搜索结果
找到约 1,098 项符合
one-step 的查询结果
matlab例程 k-step ahead predictions determined by simulation of the % one-step ahead neural network predictor.
k-step ahead predictions determined by simulation of the
% one-step ahead neural network predictor. For NNARMAX
% models the residuals are set to zero when calculating the
% predictions. The predictions are compared to the observed output.
%
matlab例程 AHP toolbox AHPCALC Perform a complete AHP calculation. AHPHIER One-step hierarchic
AHP toolbox
AHPCALC Perform a complete AHP calculation.
AHPHIER One-step hierarchical assembly of AHP weighting vector.
AHPREORDER Internal reordering function called by AHPCALC.
AHPVECTOR Calculate the AHP ranking or weighting vector from an
AHP reciproal matrix.
...
其他 This program is to one-step EEG prediction. it is done by a fuzzy neural network based on a chaotic
This program is to one-step EEG prediction. it is done by a fuzzy neural network based on a chaotic back propagation training method.
其他 This program is prepared as an one-step EEG predictor. this is used a fuzzy neural network which is
This program is prepared as an one-step EEG predictor. this is used a fuzzy neural network which is trained by a chaotic back propagation method
matlab例程 By using a MATLAB program, design a Delta Modulation (DM) system with one step-size and a modified D
By using a MATLAB program, design a Delta Modulation (DM) system with one step-size and a modified DM system with two step-sizes.
文章/文档 A new type of cloak is discussed: one that gives all cloaked objects the appearance of a flat conduc
A new type of cloak is discussed: one that gives all cloaked objects the appearance of a flat conducting
sheet. It has the advantage that none of the parameters of the cloak is singular and can in fact be made
isotropic. It makes broadband cloaking in the optical frequencies one step closer.
其他书籍 Every day, patches are created to cover up security holes in software applications and operating sys
Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one st ...
其他书籍 The combinatorial core of the OVSF code assignment problem that arises in UMTS is to assign some no
The combinatorial core of the OVSF code assignment problem
that arises in UMTS is to assign some nodes of a complete binary
tree of height h (the code tree) to n simultaneous connections, such that
no two assigned nodes (codes) are on the same root-to-leaf path. Each
connection requires a code on a ...
VC书籍 Use this resource to teach yourself Visual C# .NET version 2003, start developing Microsoft .NET–con
Use this resource to teach yourself Visual C# .NET version 2003, start developing Microsoft .NET–connected applications—one step at a time, master language fundamentals at your own pace and use the learn-by-doing exercises to dig in and code!
MySQL数据库 Login Manager V3.0(LM3.0) is an authentication system which can integrate with any existing website
Login Manager V3.0(LM3.0) is an authentication system which can integrate with any existing website that meets the requirements. LM3.0 provides a gatekeeper where user must be authorized before entering the membership secured areas.
Features:
1. Flexibility
LM3.0 allows administrator to integrate i ...