搜索结果
找到约 479 项符合
Field 的查询结果
按分类筛选
- 全部分类
- 技术资料 (206)
- 学术论文 (46)
- 书籍 (41)
- matlab例程 (18)
- 其他 (15)
- 其他书籍 (13)
- 教程资料 (8)
- 单片机编程 (7)
- 可编程逻辑 (7)
- 加密解密 (6)
- DSP编程 (5)
- Linux/Unix编程 (5)
- 数学计算 (5)
- VHDL/FPGA/Verilog (5)
- 电源技术 (4)
- 模拟电子 (4)
- 通讯编程文档 (4)
- 单片机开发 (4)
- 文章/文档 (4)
- 电子书籍 (3)
- 多国语言处理 (3)
- 文件格式 (3)
- 人工智能/神经网络 (3)
- 系统设计方案 (3)
- 其他嵌入式/单片机内容 (3)
- 行业发展研究 (3)
- GPS编程 (3)
- 论文 (2)
- 无线通信 (2)
- 嵌入式综合 (2)
- Java编程 (2)
- 汇编语言 (2)
- Delphi控件源码 (2)
- 其他行业 (2)
- 软件设计/软件工程 (2)
- JavaScript (2)
- SQL Server (2)
- 3G开发 (2)
- 教程 (1)
- 手册 (1)
- PCB相关 (1)
- 数值算法/人工智能 (1)
- 数据库系统 (1)
- 通讯/手机编程 (1)
- 书籍源码 (1)
- 技术书籍 (1)
- 软件工程 (1)
- 开发工具 (1)
- 实用工具 (1)
- 传感与控制 (1)
- 通信网络 (1)
- 工控技术 (1)
- allegro (1)
- Internet/网络编程 (1)
- 手机短信编程 (1)
- 编译器/解释器 (1)
- 网络 (1)
- 其他数据库 (1)
- 数据结构 (1)
- Java书籍 (1)
- FlashMX/Flex源码 (1)
- 生物技术 (1)
- Windows Mobile (1)
- VC书籍 (1)
matlab例程 vectline "vector field line plotter" Depending on the dimension of coordinate axis, vectline can pl
vectline "vector field line plotter"
Depending on the dimension of coordinate axis, vectline can plot both 3D and 2D vector field line.
其他 In the field of biometrics, palmprint is a novel but promising technology. Limited work has been rep
In the field of biometrics, palmprint is a novel but promising technology. Limited work has been reported on palmprint identification and verification, despite the importance of palmprint features. There are many unique features in a palmprint image that can be used for personal identification. Prin ...
其他 it is in image processing field. this code Read TIFF Image then it excute compute histogram and hist
it is in image processing field. this code Read TIFF Image then it excute compute histogram and histogram equalization. after that it Write TIFFU unsigned Char.
matlab例程 In this program we calculate the scattering field of a infinite rectangular surface. I use Physical
In this program we calculate the scattering field of a infinite rectangular surface. I use Physical Optic method and compare the result with exact solution.
文章/文档 A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di
A cylindrical wave expansion method is developed to obtain the scattering field for an ideal
two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up
to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak
with the ...
加密解密 this is the ADD routine for the prime field and large numbers for ECC or RSA algorithms. with IAR v
this is the ADD routine for the prime field and large numbers for ECC or RSA algorithms. with IAR version 5 or above.
加密解密 this is the SUB routine for the prime field and large numbers for ECC or RSA algorithms. with IAR v
this is the SUB routine for the prime field and large numbers for ECC or RSA algorithms. with IAR version 5 or above.
加密解密 this is the MUL routine for the prime field and large numbers for ECC or RSA algorithms. with IAR v
this is the MUL routine for the prime field and large numbers for ECC or RSA algorithms. with IAR version 5 or above.
Windows Mobile The C# program will display a mine field, plant mines, and provide hints on the number of mines arou
The C# program will display a mine field, plant mines, and provide hints on the number of mines around each grid. The player can therefore enjoy a typical Minesweeper game on a Smartphone.
其他 This code converts a Galois Field array created usin GF(2^m) for a given primitive polynomial into a
This code converts a Galois Field array created usin GF(2^m) for a given primitive polynomial into a decimal array that can be used within typical .m file coding.