搜索结果
找到约 2,845 项符合
Data Science 的查询结果
按分类筛选
- 全部分类
- 技术资料 (603)
- 其他书籍 (138)
- 其他 (137)
- 书籍 (120)
- 单片机开发 (106)
- matlab例程 (104)
- 单片机编程 (96)
- Java编程 (86)
- 加密解密 (49)
- 数据结构 (49)
- 软件设计/软件工程 (49)
- 人工智能/神经网络 (46)
- 电子书籍 (42)
- 数据库系统 (38)
- SQL Server (34)
- 数学计算 (32)
- 微处理器开发 (32)
- 数值算法/人工智能 (31)
- 通讯编程文档 (31)
- 文章/文档 (31)
- VHDL/FPGA/Verilog (31)
- 系统设计方案 (31)
- 压缩解压 (29)
- 汇编语言 (29)
- 嵌入式/单片机编程 (28)
- 源码 (27)
- Delphi控件源码 (27)
- Linux/Unix编程 (25)
- 其他嵌入式/单片机内容 (24)
- 书籍源码 (23)
- Java书籍 (23)
- 通讯/手机编程 (22)
- 企业管理 (22)
- VC书籍 (22)
- 行业发展研究 (22)
- GPS编程 (21)
- 其他行业 (20)
- 文件格式 (18)
- 其他数据库 (18)
- Internet/网络编程 (17)
- 编译器/解释器 (16)
- 软件 (15)
- DSP编程 (15)
- 驱动编程 (15)
- 网络 (15)
- 软件工程 (14)
- 无线通信 (13)
- 教育系统应用 (13)
- 可编程逻辑 (12)
- J2ME (11)
- 手册 (10)
- 接口技术 (10)
- 通信网络 (10)
- 模拟电子 (10)
- 串口编程 (10)
- *行业应用 (9)
- 论文 (8)
- 其他 (8)
- 电源技术 (8)
- 教程资料 (8)
- USB编程 (8)
- 邮电通讯系统 (8)
- C/C++语言编程 (7)
- 操作系统开发 (7)
- 技术书籍 (7)
- 中间件编程 (7)
- 嵌入式综合 (6)
- 技术管理 (6)
- uCOS (6)
- 交通/航空行业 (6)
- 电子政务应用 (6)
- 3G开发 (6)
- 多媒体处理 (5)
- 游戏 (5)
- 编辑器/阅读器 (5)
- 医药行业 (5)
- JavaScript (5)
- MySQL数据库 (5)
- 并行计算 (5)
- Jsp/Servlet (5)
- VIP专区 (5)
- Linux/uClinux/Unix编程 (4)
- 仿真技术 (4)
- 资料/手册 (4)
- 实用工具 (4)
- 多国语言处理 (4)
- 金融证券系统 (4)
- 嵌入式Linux (4)
- VxWorks (4)
- 家庭/个人应用 (4)
- Windows CE (4)
- 认证考试资料 (4)
- 教程 (3)
- 电路图 (3)
- 习题答案 (3)
- 驱动程序 (3)
- 其他文档 (3)
- 技术教程 (3)
- 测试测量 (3)
- 开发工具 (3)
书籍 Short-Range+Wireless
Over the past ten years there has been a revolution in the devel-
opment and acceptance of mobile products. In that period, cel-
lular telephony and consumer electronics have moved from the
realm of science fiction to everyday reality. Much of that revolu-
tion is unremarkable – we use wireless, in ...
技术资料 单片机与PC机并行数据传输分析
单片机与PC 机并行方式较为少见,其主要适应于短距离数据传输,且对于串口数据校验有着严格要求,数据传输过程也具备较多优点,可以得到令人满意的效果。以计算机Windows 系统为例,分析实现单片机与PC 机并行数据传输方法,提出了以中断脉冲为数据载体的传输方法,旨在节省开发时间,满足使用需求。The parallel mode between sing ...
其他 RW - Read & Write utility, for hardware engineers, firmware (BIOS) engineers, driver developers, QA
RW - Read & Write utility, for hardware engineers, firmware (BIOS) engineers, driver developers, QA engineers, performance test engineers, diagnostic engineers, etc., This utility access almost all the computer hardware, including PCI (PCI Express), PCI Index/Data, Memory, Memory Index/Data, I/O Spa ...
人工智能/神经网络 The tca package is a Matlab program that implements the tree-dependent component analysis (TCA) alg
The tca package is a Matlab program that implements the tree-dependent
component analysis (TCA) algorithms that extends the independent
component analysis (ICA), where instead of looking for a linear transform
that makes the data components independent, we are looking for components
that can be bes ...
其他 数据异常处理。The main source file is "dabort.s": with suitable -PreDefines or a corresponding "options-s
数据异常处理。The main source file is "dabort.s": with suitable -PreDefines or
a corresponding "options-setting" file, it assembles to the data
abort veneer. This is described in detail in the documentation.
The "dabort.h" file contains definitions of some constants used
in the data abort veneer s ...
软件设计/软件工程 A class--the basic building block of an object-oriented language such as Java--is a template that de
A class--the basic building block of an object-oriented language such as Java--is a template that describes the data and behavior associated with instances of that class. When you instantiate a class you create an object that looks and feels like other instances of the same class. The data associate ...
VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...
加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...
通讯编程文档 SPREAD SPECTRUM MODULATION TECHNIQUES -spread spectrum - those modulation methods that are producin
SPREAD SPECTRUM MODULATION TECHNIQUES
-spread spectrum - those modulation methods that are producing a signal whose
spectrum is more wider than of the data signal, the occupied frequency band being
independent by the signal of data band.
-The signals with spread spectrum of direct sequence type BPSK ...
文章/文档 What happens with your machine when you need to move away from the computer for 10 or more minutes?
What happens with your machine when you need to move away from the computer for 10 or more minutes? How secure is your data? Can someone sit on your chair while you are at a coworkers office and play with your data?
Maybe you need a computer locking tool that is small and easy to use yet powerful ...