虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Instances

  • The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of cla

    The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of classified examples a decision tree is induced, biased by the information gain measure, which heuristically leads to small trees. The examples are given in attribute-value representation. The set of possible classes is finite. Only tests, that split the set of Instances of the underlying example languages depending on the value of a single attribute are supported.

    标签: algorithm induction decision top-down

    上传时间: 2017-08-20

    上传用户:hzy5825468

  • libnids-Win32

    V1.16 Win32 July 2012 - Ported to Win32 C++ - Allow multiple Instances of libnids to coexist in the same process - Incorporate unofficial patch to track established TCP connections - Migration of calls to secure versions (i.e. strcpy to strcpy_s) - Compiles under Visual Studio 2010 with no warnings at W4 - Linux support well and truly broken, Linux specific code removed

    标签: libnids-Win32

    上传时间: 2016-07-30

    上传用户:mxgg126

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of Instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    标签: Fundamental Limits Secure Class on of

    上传时间: 2020-01-04

    上传用户:kddlas

  • Agile+Architecture+Revolution

    The core thrust of architecture has been to define core business requirements, and then construct the IT solution to meet those requirements, typically as Instances of software. While this seems like a simple concept, many in enter- prise IT went way off course in the last 10 to 15 years.

    标签: Architecture Revolution Agile

    上传时间: 2020-05-26

    上传用户:shancjb

  • Digital+Communication+over+Fading+Channels 1st

    Regardless of the branch of science or engineering, theoreticians have always been enamored with the notion of expressing their results in the form of closed-form expressions. Quite often, the elegance of the closed-form solution is overshadowed by the complexity of its form and the difficulty in evaluating it numerically. In such Instances, one becomes motivated to search instead for a solution that is simple in form and simple to evaluate. 

    标签: Communication Channels Digital Fading over 1st

    上传时间: 2020-05-27

    上传用户:shancjb

  • Digital+Communication+over+Fading+Channels,2nd

    Regardless of the branch of science or engineering, theoreticians have always been enamored with the notion of expressing their results in the form of closed-form expressions. Quite often the elegance of the closed-form solution is overshadowed by the complexity of its form and the difficulty in evaluating it numerically. In such Instances, one becomes motivated to search instead for a solution that is simple in form and likewise simple to evaluate. 

    标签: Communication Channels Digital Fading over 2nd

    上传时间: 2020-05-27

    上传用户:shancjb

  • VIP专区-嵌入式/单片机编程源码精选合集系列(164)

    VIP专区-嵌入式/单片机编程源码精选合集系列(164)资源包含以下内容:1. 嵌入式ARC平台参考资料.2. c8051f020 ds1620 温度传感器 调通了 keil下开发.3. 让蜂鸣器唱歌的程序,利用从音乐中提取出的文件资料,控制发音长短来实现.4. 基于凌阳单片机spmc75f2413的步进电机3轴联动空间圆弧插补源程序.5. Oreilly出版的权威的dojo教材.6. 基于嵌入式操作系统的网络监控系统.7. 基于arm的嵌入式开发程序设计.8. 一片关于ARM9处理器的bootloader的分析与设计论文.9. 用verilog写的对OCMJ2X8液晶模块控制代码.10. 状态机的应用。在嵌入式系统中状态机使用非常频繁.11. AD89C51单片机控制液晶显示器LCD1602显示时间。.12. T-Kernel 嵌入式系统源码.13. 这是一个重要的CPLD文件 具有很高的参考价值.14. 利用ARM2103编写的实时时钟程序.15. minigui编程手册.16. 用TEA5767 自己动手制作的收音机。效果很好.17. ARM嵌入式系统的通用bootloader的设计与实现.18. AVR驱动7219程序.19. cypress的开发框架.20. RFID读卡终端C程序设计基于51单片机实现.21. ARM与嵌入式系统基础教程 ARM与嵌入式系统基础教程.22. GUI代码,用与实现相关GUI的功能,如有需要即可自由下载!.23. 一个基于周立功EASYARM2000平台的一个小程序 定时器来实现蜂鸣器的开关 各0.5s.24. TCP/IP协议栈原代码(C语言)很好的理解TCP/IP的技术材料.25. c51+proteus 18B20 温度传感器实验.26. i2c 总线详细介绍及相关编程说明.27. c51+proteus仿真+7seg Max7221动态显示.28. E: oolLAB Proteus实例播放音乐 说明:8051单片机播放音乐.29. linux是最好的嵌入式设计操作系统,资源开源,并且可以支持很多种嵌入式IC.30. CAN51开发板功能 1、 USB或DC+5V供电; 2、 89c52+sja1000+tja1050(tja1040)(p82c250);89c52+mcp2515+tja1050(t.31. RT73在嵌入式领域最稳定的驱动 官网已经取消下载.32. 这是用prolog语言开发的系统.33. 嵌入式C使用的汇总.34. 现在Arm系统是非常成熟和广泛的嵌入式系统.本文是Arm嵌入式开发系统的介绍.35. 《LinuxuClinux+MiniGUI+嵌入式系统开发原理、工具及过程》.36. These Instances, whenmapped to an N-dimensional space, represent a core set that can be used to con.37. 一个用IO口来模拟串口通讯的软件.38. 一个对93C46进行编程的软件.39. 红外解码 LCD显示程序,用处广泛 此程序仅用于学习交流使用,.40. 图解电子器件 学习嵌入式系统的朋友.

    标签: 红外探测器

    上传时间: 2013-04-15

    上传用户:eeworm