搜索结果
找到约 1,527 项符合
R-Learning 的查询结果
系统设计方案 把R、L、C转换成频率信号f
把R、L、C转换成频率信号f,转换的原理分别是RC振荡电路和LC电容三点式振荡电路。单片机计数得出被测频率,由该频率计算出各个参数值,数据处理后,送显示。
其他书籍 With the successful implementation of XML Schema, developers are learning how to increase productivi
With the successful implementation of XML Schema, developers are learning how to increase productivity, improve software reliability, minimize development time, and decrease time to market. This in-depth reference is an all-in-one resource designed to help developers leverage the power and potential ...
其他书籍  Jagadishwar R. Sirigiri 关于光子晶体在微波领域应用的研究报告
 Jagadishwar R. Sirigiri
关于光子晶体在微波领域应用的研究报告
matlab例程 若干种r/s估值法源代码
若干种r/s估值法源代码,试试看很好用,有没有朋友有其他估值法下的源代码?麻烦上传分享一下,
人工智能/神经网络 normkit is a set of tools supporting ontology learning. from xml,xsd to rdfs.
normkit is a set of tools supporting ontology learning. from xml,xsd to rdfs.
人工智能/神经网络 AdaBoost is an efficient tool in machine learning. It can combine a series of weak learners into a s
AdaBoost is an efficient tool in machine learning. It can combine a series of weak learners into a strong learner. Besides pattern classification, it also can be applied into feature selection. This document explains the use of AdaBoost.
其他书籍 Mahafza B.R, Elsherbeni A.Z. - MATLAB Simulations for Radar Systems Design - 2004 对于雷达系统设计师来说这是一本难得的
Mahafza B.R, Elsherbeni A.Z. - MATLAB Simulations for Radar Systems Design - 2004 对于雷达系统设计师来说这是一本难得的宝典
Java书籍 Threads are essential to Java programming, but learning to use them effectively is a nontrivial task
Threads are essential to Java programming, but learning to use them effectively is a nontrivial task. This new edition of the classic Java Threads shows you how to take full advantage of Java s threading facilities and brings you up-to-date with the watershed changes in Java 2 Standard Edition versi ...
加密解密 对称密码体制的发展趋势将以分组密码为重点。分组密码算法通常由密钥扩展算法和加密(解密)算法两部分组成。密钥扩展算法将b字节用户主密钥扩展成r个子密钥。加密算法由一个密码学上的弱函数f与r个子密钥迭代r
对称密码体制的发展趋势将以分组密码为重点。分组密码算法通常由密钥扩展算法和加密(解密)算法两部分组成。密钥扩展算法将b字节用户主密钥扩展成r个子密钥。加密算法由一个密码学上的弱函数f与r个子密钥迭代r次组成。混乱和密钥扩散是分组密码算法设计的基本原则。抵御已知明文的差分和线性攻击,可变长密钥和分组是该体 ...
通讯编程文档 上以A R M 芯片为例,详细分析了在发生中断时如何实现中断现场的保护以及一 般嵌入式操作系统的多任务切换过程
上以A R M 芯片为例,详细分析了在发生中断时如何实现中断现场的保护以及一
般嵌入式操作系统的多任务切换过程