搜索结果

找到约 142 项符合 Technique 的查询结果

其他 document qui décrit la technique de squelettisation

document qui décrit la technique de squelettisation
https://www.eeworm.com/dl/534/446815.html
下载: 191
查看: 1058

matlab例程 Template matching code using cross co relation technique

Template matching code using cross co relation technique
https://www.eeworm.com/dl/665/463845.html
下载: 174
查看: 1062

其他书籍 a visual servoing technique which can be applied for robtic control

a visual servoing technique which can be applied for robtic control
https://www.eeworm.com/dl/542/489391.html
下载: 28
查看: 1122

技术资料 Memory Interfaces Data Capture Using Direct Clocking Technique

This application note describes the direct-clocking data capture technique for memoryinterfac
https://www.eeworm.com/dl/900809.html
下载: 8
查看: 3256

Java书籍 jboss cmp technique book, for how to create cmp on jboss platform

jboss cmp technique book, for how to create cmp on jboss platform
https://www.eeworm.com/dl/656/128036.html
下载: 99
查看: 1158

VC书籍 This paper presents an interactive technique that produces static hairstyles by generating individu

This paper presents an interactive technique that produces static hairstyles by generating individual hair strands of the desired shape and color, subject to the presence of gravity and collisions. A variety of hairstyles can be generated by adjusting the wisp parameters, while the deformation is so ...
https://www.eeworm.com/dl/686/218033.html
下载: 127
查看: 1097

matlab例程 Advanced Human Mood detection technique using Genetic Algorithms in Matlab

Advanced Human Mood detection technique using Genetic Algorithms in Matlab
https://www.eeworm.com/dl/665/475207.html
下载: 163
查看: 1140

通讯编程文档 an ofdm turorial. The tutorial introduce the describtion and fundamental of ofdm technique

an ofdm turorial. The tutorial introduce the describtion and fundamental of ofdm technique
https://www.eeworm.com/dl/646/489386.html
下载: 76
查看: 1186

通讯编程文档 a kind converts a technique according to the simple speech A_D of ADM principle

a kind converts a technique according to the simple speech A_D of ADM principle
https://www.eeworm.com/dl/646/296135.html
下载: 159
查看: 1077

VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/686/413130.html
下载: 134
查看: 1101