This a simple genetic algorithm implementation where the evaluation function takes positive values only and the fitness of an individual is the same as the value of the objective function
标签: implementation evaluation algorithm function
上传时间: 2015-06-03
上传用户:2467478207
把所给的三个文件DES.h,DES.c,KEY.c在C++ 中创建一个动态链接库,分别加入到相应的Header Files和、Source Files和Desdll.h中
标签: DES
上传时间: 2014-01-14
上传用户:xg262122
YSS915 (KP2V2) is an LSI for processing Karaoke voice signals. This LSI has an A/D converter (1 channel) for the microphone echo, and a memory for the microphone echo and key control. These features allow achieving the functions needed for the Karaoke system by using only one LSI chip. As for the microphone echoes, many other types of echoes are available in addition to ordinary ones so that YSS915 is applicable to various uses. In addition to these Karaoke programs, YSS915 is able to provide the Movie & Music programs, with which the surround effect is applied to the movie and music sources for giving the users more enjoyment. YSS915 is pin compatible with and register compatible with YSS903 (KP2V).
标签: processing LSI converter Karaoke
上传时间: 2015-06-23
上传用户:lijianyu172
c8051f020 实时时钟模块程序 内含IIC模块程序/********************** SYSTEM CLOCK 8M********************************/ extern unsigned char xdata currenttime[16]={0} extern unsigned char xdata settime[16]={ 0x00, // control regesiter 1 0x00, // control regesiter 2 0x01, //current second 0x19, //current minute 0x20, //current hour 0x29, //current data 0x04, //current week 0x07, //current month 0x05, //current year 0x00, // alarm value reset 0x00, // alarm value reset 0x00, // alarm value reset 0x00, // alarm value reset 0x00, // clk out disable 0x00, // close timer 0x00, } /*********************************************************************/ extern void Current_Time ( void ) extern void Set_Time ( void )
标签: c8051f020 SYSTEM CLOCK IIC
上传时间: 2015-06-30
上传用户:edisonfather
使用pso求最小化一函數 matlab程式碼,寫的非常簡潔(不到100行),且還包括了2維的圖形展示,和大家分享參考!!! 一起學習matlab和各種optimize methods 最小化:(x-15)^2+(y-20)^2 The swarm matrix is swarm(index, [location, velocity, best position, best value], [x, y components or the value component]) Author: Wesam ELSHAMY (wesamelshamy@yahoo.com) MSc Student, Electrical Enginering Dept., Faculty of Engineering Cairo University, Egypt
上传时间: 2013-12-18
上传用户:zhaiye
Title: STL Tutorial and Reference Guide: C++ Programming with the Standard Template Library (2nd Edition) Author: David R. Musser / Gillmer J. Derge / Atul Saini / Gilmer J. Derge Publisher: Addison-Wesley Page: 560 Edition: 2nd edition (March 27, 2001) Format: PDF Summary: The Standard Template Library was created as the first library of genetic algorithms and data structures, with four ideas in mind: generic programming, abstractness without loss of efficiency, the Von Neumann computation model, and value semantics. This guide provides a tutorial, a description of each element of the library, and sample applications. The expanded second edition includes new code examples and demonstrations of the use of STL in real-world C++ software development it reflects changes made to STL for the final ANSI/ISO C++ language standard.
标签: Programming Reference Standard Template
上传时间: 2014-01-19
上传用户:netwolf
以MS .NET 所寫的RSA程式,支援KEY Inport/Outport
上传时间: 2014-11-23
上传用户:wys0120
A program to demonstrate the optimization process of particle swarm optimization. A two-dimensional objective function is visualized by level of grey: the lighter the color, the higher the function value. The particles are shown as red circles, their trajectory as red lines.
标签: optimization two-dimensional demonstrate particle
上传时间: 2013-12-22
上传用户:Andy123456
加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]
标签: Cryptographic Primitives generate Library
上传时间: 2015-07-16
上传用户:wqxstar
a program that takes in three arguments: the first one represents the size of an array that will be created the second one represents the maximum value that each of the array elements can have the third one represents the position in the array that you would like to print the value of.
标签: that represents arguments the
上传时间: 2015-07-22
上传用户:waitingfy