登录
首页 » matlab » machineLearning-

machineLearning-

于 2015-01-29 发布 文件大小:3KB
0 219
下载积分: 1 下载次数: 6

代码说明:

  利用机器学习中的K邻近、感知机和logistic回归分类男女(Using KNN,perception and logistic to divide male or female)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • kavi
    This research work is used performence improvement of frequency.It is frequency division multiplexing.
    2015-02-13 13:34:53下载
    积分:1
  • Mygallagercode
    Encoding and decoding aLGORITH FOR GALllger code using BCJB for decoding
    2010-11-27 12:48:57下载
    积分:1
  • tdoaex
    time difference of arrival
    2013-11-08 15:51:45下载
    积分:1
  • Bacterial-foraging-algorithm
    基于细菌觅食算法的优化计算的matlab程序实现(Bacteria foraging optimization algorithm based on the calculation of the matlab program implements)
    2016-08-12 22:54:15下载
    积分:1
  • progress-6
    this is audio retrieval based on the feature extraction such as FFT, STFT, and Power Spectral Density
    2014-09-18 11:18:36下载
    积分:1
  • beamform_thinned_array
    稀布阵列matlab波束形成程序,可画出9阵元稀疏阵列的阵列方向图和阵列布阵示意图,有详细的注释,适合初学者参考(thinned array beamforming)
    2014-01-09 10:17:14下载
    积分:1
  • data_guess
    说明:  使用指数平滑对数据进行初步处理,在使用bp神经网络进行预测(Using exponential smoothing to deal with the data and BP neural network to forecast)
    2020-05-10 17:15:37下载
    积分:1
  • fn_scramble
    To do scrambling and inverser scrambling of array using a key (seed)
    2010-01-05 15:00:08下载
    积分:1
  • Hamming
    本文对汉明分类器进行了介绍,并在matlab中实现了汉明分类器,最后对汉明分类器的结果进行分析(In this paper, Hamming classifier was introduced and implemented in matlab Hamming classifier, the last of the Hamming classifier of the results)
    2011-05-04 11:10:51下载
    积分:1
  • leach_for_wireless_network
    无线传感器网络中应用leach算法来识别恶意节点和剔除恶意节点。从而保证网络系统的寿命最长。(In wireless sensor network,cluster algorithm of nodes is all effective approach and key technology to implement energy saving and flexible management.To improve security and lifetime of clustering network,a secure clustering was pro— posed based on the random and parallel cluster header election algorithm and pre—distributed key scheme.In hypothetical network model,it can elect the cluster header nodes and identify and get rid of malicious nodes,and in data telecommuni— cations,the communication security Can be achieved by using encryption algorithm and thus the network lifetime Call be prolonged.)
    2010-05-14 15:52:16下载
    积分:1
  • 696516资源总数
  • 106918会员总数
  • 4今日下载