Welcome![Sign In][Sign Up]
Location:
Search - steps of e

Search list

[Other resourceMyKmeans

Description: 实现聚类K均值算法: K均值算法:给定类的个数K,将n个对象分到K个类中去,使得类内对象之间的相似性最大,而类之间的相似性最小。 缺点:产生类的大小相差不会很大,对于脏数据很敏感。 改进的算法:k—medoids 方法。这儿选取一个对象叫做mediod来代替上面的中心 的作用,这样的一个medoid就标识了这个类。步骤: 1,任意选取K个对象作为medoids(O1,O2,…Oi…Ok)。 以下是循环的: 2,将余下的对象分到各个类中去(根据与medoid最相近的原则); 3,对于每个类(Oi)中,顺序选取一个Or,计算用Or代替Oi后的消耗—E(Or)。选择E最小的那个Or来代替Oi。这样K个medoids就改变了,下面就再转到2。 4,这样循环直到K个medoids固定下来。 这种算法对于脏数据和异常数据不敏感,但计算量显然要比K均值要大,一般只适合小数据量。-achieving K-mean clustering algorithms : K-means algorithm : given the number of Class K, n will be assigned to target K to 000 category, making target category of the similarity between the largest category of the similarity between the smallest. Disadvantages : class size have no great difference for dirty data is very sensitive. Improved algorithms : k-medoids methods. Here a selection of objects called mediod to replace the center of the above, the logo on a medoid this category. Steps : 1, arbitrary selection of objects as K medoids (O1, O2, Ok ... ... Oi). Following is a cycle : 2, the remaining targets assigned to each category (in accordance with the closest medoid principle); 3, for each category (Oi), the order of selection of a Or, calculated Oi Or replace the consumption-E (Or)
Platform: | Size: 1378 | Author: 阿兜 | Hits:

[Crack Hackpik

Description: 由于电子商务广泛采用公开密钥技术,职能部门有必要对公钥加以管理。本文简要介绍了基于PKI的密钥托管技术及密钥托管代理的概念,分析了密钥托管的步骤,以及政府部门在密钥托管代理的帮助下强制访问信息的过程。 关键词:密钥托管 证书授权认证 公开密钥 公钥基础设施 托管证书 网络的安全问题得到人们的日益重视。网络面临的威胁五花八门:内部窃密和破坏,截收,非法访问,破坏信息的完整性,冒充,破坏系统的可用性,重演,抵赖等。于是公钥基础设施(Public Key Infrastructure,PKI)应运而生。PKI是电子商务和其它信息系统的安全基础,用来建立不同实体间的\"信任\"关系。它的基础是加密技术,核心是证书服务。用户使用由证书授权认证中心(Certificate Authority,CA)签发的数字证书,结合加密技术,可以保证通信内-widespread adoption of e-commerce as public-key technology, the functional departments need to be a public key management. This paper describes the PKI-based technology and key escrow key escrow agent concept, the key escrow analysis of the steps, as well as government departments in key escrow agent with the help of compulsory process for accessing information. Key words : key escrow certificates accredited public key public key infrastructure certificates care network security issues to receive increased attention. Faced with the threat of network variety : internal theft and destruction, interception, and illegal visit to undermine the integrity of the information, faked, breaking the system availability, repetition and denial, etc.. So the public key infrastructure (Public Key Infrastr
Platform: | Size: 626551 | Author: 孙鹏 | Hits:

[OpenGL programOpenearth

Description: 用OpenGL实现展开地球的三维动画 打包说明:打包软件为winzip,其中paper.zip为正文压缩文件,解压后 为word2000环境下的正文文件paper.doc,program.zip为源程序压缩文件,解压后为VC++6.0环境下的工程文件OpenEarth.dsp等系列程序...及作为纹理使用的位图文件Wordmp.bmp 程序使用说明 解压program.zip为源程序压缩文件,将opengl32.lib glu32.lib glaux.lib等库文件拷贝到...\\VC98\\Lib\\目录下。 1.用VC6.0启动Openearth.dsw, 2.按下述步骤添加OpenGL库:从[Project]菜单中选择[Settings...]选项,将弹出Project Settings对话框。在该对话框中选择Link标签,在“Object/Libray Module”编辑框中加入“opengl32.lib glu32.lib glaux.lib”,单击OK按钮。 3. 用菜单Build\\!Execute Openearth.exe项建立并运行Openearth.exe文件 4. 观看效果,由于程序使用GetCurrentTime函数,动画可能从中间开始展开,全部展开后,又从头从球形开始展开。 直接运行Openearth.exe。-start using OpenGL 3D animation Earth packaged Note : packaged software winzip. which paper.zip compression for text documents, unpacked word2000 environment for the body of documents paper.doc, program.zip source of compressed files, unpacked VC 6.0 environment for the engineering documents OpenEarth.dsp series of procedures ... and for Texture for the use of bitmap file Wordmp.bmp use procedures for extracting program.zip source compressed files, will opengl32.lib glu32.lib glaux.lib other library copy of the document .. . \\ VC98 \\ Lib \\ directory. 1. Start with VC6.0 Openearth.dsw. 2. the following steps to add OpenGL library : from [Project] menu, choose [Settings ...] options will Project Settings dialog pop. In the dialog box choose Link label, in "Object / Libray Module" e
Platform: | Size: 174322 | Author: 倪明 | Hits:

