搜索:BFS+algorithm
找到约 1,280 项符合「BFS+algorithm」的查询结果
结果 1,280
按分类筛选
- 全部
- matlab例程 (149)
- 人工智能/神经网络 (102)
- 数学计算 (77)
- 加密解密 (70)
- 数值算法/人工智能 (53)
- 数据结构 (45)
- 技术资料 (42)
- 其他 (41)
- 压缩解压 (27)
- Java编程 (27)
- 其他书籍 (25)
- 软件设计/软件工程 (17)
- 通讯/手机编程 (16)
- 文章/文档 (14)
- 书籍源码 (13)
- 通讯编程文档 (13)
- Linux/Unix编程 (11)
- 技术管理 (11)
- DSP编程 (9)
- 单片机开发 (9)
- VHDL/FPGA/Verilog (9)
- 文件格式 (8)
- 系统设计方案 (8)
- 软件工程 (7)
- 电子书籍 (7)
- JavaScript (7)
- 操作系统开发 (5)
- CA认证 (5)
- 汇编语言 (5)
- 行业发展研究 (5)
- 驱动编程 (4)
- 编辑器/阅读器 (4)
- 多国语言处理 (4)
- 其他嵌入式/单片机内容 (4)
- 其他数据库 (3)
- 嵌入式/单片机编程 (3)
- STL (3)
- VC书籍 (3)
- GPS编程 (3)
- 并行计算 (3)
- 书籍 (3)
- 游戏 (2)
- 编译器/解释器 (2)
- *行业应用 (2)
- 网络 (2)
- 其他行业 (2)
- 中间件编程 (2)
- Linux/uClinux/Unix编程 (1)
- 设计相关 (1)
- 数据库系统 (1)
- 教程资料 (1)
- Modem编程 (1)
- 语音压缩 (1)
- 磁盘编程 (1)
- Applet (1)
- 微处理器开发 (1)
- Java书籍 (1)
- J2ME (1)
- 家庭/个人应用 (1)
- 生物技术 (1)
- Jsp/Servlet (1)
- RFID编程 (1)
- 3G开发 (1)
- 源码 (1)
- 论文 (1)
- 习题答案 (1)
https://www.eeworm.com/dl/633/471615.html
Java编程
1.程序基于java语言。运行要求java运行环境。即就使jdk1.2以上。否则程序无法运行。 2.程序中读图时
1.程序基于java语言。运行要求java运行环境。即就使jdk1.2以上。否则程序无法运行。
2.程序中读图时,可以选择读有向图还是无向图。
3.本程序为一个图的综合运行环境。提供了图的各种操作。包括读图,DFS判断图中是否存在 环路,BFS全局访问,两点之间的最短路径,屏幕清空。并且跟踪说明了图的各种操 ...
https://www.eeworm.com/dl/617/132266.html
压缩解压
This scheme is initiated by Ziv and Lempel [1]. A slightly modified version is described by Storer a
This scheme is initiated by Ziv and Lempel [1]. A slightly modified version is described by Storer and Szymanski [2]. An implementation using a binary tree is proposed by Bell [3]. The algorithm is quite simple: Keep a ring buffer, which initially contains "space" characters only ...
https://www.eeworm.com/dl/648/193645.html
单片机开发
* DEFINITION * This is the header file for a library module used to calculate the median * of a
* DEFINITION
* This is the header file for a library module used to calculate the median
* of a list of values. It finds the value that would be in the center if
* the list were sorted. If the list contains an even number of values, the
* lower of the two center values is rep ...
https://www.eeworm.com/dl/527/342747.html
通讯/手机编程
用于汽车巡航控制系统的模糊控制算法
用于汽车巡航控制系统的模糊控制算法,以及如何利用梯度下降法和卡尔曼滤波来优化模糊控制器的算法。The files illustrate a simple fuzzy control algorithm as applied to an automobile cruise control system. The files also illustrate how gradient descent and Kalman filtering can be used t ...
https://www.eeworm.com/dl/665/370242.html
matlab例程
This demo shows the BER performance of linear, decision feedback (DFE), and maximum likelihood seque
This demo shows the BER performance of linear, decision feedback (DFE), and maximum likelihood sequence estimation (MLSE) equalizers when operating in a static channel with a deep null. The MLSE equalizer is invoked first with perfect channel knowledge, then with an imperfect, al ...
https://www.eeworm.com/dl/kbcluoji/40089.html
可编程逻辑
XAPP953-二维列序滤波器的实现
 
This application note describes the implementation of a two-dimensional Rank Order filter. Thereference design includes the RTL VHDL implementation of an efficient sorting algorithm. Thedesign is parameterizable for input/output precision, color standards, filter kerne ...
https://www.eeworm.com/dl/650/206920.html
人工智能/神经网络
A .NET Path Finder Library Path Finder Library is a .NET library that currently contains one type c
A .NET Path Finder Library
Path Finder Library is a .NET library that currently contains one type called SimplePathFinder. SimplePathFinder is a very simple and basic implementation of the A* path finding algorithm. It is extremely easy to use and integrate in your applications. ...
https://www.eeworm.com/dl/686/413130.html
VC书籍
This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message ...
https://www.eeworm.com/dl/519/413134.html
加密解密
This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message ...
https://www.eeworm.com/dl/522507.html
书籍
Guide to Convolutional Neural Networks
General paradigm in solving a computer vision problem is to represent a raw image
using a more informative vector called feature vector and train a classifier on top of
feature vectors collected from training set. From classification perspective, there are
several off-the-shelf m ...