The purpose of this study is to explore the possibilities offered by current Artificial Neural Net(ANN) structures and topologies and determine their strengths and weaknesses.
标签: possibilities Artificial purpose explore
上传时间: 2014-11-02
上传用户:ommshaggar
configure HID devices like USB mouse with A91SAM7SE CPU. Inlcude initilization for necessary peripherials. Developer can modify this piece code to do their development on HID devices. This is speically for GNU
标签: initilization configure necessary Inlcude
上传时间: 2017-06-02
上传用户:waitingfy
USBHostSlave is a USB 1.1 host and Device IP core. – Supports full speed (12Mbps) and low speed (1.5Mbps) operation. – USB Device has four endpoints, each with their own independent FIFO. – Supports the four types of USB data transfer control, bulk, interrupt, and isochronous transfers. – Host can automatically generate SOF packets. – 8-bit Wishbone slave bus interface. – FIFO depth configurable via paramters.
标签: speed USBHostSlave and Supports
上传时间: 2014-01-17
上传用户:sxdtlqqjl
Migma intends to help teachers to get several different multiple-choice exams based on the user?s original. This command line program quickly generates a number of different new tests (and their respective answer sheets
标签: multiple-choice different teachers intends
上传时间: 2013-12-17
上传用户:Miyuki
Software-defined radios (SDRs) have been around for more than a decade. The first complete Global Positioning System (GPS) implementation was described by Dennis Akos in 1997. Since then several research groups have presented their contributions.We therefore find it timely to publish an up-to-date text on the subject and at the same time include Galileo, the forthcoming European satellitebased navigation system. Both GPS and Galileo belong to the category of Global Navigation Satellite Systems (GNSS).
标签: Software-defined complete Global radios
上传时间: 2017-06-08
上传用户:wkchong
If you d like to know where visitors to your site live, add this to your feedback forms. They just choose a region, and the second menu changes appropriately, allowing them to choose their country. (If they choose USA, it allows them to select their state) Neat!
上传时间: 2017-06-11
上传用户:wfeel
As I write this foreword, I am collaborating with four leading user interface (UI) component vendors on a presentation for the 2004 JavaOneSM conference. In our presentation, the vendors will show how they leverage JavaServerTM Faces technology in their products. While developing the presentation, I am learning some things about the work we’ve been doing on JavaServer Faces for the past three years. The vendors have their own set of concerns unique to adapting their product for JavaServer Faces, but they all voice one opinion loud and clear: they are very relieved to finally have a standard for web-based user interfaces.
标签: collaborating component interface foreword
上传时间: 2014-08-27
上传用户:时代电子小智
The book consists of three sections. The first, foundations, provides a tutorial overview of the principles underlying data mining algorithms and their application. The presentation emphasizes intuition rather than rigor. The second section, data mining algorithms, shows how algorithms are constructed to solve specific problems in a principled manner. The algorithms covered include trees and rules for classification and regression, association rules, belief networks, classical statistical models, nonlinear models such as neural networks, and local memory-based models. The third section shows how all of the preceding analysis fits together when applied to real-world data mining problems. Topics include the role of metadata, how to handle missing data, and data preprocessing.
标签: foundations The consists sections
上传时间: 2017-06-22
上传用户:lps11188
bubble sort quick sort selection sort developed to measure time performance of each sorting and compare their results with each other for very large data set 2
标签: sort performance developed selection
上传时间: 2014-01-08
上传用户:xuan‘nian
VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.
标签: implementation twofish cipher VHDL
上传时间: 2017-06-25
上传用户:王小奇