搜索:Tree+Algorithm

找到约 1,515 项符合「Tree+Algorithm」的查询结果

结果 1,515
按分类筛选
显示更多分类
https://www.eeworm.com/dl/617/446746.html 压缩解压

) Compression using huffman code -with a number of bits k per code word -provide huffma

) Compression using huffman code -with a number of bits k per code word -provide huffman table Huffman coding is optimal for a symbol-by-symbol coding with a known input probability distribution.This technique uses a variable-length code table for encoding a source sy ...
下载 109
·
查看 1068
https://www.eeworm.com/dl/kbcluoji/40089.html 可编程逻辑

XAPP953-二维列序滤波器的实现

  This application note describes the implementation of a two-dimensional Rank Order filter. Thereference design includes the RTL VHDL implementation of an efficient sorting algorithm. Thedesign is parameterizable for input/output precision, color standards, filter kerne ...
下载 51
·
查看 1069
https://www.eeworm.com/dl/650/206920.html 人工智能/神经网络

A .NET Path Finder Library Path Finder Library is a .NET library that currently contains one type c

A .NET Path Finder Library Path Finder Library is a .NET library that currently contains one type called SimplePathFinder. SimplePathFinder is a very simple and basic implementation of the A* path finding algorithm. It is extremely easy to use and integrate in your applications. ...
下载 45
·
查看 1089
https://www.eeworm.com/dl/686/413130.html VC书籍

This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message ...
下载 134
·
查看 1101
https://www.eeworm.com/dl/519/413134.html 加密解密

This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message ...
下载 97
·
查看 1093
https://www.eeworm.com/dl/522507.html 书籍

Guide to Convolutional Neural Networks

General paradigm in solving a computer vision problem is to represent a raw image using a more informative vector called feature vector and train a classifier on top of feature vectors collected from training set. From classification perspective, there are several off-the-shelf m ...
下载 1
·
查看 96
https://www.eeworm.com/dl/502/29392.html 单片机编程

基于AT89S52 的水温控制系统的设计

本文介绍了基于AT89C52 单片机的自动水温控制系统的设计及实现过程。该系统具有实时显示、温度测量、温度设定并能根据设定值对环境温度进行调节实现控温的目的以及达到上下限温度报警功能,控制算法是基于数字PID 算法。关键词 :PID AT89C52 脉宽调制 实时 Abstract : This article describes AT89C5 ...
下载 139
·
查看 1102
https://www.eeworm.com/dl/842288.html 技术资料

matlab培训教程之从基础到实践的详细教材

本文档的主要内容详细介绍的是matlab培训教程之从基础到实践的详细教材免费下载,适用于MATLAB初学者,简单易懂内容包括了:一 MATLAB入门基础 二 MATLAB进阶与提高 三 BP神经网络 四 RBF、GRNN和PNN神经网络 五 竞争神经网络与SOM神经网络 六 支持向量机(Support Vector Machine, SVM)七极限学习机 ...
下载 5
·
查看 8227
https://www.eeworm.com/dl/844141.html 技术资料

matlab培训教程之从基础到实践

本文档的主要内容详细介绍的是matlab培训教程之从基础到实践的详细教材免费下载,适用于MATLAB初学者,简单易懂内容包括了:一 MATLAB入门基础 二 MATLAB进阶与提高 三 BP神经网络 四 RBF、GRNN和PNN神经网络 五 竞争神经网络与SOM神经网络 六 支持向量机(Support Vector Machine, SVM)七极限学习机 ...
下载 5
·
查看 5027
https://www.eeworm.com/dl/656/170041.html Java书籍

分享好书(good):台湾人的著作《Spring 技术手册》等 在网上找到了台湾java专家林信良的著作 《Spring 技术手册》的电子书和大家分享下~~~只是缺了AOP的介绍

分享好书(good):台湾人的著作《Spring 技术手册》等 在网上找到了台湾java专家林信良的著作 《Spring 技术手册》的电子书和大家分享下~~~只是缺了AOP的介绍,不过已经很全面了,台湾技术书籍的特点:通俗易懂,深入浅出,结合实例~~~顺便也带上其它的几本Struts,Hibernate~~ 不过,全是繁体字 ...
下载 167
·
查看 1133