Please read this document before attempting to compile and run the libraries and applications! The projects must be compiled in a particular order. Standard support questions are about compiler and/or linker errors that are generated when users try to compile the projects in the wrong order. Other information of interest is available here, so read the entire document fi rst. Wild Magic Version 2.1 is what ships with the fi rst printing of the Game Physics book. Some of the applications that are referenced in the book did not make it onto the CD–ROM for the book. Version 2.2 contains those applications, plus more
标签: applications attempting and libraries
上传时间: 2014-01-16
上传用户:Late_Li
The XC226x derivatives are high-performance members of the Infineon XC2000 Family of full-feature single-chip CMOS microcontrollers. These devices extend the functionality and performance of the C166 Family in terms of instructions (MAC unit), peripherals, and speed. They combine high CPU performance (up to 80 million instructions per second) with extended peripheral functionality and enhanced IO capabilities. Optimized peripherals can be adapted flexibly to meet the application requirements. These derivatives utilize clock generation via PLL and internal or external clock sources. Onchip memory modules include program Flash, program RAM, and data RAM.
标签: high-performance full-feature derivatives Infineon
上传时间: 2016-12-12
上传用户:wab1981
本文挡主要探讨一些web代码安全里比较隐秘,容易被程序员忽视的问题. 主要内容: 二次攻击[Second attack] 类型1:通过文件系统函数漏洞转换 类型2:通过SQL注射漏洞转换 类型3:通过正则表达式中转变量 类型4:通过编码/解码中转变量 数组变量的魅力 Code与系统 Code与http协议 漏洞挖掘
上传时间: 2016-12-13
上传用户:佳期如梦
Batch version of the back-propagation algorithm. % Given a set of corresponding input-output pairs and an initial network % [W1,W2,critvec,iter]=batbp(NetDef,W1,W2,PHI,Y,trparms) trains the % network with backpropagation. % % The activation functions must be either linear or tanh. The network % architecture is defined by the matrix NetDef consisting of two % rows. The first row specifies the hidden layer while the second % specifies the output layer. %
标签: back-propagation corresponding input-output algorithm
上传时间: 2016-12-27
上传用户:exxxds
% Train a two layer neural network with the Levenberg-Marquardt % method. % % If desired, it is possible to use regularization by % weight decay. Also pruned (ie. not fully connected) networks can % be trained. % % Given a set of corresponding input-output pairs and an initial % network, % [W1,W2,critvec,iteration,lambda]=marq(NetDef,W1,W2,PHI,Y,trparms) % trains the network with the Levenberg-Marquardt method. % % The activation functions can be either linear or tanh. The % network architecture is defined by the matrix NetDef which % has two rows. The first row specifies the hidden layer and the % second row specifies the output layer.
标签: Levenberg-Marquardt desired network neural
上传时间: 2016-12-27
上传用户:jcljkh
Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Newton"). Also pruned (i.e., not fully % connected) networks can be trained. % % The activation functions can either be linear or tanh. The network % architecture is defined by the matrix NetDef , which has of two % rows. The first row specifies the hidden layer while the second % specifies the output layer.
标签: recursive prediction algorithm Gauss-Ne
上传时间: 2016-12-27
上传用户:ljt101007
POS is a Java® platform-based, mission-critical, ISO-8583 based financial transaction library/framework that can be customized and extended in order to implement financial interchanges.
标签: mission-critical platform-based transaction financial
上传时间: 2013-12-15
上传用户:libenshu01
Eclipse+Web开发从入门到精通 These files contain all of the code listings in Java: The Complete Reference, J2SE 5 Edition The source code is organized into files by chapter. For example, the file Chap7.code contains the programs shown in Chapter 7. Within each chapter file, the listings are stored in the same order as they appear in the book. Simply edit the appropriate file to extract the listing in which you are interested.
标签: Complete Referenc listings Eclipse
上传时间: 2017-01-20
上传用户:as275944189
the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, change passwords, and other functions, use the JDBC interface, such as SWING. If ATM landing, withdrawals and change password must use JDBC interface and database links, I encountered a lot of problems, but the most important is that the database setting, in order to solve this problem, I read four books, Inquiries related information ( s burden
标签: withdrawals the inquiries simulated
上传时间: 2017-01-27
上传用户:我们的船长
)。-the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, change passwords, and other functions, use the JDBC interface, such as SWING. If ATM landing, withdrawals and change password must use JDBC interface and database links, I encountered a lot of problems, but the most important is that the database setting, in order to solve this problem, I read four books, Inquiries related information
标签: withdrawals the inquiries simulated
上传时间: 2014-01-16
上传用户:lnnn30