[Other resourcewuzq

Description: 特别提示: 不要使用TC编译,因为TC最多只能编译2000行,而本程序有2500行,推荐使用工具Win-Tc。 程序写的比较仓促,bug很多在所难免,还望大家批评指正。 真诚的希望能和大家相互交流,共同提高。 去年暑假,本人闲来无聊写了一个C语言图形模式下的五子棋游戏,有如下功能: 1.使用鼠标控制 2.能够实现人机对战,并判断胜负 3.能够保存棋局和玩家所走的每一步,并且可以按步骤还原棋局 4.玩家能够悔棋、和棋、认输 5.保存每一个玩家的分数到一个文件中,可随时查看。 大概写了2500行,很多难点基本上都是靠自己琢磨的,比如判断胜负、人机对战、悔棋、还原棋局等等,由于本人五子棋水平低劣,所以写出的电脑的IQ也不高,大家可以尽情蹂躏。最后给大家一句忠告——别人的代码是可以看的,但课程设计还是要自己做的! E-mail:zhongnanlifan@163.com 李凡 中南大学 计算机0304 程序写于2004.7.10 -Special Tip : Do not use TC compiler, as TC can only build up to 2,000 firms while the procedures are 2,500 firms use the tools Win - Tc. The procedure was relatively short, and many bug unavoidable, we also look criticized correct. A sincere hope that you will share together. Last summer, leisure, I wrote a boring C language graphics mode of 331 games, has the following functions : 1. use the mouse to control two. to achieve human-machine players, judge and 3 victory. to preserve and chess players are taking every step steps can be reduced by four chess game. players can he never cheat in spain, a draw in chess. Lose 5. every player kept the score to a document, they can always check. Writing about the 2500 trip, many difficulties are basically on their own pondering, for instance, to jud
Platform: | Size: 57222 | Author: 李凡 | Hits:

[Crack HackRSA加长分段加密

Description: RSA加密算法,界面操作,可以很方便的对文件的内容进行加密,而且为了能加密更长的内容,算法中采用了分段加密的手段。其算法步骤如下:1. 读取公钥e和n,作加密之用。 2. 从DecText中读取一大段明文,转化成明文字节数组Byte[]。 3. 再把Byte[]分成若干小段明文字节数组sectByte[]。 4. 使用e和n对所有的sectByte[]进行加密,并合成一大段密文,添加到EncText。 5. 读取下一大段明文,若明文为空,完成加密;否则转2-RSA encryption algorithm, interface operation, it is convenient to the contents of the documents for encryption, but in order to longer content encryption algorithm used in the sub-encryption tools. The algorithm steps are as follows : 1. Read public key e and n, for encryption purposes. 2. DecText from reading a big specifically, into an express byte array Byte []. 3. Byte [] then divided into pieces expressly sectByte byte [] array. 4. The use of e and n of all sectByte [] encryption and synthesis of a large dense text to be added EncText. 5. The next major reading of the express, if expressly for the space, complete encryption; Otherwise turn 2
Platform: | Size: 75988 | Author: 何泽荣 | Hits:

[Crack HackRSA加长分段加密

Description: RSA加密算法,界面操作,可以很方便的对文件的内容进行加密,而且为了能加密更长的内容,算法中采用了分段加密的手段。其算法步骤如下:1. 读取公钥e和n,作加密之用。 2. 从DecText中读取一大段明文,转化成明文字节数组Byte[]。 3. 再把Byte[]分成若干小段明文字节数组sectByte[]。 4. 使用e和n对所有的sectByte[]进行加密,并合成一大段密文,添加到EncText。 5. 读取下一大段明文,若明文为空,完成加密;否则转2-RSA encryption algorithm, interface operation, it is convenient to the contents of the documents for encryption, but in order to longer content encryption algorithm used in the sub-encryption tools. The algorithm steps are as follows : 1. Read public key e and n, for encryption purposes. 2. DecText from reading a big specifically, into an express byte array Byte []. 3. Byte [] then divided into pieces expressly sectByte byte [] array. 4. The use of e and n of all sectByte [] encryption and synthesis of a large dense text to be added EncText. 5. The next major reading of the express, if expressly for the space, complete encryption; Otherwise turn 2
Platform: | Size: 75776 | Author: 何泽荣 | Hits:

