搜索:Fast+Algorithm
找到约 1,556 项符合「Fast+Algorithm」的查询结果
结果 1,556
按分类筛选
- 全部
- 技术资料 (259)
- matlab例程 (195)
- 人工智能/神经网络 (130)
- 数学计算 (99)
- 加密解密 (80)
- 其他 (72)
- 数值算法/人工智能 (69)
- 压缩解压 (44)
- 其他书籍 (42)
- 数据结构 (41)
- Java编程 (34)
- Linux/Unix编程 (26)
- 通讯/手机编程 (25)
- 软件设计/软件工程 (25)
- 单片机编程 (21)
- 文章/文档 (21)
- 书籍源码 (20)
- 通讯编程文档 (20)
- VHDL/FPGA/Verilog (16)
- 单片机开发 (15)
- 文件格式 (13)
- 技术管理 (13)
- DSP编程 (11)
- 软件工程 (11)
- 系统设计方案 (11)
- 书籍 (11)
- 电子书籍 (10)
- Delphi控件源码 (10)
- 嵌入式/单片机编程 (8)
- 操作系统开发 (7)
- 其他嵌入式/单片机内容 (7)
- 行业发展研究 (7)
- 源码 (7)
- 论文 (7)
- 可编程逻辑 (6)
- 汇编语言 (6)
- STL (6)
- JavaScript (6)
- VC书籍 (6)
- 学术论文 (5)
- 多媒体处理 (5)
- 教程资料 (5)
- CA认证 (5)
- 驱动编程 (4)
- Internet/网络编程 (4)
- 编辑器/阅读器 (4)
- 编译器/解释器 (4)
- 多国语言处理 (4)
- 其他数据库 (4)
- 嵌入式Linux (4)
- 微处理器开发 (4)
- VIP专区 (4)
- 电源技术 (3)
- 无线通信 (3)
- 数据库系统 (3)
- 通信网络 (3)
- 嵌入式综合 (3)
- Modem编程 (3)
- Applet (3)
- 网络 (3)
- 家庭/个人应用 (3)
- 其他行业 (3)
- GPS编程 (3)
- 并行计算 (3)
- 图形图像 (2)
- 实用工具 (2)
- Matlab (2)
- 模拟电子 (2)
- 游戏 (2)
- *行业应用 (2)
- 生物技术 (2)
- Windows CE (2)
- 中间件编程 (2)
- MySQL数据库 (2)
- 3G开发 (2)
- C/C++语言编程 (1)
- 接口技术 (1)
- Linux/uClinux/Unix编程 (1)
- 设计相关 (1)
- 仿真技术 (1)
- 存储器技术 (1)
- 技术书籍 (1)
- 测试测量 (1)
- 工控技术 (1)
- 教育系统应用 (1)
- 语音压缩 (1)
- 磁盘编程 (1)
- USB编程 (1)
- Java书籍 (1)
- J2ME (1)
- VxWorks (1)
- Windows Mobile (1)
- SQL Server (1)
- 邮电通讯系统 (1)
- Jsp/Servlet (1)
- RFID编程 (1)
- MTK (1)
- 能源行业(电力石油煤炭) (1)
- 习题答案 (1)
- 其他 (1)
https://www.eeworm.com/dl/519/463889.html
加密解密
Algorithm Festel. Programs read from file to array byte[]. key block = 64 data block = 128 if use
Algorithm Festel.
Programs read from file to array byte[].
key block = 64
data block = 128 if use classis Festel
data block = 256 if use modification Festel
https://www.eeworm.com/dl/665/469688.html
matlab例程
genetic algorithm (or GA) is a search technique used in computing to find true or approximate soluti
genetic algorithm (or GA) is a search technique used in computing to find true or approximate solutions to optimization and search problems
for function of 2 variable
https://www.eeworm.com/dl/678/448246.html
系统设计方案
This is a simple algorithm that downloads trading data from yahoo database. It is basically a large
This is a simple algorithm that downloads trading data from yahoo database. It is basically a large scale application of sqq.m which was originally submitted by Michael Boldin, link at acknowledgements.
Some of the functionalities of the package:
- User defined ticker list. ...
https://www.eeworm.com/dl/665/450689.html
matlab例程
This code proposes genetic algorithm (GA) to optimize the point-to-point trajectory planning for a 3
This code proposes genetic algorithm (GA) to optimize the point-to-point trajectory planning for a 3-link robot arm. The objective function for the proposed GA is to minimizing traveling time and space, while not exceeding a maximum
pre-defined torque, without collision with a ...
https://www.eeworm.com/dl/633/435265.html
Java编程
this is the java code which describe the sdes algorithm and help us to encrypt the information
this is the java code which describe the sdes algorithm and help us to encrypt the information
https://www.eeworm.com/dl/684/491642.html
软件设计/软件工程
I found this document very useful. This has the algorithm for extracting the license plate from the
I found this document very useful. This has the algorithm for extracting the license plate from the image
https://www.eeworm.com/dl/531/484927.html
操作系统开发
很全很好有关操作系统B的Storage Management District Allocation Algorithm
很全很好有关操作系统B的Storage Management District Allocation Algorithm
https://www.eeworm.com/dl/626/485240.html
编辑器/阅读器
Functorized Undo/Redo .The idea to marry the algorithm with the functor was encouraging and this is
Functorized Undo/Redo .The idea to marry the algorithm with the functor was encouraging and this is example code for it
https://www.eeworm.com/dl/633/490265.html
Java编程
Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the N
Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
https://www.eeworm.com/dl/654/490559.html
数据结构
I implement Dijkstra s Single Source Shortest Path, say SSP, algorithm for directed graphs using a s
I implement Dijkstra s Single Source Shortest Path, say SSP, algorithm for directed graphs using a simple data structure, say simple scheme, Fibonacci heaps, say F-heap scheme, and Pairing heaps, say P-heap scheme, and measure the relative performance of the three implementations ...