虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

machine-generated

  • The VGA example generates a 320x240 diffusion-limited-aggregation (DLA) on Altera DE2 board. A DLA i

    The VGA example generates a 320x240 diffusion-limited-aggregation (DLA) on Altera DE2 board. A DLA is a clump formed by sticky particles adhering to an existing structure. In this design, we start with one pixel at the center of the screen and allow a random walker to bounce around the screen until it hits the pixel at the center. It then sticks and a new walker is started randomly at one of the 4 corners of the screen. The random number generators for x and y steps are XOR feedback shift registers (see also Hamblen, Appendix A). The VGA driver, PLL, and reset controller from the DE2 CDROM are necessary to compile this example. Note that you must push KEY0 to start the state machine.

    标签: diffusion-limited-aggregation DLA generates 320x240

    上传时间: 2014-01-16

    上传用户:225588

  • The literature of cryptography has a curious history. Secrecy, of course, has always played a centra

    The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.

    标签: cryptography literature has Secrecy

    上传时间: 2016-12-08

    上传用户:fxf126@126.com

  • Please read this document before attempting to compile and run the libraries and applications! The p

    Please read this document before attempting to compile and run the libraries and applications! The projects must be compiled in a particular order. Standard support questions are about compiler and/or linker errors that are generated when users try to compile the projects in the wrong order. Other information of interest is available here, so read the entire document fi rst. Wild Magic Version 2.1 is what ships with the fi rst printing of the Game Physics book. Some of the applications that are referenced in the book did not make it onto the CD–ROM for the book. Version 2.2 contains those applications, plus more

    标签: applications attempting and libraries

    上传时间: 2014-01-16

    上传用户:Late_Li

  • 本人大二学习汇编语言程序设计时的全部源代码

    本人大二学习汇编语言程序设计时的全部源代码,均已经编译通过生成可执行文件,每个目录是一个程序。希望对学习汇编语言的同志有所帮助。-my sophomore year learning assembly language programming at all the source code, have already generated by compiler executable files, each directory is a process. Want to learn assembly language comrades help.

    标签: 汇编语言 程序设计 源代码

    上传时间: 2013-12-17

    上传用户:zmy123

  • 虚拟机设计与实现——C/C++

    虚拟机设计与实现——C/C++,即Virtual Machine Design and Implementation in C/C++ ,随书光盘源码,HEC虚拟机的源代码

    标签: 虚拟机

    上传时间: 2016-12-22

    上传用户:洛木卓

  • 数据加密算法(Data Encryption Algorithm

    数据加密算法(Data Encryption Algorithm,DEA)的数据加密标准(Data Encryption Standard,DES)是规范的描述,它出自 IBM 的研究工作,并在 1997 年被美国政府正式采纳。它很可能是使用最广泛的秘钥系统,特别是在保护金融数据的安全中,最初开发的 DES 是嵌入硬 件中的。通常,自动取款机(Automated Teller Machine,ATM)都使用 DES。文件是DES代码的VHDL描述

    标签: Encryption Algorithm Data 数据加密

    上传时间: 2014-09-07

    上传用户:ztj182002

  • state of art language modeling methods: An Empirical Study of Smoothing Techniques for Language Mod

    state of art language modeling methods: An Empirical Study of Smoothing Techniques for Language Modeling.pdf BLEU, a Method for Automatic Evaluation of Machine Translation.pdf Class-based n-gram models of natural language.pdf Distributed Language Modeling for N-best List Re-ranking.pdf Distributed Word Clustering for Large Scale Class-Based Language Modeling in.pdf

    标签: Techniques Empirical Smoothing Language

    上传时间: 2016-12-26

    上传用户:zhuoying119

  • This function calculates Akaike s final prediction error % estimate of the average generalization e

    This function calculates Akaike s final prediction error % estimate of the average generalization error for network % models generated by NNARX, NNOE, NNARMAX1+2, or their recursive % counterparts. % % [FPE,deff,varest,H] = nnfpe(method,NetDef,W1,W2,U,Y,NN,trparms,skip,Chat) % produces the final prediction error estimate (fpe), the effective number % of weights in the network if it has been trained with weight decay, % an estimate of the noise variance, and the Gauss-Newton Hessian. %

    标签: generalization calculates prediction function

    上传时间: 2016-12-27

    上传用户:脚趾头

  • 基于C++阐述虚拟机编程原理 This guide provides an in-depth look at the construction and underlying theory of a

    基于C++阐述虚拟机编程原理 This guide provides an in-depth look at the construction and underlying theory of a fully functional virtual machine and an entire suite of related development tools.

    标签: construction underlying provides in-depth

    上传时间: 2017-02-12

    上传用户:nanxia

  • In this paper, we describe the development of a rapidly reconfigurable system in which the users’ ta

    In this paper, we describe the development of a rapidly reconfigurable system in which the users’ tacit knowledge and requirements are elicited via a process of Interactive Evolution, finding the image processing parameters to achieve the required goals without any need for specialised knowledge of the machine vision system. We show that the resulting segmentation can be quickly and easily evolved from scratch, and achieves detection rates comparable to those of a hand-tuned system on a hot-rolled steel defect recognition problem.

    标签: reconfigurable development the describe

    上传时间: 2014-01-05

    上传用户:hopy