虫虫首页|资源下载|资源专辑|精品软件
登录|注册

perfect

  • 卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章

    卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章,全英文,2003年完成,Probabilistic Noise Identification and Data Cleaning,Real world data is never as perfect as we would like it to be and can often suffer from corruptions that may impact interpretations of the data, models created from the data, and decisions made based on the data. One approach to this problem is to identify and remove records that contain corruptions. Unfortunately, if only certain fields in a record have been corrupted then usable, uncorrupted data will be lost. In this paper we present LENS, an approach for identifying corrupted fields and using the remaining noncorrupted fields for subsequent modeling and analysis.

    标签: 大学 数据

    上传时间: 2017-08-28

    上传用户:thinode

  • 第一个Java程序 public class Practice { public static void main(String args[]) { System.out.print

    第一个Java程序 public class Practice { public static void main(String args[]) { System.out.println("**********************************") System.out.println("** Practice makes perfect") System.out.println("**********************************") } }

    标签: public Practice String System

    上传时间: 2017-09-05

    上传用户:xiaoyunyun

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    标签: Fundamental Limits Secure Class on of

    上传时间: 2020-01-04

    上传用户:kddlas

  • Pro Arduino

    Since its release, Arduino has become more than just a development platform; it has become a culture built around the idea of open source and open hardware, and one that is reimagining computer science and education. Arduino has opened hardware development by making the starting skills easy to obtain, but retaining the complexities of real-world application. This combination makes Arduino a perfect environment for school students, seasoned developers, and designers. This is the first Arduino book to hold the title of “Pro,” and demonstrates skills and concepts that are used by developers in a more advanced setting. Going beyond projects, this book provides examples that demonstrate concepts that can be easily integrated into many different projects and provide inspiration for future ones. The focus of this book is as a transition from the intermediate to the professional.

    标签: Arduino Pro

    上传时间: 2020-06-09

    上传用户:shancjb

  • MultivariableControlSystems

    This introductory chapter is devoted to reviewing the fundamental ideas of control from a multivariable point of view. In some cases, the mathematics and operations on systems (modelling, pole placement, etc.), as previously treated in introductory courses and textbooks, convey to the readers an un- realistic image of systems engineering. The simplifying assumptions, simple examples and “perfect” model set-up usually used in these scenarios present the control problem as a pure mathematical problem, sometimes losing the physical meaning of the involved concepts and operations. We try to empha- sise the engineering implication of some of these concepts and, before entering into a detailed treatment of the different topics, a general qualitative overview is provided in this chapter.

    标签: MultivariableControlSystems

    上传时间: 2020-06-09

    上传用户:shancjb

  • Observers in Control Systems

    Control systems are used to regulate an enormous variety of machines, products, and processes. They control quantities such as motion, temperature, heat flow, fluid flow, fluid pressure, tension, voltage, and current. Most concepts in control theory are based on having sensors to measure the quantity under control. In fact, control theory is often taught assuming the availability of near-perfect feedback signals. Unfortunately, such an assumption is often invalid. Physical sensors have shortcomings that can degrade a control system.

    标签: Observers Control Systems in

    上传时间: 2020-06-09

    上传用户:shancjb