虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Fuzzy-Set-The<b>OR</b>y

  • basic.c */ /**//* Project:NeuroBasic, basic package*//**/ /* Survey:This is a simple Basic b-code

    basic.c */ /**//* Project:NeuroBasic, basic package*//**/ /* Survey:This is a simple Basic b-code compiler which*/ /*can be used as a comfortable command shell for */ /* any program. The actual compiler is found in */ /*compiler.c.*/ /*The functions m_fctptr() and user_server()*/ /*build an interface to an

    标签: basic NeuroBasic Project package

    上传时间: 2017-02-15

    上传用户:xymbian

  • The BNL toolbox is a set of Matlab functions for defining and estimating the parameters of a Bayesi

    The BNL toolbox is a set of Matlab functions for defining and estimating the parameters of a Bayesian network for discrete variables in which the conditional probability tables are specified by logistic regression models. Logistic regression can be used to incorporate restrictions on the conditional probabilities and to account for the effect of covariates. Nominal variables are modeled with multinomial logistic regression, whereas the category probabilities of ordered variables are modeled through a cumulative or adjacent-categories response function. Variables can be observed, partially observed, or hidden.

    标签: estimating parameters functions defining

    上传时间: 2014-12-05

    上传用户:天诚24

  • The ATK library provides a set of interfaces for accessibility.By supporting the ATK interfaces, an

    The ATK library provides a set of interfaces for accessibility.By supporting the ATK interfaces, an application or toolkit canbe used such as tools such as screen readers, magnifiers, and alternative input devices.

    标签: interfaces accessibility supporting ATK

    上传时间: 2014-11-06

    上传用户:wpwpwlxwlx

  • SA Encryption and Decryption using Matlab The program set contains thirteen files listed below.

    SA Encryption and Decryption using Matlab The program set contains thirteen files listed below. errormeg.fig errormsg.m helpmsg.fig helpmsg.m inputmsg.fig inputmsg.m mesgcut.m pro2.fig pro2.m rsacore.m readme.txt screenshot.gif In order to run the program please call pro2.m under Matlab 6.0 Environment. System Requirement Matlab version 6.0 and if necessary, Maple version 6.0 on any platform PentiumII 300 MHz or equivalent.

    标签: Encryption Decryption contains thirteen

    上传时间: 2017-04-06

    上传用户:dreamboy36

  • The aip file contains few Matlab routines for 1D line scan analysis, 1D scaling, 2D scaling, image b

    The aip file contains few Matlab routines for 1D line scan analysis, 1D scaling, 2D scaling, image brightness or contrast variation routine and rouitne for finding area between zero cossings of 1D times series.

    标签: scaling contains analysis routines

    上传时间: 2014-01-19

    上传用户:xmsmh

  • This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only b

    This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It s detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive.

    标签: up-to-date only cutting-edge material

    上传时间: 2017-07-09

    上传用户:comua

  • You may read code because you have to-to fix it, inspect it, or improve it. You may read code the wa

    You may read code because you have to-to fix it, inspect it, or improve it. You may read code the way an engineer examines a machine--to discover what makes it tick. Or you may read code because you are scavenging--looking for material to reuse. Code-reading requires its own set of skills, and the ability to determine which technique you use when is crucial. In this indispensable book, Diomidis Spinellis uses more than 600 real-world examples to show you how to identify good (and bad) code: how to read it, what to look for, and how to use this knowledge to improve your own code. Fact: If you make a habit of reading good code, you will write better code yourself.

    标签: code read You may

    上传时间: 2017-08-13

    上传用户:jyycc

  • To use this function just define a variable say var, var = pnseq(a, b, c) for a, b and c refe

    To use this function just define a variable say var, var = pnseq(a, b, c) for a, b and c refer to the zip file

    标签: var function variable define

    上传时间: 2014-01-06

    上传用户:zhuoying119

  • B型剩余电流保护器设计

    随着光伏发电系统快速发展,以及电动汽车充电桩的普及,传统的剩余电流保护器无法满足实际需求。介绍了一款B型剩余电流保护器,采用磁调制剩余电流互感器和零序电流互感器采集剩余电流。根据GB/T 22794—2017标准要求,可识别1 kHz及以下的正弦交流、带和不带直流分量的脉动直流、平滑直流等剩余电流信号。经信号调理电路将电压信号送到单片机进行采集和判断。通过试验测试,该样机在测试精度和速度上均符合国家标准的相关要求。The rapid development of photovoltaic power generation systems and the popularity of electric vehicle charging piles make the traditional residual current protective devices unable to meet the actual demand.This paper proposed a type B residual current protective device,which uses the magnetically modulated residual current transformer and the zero sequence current transformer to acquire the residual current.According to the requirements of GB/T 22794—2017,the type B residual current protective device can detect sinusoidal AC residual current of 1kHz and below 1kHz,pulsating DC residual current with and without DC component,smooth DC residual current and so on.The signal processing circuit sends the voltage signal to the MCU for acquisition and judgment.Through experimental tests,the device meets the relevant requirements of national standards in terms of test accuracy and speed.

    标签: 电流保护器

    上传时间: 2022-03-27

    上传用户:

  • 21世纪大学新型参考教材系列 集成电路B 荒井

    21世纪大学新型参考教材系列 集成电路B 荒井

    标签: 大学 教材 集成电路

    上传时间: 2013-04-15

    上传用户:eeworm