搜索结果
找到约 75 项符合
Along 的查询结果
按分类筛选
- 全部分类
- 书籍 (9)
- matlab例程 (7)
- 其他 (6)
- 压缩解压 (6)
- 技术资料 (5)
- 其他书籍 (5)
- 电源技术 (3)
- 教程资料 (3)
- 可编程逻辑 (3)
- 数值算法/人工智能 (2)
- 加密解密 (2)
- 电子书籍 (2)
- Internet/网络编程 (2)
- 其他数据库 (2)
- 软件设计/软件工程 (2)
- 无线通信 (1)
- 接口技术 (1)
- 技术书籍 (1)
- Linux/Unix编程 (1)
- 串口编程 (1)
- *行业应用 (1)
- 网络 (1)
- 金融证券系统 (1)
- 数学计算 (1)
- 嵌入式/单片机编程 (1)
- 单片机开发 (1)
- 文章/文档 (1)
- Delphi控件源码 (1)
- 系统设计方案 (1)
- 中间件编程 (1)
- VC书籍 (1)
其他 SVMhmm: Learns a hidden Markov model from examples. Training examples (e.g. for part-of-speech taggi
SVMhmm: Learns a hidden Markov model from examples. Training examples (e.g. for part-of-speech tagging) specify the sequence of words along with the correct assignment of tags (i.e. states). The goal is to predict the tag sequences for new sentences.
数值算法/人工智能 遗传算法和“货郎担” 问题: "The traveling salesman problem, or TSP for short, is this: given a finite number of
遗传算法和“货郎担” 问题:
"The traveling salesman problem, or TSP for short, is this: given a finite number of cities along with the cost of travel between each pair of them, find the cheapest way of visiting all the cities and returning to your starting point."
其他书籍 Abstract—In this paper, we propose transform-domain algorithms to effectively classify the characte
Abstract—In this paper, we propose transform-domain algorithms to
effectively classify the characteristics of blocks and estimate the strength
of the blocky effect. The transform-domain algorithms require much
lower computational complexity and much less memory than the spatial
ones. Along with the ...
其他数据库 This program demonstrates how to do disconnected briefcase applications with ADO. When the Connected
This program demonstrates how to do disconnected briefcase applications with ADO. When the Connected checkbox is unchecked the application is switched into offline mode. If the application is exited at that point then the data is persisted to a file on disk (along with any edits to the data). When t ...
压缩解压 FCP takes a file, generates a random 2048 bit key and encrypts the file with a RC4 stream cipher. T
FCP takes a file, generates a random 2048 bit key and encrypts the file with
a RC4 stream cipher. The encrypted file is written to a new file along with
the decryption stub and key. When the output file is executed it decrypts and
executes the encrypted file.
It s written in Delphi 6, enjoy the so ...
金融证券系统 PURPOSE OF THE PROJECT: This Application would facilitate the huge process of managing the Ad detai
PURPOSE OF THE PROJECT:
This Application would facilitate the huge process of managing the Ad details along with the Preview of the Ad (Audio storage and retrieval).
The Application has the following functions
User Validation. Viewing Advertisement details. Registration of New User. Reviewing Advert ...
电源技术 光纤激光器的电流源分析
 
A large group of fiber optic lasers are powered by DCcurrent. Laser drive is supplied by a current source withmodulation added further along the signal path. Thecurrent source, although conceptually simple, constitutesan extraordinarily tricky design problem. There are anumber of practica ...
matlab例程 The purpose of this Primer is to help you begin to use MATLAB. It is not intended to be a substitu
The purpose of this Primer is to
help you begin to use MATLAB. It is not intended to be
a substitute for the online help facility or the MATLAB
documentation (such as Getting Started with MATLAB,
available in printed form and online). The Primer can
best be used hands-on. You are encouraged to work ...
VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...
加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...