虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Cross-Validation

  • These Simulink blocks contain transfer functions that model the pressure and flow transients for axi

    These Simulink blocks contain transfer functions that model the pressure and flow transients for axisymmetric 2D viscous flow of a compressible fluid in a straight rigid circular cross section pipelines. Three models are available: (1) pressures at the ends (2) flow rates at the ends (3) pressure at one end and flow rate at the other Filtering is incorporated to reduce numerical oscillation (Gibbs phenomenon). See J. Dyn. Systems, Meas. & Control vol 122 (2000) pp. 153-162.

    标签: transients functions Simulink transfer

    上传时间: 2014-01-22

    上传用户:Shaikh

  • SpikeLM: A Second-Order Supervised Learning Algorithm for Training Spiking Neural Networks Introduc

    SpikeLM: A Second-Order Supervised Learning Algorithm for Training Spiking Neural Networks Introduction Preliminaries SpikeLM algorithm Experimental validation Conclusions

    标签: Second-Order Supervised Algorithm Learning

    上传时间: 2014-01-13

    上传用户:zhuimenghuadie

  • % This program calculates Dilution of Precision with respect to a GPS * % receiver given its Cartes

    % This program calculates Dilution of Precision with respect to a GPS * % receiver given its Cartesian ECEF position and the positions of four or * % more visible GPS satellites. It is a validation of the DOP algorithm and * % contains reference positions for which the DOP results are known. *

    标签: calculates Precision Dilution receiver

    上传时间: 2014-01-25

    上传用户:zq70996813

  • 【下载说明】 这里提供给大家的是《Embedded Linux: Hardware, Software, and Interfacing》(嵌入式 Linux---硬件、软件与接口)一书的英文原版C

    【下载说明】 这里提供给大家的是《Embedded Linux: Hardware, Software, and Interfacing》(嵌入式 Linux---硬件、软件与接口)一书的英文原版CHM格式下载。 【作者简介】 Craig Hollabaugh has been fascinated by electronics since he bought an AM radio in elementary school. He was first exposed to Unix during a cross-country talk session in 1985. Later, he administered networked Sun and DEC workstations while pursuing a doctoral degree in electrical engineering at Georgia Institute of Technology. 【内容提要】 本书通过一个冬季旅游胜地自动化管理项目实例,从软件、硬件和接口的观点介绍嵌入式Linux。引入项目需求后,作者讲述了开发环境的建立,接着用一系列软硬件接口实例展示了如何使用异步串行通信、PC并口、USB、内存I/O、同步串行通信以及中断,等等。最后介绍了将前面所有的工作有机地组织在一起的系统集成过程。本书以实际应用为导向,书中整个项目的实施过程和软硬件接口实例都具实践指导意义。

    标签: Linux Interfacing Embedded Hardware

    上传时间: 2014-01-22

    上传用户:shus521

  • The core of Java(TM) technology, the Java virtual machine is an abstract computing machine that enab

    The core of Java(TM) technology, the Java virtual machine is an abstract computing machine that enables the Java(TM) platform to host applications on any computer or operating system without rewriting or recompiling. Anyone interested in designing a language or writing a compiler for the Java virtual machine must have an in-depth understanding of its binary class format and instruction set. If you are programming with the Java programming language, knowledge of the Java virtual machine will give you valuable insight into the Java platform s security capabilities and cross-platform portability. It will increase your understanding of the Java programming language, enabling you to improve the security and performance of your programs.

    标签: machine Java technology computing

    上传时间: 2016-05-03

    上传用户:zhenyushaw

  • The toolbox solves a variety of approximate modeling problems for linear static models. The model ca

    The toolbox solves a variety of approximate modeling problems for linear static models. The model can be parameterized in kernel, image, or input/output form and the approximation criterion, called misfit, is a weighted norm between the given data and data that is consistent with the model. There are three main classes of functions in the toolbox: transformation functions, misfit computation functions, and approximation functions. The approximation functions derive an approximate model from data, the misfit computation functions are used for validation and comparison of models, and the transformation functions are used for deriving one model representation from another. KEYWORDS: Total least squares, generalized total least squares, software implementation.

    标签: approximate The modeling problems

    上传时间: 2013-12-20

    上传用户:15071087253

  • Google 推出一套免費的 Web 安全評估工具

    Google 推出一套免費的 Web 安全評估工具,叫做 ratproxy,這套工具可以檢測、分析您的網站是否有安全性漏洞或網頁是否有被入侵,目前可支援 Linux, FreeBSD, MacOS X, 與 Windows (Cygwin) 等執行環境(反正就是 Unix-like 的環境啦)。 RatProxy 可偵測到的漏洞包括 Cross-site Scripting (XSS, 跨網站指令碼)、指令碼惡意置入(script inclusion issues), 惡意網頁內容(content serving problems), insufficient XSRF 以及 XSS 防護(XSS defenses) 等。

    标签: Google Web

    上传时间: 2016-09-30

    上传用户:LouieWu

  • Learn how to build a custom Linux® distribution to use in an embedded environment, in this case

    Learn how to build a custom Linux® distribution to use in an embedded environment, in this case to drive a Technologic Systems TS-7800 single-board computer. In this tutorial, you learn about cross-compiling, the boot loader, file systems, the root file system, disk images, and the boot process, all with respect to the decisions you make as you re building the system and creating the distribution.

    标签: distribution environment embedded custom

    上传时间: 2013-12-23

    上传用户:stella2015

  • QT3.3.4在远峰2410上移植 HOST 环境(虚拟机VM6.0): 系统:redhat 9 完全安装 交叉工具arm 2.95.3 TARGET环境 arm 2410 240*3

    QT3.3.4在远峰2410上移植 HOST 环境(虚拟机VM6.0): 系统:redhat 9 完全安装 交叉工具arm 2.95.3 TARGET环境 arm 2410 240*320屏外加触摸屏 cramfs文件系统 软件: cross-2.95.3.tar.bz2 qt-embedded-free-3.3.4.tar.bz2 qt-x11-free-3.3.4.tar.bz2 tmake-1.11.tar.gz 经测试,在3.3.2的交叉编译工具也通过

    标签: 2410 arm TARGET redhat

    上传时间: 2014-12-22

    上传用户:上善若水

  • 不知为何

    不知为何,在rh9下编译有警告,但是可以正常编译出结果 HOST 环境(虚拟机VM6.0): 系统:redhat 9 完全安装 交叉工具arm 2.95.3 TARGET环境 arm 2410 240*320屏外加触摸屏 cramfs文件系统 软件: cross-2.95.3.tar.bz2 //交叉编译器 qtopia-free-src-2.2.0.tar.gz //qtopia e2fsprogs-1.35.tar.gz // jpegsrc.v6b.tar.gz // libpng-1.2.14.tar.bz2 tslib-1.3.tar.bz2 zlib-1.2.3.tar.bz2

    标签:

    上传时间: 2016-10-23

    上传用户:as275944189