搜索资源列表
从BIOS控制计算机安全
- 纵观市场上的安全产品,从网络防火墙到各种网络加密、个人数字签证以及早期硬盘锁,均未能对个人计算机本身进行实质性的保护。这些安全机制大都基于这样一种原理:利用一个软件,输入一个特定的密码,经过验证后即可获得合法身份,从而实现各种操作,如购物、收发公文、浏览甚至修改机密数据。众所周知,这种基于纯密码的机制是很脆弱的,所以,许多关键行业和部门都采用了软、硬结合的方式,如设立各种Smart卡认证机制。在银行工作的职工,每人都有一张代表自己电子身份的IC卡,每天上班,必须先刷卡才能进入银行的业务系统。这种
ex6-3
- 用KEIL C编写的网络远端温度感测器,比较使用且经典,欢迎大家喜欢,共享-KEIL C with the preparation of remote temperature sensor networks, which use more classical, welcoming everyone likes to share
bysjjimmy
- OFDM系统的C语言程序,其中少了IFFT及FFT部分(外网了随便搜下很多的^_^)-OFDM System C Programming Language, a minority of the FFT and IFFT some (external networks arbitrarily seized under a lot of ^ _ ^)
1.txt(5.75K)
- 串口通信的单片机程序,是计算机网络的实验程序,经调试可以使用-The single-chip serial communication procedure is experimental procedures of computer networks, can be used by the debugger
BP
- C语言编写的BP神经网络,对了解和建立神经网络的过程有帮助。-C language of BP neural networks, on the understanding and the establishment of neural networks to help the process.
LEACH
- 一种无线传感网络的LEACH分簇算法,大家都比较需要 -Wireless sensor networks LEACH clustering algorithm
BPnetwork
- 神经网络,不借助Mtlab内部工具箱,实现预测优化。-Neural Networks
Connected-dominating-set.ZIP
- Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks
littleworld
- NW小世界网络的构成原则为:从一个环状的规则网络开始,网络含有N个结点,每个结点向与它最近邻的K个结点连出K条边,并满足N>>K>>In(N)>>1。随后进行随机化加边,以概率p在随机选取的一对节点之间加上一条边。其中,任意两个不同的节点之间至多只能有一条边,并且每一个节点都不能有边与自身相连。改变p值可以实现从最近邻耦合网络(p=0)向全局耦合网络(p=1)转变。在p足够小和N足够大时,NW小世界模型本质上等同于WS小世界模型。 -NW constitu
yotporeviews-1.4.3
- YOTPO社会评价 升压购物的信心,值得信赖的评论 购买后,自动提醒邮件发送,以鼓励您的购物者留下评论 生成高素质的交通跨社交网络分享评论 导入你现有的评论,这样你就没有失去任何有价值的内容!-YOTPO SOCIAL REVIEWS Boost your shoppers confidence with trustworthy reviews Send auto-reminder emails after purchases, to
guangqian1
- 无线传感器网络由众多的传感器节点共同组成,传感器节点往往通过随机撒播的方式部署在人为力量无法到达的环境复杂区域进行数据的采集与传输。-Wireless sensor networks is composed of many sensor nodes which are deployed in a complex area beyond men’s approach by means of scattering randomly to collect and transmit the data.
guangqian2
- 无线传感器网络由众多的传感器节点共同组成,传感器节点往往通过随机撒播的方式部署在人为力量无法到达的环境复杂区域进行数据的采集与传输。-Wireless sensor networks is composed of many sensor nodes which are deployed in a complex area beyond men’s approach by means of scattering randomly to collect and transmit the data.
guagnqian3
- 无线传感器网络由众多的传感器节点共同组成,传感器节点往往通过随机撒播的方式部署在人为力量无法到达的环境复杂区域进行数据的采集与传输。-Wireless sensor networks is composed of many sensor nodes which are deployed in a complex area beyond men’s approach by means of scattering randomly to collect and transmit the data.
guangqian4
- 无线传感器网络由众多的传感器节点共同组成,传感器节点往往通过随机撒播的方式部署在人为力量无法到达的环境复杂区域进行数据的采集与传输。无线传感器网络能够使观察人员快速直接的得到有效的数据,-Wireless sensor networks is composed of many sensor nodes which are deployed in a complex area beyond men’s approach by means of scattering randomly to coll
os
- 无线传感器网络由众多的传感器节点共同组成,传感器节点往往通过随机撒播的方式部署在人为力量无法到达的环境复杂区域进行数据的采集与传输。无线传感器网络能够使观察人员快速直接的得到有效的数据,-Wireless sensor networks is composed of many sensor nodes which are deployed in a complex area beyond men’s approach by means of scattering randomly to coll
LVQ
- 神经网络LVQ对企业进行资信评估,弱化了权重确定中的人为因素,提高了评估结果的准确性和权威性。-LVQ neural networks to enterprise credit uation, weakening the weight determination of human factors, improving the accuracy and authority of uation results.
mapminmax
- mapminmax函数,用于将网络的输入数据或输出数据进行归一化,归一化后的数据将分布在[-1,1]区间内-mapminmax function used to input data or output data networks normalized, normalized data will be distributed in [1,1] interval
PIDNeural-Networks
- PID神经元网络解耦控制算法_多变量系统控制的相关代码。matlab软件-PIDneural network
OS-ELM
- 极限学习机(extreme learning machine)ELM是一种简单易用、有效的单隐层前馈神经网络SLFNs学习算法。2004年由南洋理工大学黄广斌副教授提出。传统的神经网络学习算法(如BP算法)需要人为设置大量的网络训练参数,并且很容易产生局部最优解。极限学习机只需要设置网络的隐层节点个数,在算法执行过程中不需要调整网络的输入权值以及隐元的偏置,并且产生唯一的最优解,因此具有学习速度快且泛化性能好的优点。-ELM extreme learning machine (extreme l
shj3
- 神经网络的实际应用,具有预测,学习能力,有实用价值。-The practical application of neural networks, predictive, learning ability, practical value.