搜索:Control+Algorithm
找到约 3,056 项符合「Control+Algorithm」的查询结果
结果 3,056
按分类筛选
- 全部
- matlab例程 (190)
- 技术资料 (185)
- 人工智能/神经网络 (108)
- 其他 (95)
- 数学计算 (80)
- 加密解密 (72)
- 其他书籍 (70)
- 单片机开发 (69)
- 数值算法/人工智能 (52)
- 文章/文档 (35)
- 其他嵌入式/单片机内容 (35)
- 压缩解压 (32)
- Java编程 (31)
- 数据结构 (31)
- 嵌入式/单片机编程 (30)
- 通讯编程文档 (26)
- 软件设计/软件工程 (26)
- DSP编程 (25)
- 通讯/手机编程 (25)
- 汇编语言 (25)
- 书籍 (25)
- 书籍源码 (24)
- 微处理器开发 (23)
- 文件格式 (19)
- VHDL/FPGA/Verilog (19)
- Linux/Unix编程 (18)
- 系统设计方案 (18)
- 技术管理 (16)
- 电子书籍 (15)
- 软件工程 (13)
- 驱动编程 (13)
- 其他行业 (13)
- Windows CE (11)
- Delphi控件源码 (10)
- 操作系统开发 (9)
- 编辑器/阅读器 (9)
- 串口编程 (8)
- 中间件编程 (8)
- VC书籍 (8)
- 行业发展研究 (8)
- JavaScript (7)
- USB编程 (6)
- *行业应用 (5)
- CA认证 (5)
- 其他数据库 (5)
- GPS编程 (5)
- 技术书籍 (4)
- 游戏 (4)
- 编译器/解释器 (4)
- 网络 (4)
- 多国语言处理 (4)
- VxWorks (4)
- 家庭/个人应用 (4)
- 并行计算 (4)
- 教育系统应用 (3)
- 手机短信编程 (3)
- Modem编程 (3)
- 嵌入式Linux (3)
- STL (3)
- Symbian (3)
- 论文 (3)
- 电子书籍 (2)
- 学术论文 (2)
- 数据库系统 (2)
- Internet/网络编程 (2)
- Java书籍 (2)
- J2ME (2)
- Jsp/Servlet (2)
- 3G开发 (2)
- 能源行业(电力石油煤炭) (2)
- FPGA (1)
- 单片机编程 (1)
- 电源技术 (1)
- 无线通信 (1)
- Linux/uClinux/Unix编程 (1)
- 设计相关 (1)
- 其他文档 (1)
- 资料/手册 (1)
- 电工电气 (1)
- 电机控制 (1)
- 教程资料 (1)
- 语音压缩 (1)
- 磁盘编程 (1)
- Applet (1)
- 传真(Fax)编程 (1)
- uCOS (1)
- BREW编程 (1)
- 生物技术 (1)
- 交通/航空行业 (1)
- Windows Mobile (1)
- SQL Server (1)
- 邮电通讯系统 (1)
- RFID编程 (1)
- Ajax (1)
- 源码 (1)
- 习题答案 (1)
https://www.eeworm.com/dl/619/171810.html
Linux/Unix编程
The Viterbi algorithm is the same as the binary case with one main difference: The survivor sequence
The Viterbi algorithm is the same as the binary case with one main difference: The survivor sequences include the uncoded bits, which are decided at each trellis stage when selecting one of two parallel branches with the largest correlation metric.
Presently, only 8-PSK modulat ...
https://www.eeworm.com/dl/519/206918.html
加密解密
Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The origina
Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The original Tiger Hash code was taken from Tiger.Net which is written in Visual Basic. NET.
Tiger Tree Hash算法的C#实现!
https://www.eeworm.com/dl/650/200938.html
人工智能/神经网络
This a A* pathfinding example to illustrate how to implement a A* pathfinding algorithm into your pr
This a A* pathfinding example to illustrate how to implement a A* pathfinding algorithm into your program. It s a port from Patrick Lesters example in BlitzBasic to VB.Net. It uses a Binary Heap class I made to sort the score values.
https://www.eeworm.com/dl/658/187942.html
STL
implement huffman algorithm with stl priority-queue, first you must have the file, then the result i
implement huffman algorithm with stl priority-queue, first you must have the file, then the result is saved
https://www.eeworm.com/dl/650/343494.html
人工智能/神经网络
he algorithm is equivalent to Infomax by Bell and Sejnowski 1995 [1] using a maximum likelihood form
he algorithm is equivalent to Infomax by Bell and Sejnowski 1995 [1] using a maximum likelihood formulation. No noise is assumed and the number of observations must equal the number of sources. The BFGS method [2] is used for optimization.
The number of independent components a ...
https://www.eeworm.com/dl/519/304536.html
加密解密
Tasks Read the textbook about the details of Vigenére Cipher. Implement the algorithm by C or C++.
Tasks
Read the textbook about the details of Vigenére Cipher.
Implement the algorithm by C or C++.
Requirements
You do this lab in a group of two students.
Your program should have input and output as follows:
csci>a.out
--> Please input the key:
receptive
--> Please input the ...
https://www.eeworm.com/dl/665/305243.html
matlab例程
The FastICA package is a free (GPL) MATLAB program that implements the fast fixed-point algorithm fo
The FastICA package is a free (GPL) MATLAB program that implements the fast fixed-point algorithm for independent component analysis and projection pursuit. It features an easy-to-use graphical user interface, and a computationally powerful algorithm.
https://www.eeworm.com/dl/519/438207.html
加密解密
This method is based upon the image hiding technic into another image using LSB algorithm called as
This method is based upon the image hiding technic into another image using LSB algorithm called as Steganography.
https://www.eeworm.com/dl/665/371771.html
matlab例程
PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A componen
PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A components) those variables that do not carry any relevant information to model Y. The criterion used to trace the un-informative variables is the reliability of the regression coefficient ...
https://www.eeworm.com/dl/617/372621.html
压缩解压
We describe and demonstrate an algorithm that takes as input an unorganized set of points fx1И
We describe and demonstrate an algorithm that takes as input an
unorganized set of points fx1&#1048576 &#1048576 xng &#1048576 IR3 on or near an unknown
manifold M, and produces as output a simplicial surface that
approximates M. Neither the topology, the presence of boundarie ...