PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A components) those variables that do not carry any relevant information to model Y. The criterion used to trace the un-informative variables is the reliability of the regression coefficients: c_j=mean(b_j)/std(b_j), obtained by jackknifing. The cutoff level, below which c_j is considered to be too small, indicating that the variable j should be removed, is estimated using a matrix of random variables.The predictive power of PLS models built on the retained variables only is evaluated over all 1-a dimensions =(yielding RMSECVnew).
标签: from eliminates PRINCIPLE algorithm
上传时间: 2016-11-27
上传用户:凌云御清风
Good morning, dear teachers. I am very glad to be here for your interview. my name is xx.I am 21 years old. I come from Dafang, a small town of Guizhou province. My undergraduate period will be accomplished in East China Jiaotong University. I major in electrical engineering and automation. I am interesting in computer, especially in program design. I am a hard study student, especially in the things which I interesting in. I am a person with great perseverance. During the days I preparing for the postgraduate examination, I insist on study for more than 10 hours every day. Just owing to this, I could pass the first examination finally. I am also a person with great ambition.
标签: interview teachers morning Good
上传时间: 2014-01-11
上传用户:钓鳌牧马
The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.
标签: cryptography literature has Secrecy
上传时间: 2016-12-08
上传用户:fxf126@126.com
用C语言编的一个小解释器,可以执行C程序的!算是可以执行C程序的C程序吧! 选自最新C语言精华(第三版)Herbert Schildt著 A small interpreter arranges which with the C language, may carry out the C procedure! Is may carry out C the procedure C procedure! (Master) writes oh!
标签: C语言
上传时间: 2013-12-20
上传用户:kelimu
/* 在这里我们连接 "destroy" 事件到一个信号处理函数。 * 对这个窗口调用 gtk_widget_destroy() 函数或在 "delete_event" 回调函数中返回 FALSE 值 * 都会触发这个事件。*/ g_signal_connect (G_OBJECT (window), "destroy", G_CALLBACK (destroy), NULL) /* 设置窗口边框的宽度。*/ gtk_container_set_border_width (GTK_CONTAINER (window), 10) /* 创建一个标签为 "Hello World" 的新按钮。*/ button = gtk_button_new_with_label ("hello world") /* 当按钮收到 "clicked" 信号时会调用 hello() 函数,并将NULL传给 * 它作为参数。hello() 函数在前面定义了。*/ g_signal_connect (G_OBJECT (button), "clicked", G_CALLBACK (hello), NULL)
标签: gtk_widget_destroy delete_event destroy FALS
上传时间: 2016-12-26
上传用户:zsjinju
97 law to enhance the classic procedure Ridge wavelet extraction Modulus maximum for the wavelet edge detection Small spectral analysis method mallat classic procedure
标签: wavelet extraction the procedure
上传时间: 2014-01-09
上传用户:xg262122
Java is the first language to provide a cross-platform I/O library that is powerful enough to handle all these diverse tasks. Java is the first programming language with a modern, object-oriented approach to input and output. Java s I/O model is more powerful and more suited to real-world tasks than any other major language used today. Java I/O is the first and still the only book to fully expose the power and sophistication of this library.
标签: cross-platform language powerful provide
上传时间: 2014-01-07
上传用户:pompey
I want to provide an example file system driver for Windows NT/2000/XP. For some time I have worked on an implementation of RomFs. RomFs is a small filesystem originally implemented in Linux, because of its simple disk layout its a good choice for an example driver. The current status is a working read-only driver that supports caching of file data, the create functionallity still needs some work but I m releasing it due to the high public demand.
标签: provide Windows example driver
上传时间: 2013-12-19
上传用户:zsjzc
熟悉基于 uCOS-II 扩展的嵌入式操作系统的启动和应用程序的结构。阅读 main. 调用的函数,了解 uCOS-II操作系统系统的启动过程。使用Source Insight 3.0 C代码 辑器,在操作系统的基础上,编写一段程序,在屏幕上显示“Hello world”等文本
上传时间: 2013-12-21
上传用户:wxhwjf
ThreadX Library for ARM RISC microprocessor. ThreadX is a high performance RTOS that is wildly used in industrail world-wide.
标签: ThreadX microprocessor performance Library
上传时间: 2014-10-26
上传用户:1101055045