搜索结果
找到约 118 项符合
could 的查询结果
按分类筛选
- 全部分类
- 书籍 (17)
- 其他书籍 (8)
- 单片机编程 (7)
- matlab例程 (7)
- 其他 (6)
- Java编程 (6)
- 无线通信 (4)
- 汇编语言 (3)
- 数据结构 (3)
- Linux/Unix编程 (3)
- 软件设计/软件工程 (3)
- 论文 (3)
- 技术资料 (3)
- 电源技术 (2)
- 人工智能/神经网络 (2)
- 数值算法/人工智能 (2)
- 加密解密 (2)
- J2ME (2)
- 多媒体处理 (1)
- 模拟电子 (1)
- Mentor (1)
- 可编程逻辑 (1)
- 测试测量 (1)
- 源码/资料 (1)
- 驱动编程 (1)
- VHDL/FPGA/Verilog (1)
- 压缩解压 (1)
- Internet/网络编程 (1)
- 人物传记/成功经验 (1)
- 技术管理 (1)
- 文件格式 (1)
- 多国语言处理 (1)
- DSP编程 (1)
- Jsp/Servlet (1)
- SQL Server (1)
- 单片机开发 (1)
- 其他数据库 (1)
- 通讯/手机编程 (1)
- USB编程 (1)
- Delphi控件源码 (1)
- 嵌入式/单片机编程 (1)
- 中间件编程 (1)
- 数学计算 (1)
- 书籍源码 (1)
- 其他行业 (1)
- 家庭/个人应用 (1)
- 网络 (1)
- 并行计算 (1)
- STL (1)
- 软件工程 (1)
- 文章/文档 (1)
- 接口技术 (1)
- 其他 (1)
其他 If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction dis
If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction disallowing scripts to run in files opened on your local machine. When you first try to run the examples, you will most likely get a message saying, "To help protect your security, Internet Explorer has ...
嵌入式/单片机编程 Good morning, dear teachers. I am very glad to be here for your interview. my name is xx.I am 21 yea
Good morning, dear teachers. I am very glad to be here for your interview. my name is xx.I am 21 years old. I come from Dafang, a small town of Guizhou province. My undergraduate period will be accomplished in East China Jiaotong University. I major in electrical engineering and automation. I am int ...
matlab例程 Wavelet Subband coding for speaker recognition The fn will calculated subband energes as given in
Wavelet Subband coding for speaker recognition
The fn will calculated subband energes as given in the att tech paper of ruhi sarikaya and others. the fn also calculates the DCT part. using this fn and other algo for pattern classification(VQ,GMM) speaker identification could be achived. the progres ...
其他 Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a
Introduction
Computer security is undeniably important, and as new vulnerabilities are discovered and
exploited, the perceived need for new security solutions grows. "Trusted computing"
initiatives propose to solve some of today s security problems through hardware changes
to the personal computer. ...
数值算法/人工智能 anb 版的LBM程序 This code was written to show beginners in a simple and c short way the relevant proce
anb 版的LBM程序 This code was written to show beginners in a simple and
c short way the relevant procedures of a lattice Boltzmann solver,
c pointing on how everything works "in principle". Nearly all
c procedures could be implemented other (and better) as it is done
c here, and even the algorithm ...
软件设计/软件工程 Java technology is both a programming language and a platform. The Java programming language origina
Java technology is both a programming language and a platform. The Java programming language originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time o ...
中间件编程 This is a PHP search engine. It searches for text and then displays results. At the time I complet
This is a PHP search engine. It searches for text
and then displays results. At the time I completed it
it was the first of its kind. I spent many hours
looking for something like it, but could not find
anything. It searches the directory you put it in.
数学计算 pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small chang ...
书籍源码 How to control the time s equence of LM3033B- 0BR3 LCD module by C51 programming was dis cus s ed i
How to control the time s equence of LM3033B- 0BR3 LCD module by C51
programming was dis cus s ed in this paper. In this way the LCD module was driven by
parallel communication and the characters and graphics could be
were narrated in detail.
其他行业 Emdros is a text database middleware-layer aimed at storage and retrieval of "text plus information
Emdros is a text database middleware-layer aimed at storage and
retrieval of "text plus information about that text." This
information could be linguistic analyses or other annotations. Emdros
provides an abstraction of text that makes it well suited to storing
/syntactic analyses/ of text, but ot ...