虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

FlexCAN-architecture

  • Batch version of the back-propagation algorithm. % Given a set of corresponding input-output pairs

    Batch version of the back-propagation algorithm. % Given a set of corresponding input-output pairs and an initial network % [W1,W2,critvec,iter]=batbp(NetDef,W1,W2,PHI,Y,trparms) trains the % network with backpropagation. % % The activation functions must be either linear or tanh. The network % architecture is defined by the matrix NetDef consisting of two % rows. The first row specifies the hidden layer while the second % specifies the output layer. %

    标签: back-propagation corresponding input-output algorithm

    上传时间: 2016-12-27

    上传用户:exxxds

  • % Train a two layer neural network with the Levenberg-Marquardt % method. % % If desired, it is p

    % Train a two layer neural network with the Levenberg-Marquardt % method. % % If desired, it is possible to use regularization by % weight decay. Also pruned (ie. not fully connected) networks can % be trained. % % Given a set of corresponding input-output pairs and an initial % network, % [W1,W2,critvec,iteration,lambda]=marq(NetDef,W1,W2,PHI,Y,trparms) % trains the network with the Levenberg-Marquardt method. % % The activation functions can be either linear or tanh. The % network architecture is defined by the matrix NetDef which % has two rows. The first row specifies the hidden layer and the % second row specifies the output layer.

    标签: Levenberg-Marquardt desired network neural

    上传时间: 2016-12-27

    上传用户:jcljkh

  • Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Ne

    Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Newton"). Also pruned (i.e., not fully % connected) networks can be trained. % % The activation functions can either be linear or tanh. The network % architecture is defined by the matrix NetDef , which has of two % rows. The first row specifies the hidden layer while the second % specifies the output layer.

    标签: recursive prediction algorithm Gauss-Ne

    上传时间: 2016-12-27

    上传用户:ljt101007

  • VC技术内幕第五版,学习VC经典书籍 The 6.0 release of Visual C++ shows Microsoft s continued focus on Internet tech

    VC技术内幕第五版,学习VC经典书籍 The 6.0 release of Visual C++ shows Microsoft s continued focus on Internet technologies and COM, which are key components of the new Windows Distributed interNet Application Architecture (DNA). In addition to supporting these platform initiatives, Visual C++ 6.0 also adds an amazing number of productivity-boosting features such as Edit And Continue, IntelliSense, AutoComplete, and code tips. These features take Visual C++ to a new level. We have tried to make sure that this book keeps you up to speed on the latest technologies being introduced into Visual C++.

    标签: Microsoft continued Internet release

    上传时间: 2013-12-14

    上传用户:ve3344

  • IEC 62056 的很有价值的参考文档

    IEC 62056 的很有价值的参考文档,包括: DLMS UA 1000-1 ed.8, Blue book, COSEM Identification System and Interface Classes DLMS UA 1000-2 ed.6, Green book, DLMS/COSEM Architecture and Protocols DLMS UA 1001-1 ed.3,Yellow book, DLMS/COSEM Conformance Testing Proce

    标签: 62056 IEC 价值 文档

    上传时间: 2017-02-18

    上传用户:小眼睛LSL

  • pccard driver s3c2440.The S3C2440A offers outstanding features with its CPU core, a 16/32-bit ARM92

    pccard driver s3c2440.The S3C2440A offers outstanding features with its CPU core, a 16/32-bit ARM920T RISC processor designed by Advanced RISC Machines, Ltd. The ARM920T implements MMU, AMBA BUS, and Harvard cache architecture with separate 16KB instruction and 16KB data caches, each with an 8-word line length.

    标签: outstanding S3C2440A features pccard

    上传时间: 2013-12-24

    上传用户:lizhen9880

  • Java technology is both a programming language and a platform. The Java programming language origina

    Java technology is both a programming language and a platform. The Java programming language originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time operating platform. When the project started, C++ was the language of choice. But over time the difficulties encountered with C++ grew to the point where the problems could best be addressed by creating an entirely new language platform. Design and architecture decisions drew from a variety of languages such as Eiffel, SmallTalk, Objective C, and Cedar/Mesa. The result is a language platform that has proven ideal for developing secure, distributed, network-based end-user applications in environments ranging from network-embedded devices to the World-Wide Web and the desktop

    标签: programming language Java technology

    上传时间: 2014-01-03

    上传用户:huangld

  • Windows applications using C++ and the Microsoft Foundation Class (MFC) library. The text builds fro

    Windows applications using C++ and the Microsoft Foundation Class (MFC) library. The text builds from the ground up, first describing the Windows architecture and showing how MFC works with that architecture next covering the document/view framework that simplifies the creation of industrial-strength programs and finally illustrating advanced concepts like the usage of dynamic link libraries (DLL), creating Internet clients, and building form-based applications.

    标签: applications Foundation Microsoft Windows

    上传时间: 2013-12-19

    上传用户:wpt

  • In this application note we will only refer to the FX1. The same terminologies and concept is also

    In this application note we will only refer to the FX1. The same terminologies and concept is also used in the FX2. The FX2 has identical FIFO architecture and the same number of endpoints as the FX1

    标签: terminologies application concept refer

    上传时间: 2014-01-10

    上传用户:zhangliming420

  • This book is for systems architects who are interested in building security into their application

    This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues for architecture review, and as a catalog of designs to look for within a security product.

    标签: application architects interested building

    上传时间: 2014-01-24

    上传用户:xwd2010