搜索:Control+Algorithm

找到约 3,056 项符合「Control+Algorithm」的查询结果

结果 3,056
按分类筛选
显示更多分类
https://www.eeworm.com/dl/626/485240.html 编辑器/阅读器

Functorized Undo/Redo .The idea to marry the algorithm with the functor was encouraging and this is

Functorized Undo/Redo .The idea to marry the algorithm with the functor was encouraging and this is example code for it
下载 149
·
查看 1091
https://www.eeworm.com/dl/633/490265.html Java编程

Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the N

Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
下载 25
·
查看 1173
https://www.eeworm.com/dl/654/490559.html 数据结构

I implement Dijkstra s Single Source Shortest Path, say SSP, algorithm for directed graphs using a s

I implement Dijkstra s Single Source Shortest Path, say SSP, algorithm for directed graphs using a simple data structure, say simple scheme, Fibonacci heaps, say F-heap scheme, and Pairing heaps, say P-heap scheme, and measure the relative performance of the three implementations ...
下载 35
·
查看 1082
https://www.eeworm.com/dl/665/472861.html matlab例程

I need estimation channel MIMO-OFDM because I do synchronous CFO and SFO by tracking algorithm Obeli

I need estimation channel MIMO-OFDM because I do synchronous CFO and SFO by tracking algorithm Obelix
下载 186
·
查看 1053
https://www.eeworm.com/dl/665/480589.html matlab例程

a matlab program that deals with k-means algorithm to cluster the data points and build codebook.

a matlab program that deals with k-means algorithm to cluster the data points and build codebook.
下载 134
·
查看 1076
https://www.eeworm.com/dl/665/480842.html matlab例程

In numerical analysis, the secant method is a root-finding algorithm that uses a succession of roots

In numerical analysis, the secant method is a root-finding algorithm that uses a succession of roots of secant lines to better approximate a root of a function f.
下载 86
·
查看 1077
https://www.eeworm.com/dl/519/484586.html 加密解密

A paper on the Rijndael encryption/decryption algorithm (now known as the AES standard) written by t

A paper on the Rijndael encryption/decryption algorithm (now known as the AES standard) written by the authors.
下载 172
·
查看 1065
https://www.eeworm.com/dl/692/443162.html 行业发展研究

this document describes in details the freeman s chain code algorithm in regards to using for featur

this document describes in details the freeman s chain code algorithm in regards to using for feature extraction in an OCR Application it also describes all the necessary phases to develop an ocr
下载 187
·
查看 1111
https://www.eeworm.com/dl/622/100949.html 手机短信编程

Oxygen SMS ActiveX Control允许你发送接受文字及图片消息

Oxygen SMS ActiveX Control允许你发送接受文字及图片消息,读写缺省的SMS中心号码,获得保存的信息总数和统计它们的位置,从SMS收件箱中读取和删除信息。可以获得手机的IMEI,型号的软件和硬件版本和日期,电池容量和信号强度。控件可以和任何支持Active X的编程环境相融合(如,ASP。Microsoft Visua ...
下载 159
·
查看 1101
https://www.eeworm.com/dl/925826.html 技术资料

一种智能门禁系统的设计Design of an Intelligent Access Control System

由于普通门禁系统在非法进入后没有记录人员的状况,导致事后无法破案,本系统根据这一使用要求,利用指纹识别提高安全强度,同时在系统设计中增加了自动摄象和图象存储功能,记录了非法进入时的场景信息,特别 ...
下载 6
·
查看 5311