搜索结果
找到约 389 项符合
higher-Order 的查询结果
SQL Server 合同与报价系统 PB8开发
合同与报价系统
PB8开发,sysbase sql anywhere7
默认密码:user:admin password:admin
ODBC设置为
Database=HxFirm
UserId=tt
ServerName=order
LogId=tt
VC书籍 this program is insertion_sort that writted with c++. this program get an array and sort it in orde
this program is insertion_sort that writted with c++.
this program get an array and sort it in order n^2.
其他书籍 This paper shows the development of a 1024-point radix-4 FFT VHDL core for applications in hardware
This paper shows the development of a 1024-point
radix-4 FFT VHDL core for applications in hardware signal processing, targeting low-cost FPGA technologies. The developed core is targeted into a Xilinx庐 Spartan鈩?3 XC3S200 FPGA with the inclusion of a VGA display interface and an external 16-bit da ...
文章/文档 It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom
It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic
illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally
demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon ...
文章/文档 A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di
A cylindrical wave expansion method is developed to obtain the scattering field for an ideal
two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up
to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak
with the ...
文章/文档 In an electromagnetic cloak based on a transformation approach, reduced sets of material properties
In an electromagnetic cloak based on a transformation approach, reduced sets of
material properties are generally favored due to their easier implementation in reality,
although a seemingly inevitable drawback of undesired reflection exists in such cloaks.
Here we suggest using high-order transforma ...
行业发展研究 In computer vision, sets of data acquired by sampling the same scene or object at different times, o
In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessa ...
加密解密 SA Encryption and Decryption using Matlab The program set contains thirteen files listed below.
SA Encryption and Decryption using Matlab
The program set contains thirteen files listed below.
errormeg.fig
errormsg.m
helpmsg.fig
helpmsg.m
inputmsg.fig
inputmsg.m
mesgcut.m
pro2.fig
pro2.m
rsacore.m
readme.txt
screenshot.gif
In order to run the program please call pro2.m under Matlab 6.0 Envi ...
Delphi控件源码 1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click
1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click on Security button
in order to Add/Remove users and set user rights. Once you entered Security dialog you may select your Supervisor password.
2. Click OK when finished configuring users. Don t forg ...
编译器/解释器 c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlyin
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths ...