搜索结果

找到约 108 项符合 Published 的查询结果

matlab例程 This program is a new way to estimate the coherence function. It s based on the MVDR and is much mor

This program is a new way to estimate the coherence function. It s based on the MVDR and is much more reliable than the classical Welch s method implemented in MATLAB. There are 2 programs: the main program called coherence_MVDR.m and and an example, called illustrate.m, that calls the main functio ...
https://www.eeworm.com/dl/665/316034.html
下载: 163
查看: 1059

软件设计/软件工程 MISRA-C:2004 Coding Standard The LDRA tool suite is developed and certified to BS EN ISO 9001:2000.

MISRA-C:2004 Coding Standard The LDRA tool suite is developed and certified to BS EN ISO 9001:2000. This comparison has used the revised MISRA standard, MISRA-C:2004 "Guidelines for the use of the C language in critical systems" was published in October 2004.
https://www.eeworm.com/dl/684/321852.html
下载: 98
查看: 1134

人工智能/神经网络 Modeling and Forecasting Electricity Loads and Prices: A Statistical Approach" by Rafa&#322 Weron, p

Modeling and Forecasting Electricity Loads and Prices: A Statistical Approach" by Rafa&#322 Weron, published by John Wiley and Sons, 2006. Rafa&#322 Weron的大作:电网系统负荷与价格预测与建模:一种统计方法的源码
https://www.eeworm.com/dl/650/322305.html
下载: 118
查看: 1060

其他 ** This source is free software you can redistribute it and/or ** modify it under the terms of the

** This source is free software you can redistribute it and/or ** modify it under the terms of the GNU General Public ** License as published by the Free Software Foundation either ** version 2 of the License, or (at your option) any later version.
https://www.eeworm.com/dl/534/333380.html
下载: 178
查看: 1046

matlab例程 This diskette (version 1.0) contains demonstration programs and source codes in MATLAB (v.5.2) for a

This diskette (version 1.0) contains demonstration programs and source codes in MATLAB (v.5.2) for algorithms listed in the textbook Global Positioning Systems, Inertial Navigation, and Integration, by M. S. Grewal, Lawrence Weill, and A. P. Andrews, published by John Wiley and Sons, 2000. Contents: ...
https://www.eeworm.com/dl/665/356656.html
下载: 122
查看: 1147

语音压缩 The files in this directory comprise ANSI-C language reference implementations of the CCITT (Intern

The files in this directory comprise ANSI-C language reference implementations of the CCITT (International Telegraph and Telephone Consultative Committee) G.711, G.721 and G.723 voice compressions. They have been tested on Sun SPARCstations and passed 82 out of 84 test vectors published by CCITT (De ...
https://www.eeworm.com/dl/627/362279.html
下载: 180
查看: 1062

其他行业 天文算法

天文算法,包括时间、行星、以及内插算法。 A portable ANSI C implementation of some of the algorithms published in Astronomical Algorithms by Jean Meeus 2nd edition (December 1998) Willmann-Bell ISBN: 0943396638
https://www.eeworm.com/dl/668/371138.html
下载: 92
查看: 1092

其他书籍 Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Fr

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation with no Invariant Sections, with no Front- Cover Texts, and with no Back-Cover Texts. A copy of the ...
https://www.eeworm.com/dl/542/373138.html
下载: 137
查看: 1049

电子书籍 A stability analysis is presented for staggered schemes for the governing equations of compressible

A stability analysis is presented for staggered schemes for the governing equations of compressible flow. The method is based on Fourier analysis. The approximate nature of pressure-correction solution methods is taken into account. &#63193 2001 IMACS. Published by Elsevier Science B.V. All rights r ...
https://www.eeworm.com/dl/cadence/ebook/373986.html
下载: 101
查看: 1075

其他书籍 MS Access is commonly thought of as the little brother of Database engines, and not a lot of materia

MS Access is commonly thought of as the little brother of Database engines, and not a lot of material has been published about methods used for exploiting it during a penetration test. The aim of this paper is to bring a lot of disparate information together into one guide.
https://www.eeworm.com/dl/542/378602.html
下载: 74
查看: 1043