搜索结果

找到约 462 项符合 Algorithms 的查询结果

Java编程 m5 code is used to bring data mining algorithms implementation

m5 code is used to bring data mining algorithms implementation
https://www.eeworm.com/dl/633/413141.html
下载: 198
查看: 1045

通讯编程文档 contains documents related to adaptive beamforming algorithms for Wideband Code Division multiple

contains documents related to adaptive beamforming algorithms for Wideband Code Division multiple access and a research article on circular patch antenna for C band altimeter system
https://www.eeworm.com/dl/646/427155.html
下载: 128
查看: 1069

数学计算 pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr

pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small chang ...
https://www.eeworm.com/dl/641/429179.html
下载: 51
查看: 1173

通讯编程文档 A necessary book containing many FFT algorithms, both serial and parallel.

A necessary book containing many FFT algorithms, both serial and parallel.
https://www.eeworm.com/dl/646/437513.html
下载: 137
查看: 1045

matlab例程 Non Convex Algorithms for Group Sparse Optimization by Angshul Majumdar @matlab central

Non Convex Algorithms for Group Sparse Optimization by Angshul Majumdar @matlab central
https://www.eeworm.com/dl/665/448050.html
下载: 152
查看: 1067

通讯编程文档 This also a nice paper about Synchronization and Channel Estimation in OFDM Algorithms for Efficient

This also a nice paper about Synchronization and Channel Estimation in OFDM Algorithms for Efficient Implementation of WLAN Systems
https://www.eeworm.com/dl/646/465193.html
下载: 137
查看: 1077

Java编程 Java examples for dinamic programming, divide and conquer, greedy algorithms and backtracking.

Java examples for dinamic programming, divide and conquer, greedy algorithms and backtracking.
https://www.eeworm.com/dl/633/465823.html
下载: 62
查看: 1082

加密解密 Java Application for testing Encryption/Decryption of several algorithms: Ceaar, Vigenere, a custom

Java Application for testing Encryption/Decryption of several algorithms: Ceaar, Vigenere, a custom make alg (key + permutation of elements)
https://www.eeworm.com/dl/519/470614.html
下载: 131
查看: 1089

数据结构 implement a number of pattern-matching algorithms and to carry out an analysis of their operation

implement a number of pattern-matching algorithms and to carry out an analysis of their operation
https://www.eeworm.com/dl/654/487193.html
下载: 56
查看: 1170

数据结构 There are many algorithms that can be applied to graphs. Many of these are actually used in the real

There are many algorithms that can be applied to graphs. Many of these are actually used in the real world, such as Dijkstra’s algorithm to find shortest paths. We will discuss a few here.
https://www.eeworm.com/dl/654/490439.html
下载: 73
查看: 1155