搜索结果

找到约 331 项符合 bi-linear 的查询结果

matlab例程 Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Ne

Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Newton"). Also pruned (i.e., not fully % connected) networks can be trained. % % The activation functions can either be linear or tanh. The network % architecture is defined by the matrix NetDef , w ...
https://www.eeworm.com/dl/665/384109.html
下载: 78
查看: 1074

嵌入式/单片机编程 这是LLE的原始算法

这是LLE的原始算法,原文的参考文献是:S.T.Roweis and L.K.Saul. Nonlinear dimensionality reduction by locally linear embedding. Science, 290, 2000.
https://www.eeworm.com/dl/647/386048.html
下载: 61
查看: 1128

文件格式 The solution of Ziemer s book Digital communication. This version of Digital communication is the Bi

The solution of Ziemer s book Digital communication. This version of Digital communication is the Bible in telecommunication.
https://www.eeworm.com/dl/639/386077.html
下载: 173
查看: 1057

数学计算 数值分析高斯——列主元消去法主程序 说明如下: % a----input,matrix of coefficient % b----input,right vector % sol----o

数值分析高斯——列主元消去法主程序 说明如下: % a----input,matrix of coefficient % b----input,right vector % sol----output,returns the solution of linear equation
https://www.eeworm.com/dl/641/386288.html
下载: 29
查看: 1101

加密解密 加密的步骤 1) 计算N的有效位数tn(以字节数计)

加密的步骤 1) 计算N的有效位数tn(以字节数计),将最高位的零忽略掉,令tn1=tn-1。比如N=0x012A05,其有效位数tn=5,tn1=4。 2) 将明文数据A分割成tn1位(以字节数计)的块,每块看成一个大数,块数记为bn。从而,保证了每块都小于N。 3) 对A的每一块Ai进行Bi=Ai^E MOD N运算。Bi就是密文数据的一块,将所有密文 ...
https://www.eeworm.com/dl/519/400809.html
下载: 139
查看: 1021

数据结构 密码学界牛人Victor Shoup用C++编写数论类库。 NTL is a high-performance, portable C++ library providing data struct

密码学界牛人Victor Shoup用C++编写数论类库。 NTL is a high-performance, portable C++ library providing data structures and algorithms for arbitrary length integers for vectors, matrices, and polynomials over the integers and over finite fields and for arbitrary precision floating point arithmetic. N ...
https://www.eeworm.com/dl/654/402666.html
下载: 47
查看: 1454

数学计算 SuperLU is a general purpose library for the direct solution of large, sparse, nonsymmetric systems

SuperLU is a general purpose library for the direct solution of large, sparse, nonsymmetric systems of linear equations on high performance machines. The library is written in C and is callable from either C or Fortran. The library routines will perform an LU decomposition with partial pivoting and ...
https://www.eeworm.com/dl/641/407093.html
下载: 31
查看: 1093

数学计算 cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used

cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used to calculate a whole range of scientific functions including sin, cos, tan, arctan, arcsin, arccos, sinh, cosh, tanh, arctanh, log, exp, square root and even multiply and divide. the method dates ba ...
https://www.eeworm.com/dl/641/410485.html
下载: 80
查看: 1054

文章/文档 In an electromagnetic cloak based on a transformation approach, reduced sets of material properties

In an electromagnetic cloak based on a transformation approach, reduced sets of material properties are generally favored due to their easier implementation in reality, although a seemingly inevitable drawback of undesired reflection exists in such cloaks. Here we suggest using high-order transforma ...
https://www.eeworm.com/dl/652/421409.html
下载: 155
查看: 1048

其他书籍 An introduction to some of the key ideas in computer graphics is given. Modeling, 2D and 3D viewing,

An introduction to some of the key ideas in computer graphics is given. Modeling, 2D and 3D viewing, transformations and related ideas from linear algebra are presented.
https://www.eeworm.com/dl/542/424422.html
下载: 20
查看: 1045