搜索结果
找到约 562 项符合
second-order 的查询结果
其他 Please read this document before attempting to compile and run the libraries and applications! The p
Please read this document before attempting to compile and run the libraries and applications! The projects
must be compiled in a particular order. Standard support questions are about compiler and/or linker errors
that are generated when users try to compile the projects in the wrong order. Other i ...
单片机开发 The XC226x derivatives are high-performance members of the Infineon XC2000 Family of full-feature s
The XC226x derivatives are high-performance members of the Infineon XC2000 Family
of full-feature single-chip CMOS microcontrollers. These devices extend the functionality
and performance of the C166 Family in terms of instructions (MAC unit), peripherals, and
speed. They combine high CPU performanc ...
其他书籍 本文挡主要探讨一些web代码安全里比较隐秘
本文挡主要探讨一些web代码安全里比较隐秘,容易被程序员忽视的问题.
主要内容:
二次攻击[Second attack]
类型1:通过文件系统函数漏洞转换
类型2:通过SQL注射漏洞转换
类型3:通过正则表达式中转变量
类型4:通过编码/解码中转变量
数组变量的魅力
Code与系统
Code与http协议
漏洞挖掘 ...
数值算法/人工智能 Batch version of the back-propagation algorithm. % Given a set of corresponding input-output pairs
Batch version of the back-propagation algorithm.
% Given a set of corresponding input-output pairs and an initial network
% [W1,W2,critvec,iter]=batbp(NetDef,W1,W2,PHI,Y,trparms) trains the
% network with backpropagation.
%
% The activation functions must be either linear or tanh. The network
...
人工智能/神经网络 % Train a two layer neural network with the Levenberg-Marquardt % method. % % If desired, it is p
% Train a two layer neural network with the Levenberg-Marquardt
% method.
%
% If desired, it is possible to use regularization by
% weight decay. Also pruned (ie. not fully connected) networks can
% be trained.
%
% Given a set of corresponding input-output pairs and an initial
% network,
% ...
matlab例程 Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Ne
Train a two layer neural network with a recursive prediction error
% algorithm ("recursive Gauss-Newton"). Also pruned (i.e., not fully
% connected) networks can be trained.
%
% The activation functions can either be linear or tanh. The network
% architecture is defined by the matrix NetDef , w ...
Java编程 POS is a Java® platform-based, mission-critical, ISO-8583 based financial transaction library/fr
POS is a Java® platform-based, mission-critical, ISO-8583 based financial transaction library/framework that can be customized and extended in order to implement financial interchanges.
Java书籍 Eclipse+Web开发从入门到精通 These files contain all of the code listings in Java: The Complete Referenc
Eclipse+Web开发从入门到精通
These files contain all of the code listings in
Java: The Complete Reference, J2SE 5 Edition
The source code is organized into files by chapter.
For example, the file Chap7.code contains the
programs shown in Chapter 7.
Within each chapter file, the listings are store ...
Java编程 the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, change
the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, change passwords, and other functions, use the JDBC interface, such as SWING. If ATM landing, withdrawals and change password must use JDBC interface and database links, I encountered a lot of problems, but ...
Java编程 )。-the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, chan
)。-the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, change passwords, and other functions, use the JDBC interface, such as SWING. If ATM landing, withdrawals and change password must use JDBC interface and database links, I encountered a lot of problems, ...