ICA介绍课件。There has been a wide discussion about the application of Independence Component Analysis (ICA) in Signal Processing, Neural Computation and Finance, first introduced as a novel tool to separate blind sources in a mixed signal. The Basic idea of ICA is to reconstruct from observation sequences the hypothesized independent original sequences
标签: Independence application discussion Component
上传时间: 2016-01-12
上传用户:AbuGe
This a naive implementation of BOOTP/TFTPBOOT, the protocols to use to bootstrap a computer through a TCP/IP network. The goal was to design a small footprint implementation to allow the code to be integrated into a monitor program stored in a ROM/FLASH, the footprint is about 7 KBytes for the test program. This code has not been yet tested in many environment. It should be seen at your starting point to integrate the network boot function to your board.
标签: implementation bootstrap protocols TFTPBOOT
上传时间: 2013-12-18
上传用户:极客
这是一个模拟第3类模式地震波的matlab脚本。 This a collection of Matlab scripts that solve the antiplane (mode III) earthquake dynamic problem with slip-weakening friction, on a 1D fault embedded in a 2D homogeneous elastic unbounded medium. The problem is formulated as a boundary integral equation and the elastodynamic kernels are analytically derived in the spectral domain (spatial wavenumber). The method is explained e.g. by Morrysey and Geubelle (1997), and has been improved and extensively used by Nadia Lapusta, Alain Cochard, etc.
标签: collection antiplane scripts matlab
上传时间: 2013-12-26
上传用户:远远ssad
KeePass for J2ME is a J2ME port of KeePass Password Safe, a free, open source, light-weight and easy-to-use password manager. You can store passwords in a highly-encrypted database on a mobile phone, and view them on the go.
标签: KeePass J2ME light-weight Password
上传时间: 2016-01-25
上传用户:er1219
FIST可堆叠文件系统,linux文件系统修改相关的开源软件,使得对linux文件系统功能的改进很简单了 The FiST (File System Translator) system combines two methods to solve the above problems in a novel way: a set of stackable file system templates for each operating system, and a high-level language that can describe stackable file systems in a cross-platform portable fashion. Using FiST, stackable file systems need only be described once. FiST s code generation tool, fistgen, compiles a single file system description into loadable kernel modules for several operating systems (currently Solaris, Linux, and FreeBSD). The project demonstrates that with FiST, code size and development time are reduced significantly, while imposing a small performance overhead of only 1-2%. These benefits are achieved, as well as portability, without changing existing operating systems or file system.
上传时间: 2014-01-10
上传用户:xsnjzljj
Boosting is a meta-learning approach that aims at combining an ensemble of weak classifiers to form a strong classifier. Adaptive Boosting (Adaboost) implements this idea as a greedy search for a linear combination of classifiers by overweighting the examples that are misclassified by each classifier. icsiboost implements Adaboost over stumps (one-level decision trees) on discrete and continuous attributes (words and real values). See http://en.wikipedia.org/wiki/AdaBoost and the papers by Y. Freund and R. Schapire for more details [1]. This approach is one of most efficient and simple to combine continuous and nominal values. Our implementation is aimed at allowing training from millions of examples by hundreds of features in a reasonable time/memory.
标签: meta-learning classifiers combining Boosting
上传时间: 2016-01-30
上传用户:songnanhua
A web crawler (also known as a web spider or web robot) is a program or automated script which browses the in a methodical, automated manner. Other less frequently used names for web crawlers are ants, automatic indexers, bots, and worms (Kobayashi and Takeda, 2000).来源。
标签: web automated crawler program
上传时间: 2016-02-01
上传用户:钓鳌牧马
古典密码中,主要的思想为移位算法及置换算法。 1.移位密码 密钥K为整数,且取值空间为0到25;加密函数:x = x + k (mod 26);解密函数:x = x - k (mod 26)。当K=3时,为凯撒密码。 2.仿射密码 密钥对由a、b组成,整数a满足 gcd(a, 26) = 1,整数b的取值空间为0到25;加密函数:x = ax + b(mod 26);解密函数:x = a*y - a*b (mod 26)。当a=1,b=3时,为凯撒密码。 3.维吉尼亚密码 首先确定密钥长度(本例中密钥只采取个位数字,所以取决于输入密钥的长度),然后输入满足这个长度的向量;加密:取明文第一个字母并将之移k1位,这里k1=1,第二个字母移k2位,k2=2,一旦到了密钥末尾,又从头开始。 4.换位密码 首先确定密钥长度,输入长度为5的0到4的整数序列,将明文分成每5个字母一组,每组字母按照密钥进行换位。
标签: 密码
上传时间: 2016-02-09
上传用户:jqy_china
Thinking in C++ patiently and methodically explores the issues of when and how to use inlines, references, operator overloading, inheritance and dynamic objects, as well as advanced topics such as the proper use of templates, exceptions and multiple inheritance. The entire effort is woven in a fabric that includes Eckel’s own philosophy of object and program design. A must for every C++ developer’s bookshelf, Thinking in C++ is the one C++ book you must have if you’re doing serious development with C++.
标签: methodically and patiently Thinking
上传时间: 2014-01-03
上传用户:it男一枚
The XML Toolbox converts MATLAB data types (such as double, char, struct, complex, sparse, logical) of any level of nesting to XML format and vice versa. For example, >> project.name = MyProject >> project.id = 1234 >> project.param.a = 3.1415 >> project.param.b = 42 becomes with str=xml_format(project, off ) "<project> <name>MyProject</name> <id>1234</id> <param> <a>3.1415</a> <b>42</b> </param> </project>" On the other hand, if an XML string XStr is given, this can be converted easily to a MATLAB data type or structure V with the command V=xml_parse(XStr).
标签: converts Toolbox complex logical
上传时间: 2016-02-12
上传用户:a673761058