虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Second-Order

  • Please read this document before attempting to compile and run the libraries and applications! The p

    Please read this document before attempting to compile and run the libraries and applications! The projects must be compiled in a particular order. Standard support questions are about compiler and/or linker errors that are generated when users try to compile the projects in the wrong order. Other information of interest is available here, so read the entire document fi rst. Wild Magic Version 2.1 is what ships with the fi rst printing of the Game Physics book. Some of the applications that are referenced in the book did not make it onto the CD–ROM for the book. Version 2.2 contains those applications, plus more

    标签: applications attempting and libraries

    上传时间: 2014-01-16

    上传用户:Late_Li

  • The XC226x derivatives are high-performance members of the Infineon XC2000 Family of full-feature s

    The XC226x derivatives are high-performance members of the Infineon XC2000 Family of full-feature single-chip CMOS microcontrollers. These devices extend the functionality and performance of the C166 Family in terms of instructions (MAC unit), peripherals, and speed. They combine high CPU performance (up to 80 million instructions per second) with extended peripheral functionality and enhanced IO capabilities. Optimized peripherals can be adapted flexibly to meet the application requirements. These derivatives utilize clock generation via PLL and internal or external clock sources. Onchip memory modules include program Flash, program RAM, and data RAM.

    标签: high-performance full-feature derivatives Infineon

    上传时间: 2016-12-12

    上传用户:wab1981

  • 本文挡主要探讨一些web代码安全里比较隐秘

    本文挡主要探讨一些web代码安全里比较隐秘,容易被程序员忽视的问题. 主要内容: 二次攻击[Second attack] 类型1:通过文件系统函数漏洞转换 类型2:通过SQL注射漏洞转换 类型3:通过正则表达式中转变量 类型4:通过编码/解码中转变量 数组变量的魅力 Code与系统 Code与http协议 漏洞挖掘

    标签: web 代码 比较

    上传时间: 2016-12-13

    上传用户:佳期如梦

  • Batch version of the back-propagation algorithm. % Given a set of corresponding input-output pairs

    Batch version of the back-propagation algorithm. % Given a set of corresponding input-output pairs and an initial network % [W1,W2,critvec,iter]=batbp(NetDef,W1,W2,PHI,Y,trparms) trains the % network with backpropagation. % % The activation functions must be either linear or tanh. The network % architecture is defined by the matrix NetDef consisting of two % rows. The first row specifies the hidden layer while the second % specifies the output layer. %

    标签: back-propagation corresponding input-output algorithm

    上传时间: 2016-12-27

    上传用户:exxxds

  • % Train a two layer neural network with the Levenberg-Marquardt % method. % % If desired, it is p

    % Train a two layer neural network with the Levenberg-Marquardt % method. % % If desired, it is possible to use regularization by % weight decay. Also pruned (ie. not fully connected) networks can % be trained. % % Given a set of corresponding input-output pairs and an initial % network, % [W1,W2,critvec,iteration,lambda]=marq(NetDef,W1,W2,PHI,Y,trparms) % trains the network with the Levenberg-Marquardt method. % % The activation functions can be either linear or tanh. The % network architecture is defined by the matrix NetDef which % has two rows. The first row specifies the hidden layer and the % second row specifies the output layer.

    标签: Levenberg-Marquardt desired network neural

    上传时间: 2016-12-27

    上传用户:jcljkh

  • Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Ne

    Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Newton"). Also pruned (i.e., not fully % connected) networks can be trained. % % The activation functions can either be linear or tanh. The network % architecture is defined by the matrix NetDef , which has of two % rows. The first row specifies the hidden layer while the second % specifies the output layer.

    标签: recursive prediction algorithm Gauss-Ne

    上传时间: 2016-12-27

    上传用户:ljt101007

  • POS is a Java® platform-based, mission-critical, ISO-8583 based financial transaction library/fr

    POS is a Java® platform-based, mission-critical, ISO-8583 based financial transaction library/framework that can be customized and extended in order to implement financial interchanges.

    标签: mission-critical platform-based transaction financial

    上传时间: 2013-12-15

    上传用户:libenshu01

  • Eclipse+Web开发从入门到精通 These files contain all of the code listings in Java: The Complete Referenc

    Eclipse+Web开发从入门到精通 These files contain all of the code listings in Java: The Complete Reference, J2SE 5 Edition The source code is organized into files by chapter. For example, the file Chap7.code contains the programs shown in Chapter 7. Within each chapter file, the listings are stored in the same order as they appear in the book. Simply edit the appropriate file to extract the listing in which you are interested.

    标签: Complete Referenc listings Eclipse

    上传时间: 2017-01-20

    上传用户:as275944189

  • the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, change

    the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, change passwords, and other functions, use the JDBC interface, such as SWING. If ATM landing, withdrawals and change password must use JDBC interface and database links, I encountered a lot of problems, but the most important is that the database setting, in order to solve this problem, I read four books, Inquiries related information ( s burden

    标签: withdrawals the inquiries simulated

    上传时间: 2017-01-27

    上传用户:我们的船长

  • )。-the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, chan

    )。-the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, change passwords, and other functions, use the JDBC interface, such as SWING. If ATM landing, withdrawals and change password must use JDBC interface and database links, I encountered a lot of problems, but the most important is that the database setting, in order to solve this problem, I read four books, Inquiries related information

    标签: withdrawals the inquiries simulated

    上传时间: 2014-01-16

    上传用户:lnnn30