搜索结果

找到约 268 项符合 implement 的查询结果

VC书籍 The source code of Travelling Salesman Problem. Implement in Visual C++.

The source code of Travelling Salesman Problem. Implement in Visual C++.
https://www.eeworm.com/dl/686/332313.html
下载: 190
查看: 1161

其他书籍 论文《research_and_implement_distributed_intrusion_detection_system_on_mobile_agent》

论文《research_and_implement_distributed_intrusion_detection_system_on_mobile_agent》
https://www.eeworm.com/dl/542/365973.html
下载: 109
查看: 1018

通讯/手机编程 Implement a Rayleigh fading channel simulator based on the Filtered Gaussian Noise method

Implement a Rayleigh fading channel simulator based on the Filtered Gaussian Noise method
https://www.eeworm.com/dl/527/390032.html
下载: 102
查看: 1123

压缩解压 This toolbox contains Matlab files that implement the nonsubsample contourlet transform and its util

This toolbox contains Matlab files that implement the nonsubsample contourlet transform and its utility functions. Some Matlab files are the same as those in Contourlet Toolbox.
https://www.eeworm.com/dl/617/391686.html
下载: 94
查看: 1064

数值算法/人工智能 自行implement的k-mean(含fuzzy c mean)

自行implement的k-mean(含fuzzy c mean),可以直接於vc++針對大量數據進行分群的動作
https://www.eeworm.com/dl/518/400613.html
下载: 131
查看: 1062

文章/文档 An Empirical Study on Effectiveness and Impact Factors Analysis of Enterprise Implement ERP System

An Empirical Study on Effectiveness and Impact Factors Analysis of Enterprise Implement ERP System
https://www.eeworm.com/dl/652/402061.html
下载: 23
查看: 1071

VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/686/413130.html
下载: 134
查看: 1101

加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/519/413134.html
下载: 97
查看: 1093

其他书籍 an ebook describing cryptographic protocols in a suitable way for developers to implement them easil

an ebook describing cryptographic protocols in a suitable way for developers to implement them easily in certain ways.
https://www.eeworm.com/dl/542/427086.html
下载: 64
查看: 1108

Java编程 Specification File adjacencyListGragh class GeneralGraph: use adjacency list to implement the gr

Specification File adjacencyListGragh class GeneralGraph: use adjacency list to implement the graph which data structure is vector Construct methods: * public GeneralGraph(): contain an empty vector store the vertex and a boolean determines whether graph is directed or not, defaulted is undirecte ...
https://www.eeworm.com/dl/633/441581.html
下载: 119
查看: 1061