▍1. neural-network
基于神经网络的光伏阵列发电预测模型的设计(Based on neural network prediction model generation PV array design)
基于神经网络的光伏阵列发电预测模型的设计(Based on neural network prediction model generation PV array design)
基于神经网络的光伏阵列发电预测模型的设计(Based on neural network prediction model generation PV array design)
说明: 我的世界压测,可用于大部分版本,非常实用(My world piezometry can be used in most versions)
随着预测控制在工业过程控制中的广泛应用,近年来,预测控制理论的研究也取得了很大的进展,本文系统的介绍了预测控制的背景和其发展、基本原理以及其他的先进控制技术,并重点对其中的动态矩阵控制(DMC)算法进行了研究并用Matlab进行仿真(With the wide application of predictive control in industrial process control, in recent years, the predictive control theory research has made great progress, this paper introduces the background and its development, the basic principle of predictive control and other advanced control technology, and focus on the dynamic matrix control (DMC) algorithm is studied with Matlab simulation.)
随着预测控制在工业过程控制中的广泛应用,近年来,预测控制理论的研究也取得了很大的进展,本文系统的介绍了预测控制的背景和其发展、基本原理以及其他的先进控制技术,并重点对其中的动态矩阵控制(DMC)算法进行了研究并用Matlab进行仿真(With the wide application of predictive control in industrial process control, in recent years, the predictive control theory research has made great progress, this paper introduces the background and its development, the basic principle of predictive control and other advanced control technology, and focus on the dynamic matrix control (DMC) algorithm is studied with Matlab simulation.)
从卷积神经网络的发展历史开始,详细阐述了卷积神经网络的网络结构、神经元模型和训练算法。在此基础上以卷积神经网络在人脸检测和形状识别方面的应用为例,简单介绍了卷积神经网络在工程上的应用,并给出了设计思路和网络结构。(Starting from the history of the convolution neural network, the network structure, neuron model and training algorithm of the convolution neural network are elaborated in detail. On the basis of the application of convolutional neural network in face detection and shape recognition, this paper briefly introduces the application of convolution neural network in engineering, and gives the design idea and network structure.)
参考文献用labview编写的一个3层BP神经网络程序 (References with labview prepared a three-layer BP neural network program)
新版留言本新增用户头像及留言表情功能,并对程序做了部分优化修改(The new message of this new user avatar and comment expressive function, and made some optimization program modification)
基于规则的推理系统实现,可以用来实现一些专家系统(rule-based reasoning system)
讲述黑客基础知识。 1.网络以及相关知识 2.入侵概念和基础知识 3.入侵基本过程和使用工具(Basic knowledge about the hacking. 1 Network and Knowledge 2 invasion concepts and basics 3. Invasion process and the use of basic tools)
讲述黑客基础知识。 1.网络以及相关知识 2.入侵概念和基础知识 3.入侵基本过程和使用工具(Basic knowledge about the hacking. 1 Network and Knowledge 2 invasion concepts and basics 3. Invasion process and the use of basic tools)
《菜鸟也能防黑客之非技术攻击》就是向大家介绍这种方法。正如书名所述,这些方法并不是多么高深的技米,你也一样可以做到。看过《菜鸟也能防黑客之非技术攻击》之后,你会发现在非技术攻击面前,那些所谓的高科技设备是多么的脆弱。想知道黑客怎样从电脑中获取数据而不留痕迹吗?如何不用碰键盘就能侵入邮件服务器吗?这不是魔幻大片,而是真真正正发生在我们身边。 我们都知道信息的重要性。随着计算机时代的来临,大量的信息以电子的形式存储。而用高科技的电子保护系统来保护信息也就是自然而然的事情。作为一名职业黑客,作者的主要工作就是发现这些系统的弱点。在一次又一次的入侵后,作者发现了可以绕开那些所谓高科技防御系统的方法。 你和你身边的人很可能现在就正在受到此种攻击,你准备好了吗?("Rookie also can prevent unskilled hackers attack" is to introduce this method. As the title said, these methods are not rocket technology meters, you can do it too. Read the "rookie can prevent unskilled hackers attack" after, you will find in front of non-technical attacks, how fragile is the so-called high-tech equipment. Want to know how to get data from hackers computer without leaving traces of it? How not to touch the keyboard can invade the mail server? It s not magic movies, but really in our midst. We all know the importance of information. With the advent of the computer age, a lot of information stored in electronic form. And with high-tech electronic protection systems to protect information that is a natural thing. As a professional hacker, author of the main job is to find weaknesses in these systems. Again and again after the invasion, the authors found that can bypass the so-called high-tech defense systems. You and the people around you are likely to suffer such att)
《菜鸟也能防黑客之非技术攻击》就是向大家介绍这种方法。正如书名所述,这些方法并不是多么高深的技米,你也一样可以做到。看过《菜鸟也能防黑客之非技术攻击》之后,你会发现在非技术攻击面前,那些所谓的高科技设备是多么的脆弱。想知道黑客怎样从电脑中获取数据而不留痕迹吗?如何不用碰键盘就能侵入邮件服务器吗?这不是魔幻大片,而是真真正正发生在我们身边。 我们都知道信息的重要性。随着计算机时代的来临,大量的信息以电子的形式存储。而用高科技的电子保护系统来保护信息也就是自然而然的事情。作为一名职业黑客,作者的主要工作就是发现这些系统的弱点。在一次又一次的入侵后,作者发现了可以绕开那些所谓高科技防御系统的方法。 你和你身边的人很可能现在就正在受到此种攻击,你准备好了吗?("Rookie also can prevent unskilled hackers attack" is to introduce this method. As the title said, these methods are not rocket technology meters, you can do it too. Read the "rookie can prevent unskilled hackers attack" after, you will find in front of non-technical attacks, how fragile is the so-called high-tech equipment. Want to know how to get data from hackers computer without leaving traces of it? How not to touch the keyboard can invade the mail server? It s not magic movies, but really in our midst. We all know the importance of information. With the advent of the computer age, a lot of information stored in electronic form. And with high-tech electronic protection systems to protect information that is a natural thing. As a professional hacker, author of the main job is to find weaknesses in these systems. Again and again after the invasion, the authors found that can bypass the so-called high-tech defense systems. You and the people around you are likely to suffer such att)
基与FPGA的CORDIC算法,CORDIC算法的描述(base on FPGA s CORDIC algorithms)
adslcr pppoe bat=dos(Create a broadband connection through adslcr pppoe bat=dos)
命名管道,学习网络编程的好例子 命名管道,学习网络编程的好例子 (Named pipes, a good example of learning network programming)
如何攻击电脑,如何成为电脑高手 天外有天,人外有人,这是你成为黑客的 捷径!得到它,对于你成为电脑高手,已经起到事半功倍的效果(How to attack a computer, how to become a computer expert天外有天people, some people outside, this is your shortcut to become a hacker! Get it for you to become a computer expert, has played a multiplier effect)
windwos系统路由表的操作和配置说明(Windows operating system routing table and configuration)
计算机网络课件。。。。。。。谢西人的课件。。。。(Courseware for computer networks. . . . . . . West hsieh courseware. . . .)