搜索结果

找到约 389 项符合 higher-Order 的查询结果

SQL Server 合同与报价系统 PB8开发

合同与报价系统 PB8开发,sysbase sql anywhere7 默认密码:user:admin password:admin ODBC设置为 Database=HxFirm UserId=tt ServerName=order LogId=tt
https://www.eeworm.com/dl/689/416100.html
下载: 79
查看: 1028

VC书籍 this program is insertion_sort that writted with c++. this program get an array and sort it in orde

this program is insertion_sort that writted with c++. this program get an array and sort it in order n^2.
https://www.eeworm.com/dl/686/418248.html
下载: 25
查看: 1090

其他书籍 This paper shows the development of a 1024-point radix-4 FFT VHDL core for applications in hardware

This paper shows the development of a 1024-point radix-4 FFT VHDL core for applications in hardware signal processing, targeting low-cost FPGA technologies. The developed core is targeted into a Xilinx庐 Spartan鈩?3 XC3S200 FPGA with the inclusion of a VGA display interface and an external 16-bit da ...
https://www.eeworm.com/dl/542/418811.html
下载: 70
查看: 1046

文章/文档 It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom

It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon ...
https://www.eeworm.com/dl/652/421399.html
下载: 42
查看: 1073

文章/文档 A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di

A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak with the ...
https://www.eeworm.com/dl/652/421405.html
下载: 181
查看: 1092

文章/文档 In an electromagnetic cloak based on a transformation approach, reduced sets of material properties

In an electromagnetic cloak based on a transformation approach, reduced sets of material properties are generally favored due to their easier implementation in reality, although a seemingly inevitable drawback of undesired reflection exists in such cloaks. Here we suggest using high-order transforma ...
https://www.eeworm.com/dl/652/421409.html
下载: 155
查看: 1048

行业发展研究 In computer vision, sets of data acquired by sampling the same scene or object at different times, o

In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessa ...
https://www.eeworm.com/dl/692/422791.html
下载: 65
查看: 1046

加密解密 SA Encryption and Decryption using Matlab The program set contains thirteen files listed below.

SA Encryption and Decryption using Matlab The program set contains thirteen files listed below. errormeg.fig errormsg.m helpmsg.fig helpmsg.m inputmsg.fig inputmsg.m mesgcut.m pro2.fig pro2.m rsacore.m readme.txt screenshot.gif In order to run the program please call pro2.m under Matlab 6.0 Envi ...
https://www.eeworm.com/dl/519/424230.html
下载: 21
查看: 1053

Delphi控件源码 1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click

1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click on Security button in order to Add/Remove users and set user rights. Once you entered Security dialog you may select your Supervisor password. 2. Click OK when finished configuring users. Don t forg ...
https://www.eeworm.com/dl/666/424794.html
下载: 178
查看: 1102

编译器/解释器 c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlyin

c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths ...
https://www.eeworm.com/dl/628/425099.html
下载: 77
查看: 1078