A to Z of C programming speaks from basic level C programming to obfuscated C
标签: programming obfuscated speaks basic
上传时间: 2014-11-04
上传用户:www240697738
Description: FASBIR(Filtered Attribute Subspace based Bagging with Injected Randomness) is a variant of Bagging algorithm, whose purpose is to improve accuracy of local learners, such as kNN, through multi-model perturbing ensemble. Reference: Z.-H. Zhou and Y. Yu. Ensembling local learners through multimodal perturbation. IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics, 2005, vol.35, no.4, pp.725-735.
标签: Description Randomness Attribute Filtered
上传时间: 2015-04-10
上传用户:ynzfm
Description: S-ISOMAP is a manifold learning algorithm, which is a supervised variant of ISOMAP. Reference: X. Geng, D.-C. Zhan, and Z.-H. Zhou. Supervised nonlinear dimensionality reduction for visualization and classification. IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics, 2005, vol.35, no.6, pp.1098-1107.
标签: Description supervised algorithm S-ISOMAP
上传时间: 2015-04-10
上传用户:wfeel
Description: C4.5Rule-PANE is a rule learning method which could generate accurate and comprehensible symbolic rules, through regarding a neural network ensemble as a pre-process of a rule inducer. Reference: Z.-H. Zhou and Y. Jiang. Medical diagnosis with C4.5 rule preceded by artificial neural network ensemble. IEEE Transactions on Information Technology in Biomedicine, 2003, vol.7, no.1, pp.37-42. 使用神经网络集成方法诊断糖尿病,肝炎,乳腺癌症的案例研究.
标签: comprehensibl Description Rule-PANE accurate
上传时间: 2013-11-30
上传用户:wcl168881111111
//在tc3.0++在运行 //a数组用于随机产生1-6数表示每个方格后面的图形.用inita()函数来实现 //c数组用于记录方格的状态,用字符L(lock)表示没有打开的方格 //D(delete)表示已消去的方格.O(open)表示打开的方格. //变量m表示按回车键的有效次数.也是记忆力参数,越小记忆力越好 //变量xpos,ypos用于表示当前光标所在的位置 //(x1,y1),(x2,y2)用于记录打开的两个方格的位置 //judge()函数用于控制光标范围,使其不能移出长方形 //win()函数用于判断游戏是否过关,通过判断每个方格是否全是 D 状态 //xago,yago 用于记录移动前的位置 //ax,ay表示行列式的行与列,用它们来控制游戏的关数,ax位于3-6之间,ay位于4-7之间 //z来控制方格后的图形 //第一关后面的图形用1-6代表的图形.第二关后面的图形用0-9十个数。第三关后面的图形用A-O十五个字母, //第四关后面的图形用A-T二十一个字母
上传时间: 2015-06-19
上传用户:hgy9473
加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]
标签: Cryptographic Primitives generate Library
上传时间: 2015-07-16
上传用户:wqxstar
BNB20 Finds the constrained minimum of a function of several possibly integer variables. % Usage: [errmsg,Z,X,t,c,fail] = % BNB20(fun,x0,xstatus,xlb,xub,A,B,Aeq,Beq,nonlcon,settings,options,P1,P2,...) % % BNB solves problems of the form: % Minimize F(x) subject to: xlb <= x0 <=xub % A*x <= B Aeq*x=Beq % C(x)<=0 Ceq(x)=0 % x(i) is continuous for xstatus(i)=0 % x(i) integer for xstatus(i)= 1 % x(i) fixed for xstatus(i)=2 %
标签: constrained variables function possibly
上传时间: 2014-01-13
上传用户:youth25
This m file analyzes a coherent binary phase shift keyed(BPSK) and a amplitude shift keyed(ASK) communication system. The receiver uses a correlator(mixer-integrator[LPF]) configuration with BER measurements comparing measured and theoretical results. The bandpass and low pass used in the receiver are constructed using z transforms.
标签: keyed shift amplitude analyzes
上传时间: 2015-09-26
上传用户:liuchee
Romberg求定积分 输入:积分区间[a,b],被积函数f(x,y,z) 输出:积分结果
上传时间: 2015-10-14
上传用户:妄想演绎师
代入法的启发示搜索 我的代码实现是:按照自然语言各字母出现频率的大小从高到低(已经有人作国统计分析了)先生成一张字母出现频率统计表(A)--------(e),(t,a,o,i,n,s,h,r),(d,l),(c,u,m,w,f,g,y,p,b),(v,k,j,x,q,z) ,再对密文字母计算频率,并按频率从高到低生成一张输入密文字母的统计表(B),通过两张表的对应关系,不断用A中的字母去替换B中的字母,搜索不成功时就回退,在这里回朔是一个关键。
上传时间: 2015-10-24
上传用户:wanqunsheng