搜索结果
找到约 110 项符合
Di 的查询结果
按分类筛选
- 全部分类
- 单片机开发 (12)
- 其他书籍 (10)
- 单片机编程 (5)
- 其他 (5)
- 技术资料 (5)
- 电子书籍 (4)
- 书籍 (4)
- 电源技术 (3)
- 中间件编程 (3)
- 数据结构 (3)
- matlab例程 (3)
- 其他嵌入式/单片机内容 (3)
- 驱动编程 (3)
- 测试测量 (2)
- 书籍源码 (2)
- 通讯编程文档 (2)
- 人工智能/神经网络 (2)
- 汇编语言 (2)
- 文章/文档 (2)
- 行业发展研究 (2)
- 系统设计方案 (2)
- 压缩解压 (2)
- 学术论文 (1)
- 教程资料 (1)
- allegro (1)
- 开发工具 (1)
- 实用工具 (1)
- 可编程逻辑 (1)
- 数值算法/人工智能 (1)
- 邮电通讯系统 (1)
- 通讯/手机编程 (1)
- USB编程 (1)
- 编译器/解释器 (1)
- Applet (1)
- VHDL/FPGA/Verilog (1)
- Linux/Unix编程 (1)
- 多国语言处理 (1)
- 3G开发 (1)
- 文件格式 (1)
- VC书籍 (1)
- 网络 (1)
- 软件设计/软件工程 (1)
- 数学计算 (1)
- JavaScript (1)
- 手机短信编程 (1)
- GPS编程 (1)
- Java书籍 (1)
- 应用设计 (1)
- 教程 (1)
- 习题答案 (1)
- 其他 (1)
数据结构 希尔排序(缩小增量法) 排序过程:先取一个正整数d1<n
希尔排序(缩小增量法)
排序过程:先取一个正整数d1<n,把所有相隔d1的记录放一组,组内进行直接插入排序;然后取d2<d1,重复上述分组和排序操作;直至di=1,即所有记录放进一个组中排序为止
其他 For solving the following problem: "There is No Free Lunch" Time Limit: 1 Second Memory Limit: 3
For solving the following problem:
"There is No Free Lunch"
Time Limit: 1 Second Memory Limit: 32768 KB
One day, CYJJ found an interesting piece of commercial from newspaper: the Cyber-restaurant was offering a kind of "Lunch Special" which was said that one could "buy one get two for free". That ...
matlab例程 四种聚类算法源代码及示例代码,本程序的最终目的是形成一套标准的用于聚类、可扩展的工具。包括的内容有1. 聚类算法:Kmeans和Kmedoid算法、FCMclust, GKclust, GGclust
四种聚类算法源代码及示例代码,本程序的最终目的是形成一套标准的用于聚类、可扩展的工具。包括的内容有1. 聚类算法:Kmeans和Kmedoid算法、FCMclust, GKclust, GGclust算法 2. 评估分类原型:程序可以在二维图像上绘制出聚类的结果 3. 验证:程序给每一个算法提供验证机制,每个聚类算法会统计Partition Coefficient (PC), ...
其他书籍 摩斯密码电子锁 电报最早是由美国的摩尔斯在1844年发明的
摩斯密码电子锁
电报最早是由美国的摩尔斯在1844年发明的,故也被叫做摩尔斯电码。它由两种基本信号和不同的间隔时间组成:短促的点信号" .",
读" 嘀 "(Di);保持一定时间的长信号"—",读"嗒 "(Da)。间隔时间:"嘀"1t;"嗒"3t;"滴嗒"间1t;字母间3t;字间5t。 ...
编译器/解释器 Please read your package and describe it at least 40 bytes. System will automatically delete the di
Please read your package and describe it at least 40 bytes.
System will automatically delete the directory of debug and release
VHDL/FPGA/Verilog system verilog This directory has all the examples in chapter 1. The examples are in different di
system verilog
This directory has all the examples in chapter 1.
The examples are in different directories. The table below lists the location of hte examples.
书籍源码 Please read your package and describe it at least 40 bytes. System will automatically delete the di
Please read your package and describe it at least 40 bytes.
System will automatically delete the directory of debug and release, so please do not put files on these two directory
压缩解压 Please read your package and describe it at least 40 bytes. System will automatically delete the di
Please read your package and describe it at least 40 bytes.
System will automatically delete the directory of debug and release, so please do not put files on these two directory.
文章/文档 A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di
A cylindrical wave expansion method is developed to obtain the scattering field for an ideal
two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up
to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak
with the ...
驱动编程 通过vb与鸿格7000系列模块进行通讯
通过vb与鸿格7000系列模块进行通讯,与DI通讯源码