虫虫首页|资源下载|资源专辑|精品软件
登录|注册

Chain

  • In this talk we will consider two approaches in dealing with the risk of supplier bankruptcy. In the

    In this talk we will consider two approaches in dealing with the risk of supplier bankruptcy. In the first model, we study the effects of supply disruption risk in a supply Chain where one buyer deals with competing risky suppliers who may default during their production lead-times.

    标签: approaches bankruptcy the consider

    上传时间: 2014-08-03

    上传用户:lanjisu111

  • 用c8051做的usb鼠标(HID类)Firmware works with the Silicon Labs IDE v1.71 or later and the Keil C51 tool cha

    用c8051做的usb鼠标(HID类)Firmware works with the Silicon Labs IDE v1.71 or later and the Keil C51 tool Chain. Project and code modifications will be necessary for use with different tool Chains.

    标签: the Firmware Silicon c8051

    上传时间: 2016-03-14

    上传用户:asdfasdfd

  • Hybrid Monte Carlo sampling.SAMPLES = HMC(F, X, OPTIONS, GRADF) uses a hybrid Monte Carlo algorithm

    Hybrid Monte Carlo sampling.SAMPLES = HMC(F, X, OPTIONS, GRADF) uses a hybrid Monte Carlo algorithm to sample from the distribution P ~ EXP(-F), where F is the first argument to HMC. The Markov Chain starts at the point X, and the function GRADF is the gradient of the `energy function F.

    标签: Carlo Monte algorithm sampling

    上传时间: 2013-12-02

    上传用户:jkhjkh1982

  • Sequential Monte Carlo without Likelihoods 粒子滤波不用似然函数的情况下 本文摘要:Recent new methods in Bayesian simu

    Sequential Monte Carlo without Likelihoods 粒子滤波不用似然函数的情况下 本文摘要:Recent new methods in Bayesian simulation have provided ways of evaluating posterior distributions in the presence of analytically or computationally intractable likelihood functions. Despite representing a substantial methodological advance, existing methods based on rejection sampling or Markov Chain Monte Carlo can be highly inefficient, and accordingly require far more iterations than may be practical to implement. Here we propose a sequential Monte Carlo sampler that convincingly overcomes these inefficiencies. We demonstrate its implementation through an epidemiological study of the transmission rate of tuberculosis.

    标签: Likelihoods Sequential Bayesian without

    上传时间: 2016-05-26

    上传用户:离殇

  • A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log

    A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log preparation model enhances usage logs with semantic.The M arkov Chain mode1 based on ontology semantic measurement is used to identi. ing which active session a request should belong to.The corn— petitive method is applied to determine the end of the sessions. Compared with other algorithms,more successfu1 sessions are additionally detected by semantic outlier analysis.

    标签: usage partitioning presented semantic

    上传时间: 2016-08-06

    上传用户:gxrui1991

  • Realizing an MP3 player with the LPC2148, using libmad and EFSL This Application Note describes ho

    Realizing an MP3 player with the LPC2148, using libmad and EFSL This Application Note describes how to integrate the libmad MPEG 1/2 layer 3 library and the Embedded File System Library EFSL in a LPC2148 device to realize MP3 player. The Keil MCB2140 board is used to test the application and the Rowley CrossStudio for ARM has been chosen as a reference tool-Chain.

    标签: Application Realizing describes player

    上传时间: 2016-09-05

    上传用户:moerwang

  • 描述该如何设计JTAG

    描述该如何设计JTAG,尤其讲了JTAG Chain的设计,对于产品需要产业化的硬件工程师来说很重要!

    标签: JTAG 如何设计

    上传时间: 2016-11-09

    上传用户:zsjzc

  • learning English The following appeared in a memorandum written by the vice president of Nature s Wa

    learning English The following appeared in a memorandum written by the vice president of Nature s Way, a Chain of stores selling health food and other health-related products. "Previous experience has shown that our stores are most profitable in areas where residents are highly concerned with leading healthy lives. We should therefore build our next new store in Plainsville, which has many such residents. Plainsville merchants report that sales of running shoes and exercise clothing are at all-time highs. The local health club, which nearly closed five years ago due to lack of business, has more members than ever, and the weight training and aerobics classes are always full. We can even anticipate a new generation of customers: Plainsville s schoolchildren are required to participate in a fitness for life program, which emphasizes the benefits of regular exercise at an early age.

    标签: memorandum following president learning

    上传时间: 2017-03-05

    上传用户:youth25

  • This program implements a PIC-based fuzzy inference engine for the Fudge fuzzy development system

    This program implements a PIC-based fuzzy inference engine for the Fudge fuzzy development system from Motorola. It works by taking the output from Fudge for the 68HC11 processor, and converting it to a MPASM compatible assembler file using the convert batch file. This file can then be incorporated with fuzzy.asm to create a fuzzy inference engine. Tool Chain ---------- FUDGE -> Fuzzy Rules -> MC68HC11.ASM -> CONVERT.BAT -> RULES.ASM -> MPASM FUZZY.ASM -> INTEL HEX Fuzzy input registers --------------------- current_ins 1..8 x 8-bit raw inputs Fuzzy inference function ------------------------ FuzzyEngine Fuzzy output registers ---------------------- cog_outs 1..8 x 8-bit raw outputs

    标签: fuzzy development implements PIC-based

    上传时间: 2014-01-18

    上传用户:caozhizhi

  • Wireless range extenders or wireless repeaters can extend the range of an existing wireless network.

    Wireless range extenders or wireless repeaters can extend the range of an existing wireless network. Range extenders can be strategically placed to elongate a signal area or allow for the signal area to reach around barriers such as those created in L-shaped corridors. Wireless devices connected through repeaters will suffer from an increased latency for each hop. Additionally, a wireless device connected to any of the repeaters in the Chain will have a throughput that is limited by the weakest link between the two nodes in the Chain from which the connection originates to where the connection ends

    标签: wireless range extenders repeaters

    上传时间: 2014-01-01

    上传用户:zhangyigenius