搜索:Algorithm
找到约 1,300 项符合「Algorithm」的查询结果
结果 1,300
按分类筛选
- 全部
- matlab例程 (182)
- 技术资料 (172)
- 人工智能/神经网络 (130)
- 数学计算 (91)
- 加密解密 (78)
- 数值算法/人工智能 (66)
- 其他 (57)
- 压缩解压 (39)
- 数据结构 (37)
- 其他书籍 (35)
- Java编程 (32)
- 软件设计/软件工程 (23)
- 通讯/手机编程 (21)
- Linux/Unix编程 (19)
- 文章/文档 (19)
- 书籍源码 (17)
- 通讯编程文档 (16)
- 技术管理 (15)
- VHDL/FPGA/Verilog (14)
- 文件格式 (13)
- 单片机编程 (11)
- 单片机开发 (11)
- DSP编程 (9)
- 电子书籍 (9)
- 系统设计方案 (9)
- 行业发展研究 (9)
- 软件工程 (8)
- 汇编语言 (8)
- VC书籍 (8)
- 书籍 (7)
- 编辑器/阅读器 (6)
- JavaScript (6)
- 源码 (5)
- 论文 (5)
- 多媒体处理 (5)
- 操作系统开发 (5)
- CA认证 (5)
- 嵌入式/单片机编程 (5)
- 其他嵌入式/单片机内容 (5)
- 驱动编程 (4)
- 多国语言处理 (4)
- STL (4)
- VIP专区 (4)
- 通信网络 (3)
- 教程资料 (3)
- 可编程逻辑 (3)
- 编译器/解释器 (3)
- 其他数据库 (3)
- 微处理器开发 (3)
- 其他行业 (3)
- GPS编程 (3)
- 并行计算 (3)
- 数据库系统 (2)
- Matlab (2)
- Modem编程 (2)
- 游戏 (2)
- *行业应用 (2)
- Applet (2)
- 网络 (2)
- 生物技术 (2)
- 中间件编程 (2)
- 习题答案 (1)
- C/C++语言编程 (1)
- 无线通信 (1)
- 接口技术 (1)
- Linux/uClinux/Unix编程 (1)
- 设计相关 (1)
- 学术论文 (1)
- 图形图像 (1)
- 技术书籍 (1)
- 测试测量 (1)
- 实用工具 (1)
- 源码/资料 (1)
- Internet/网络编程 (1)
- 教育系统应用 (1)
- 语音压缩 (1)
- 磁盘编程 (1)
- 金融证券系统 (1)
- Java书籍 (1)
- BREW编程 (1)
- J2ME (1)
- Delphi控件源码 (1)
- 家庭/个人应用 (1)
- Jsp/Servlet (1)
- RFID编程 (1)
- MTK (1)
- 3G开发 (1)
- 能源行业(电力石油煤炭) (1)
https://www.eeworm.com/dl/617/132266.html
压缩解压
This scheme is initiated by Ziv and Lempel [1]. A slightly modified version is described by Storer a
This scheme is initiated by Ziv and Lempel [1]. A slightly modified version is described by Storer and Szymanski [2]. An implementation using a binary tree is proposed by Bell [3]. The algorithm is quite simple: Keep a ring buffer, which initially contains "space" characters only ...
https://www.eeworm.com/dl/cadence/ebook/176911.html
电子书籍
The DSP Design Flow workshop provides an introduction to the advanced tools you need to design and i
The DSP Design Flow workshop provides an introduction to the advanced tools you need to design and implement DSP algorithms targeting FPGAs. This intermediate workshop in implementing DSP functions focuses on learning how to use System Generator for DSP, as well as HDL design flo ...
https://www.eeworm.com/dl/617/333119.html
压缩解压
EZW Embedded Zero-tree Wavelets Encoding,video codecs from the EZW family which use a 3D version of
EZW Embedded Zero-tree Wavelets Encoding,video codecs from the EZW family which use a 3D version of EZW or SPIHT algorithms showed better performance than the MPEG-2 compression algorithm. These algorithms have many advantages inherent for wavelet based schemes and EZW-like coder ...
https://www.eeworm.com/dl/527/342747.html
通讯/手机编程
用于汽车巡航控制系统的模糊控制算法
用于汽车巡航控制系统的模糊控制算法,以及如何利用梯度下降法和卡尔曼滤波来优化模糊控制器的算法。The files illustrate a simple fuzzy control algorithm as applied to an automobile cruise control system. The files also illustrate how gradient descent and Kalman filtering can be used t ...
https://www.eeworm.com/dl/521800.html
论文
A Rate Adaptive Channel Estimation Approach
In this paper, we consider the channel estimation
problem in Millimeter wave (mmWave) wireless systems with
large antenna arrays. By exploiting the inherent sparse nature of
the mmWave channel, we develop a novel rate-adaptive channel
estimation (RACE) algorithm, which can adapti ...
https://www.eeworm.com/dl/650/192600.html
人工智能/神经网络
Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search ma
Implemented BFS, DFS and A*
To compile this project, use the following command:
g++ -o search main.cpp
Then you can run it:
./search
The input is loaded from a input file in.txt
Here is the format of the input file:
The first line of the input file shoud contain two chars ind ...
https://www.eeworm.com/dl/686/413130.html
VC书籍
This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message ...
https://www.eeworm.com/dl/519/413134.html
加密解密
This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message ...
https://www.eeworm.com/dl/534/487877.html
其他
sba, a C/C++ package for generic sparse bundle adjustment is almost invariably used as the last step
sba, a C/C++ package for generic sparse bundle adjustment is almost invariably used as the last step of every feature-based multiple view reconstruction vision algorithm to obtain optimal 3D structure and motion (i.e. camera matrix) parameter estimates. Provided with initial esti ...