An adaptive fuzzy integral sliding mode controller for mismatched time-varying linear systems is presented in this paper. The proposed fuzzy integral sliding mode controller is designed to have zero steady state system error under step inputs and alleviate the undesired chattering around the sliding surface
标签: time-varying controller mismatched adaptive
上传时间: 2014-12-04
上传用户:luopoguixiong
We address the problem of predicting a word from previous words in a sample of text. In particular, we discuss n-gram models based on classes of words. We also discuss several statistical algorithms for assigning words to classes based on the frequency of their co-occurrence with other words. We find that we are able to extract classes that have the flavor of either syntactically based groupings or semantically based groupings, depending on the nature of the underlying statistics.
标签: predicting particular previous address
上传时间: 2016-12-26
上传用户:xfbs821
Batch version of the back-propagation algorithm. % Given a set of corresponding input-output pairs and an initial network % [W1,W2,critvec,iter]=batbp(NetDef,W1,W2,PHI,Y,trparms) trains the % network with backpropagation. % % The activation functions must be either linear or tanh. The network % architecture is defined by the matrix NetDef consisting of two % rows. The first row specifies the hidden layer while the second % specifies the output layer. %
标签: back-propagation corresponding input-output algorithm
上传时间: 2016-12-27
上传用户:exxxds
The AVRcam source files were built using the WinAVR distribution (version 3.3.1 of GCC). I haven t tested other versions of GCC, but they should compile without too much difficulty. * The source files for the AVRcam had the author name and copyright information added back into them after the judging of the project, since it states in the competition rules that the author s name can not be present during their inspection. * The included source files are the ones that were submitted for the entry into the Circuit Cellar contest. I have continued to develop the AVRcam, and have added several new features (such as ignoring objects that aren t larger than a minimum size, removing tracked objects that overlap with each, and some general optimizations). If you are interested in the latest source, email me at john@jrobot.net * For more info about the AVRcam, check out http://www.jrobot.net John Orlando August 20, 2004
标签: distribution version AVRcam source
上传时间: 2016-12-30
上传用户:GavinNeko
ORACLE FOR SQL DE FILE ,AS EXAMPLE DE HAVE YOU DOING WHAT。
上传时间: 2013-12-23
上传用户:chfanjiang
Distributed applications, devices, and services appear in many different arrangements in an enterprise. At your company, you probably access data from your intranet services, from computers distributed throughout the company network, and from services across the firewall out on the Web. For example, you might access a calendar-sharing application or a financial application to fill out expense sheets. Someone must maintain all these applications. Not only the applications, but also the hardware that supports them must be maintained. Resource management encompasses both applications and hardware. In fact, both application and hardware management can be supported through the development of Java Management Extensions (JMX) resource management software. This book will show how you can use JMX to manage and monitor all your resources across an enterprise—both software and hardware.
标签: applications arrangements Distributed different
上传时间: 2014-01-05
上传用户:330402686
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
标签: vulnerabilities Introduction discovered undeniably
上传时间: 2014-01-05
上传用户:yph853211
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book and Addison Wesley Longman Inc., was aware of a trademark claim, the designations have been printed in initial caps or all caps. The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers discounts on this book when ordered in quantity for special sales. For more information, please contact:
标签: manufacturers designations distinguish products
上传时间: 2017-01-23
上传用户:woshiayin
the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, change passwords, and other functions, use the JDBC interface, such as SWING. If ATM landing, withdrawals and change password must use JDBC interface and database links, I encountered a lot of problems, but the most important is that the database setting, in order to solve this problem, I read four books, Inquiries related information ( s burden
标签: withdrawals the inquiries simulated
上传时间: 2017-01-27
上传用户:我们的船长
)。-the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, change passwords, and other functions, use the JDBC interface, such as SWING. If ATM landing, withdrawals and change password must use JDBC interface and database links, I encountered a lot of problems, but the most important is that the database setting, in order to solve this problem, I read four books, Inquiries related information
标签: withdrawals the inquiries simulated
上传时间: 2014-01-16
上传用户:lnnn30