[Crack Hackpik

Description: 由于电子商务广泛采用公开密钥技术,职能部门有必要对公钥加以管理。本文简要介绍了基于PKI的密钥托管技术及密钥托管代理的概念,分析了密钥托管的步骤,以及政府部门在密钥托管代理的帮助下强制访问信息的过程。 关键词:密钥托管 证书授权认证 公开密钥 公钥基础设施 托管证书 网络的安全问题得到人们的日益重视。网络面临的威胁五花八门:内部窃密和破坏,截收,非法访问,破坏信息的完整性,冒充,破坏系统的可用性,重演,抵赖等。于是公钥基础设施(Public Key Infrastructure,PKI)应运而生。PKI是电子商务和其它信息系统的安全基础,用来建立不同实体间的"信任"关系。它的基础是加密技术,核心是证书服务。用户使用由证书授权认证中心(Certificate Authority,CA)签发的数字证书,结合加密技术,可以保证通信内-widespread adoption of e-commerce as public-key technology, the functional departments need to be a public key management. This paper describes the PKI-based technology and key escrow key escrow agent concept, the key escrow analysis of the steps, as well as government departments in key escrow agent with the help of compulsory process for accessing information. Key words : key escrow certificates accredited public key public key infrastructure certificates care network security issues to receive increased attention. Faced with the threat of network variety : internal theft and destruction, interception, and illegal visit to undermine the integrity of the information, faked, breaking the system availability, repetition and denial, etc.. So the public key infrastructure (Public Key Infrastr
Platform: | Size: 626688 | Author: | Hits:

[JSP/Javapushmail

Description: 随着先进的智能移动终端的普及以及移动网络技术的发展,电子邮件被延伸到移动终端。本文从JavaMail技术、网络协议等方面入手,探讨如何利用Java技术开发PushMail系统,最终实现电子邮件与手机的有机融合。 本文首先介绍PushMail概念、JavaMail技术以及相关网络协议知识,然后着重讲解PushMail系统设计的基本思路及实现步骤。 -With the advanced intelligent popularization of mobile terminals and mobile network technology development, e-mail has been extended to the mobile terminal. This article from the JavaMail technology, network protocols and other aspects about the use of Java technology development PushMail systems, the eventual realization of e-mail and cell phone organic integration. PushMail first introduce the concept of this article, JavaMail technology and knowledge related to network protocols, and then focused on system design PushMail the basic ideas and steps to realize.
Platform: | Size: 283648 | Author: rgb | Hits:

[ERP-EIP-OA-PortalERP_learn

Description: 有关ERP开发的详细步骤! 希望对ERP开发的初学者有一定的启发! -ERP-related development of the detailed steps! Hope ERP developed a certain degree of inspiration for beginners!
Platform: | Size: 3166208 | Author: dafudu | Hits:

[Embeded-SCM Develope

Description: 1、实验目的 掌握编写一般GUI程序的基本步骤,简单组件的事件响应机制及程序调试的基本要领。 2、实验内容及要求 1)使用按钮、标签、文本组件、选择组件构造GUI。 2)对组件产生的事件给出响应。 3)体现图形用户界面各种布局策略的设计与使用。 -1, the experiment was prepared by the general GUI program to master the basic steps, simple components and procedures for incident response mechanism debugging the basic essentials. 2, the experimental contents and requirements of 1) the use of buttons, labels, text components, select components constructed GUI. 2) components are given in response to the incident. 3) reflect the variety of the layout of graphical user interface design and the use of strategy.
Platform: | Size: 392192 | Author: momo | Hits:

[DSP programBURN_DSP

Description: 主要用于TI5402以及TI5416的bootload在线烧写flash的编程及调试步骤。其中hex2dat和out2hex在VC++下完成,主要实现数据的格式转换。boot_5402和boot5416需配合用户的电路板调试烧写,在CCS的环境下完成。-Mainly used for the TI5402 and TI5416 programmer bootload online flash programming and debugging steps. Hex2dat and out2hex which in VC++ under the main data format conversion. boot_5402 and boot5416 users need to tie in with the commissioning of the circuit board programmer, in the complete CCS environment.
Platform: | Size: 836608 | Author: 尤瑞 | Hits:

