搜索结果

找到约 1,071 项符合 INFORMATION 的查询结果

按分类筛选

显示更多分类

技术资料 gonghuoxinxibiao

供货信息表,对货物的信息(如数量、名称等)描述,记录了出货和进货后的信息调整。-Supplier information table
https://www.eeworm.com/dl/907197.html
下载: 10
查看: 5629

技术资料 基于神经网络的信息收集机器人导航界面

基于神经网络的信息收集机器人导航界面 Neural Network Based Navigation Interface for Robot of Information Col
https://www.eeworm.com/dl/922158.html
下载: 4
查看: 4463

Java编程 This project does not contain a full, runnable application program. Instead, the only package ope.ac

This project does not contain a full, runnable application program. Instead, the only package ope.account contains two classes which represent basic bank customer and account information.
https://www.eeworm.com/dl/633/192336.html
下载: 70
查看: 1137

matlab例程 This file is a function under matlab which allow to compute and plot Amplitude modulation : AM. We c

This file is a function under matlab which allow to compute and plot Amplitude modulation : AM. We can observe the effect of the information parameter can be changed such as amplitude and modulation ratio m.
https://www.eeworm.com/dl/665/457983.html
下载: 166
查看: 1129

Java编程 Auctions are among the oldest economic institutions in place. They have been used since antiquity to

Auctions are among the oldest economic institutions in place. They have been used since antiquity to sell a wide variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the efficiency of common auctions when values are interdependent- the value to a particular ...
https://www.eeworm.com/dl/633/430541.html
下载: 47
查看: 1055

书籍 Smart Grid Security

The field of cyber security, or information security, or information assurance, depending on your preference, is an interdisciplinary one. It is part computer science, part statistics, part psychology, part law, and a part of many other fields. Moreover, any cyber security practi- tioner needs to kn ...
https://www.eeworm.com/dl/522347.html
下载: 1
查看: 170

Linux/Unix编程 The same two-stage decoder as above. However, when transforming the symbols prior to Viterbi decodin

The same two-stage decoder as above. However, when transforming the symbols prior to Viterbi decoding, the amplitude information is ignored and only the phase of the received symbol is employed in the metric computation stage.
https://www.eeworm.com/dl/619/171799.html
下载: 118
查看: 1065

文章/文档 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile

This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
https://www.eeworm.com/dl/652/441081.html
下载: 163
查看: 1098

行业发展研究 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile

This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
https://www.eeworm.com/dl/692/441085.html
下载: 104
查看: 1064

系统设计方案 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile

This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
https://www.eeworm.com/dl/678/441086.html
下载: 133
查看: 1054