虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

two-circle

  • ICA can be used in brain activation studies to reduce the number of dimension and filter out indepen

    ICA can be used in brain activation studies to reduce the number of dimension and filter out independent and interesting activations. This demonstration shows two studies. One provided by Hvidovre Universitets Hospital, Denmark, that consists of fMRI scannings of humans. Another provided by the EU sponsored MAPAWAMO project from fMRI scannings of monkeys. In the demo comparison between icaMS, icaML, icaMF, icaMF (positive sources) and PCA can be made. More detailes can found in [2].

    标签: activation dimension studies indepen

    上传时间: 2015-04-19

    上传用户:zukfu

  • For the incomplete methods, we kept the representation of the queens by a table and the method of ca

    For the incomplete methods, we kept the representation of the queens by a table and the method of calculation to determine if two queens are in conflict, which is much faster for this kind of problems than the representation by a matrix. heuristics: descent. Tests: 100 queens in less than 1 second and 67 iterations. 500 queens in 1 second and 257 iterations. 1000 queens in 11 seconds and 492 iterations. heuristics: Simulated annealing. Tests: 100 queens in less than 1 second and 47 iterations. 500 queens in 5 seconds and 243 iterations. 1000 queens in 13 seconds and 497 iterations. heuristics: based on Simulated Annealing. Tests: 100 queens in less than 1 second and 60 iterations. 500 queens in 1 second and 224 iterations. 1000 queens in 5 seconds and 459 iterations. 10 000 queens in 20 minutes 30 seconds and 4885 iterations.

    标签: the representation incomplete methods

    上传时间: 2015-05-05

    上传用户:1159797854

  • NORTi3 is a realtime multitasking operating system conforming to the micro-ITRON 3.0 specification.

    NORTi3 is a realtime multitasking operating system conforming to the micro-ITRON 3.0 specification. NORTi3 is divided into two packages: NORTi3 Standard and NORTi3 Extended. The product NORTi3 Extended has implemented all the system calls of level E placed as "added and extended functions” in the micro-ITRON specification as well as the system calls equivalent to level X.

    标签: specification multitasking micro-ITRON conforming

    上传时间: 2014-01-14

    上传用户:saharawalker

  • The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: he

    The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: header file for same ptfsf-demo.c: FDTD code which demonstrates use of perfect TFSF code. Essentially this program used to generate results shown in the paper ptfsf-file-maker.c: code to generate an incident-field file using the "perfect" incident fields ptfsf-demo-file.c: FDTD code which uses the perfect incident fields stored in a file fdtdgen.h: defines macros used in much of my code Makefile: simple make-file to compile programs Also include are some simple script files to run the programs with reasonable values. The code assumes a two-dimensional computational domain with TMz polarization (i.e., non-zero field Ez, Hx, and Hy). The program is currently written so that the incident field always strikes the lower-left corner of the total-field region first. (If you want a different corner, that should be a fairly simple tweak to the code, but for now you ll have to make that tweak yourself.)

    标签: ptfsf following the contains

    上传时间: 2013-11-28

    上传用户:风之骄子

  • ARM下 Implement matrix multiplication of 2 square matrices, with data read from an input file and pri

    ARM下 Implement matrix multiplication of 2 square matrices, with data read from an input file and printed both to the console and to an output file. • Assume a file with correct data (no garbage, characters, etc.). • you must check and provide appropriate execution for 2 extra cases, namely when the matrix size given is either “0” , or when the size is greater than the maximum handled of “5” . In these 2 cases you must implement the following behaviour: o If size = 0, then print a message “Size = 0 is unacceptable” and continue by reading the next size for the next 2 matrices (if not end of file). o If size >5, then print two messages: “Size is too big - unacceptable”. Then read and discard the next (size2 ) integers and continue by reading the next size for the next 2 matrices (if not end of file).

    标签: multiplication Implement matrices matrix

    上传时间: 2014-08-30

    上传用户:dsgkjgkjg

  • Decoding most of the infrared signals can be easily handled by PIC16C5X microcontrollers. This appl

    Decoding most of the infrared signals can be easily handled by PIC16C5X microcontrollers. This application note describes how this decoding may be done. The only mandatory hardware for decoding IR signals is an infrared receiver. The use of two types is described here. Both are modular types used often by the consumer electronics industry. The first type responds to infrared signals modulated at about 40 kHz. The second responds to non-modulated infrared pulses and has a restricted range. The hardware costs of each approach will be less than two dollars.

    标签: microcontrollers Decoding infrared handled

    上传时间: 2015-05-24

    上传用户:ruan2570406

  • Writing an interactive Java program with a graphical user interface (GUI) running on the Java phone

    Writing an interactive Java program with a graphical user interface (GUI) running on the Java phone emulator bundled with J2ME Wireless Toolkit 2.2 or Sun Java Wireless Toolkit 2.3 Beta Release. The Jave program will provide a tic-tac-toe board for two players to play a typical tic-tac-toe game on a Java mobile phone.

    标签: Java interactive graphical interface

    上传时间: 2014-01-22

    上传用户:xuanjie

  • Writing an interactive Java program with a graphical user interface (GUI) running on the Java phone

    Writing an interactive Java program with a graphical user interface (GUI) running on the Java phone emulator bundled with J2ME Wireless Toolkit 2.2 or Sun Java Wireless Toolkit 2.3 Beta Release. The Jave program will provide a Gobang board for two players to play a typical Gobang game on a Java mobile phone.

    标签: Java interactive graphical interface

    上传时间: 2015-06-05

    上传用户:LouieWu

  • The JICQ is the bureau area which JAVA writes according to "Customer s Machine/Server"(C/S) mode mes

    The JICQ is the bureau area which JAVA writes according to "Customer s Machine/Server"(C/S) mode message solid hour correspond by letter tool system, the system adopted the SQL Server2000 of Microsoft company as a backstage database, the system passes a JDBC interview database. The system is divided into the server procedure and customer s procedure two parts, server and customer adoption "Transmission Control Protocol"(TCP), connect a word (Socket) conjunction through a set, the adoption "User Datagram Protocol "(UDP) of the customer s, pass a data report a set to connect a word (DatagramSocket) establishment a conjunction. The system has customer registration, customer to register, increase good friend, delete good friend and send out and receive news etc. function.

    标签: according Customer Machine Server

    上传时间: 2014-01-04

    上传用户:jyycc

  • Single-layer neural networks can be trained using various learning algorithms. The best-known algori

    Single-layer neural networks can be trained using various learning algorithms. The best-known algorithms are the Adaline, Perceptron and Backpropagation algorithms for supervised learning. The first two are specific to single-layer neural networks while the third can be generalized to multi-layer perceptrons.

    标签: Single-layer algorithms best-known networks

    上传时间: 2015-06-17

    上传用户:赵云兴