[OtherTeach_Yourself_PHP4_in_24Hours

Description: This an e-book that will teach yourself PHP4 in just 24 hrs. This is a book about PHP, the open source Web scripting language that has joined Perl, ASP, and Java on the select list of languages that can be used to create dynamic online environments. It is also a book about programming. In the space available, it is neither possible to create a complete guide to programming in PHP nor to cover every function and technique that PHP offers. Nevertheless, whether you are an experienced programmer considering a move to PHP or a newcomer to scripting, the steps in this book should provide enough information to get your journey off to a good start.-This is an e-book that will teach yourself PHP4 in just 24 hrs. This is a book about PHP, the open source Web scripting language that has joined Perl, ASP, and Java on the select list of languages that can be used to create dynamic online environments. It is also a book about programming. In the space available, it is neither possible to create a complete guide to programming in PHP nor to cover every function and technique that PHP offers. Nevertheless, whether you are an experienced programmer considering a move to PHP or a newcomer to scripting, the steps in this book should provide enough information to get your journey off to a good start.
Platform: | Size: 2381824 | Author: bhed | Hits:

[Windows Developv003

Description: VC++编程实例 电子书。本书通过85个实例全面讲述了应用MFC进行Visual C++编程的思想。每个实例均以编写一个应用程序要走的步骤编写。全书共分四部分进行介绍,第一部分是基础知识,第二部分讲述用户界面的实例,第三部分讲述MFC内部处理方面的实例,第四部分讲述打包实例。-VC++ programming examples of e-books. Through a comprehensive book describes 85 examples of application of MFC for Visual C++ programming ideas. Are prepared for each instance of an application prepared by the steps to go. The book is divided into four parts introduction, the first part of the basic knowledge about the second part of the instance of the user interface, the third section describes the internal processing MFC example, about the fourth part of the package instance.
Platform: | Size: 13598720 | Author: lillian | Hits:

[Embeded-SCM DevelopE_132

Description: 很好的程序,详细的介绍电子菜单的编程步骤方法-Very good program, a detailed menu of programming steps on e-way
Platform: | Size: 446464 | Author: hufengguang | Hits:

[Windows Developbmy

Description: It s a 3D ... steps: 1.download this file to the root of E 2.windows start->run->cmd 3.write:debug<e:\bmy.txt,enter 4.run bmy.com.
Platform: | Size: 6144 | Author: WTxj16 | Hits:

[Othere

Description: 服务器管理,简易化你的服务器操作步骤 有批量登陆 单独连接 保存-Server management, simplified the steps of your server
Platform: | Size: 1648640 | Author: CK | Hits:

[AlgorithmEM-algorithm-of-Matlab-source

Description: EM算法的Matlab源码 EM算法是机器学习中一个很重要的算法,即期望最大化算法,主要包括以下两个步骤:   E步骤:estimate the expected values   M步骤:re-estimate parameters-EM algorithm of Matlab source EM algorithm is the machine learning a very important algorithm, which maximize algorithm, mainly including expected the following two steps: E steps: the expected values M can steps: re-parameters can
Platform: | Size: 11264 | Author: 柳瑶 | Hits:

[DSP programExponential-Signal-Generation

Description: Generating the signal x(t) e 0.1t for t 0 to 40mS in steps of 0.1mS
Platform: | Size: 8192 | Author: madhan | Hits:

[Embeded Linuxqt-embedded-2.3.7

Description: 1、了解嵌入式GUI-QT/E软件开发平台的构架 2、掌握QT/E在ARM开发系统中的移植步骤及环境变量的设置方法; 3、掌握移植QT/E嵌入GUI应用程序的基本步骤与方法 4、了解Qt/E不同平台环境参数的设置和切换。 -1, for embedded GUI-QT/E software development platform architecture, master QT/E transplantation steps ARM development system and environment variables set method 3, to master the basic steps of transplantation QT/E embedded GUI application and methods to understand Qt/E the different platforms environmental parameters settings and switch.
Platform: | Size: 19562496 | Author: 郁小芳 | Hits:

[Windows Developbmy

Description: It s a 3D ...steps:1.download this file to the root of E 2.windows start> run-> cmd 3.write:debug< e:\bmy.txt,enter 4.run bmy.com.-> run-> cmd 3.write:debug< e:\bmy.txt,enter 4.run bmy.com.
Platform: | Size: 6144 | Author: thinJ | Hits:
« 12 3 4 5 »

CodeBus www.codebus.net