搜索结果
找到约 12,483 项符合
a-z 的查询结果
通讯/手机编程 I. C. Wong, Z. Shen, J. G. Andrews, and B. L. Evans, ``A Low Complexity Algorithm for Proportional R
I. C. Wong, Z. Shen, J. G. Andrews, and B. L. Evans, ``A Low Complexity Algorithm for Proportional Resource Allocation in OFDMA Systems , Proc. IEEE Int. Work. Signal Processing Systems, 针对这篇文章给出的源代码
VC书籍 A to Z of C programming speaks from basic level C programming to obfuscated C
A to Z of C programming speaks from basic level C programming to obfuscated C
人工智能/神经网络 Description: FASBIR(Filtered Attribute Subspace based Bagging with Injected Randomness) is a variant
Description: FASBIR(Filtered Attribute Subspace based Bagging with Injected Randomness) is a variant of Bagging algorithm, whose purpose is to improve accuracy of local learners, such as kNN, through multi-model perturbing ensemble.
Reference: Z.-H. Zhou and Y. Yu. Ensembling local learners through ...
matlab例程 Description: S-ISOMAP is a manifold learning algorithm, which is a supervised variant of ISOMAP.
Description: S-ISOMAP is a manifold learning algorithm, which is a supervised variant of ISOMAP.
Reference: X. Geng, D.-C. Zhan, and Z.-H. Zhou. Supervised nonlinear dimensionality reduction for visualization and classification. IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cyberneti ...
人工智能/神经网络 Description: C4.5Rule-PANE is a rule learning method which could generate accurate and comprehensibl
Description: C4.5Rule-PANE is a rule learning method which could generate accurate and comprehensible symbolic rules, through regarding a neural network ensemble as a pre-process of a rule inducer.
Reference: Z.-H. Zhou and Y. Jiang. Medical diagnosis with C4.5 rule preceded by artificial neural net ...
手机短信编程 //在tc3.0++在运行 //a数组用于随机产生1-6数表示每个方格后面的图形.用inita()函数来实现 //c数组用于记录方格的状态,用字符L(lock)表示没有打开的方格 //D(d
//在tc3.0++在运行
//a数组用于随机产生1-6数表示每个方格后面的图形.用inita()函数来实现
//c数组用于记录方格的状态,用字符L(lock)表示没有打开的方格
//D(delete)表示已消去的方格.O(open)表示打开的方格.
//变量m表示按回车键的有效次数.也是记忆力参数,越小记忆力越好
//变量xpos,ypos用于表示当前光标所在的位置
//( ...
加密解密 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an
加密算法
Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives:
- To generate an RSA key
cryptest g
- To encrypt and decrypt a string using RSA
cryptest r
- To calculate MD5, SHS, and RIPEMD-160 message digests:
cryptest m file
- To encrypt and decrypt a string using DES-E ...
其他 BNB20 Finds the constrained minimum of a function of several possibly integer variables. % Usage: [
BNB20 Finds the constrained minimum of a function of several possibly integer variables.
% Usage: [errmsg,Z,X,t,c,fail] =
% BNB20(fun,x0,xstatus,xlb,xub,A,B,Aeq,Beq,nonlcon,settings,options,P1,P2,...)
%
% BNB solves problems of the form:
% Minimize F(x) subject to: xlb <= x0 <=xub
% A*x <= B ...
其他 This m file analyzes a coherent binary phase shift keyed(BPSK) and a amplitude shift keyed(ASK) comm
This m file analyzes a coherent binary phase shift keyed(BPSK) and a amplitude shift keyed(ASK) communication system. The receiver uses a correlator(mixer-integrator[LPF]) configuration with BER measurements comparing measured and theoretical results. The bandpass and low pass used in the receiver a ...
数学计算 Romberg求定积分 输入:积分区间[a,b]
Romberg求定积分
输入:积分区间[a,b],被积函数f(x,y,z)
输出:积分结果