original crowd behavior.

    标签: Behavioral simulation realistic computer

    上传时间: 2017-09-08

    上传用户:hanli8870

  • Commercially available active noise control headphones rely on fixed analog controllers to drive "an

    Commercially available active noise control headphones rely on fixed analog controllers to drive "anti-noise" loudspeakers. Our design uses an adaptive controller to optimally cancel unwanted acoustic noise. This headphone would be particularly useful for workers who operate or work near heavy machinery and engines because the noise is selectively eliminated. Desired sounds, such as speech and warning signals, are left to be heard clearly. The adaptive control algorithm is implemented on a Texas Instruments (TI™ ) 1 TMS320C30GEL digital signal processor (DSP), which drives a Sony CD550 headphone/microphone system. Our experiments indicate that adaptive noise control results in a dramatic improvement in performance over fixed noise control. This improvement is due to the availability of high-performance programmable DSPs and the self-optimizing and tracking capabilities of the adaptive controller in response to the surrounding noise.

    标签: Commercially controllers headphones available

    上传时间: 2013-12-04

    上传用户:dyctj

  • An Overview of Smart Card Security. The smart card, an intelligent token, is a credit card sized

    An Overview of Smart Card Security. The smart card, an intelligent token, is a credit card sized plastic card embedded with an integrated circuit chip. It provides not only memory capacity, but computational capability as well. The self-containment of smart card makes it resistant to attack as it does not need to depend upon potentially vulnerable external resources. Because of this characteristic, smart cards are often used in different applications which require strong security protection and authentication.

    标签: card intelligent Overview Security

    上传时间: 2017-09-25

    上传用户:busterman

  • as a message came into prominence with the publication in 1948 of an influential paper by Claude Sha

    as a message came into prominence with the publication in 1948 of an influential paper by Claude Shannon, "A Mathematical Theory of Communication." This paper provides the foundations of information theory and endows the word information not only with a technical meaning but also a measure. If the sending device is equally likely to send any one of a set of N messages, then the preferred measure of "the information produced when one message is chosen from the set" is the base two logarithm of N (This measure is called self-information). In this paper, Shannon cont

    标签: influential publication prominence message

    上传时间: 2014-01-21

    上传用户:2404