搜索结果
找到约 166 项符合
Presented 的查询结果
按分类筛选
- 全部分类
- 单片机编程 (27)
- 技术资料 (26)
- 其他书籍 (11)
- 书籍 (6)
- 模拟电子 (6)
- 电子书籍 (5)
- 人工智能/神经网络 (5)
- VHDL/FPGA/Verilog (5)
- matlab例程 (5)
- 行业发展研究 (5)
- 电源技术 (4)
- 无线通信 (4)
- 数值算法/人工智能 (4)
- 系统设计方案 (4)
- VC书籍 (4)
- 测试测量 (3)
- 可编程逻辑 (3)
- 数学计算 (3)
- 文章/文档 (3)
- 其他 (2)
- 嵌入式综合 (2)
- 教程资料 (2)
- Internet/网络编程 (2)
- 文件格式 (2)
- 单片机开发 (2)
- Java书籍 (2)
- GPS编程 (2)
- 论文 (1)
- 接口技术 (1)
- 存储器技术 (1)
- 通讯/手机编程 (1)
- 软件工程 (1)
- 压缩解压 (1)
- Java编程 (1)
- 网络 (1)
- 多国语言处理 (1)
- 嵌入式/单片机编程 (1)
- 微处理器开发 (1)
- J2ME (1)
- 其他行业 (1)
- 生物技术 (1)
- Windows Mobile (1)
- 软件设计/软件工程 (1)
- 其他嵌入式/单片机内容 (1)
电子书籍 A stability analysis is presented for staggered schemes for the governing equations of compressible
A stability analysis is presented for staggered schemes for the governing equations of compressible flow. The
method is based on Fourier analysis. The approximate nature of pressure-correction solution methods is taken into
account. &#63193 2001 IMACS. Published by Elsevier Science B.V. All rights r ...
文件格式 An optimal neuron evolution algorithm for the restoration of linearly distorted images is presented
An optimal neuron evolution algorithm for the restoration
of linearly distorted images is presented in this paper. The proposed
algorithm is motivated by the symmetric positive-definite quadratic programming
structure inherent in restoration. Theoretical analysis and experimental
results show that t ...
行业发展研究 A method is presented for augmenting an extended Kalman filter with an adaptive element. The result
A method is presented for augmenting an extended
Kalman filter with an adaptive element. The resulting estimator
provides robustness to parameter uncertainty and unmodeled
dynamics.
Internet/网络编程 The tool presented below tries to detect from remote if the target machine was compromised with the
The tool presented below tries to detect from remote if the target machine was compromised with the HACKER Defender rootkit. The tool connect to the remote host, and compares the reply to several known replies. The rootkits that can be detected by the tool are: HACKER Defender v1.0.0 and below.
微处理器开发 This file contains the material presented as the first Embedded MATLAB webinar on the MathWorks web
This file contains the material presented as the first Embedded MATLAB webinar on the MathWorks web site on September 13, 2007.
It contains the PDF version of presentation slides and all necessary demonstration files (including MATLAB M-files and Simulink models).
文章/文档 In the previous article, we presented an approach for capturing similarity between words that was co
In the previous article, we presented an approach for capturing similarity between words that was concerned with the syntactic similarity of two strings. Today we are back to discuss another approach that is more concerned with the meaning of words. Semantic similarity is a confidence score that ref ...
matlab例程 A general technique for the recovery of signicant image features is presented. The technique is ba
A general technique for the recovery of signicant
image features is presented. The technique is based on
the mean shift algorithm, a simple nonparametric pro-
cedure for estimating density gradients. Drawbacks of
the current methods (including robust clustering) are
avoided. Feature space of any nat ...
文章/文档 A paper that I presented on Supervisory Control and Data Acquisition (SCADA) won the second prize at
A paper that I presented on Supervisory Control and Data Acquisition (SCADA) won the second prize at the symposium conducted by the Electrical and Electronics Engineering department of the SRM University. Other topics on which I presented papers were Performance enhancement of wireless sensor networ ...
数值算法/人工智能 This algorithm was developed by Professor Ronald L. Rivest of MIT and can be found presented in seve
This algorithm was developed by Professor Ronald L. Rivest of MIT and can be found presented in several languages. What I provide to you here is a C++ derivative of the original C implementation of Professor Rivets. The library code itself is platform-independant and has been tested in Redhat Linux. ...
VC书籍 This companion disc contains the source code for the sample programs presented in INSIDE VISUAL C++
This companion disc contains the source code for the sample
programs presented in INSIDE VISUAL C++ 5.0, as well as pre-
compiled copies of the programs.
To copy all of the sample code onto your hard disk, run the
SETUP.EXE program and follow the instructions that appear on
the screen. The sample c ...