This a simple genetic algorithm implementation where the evaluation function takes positive values only and the fitness of an individual is the same as the value of the objective function
标签: implementation evaluation algorithm function
上传时间: 2015-04-12
上传用户:klin3139
mp3设计程序资料,采用c语言编写。 README file for yampp-3 source code 2001-05-27 This is the current state of the yampp-3 source code, 2001-05-27. This code is intended to run on Rev. B of the yampp-3 PCB, but can ofcourse be used on compatible systems as well. It still uses the "old" song selection system as the yampp-2. However, the disk handling routines has improved a lot and the obviosly, the new VS1001 handling has been put in. The codesize is almost at it s maximum at 1F40 bytes. A .ROM file is included if you don t have the compiler set up. For now, the documentation is in the code
上传时间: 2015-04-13
上传用户:小码农lz
根据文件自动生成带有完整网页的工具,让没有服务器程序支持的你,迅速建立属于你自己的站点。本工具自带语法,可以让你灵活运用。 直接把 html代码转换成 js代码的好工具,是作导航条信息嵌入的好工具。作下载站点一直很麻烦,因为每次都要重复手工去改一些页面,就算是使用save as ,也够烦的。现在你可以省下心来了,因为只要选定两个模版,就可以帮你做出新的一页,连索引都生成了,所有以前 烦琐的事情现在只要粘贴和复制代码就ok~。另外软件连下载的时间都帮你做好了,在增加pageview之余准备好你的广告条吧!
上传时间: 2014-01-06
上传用户:小宝爱考拉
prolog 找路例子程序: === === === === === === Part 1-Adding connections Part 2-Simple Path example | ?- path1(a,b,P,T). will produce the response: T = 15 P = [a,b] ? Part 3 - Non-repeating path As an example, the query: ?- path2(a,h,P,T). will succeed and may produce the bindings: P = [a,depot,b,d,e,f,h] T = 155 Part 4 - Generating a path below a cost threshold As an example, the query: ?- path_below_cost(a,[a,b,c,d,e,f,g,h],RS,300). returns: RS = [a,b,depot,c,d,e,g,f,h] ? RS = [a,c,depot,b,d,e,g,f,h] ? no ==================================
标签: Part connections example prolog
上传时间: 2015-04-24
上传用户:ljt101007
内容如下: 1.The history of the computerized database 2.SQL Data Statements--those used to create, manipulate, and retrieve data stored in your database example statements include select, update, insert, and delete 3.SQL Schema Statements--those used to create database objects, such as tables, indexes, and constraints 4.How data sets can interact with queries 5.The importance of subqueries 6.Data conversion and manipulation via SQL s built-in functions 7.How conditional logic can be used in Data Statements
标签: computerized Statements database history
上传时间: 2015-04-25
上传用户:ardager
Support is available from MIPS Technologies Inc. - problems should be addressed to support@mips.com。This product may be controlled for export purposes. You may not export, or transfer for the purpose of reexport, any technical data received hereunder or the product produced by use of such technical data, including processes and services (the "product"), in violation of any U.S. or foreign regulation, treaty, Executive Order, law, statute, amendment or supplement thereto. Further, you may not export the product to any prohibited or embargoed country or to any denied, blocked, or designated person or entity as mentioned in any applicable U.S. or foreign regulation, treaty, Executive Order, law, statute, amendment or supplement thereto.
标签: Technologies available addressed problems
上传时间: 2014-01-24
上传用户:二驱蚊器
This product may be controlled for export purposes. You may not export, or transfer for the purpose of reexport, any technical data received hereunder or the product produced by use of such technical data, including processes and services (the "product"), in violation of any U.S. or foreign regulation, treaty, Executive Order, law, statute, amendment or supplement thereto. Further, you may not export the product to any prohibited or embargoed country or to any denied, blocked, or designated person or entity as mentioned in any applicable U.S. or foreign regulation, treaty, Executive Order, law, statute, amendment or supplement thereto.
标签: export controlled may for
上传时间: 2015-04-29
上传用户:阳光少年2016
This product may be controlled for export purposes. You may not export, or transfer for the purpose of reexport, any technical data received hereunder or the product produced by use of such technical data, including processes and services (the "product"), in violation of any U.S. or foreign regulation, treaty, Executive Order, law, statute, amendment or supplement thereto. Further, you may not export the product to any prohibited or embargoed country or to any denied, blocked, or designated person or entity as mentioned in any applicable U.S. or foreign regulation, treaty, Executive Order, law, statute, amendment or supplement thereto.
标签: export controlled may for
上传时间: 2014-01-13
上传用户:cc1915
This is an example how one could hide a process on Windows based operation systems from task viewers like ProcDump (G-RoM, Lorian & Stone) or ProcessExplorer (SysInternals). It could e.g. be used as some kind of dump protection. The way to get this done is very different on NT and 9x machines.
标签: operation Windows example process
上传时间: 2013-12-17
上传用户:wang0123456789
He was the first one (I noticed of) who coded a decrypter for yC 1.2 :)...good job. Also if it hasn t full support yet >:-) So as I promised...here s the source code. I hope it helps someone.
标签: decrypter noticed first coded
上传时间: 2015-05-03
上传用户:498732662