对应分析correspondence analysis(ANACOR) [G,F,A]=ANACOR(X),X为原始数据 p X n维 即有n个样本,每个样本由p个变量来描述。返回F为R型因子分析后的结果,Q为最后的结果,A=ZZ 。
标签: ANACOR correspondence analysis 分
上传时间: 2016-11-26
上传用户:wyc199288
提出一种基于分形理论和BP 神经网络的航空遥感图像有监督分类方法。该方法尝试将航空图像 的光谱信息和纹理特征相结合。它首先将彩色航空图像由RGB 格式转化为HSI 格式,然后,根据亮度计算分 数维、多重分形广义维数谱q-D( q) 和“空隙”等基于分形的纹理特征,同时加入归一化的色度和饱和度作为光 谱特征,采用BP 神经网络作为分类器。通过对彩色航空图像的分类实验,结果证实该方法行之有效。
上传时间: 2014-01-11
上传用户:qq1604324866
利用matlab仿真软件,实现8QAM调制。在实现时采用正交调幅的方式,某星座点在I坐标上的投影去调制同相载波的幅度,在Q坐标上的投影去调制正交载波的幅度,然后将2个调幅信号相加就是所需的调相信号。
上传时间: 2014-01-02
上传用户:leehom61
This an example showing how idl helping to build the abstract class for the java objects. As a result, the client class is able to use the function of the servant program.
标签: the abstract example showing
上传时间: 2014-01-04
上传用户:yxgi5
标准的遗传算法代码,下面是程序:function y=fitness(chrom,p,aim) global P_cross P_mutation [Popsize len]=size(chrom) fitness_gene=zeros(Popsize,1) in_he=zeros(4,1) out_he=zeros(4,1) in_out=0 out_out=0
上传时间: 2013-12-08
上传用户:pkkkkp
扰乱加密,加扰之前的数据在x中,加扰后数据在w中,p,p+1与p+2中分别放移存器低14位中14位和高14位 *q,q+1与q+2中分别放掩码标志码低14位中14位和高14位
标签: 加密
上传时间: 2014-01-15
上传用户:xiaoyunyun
evc与mapx mobile 在PDA上开发的GPS接收器。你的电脑上最好有evc++4.0和ppc2003模拟器,还有mapx mobile,没有都可以去官方网站上下载-AES with MapX mobile PDA development of the GIS system, the main function of MapInfo are included in the inside. Your computer is the best and ppc2003 AES Simulator 4.0, MapX mobile, can not go on the official website of the download
上传时间: 2016-12-06
上传用户:asddsd
"arect" displays a 3-D plot of a pattern."makepattern" computes values of an array pattern cover function for apattern.函数“arect”是给出一个方向图的3D图。函数“makepattern”是计算一个阵列方向图的值。
标签: pattern makepattern displays computes
上传时间: 2016-12-09
上传用户:zm7516678
单片机方面,不错的学习资料 还有很多这方面的,有需要Q我,互相学习
上传时间: 2014-01-24
上传用户:ljt101007
This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Pages environment, but most of the techniques discussed have equivalents in other database environments. It should be viewed as a "follow up", or perhaps an appendix, to the previous paper, "Advanced SQL Injection". The paper covers in more detail some of the points described in its predecessor, providing examples to clarify areas where the previous paper was perhaps unclear. An effective method for privilege escalation is described that makes use of the openrowset function to scan a network. A novel method for extracting information in the absence of helpful error messages is described the use of time delays as a transmission channel. Finally, a number of miscellaneous observations and useful hints are provided, collated from responses to the original paper, and various conversations around the subject of SQL injection in a SQL Server environment.
标签: Server SQL Injection Microsoft
上传时间: 2014-07-28
上传用户:xhz1993