k-step ahead predictions determined by simulation of the % One-step ahead neural network predictor. For NNARMAX % models the residuals are set to zero when calculating the % predictions. The predictions are compared to the observed output. %
标签: ahead predictions determined simulation
上传时间: 2016-12-27
上传用户:busterman
AHP toolbox AHPCALC Perform a complete AHP calculation. AHPHIER One-step hierarchical assembly of AHP weighting vector. AHPREORDER Internal reordering function called by AHPCALC. AHPVECTOR Calculate the AHP ranking or weighting vector from an AHP reciproal matrix. AHPMAKEMAT Turn a vector of comparisons into an AHP reciprocal matrix. Copyright (C) 2001 Michael J. Scott
标签: calculation hierarchic AHP One-step
上传时间: 2013-11-28
上传用户:PresidentHuang
This program is to One-step EEG prediction. it is done by a fuzzy neural network based on a chaotic back propagation training method.
标签: prediction One-step program chaotic
上传时间: 2017-07-15
上传用户:风之骄子
This program is prepared as an One-step EEG predictor. this is used a fuzzy neural network which is trained by a chaotic back propagation method
标签: predictor is prepared One-step
上传时间: 2013-12-26
上传用户:TRIFCT
By using a MATLAB program, design a Delta Modulation (DM) system with one step-size and a modified DM system with two step-sizes.
标签: Modulation step-size modified program
上传时间: 2017-08-15
上传用户:LIKE
A new type of cloak is discussed: one that gives all cloaked objects the appearance of a flat conducting sheet. It has the advantage that none of the parameters of the cloak is singular and can in fact be made isotropic. It makes broadband cloaking in the optical frequencies one step closer.
标签: appearance discussed cloaked objects
上传时间: 2017-03-30
上传用户:rishian
Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.
标签: applications operating security software
上传时间: 2015-11-01
上传用户:fhzm5658
The combinatorial core of the OVSF code assignment problem that arises in UMTS is to assign some nodes of a complete binary tree of height h (the code tree) to n simultaneous connections, such that no two assigned nodes (codes) are on the same root-to-leaf path. Each connection requires a code on a specified level. The code can change over time as long as it is still on the same level. We consider the One-step code assignment problem: Given an assignment, move the minimum number of codes to serve a new request. Minn and Siu proposed the so-called DCAalgorithm to solve the problem optimally. We show that DCA does not always return an optimal solution, and that the problem is NP-hard. We give an exact nO(h)-time algorithm, and a polynomial time greedy algorithm that achieves approximation ratio Θ(h). Finally, we consider the online code assignment problem for which we derive several results
标签: combinatorial assignment problem arises
上传时间: 2014-01-19
上传用户:BIBI
Use this resource to teach yourself Visual C# .NET version 2003, start developing Microsoft .NET–connected applications—one step at a time, master language fundamentals at your own pace and use the learn-by-doing exercises to dig in and code!
标签: developing NET Microsoft resource
上传时间: 2014-08-09
上传用户:jcljkh
Login Manager V3.0(LM3.0) is an authentication system which can integrate with any existing website that meets the requirements. LM3.0 provides a gatekeeper where user must be authorized before entering the membership secured areas. Features: 1. Flexibility LM3.0 allows administrator to integrate it with the current unprotected website. This is especially useful if major changes are going to be painful. With LM3.0, you re just one step towards getting the security you needed most. 2. Speed LM3.0 uses PHP and MySQL which enables fast data transactions.
标签: authentication 3.0 integrate existing
上传时间: 2017-06-06
上传用户:hullow