搜索结果
找到约 127 项符合
beyond Compare 的查询结果
matlab例程 Prony算法工具箱。Prony方法是用一组指数项的线性组合来拟和等间距采样数据的方法,可以从中分析出信号的幅值、相位、阻尼因子、频率等信息。considerations including data
Prony算法工具箱。Prony方法是用一组指数项的线性组合来拟和等间距采样数据的方法,可以从中分析出信号的幅值、相位、阻尼因子、频率等信息。considerations including data preprocessing, model order selection, model order selection criteria, signal subspace selection, signal and noise separation, root inspecti ...
VC书籍 This note describes some key aspects of what C++ is and of how C++ has developed over the years. The
This note describes some key aspects of what C++ is and of how C++ has developed over the years. The spective is that of an experienced C++ user looking at C++ as a practical tool. No attempts are made to compare C++ to other languages, though I have
tried to answer some questions that I have often ...
其他 1.kruscal_CDT: 在Eclipse里面的CDT和MinGW(提供gcc)的环境下所编写的。 2.kruscal_VC2005: 在VC2005里面编写的。 3.以上两个的代码有点不同,
1.kruscal_CDT: 在Eclipse里面的CDT和MinGW(提供gcc)的环境下所编写的。
2.kruscal_VC2005: 在VC2005里面编写的。
3.以上两个的代码有点不同,区别主要在于compare函数
4.kruscal算法里面,我有两个不同的实现,一个是最小化堆里面放EdgeNode的指针,一个是最小化堆里面放EdgeNode的Object实例。前者使用了compare函数来比 ...
编译器/解释器 this a pack include source code for quartus 2. It is an implementation of the LC2. The LC-2 compu
this a pack include source code for quartus 2.
It is an implementation of the LC2. The LC-2 computer is described in Introduction to Computing Systems from Bits & Gates to C & Beyond by Yale Patt and Sanjay Patel, McGraw Hill, 2001. The LC2 model can be run as a simulation or downloaded to the UP3 ...
Java编程 We have a group of N items (represented by integers from 1 to N), and we know that there is some tot
We have a group of N items (represented by integers from 1 to N), and we know that there is some total order defined for these items. You may assume that no two elements will be equal (for all a, b: a<b or b<a). However, it is expensive to compare two items. Your task is to make a number of comparis ...
数学计算 Using Jacobi method and Gauss-Seidel iterative methods to solve the following system The require
Using Jacobi method and Gauss-Seidel iterative methods to solve the following system
The required precision is   =0.00001, and the maximum iteration number N=25. Compare the number of iterations and the convergence of these two methods
软件设计/软件工程 Just what is a regular expression, anyway? Take the tutorial to get the long answer. The short answ
Just what is a regular expression, anyway?
Take the tutorial to get the long answer. The short answer is that a regular expression
is a compact way of describing complex patterns in texts. You can use them to search
for patterns and, once found, to modify the patterns in complex ways. You can also u ...
SQL Server Here we are at the crossroads once again Youre telling me youre so confused You cant make up your
Here we are at the crossroads once again
Youre telling me youre so confused
You cant make up your mind
Is this meant to be
Youre asking me
Trademark
But only love can say - try again or walk away
But I believe for you and me
The sun will shine one day
So Ill just play my part
And pray you ll have a ...
Linux/Unix编程 电路仿真程序 Classic Ladder is coded 100% in C.It can be used for educational purposes or anything you wan
电路仿真程序 Classic Ladder is coded 100% in C.It can be used for educational purposes or anything you want...
The graphical user interface uses GTK.
In the actual version, the following elements are implemented :
* Booleans elements
* Rising / falling edges
* Timers
* Monostables
* Compare o ...
其他 The goal of this exercise is to understand the concept of Carrier-Sensing in IEEE 802.11 standard an
The goal of this exercise is to understand the concept of Carrier-Sensing in IEEE 802.11 standard and compare Physical Carrier Sense and Virtual Carrier Sense mechanisms.