This function applies the Optimal Brain Surgeon (OBS) strategy for % pruning neural network models of dynamic systems. That is networks % trained by NNARX, NNOE, NNARMAX1, NNARMAX2, or their recursive % counterparts.
资源简介:This function applies the Optimal Brain Surgeon (OBS) strategy for % pruning neural network models of dynamic systems. That is networks % trained by NNARX, NNOE, NNARMAX1, NNARMAX2, or their recursive % counterparts.
上传时间: 2013-12-19
上传用户:ma1301115706
资源简介:* This function positions the cursor at the specified * x,y coordinate. It uses the ANSI standard ESCAPE * * sequence to produce the desired effect. Its not the * * fastest way to position the cursor, but perhaps the * * most portable. *
上传时间: 2015-02-24
上传用户:chenjjer
资源简介:PID calculations for the _pid structure *a. This function uses the positional form of the pid equation, and incorporates an integral windup prevention algorithim. Rectangular integration is used, so this function must be repeated on a consi...
上传时间: 2014-01-16
上传用户:moerwang
资源简介:MATLAB source code: This function implements the *(int*)(&float_var).
上传时间: 2014-01-08
上传用户:tb_6877751
资源简介:DESCRIPTION This function initializes the pointers in the _pid structure to the process variable and the setpoint. *pv and *sp are integer pointers.
上传时间: 2014-01-15
上传用户:邶刖
资源简介:This function checks the mailbox to see if a message is available. Unlike OSMboxPend(), OSMboxAccept() does not suspend the calling task if a message is not available.
上传时间: 2014-12-04
上传用户:hphh
资源简介:This function performs the ASK,BPSK and 8PSK modulations.
上传时间: 2017-03-22
上传用户:epson850
资源简介:This function calculates the ergodic and outage capacity of a MIMO Rayleigh channel considering no CSIT (equal power allocation) and perfect CSIT (waterfilling power allocation). In both cases perfect CSIR is assumed. The channel ...
上传时间: 2014-12-02
上传用户:pompey
资源简介:The function applies the Madsen method for Doppler Centroid estimation. The input are: 1) the raw data, the parameter of the distance between samples in azimuth to be correlated and the PRF (Pulse repetition frequency)
上传时间: 2017-08-12
上传用户:pinksun9
资源简介:This function resamples the images at the new grid points defined by the new pixel sizes. It assumes that intensities are defined at the pixel centers
上传时间: 2014-01-09
上传用户:WMC_geophy
资源简介:This directory contains the 8051 firmware Vend_Ax source code for the Anchor Chips EZ-USB chip.
上传时间: 2014-01-07
上传用户:xjz632
资源简介:This directory contains the 8051 firmware frameworks source code for the Anchor Chips EZ-USB FX2 chip.
上传时间: 2014-01-10
上传用户:it男一枚
资源简介:关于FPGA流水线设计的论文 This work investigates the use of very deep pipelines for implementing circuits in FPGAs, where each pipeline stage is limited to a single FPGA logic element (LE). The architecture and VHDL design of a parameter...
上传时间: 2015-07-26
上传用户:CHINA526
资源简介:This paper reviews the techniques that have been developed for error control and concealment in the past 10–15 years
上传时间: 2014-01-19
上传用户:familiarsmile
资源简介:this can realize the des which may be useful for you!
上传时间: 2016-03-15
上传用户:llandlu
资源简介:The goal of this thesis is the development of traffic engineering rules for cellular packet radio networks based on GPRS and EDGE. They are based on traffic models for typical mobile applications. Load generators, representing these traff...
上传时间: 2014-01-10
上传用户:Miyuki
资源简介:the fuction performs thresholding to the eye images. this function can be used in implementing daugman algo for iris localization.
上传时间: 2017-03-23
上传用户:trepb001
资源简介:VESA Display Device Data Block (DDDB) Standard Display Device Data Block This proposal defines the Display Device Data Block (DDDB), for use in a CEA-861-compatible EDID extension, as originally proposed in the VESA TV Compatibility Whit...
上传时间: 2014-10-11
上传用户:wanghui2438
资源简介:This m-file displays the time waveform for the Gaussian pulse function and the first and second derivatives of the Gaussian pulse function for a 0.5 nanosecond pulse width. Other values of pulse widths may be used by changing fs,t,t1. The p...
上传时间: 2015-05-08
上传用户:leixinzhuo
资源简介:This manual describes the Call Library function Node and the Code Interface Node (CIN). The Call Library function Node and the CIN are the LabVIEW programming objects you use to call compiled code from text-based programming languages. T...
上传时间: 2014-12-07
上传用户:zm7516678
资源简介:FSK信号鉴频的程序.This program implements the function of finding out the largest and the second largest values of the sequence of "in_buffer[10]"
上传时间: 2016-02-04
上传用户:youth25
资源简介:For this reason, iterative soft decoding has been studied to approach the Optimal ML decoding performance at affordable complexity.
上传时间: 2014-01-20
上传用户:evil
资源简介:This function can inflexibly used by the programmers who want to find neighbor in som
上传时间: 2016-11-17
上传用户:lizhen9880
资源简介:// chebysheve outlier detection // this function is used to detect the abnormal value among a set of data // input: // delta: a set of data // flag: discribe which data is already known as outlier // p: restrict level // output: // ...
上传时间: 2013-11-30
上传用户:13517191407
资源简介:This function calculates Akaike s final prediction error % estimate of the average generalization error. % % [FPE,deff,varest,H] = fpe(NetDef,W1,W2,PHI,Y,trparms) produces the % final prediction error estimate (fpe), the effective n...
上传时间: 2014-12-03
上传用户:maizezhen
资源简介:This function calculates Akaike s final prediction error % estimate of the average generalization error for network % models generated by NNARX, NNOE, NNARMAX1+2, or their recursive % counterparts. % % [FPE,deff,varest,H] = nnfpe(...
上传时间: 2016-12-26
上传用户:脚趾头
资源简介:This function takes a 16-, 24-, or 32-byte key and generates the RC6 key schedule in array S.
上传时间: 2013-12-16
上传用户:wl9454
资源简介:This funtions draw circles to the limbic and pupillary boundary. this function is used in the daugman algorithm after the steps of thresholding and partial differeniation.
上传时间: 2013-11-30
上传用户:c12228
资源简介:This program plot the Bistatic Radar Cross Section of a dielectric sphere as a function of theta.(Analytic Method)
上传时间: 2017-03-30
上传用户:凤临西北
资源简介:This function implements brute force bactracking to solve the knapsack problem.
上传时间: 2017-04-02
上传用户:stvnash