搜索结果

找到约 100 项符合 original 的查询结果

其他数据库 This application uses OleDb as a backhand communicator with the file to allow the user to : select,

This application uses OleDb as a backhand communicator with the file to allow the user to : select, delete, insert and modify the database and then save all the changes to the original file.
https://www.eeworm.com/dl/645/201455.html
下载: 139
查看: 1047

加密解密 Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The origina

Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The original Tiger Hash code was taken from Tiger.Net which is written in Visual Basic. NET. Tiger Tree Hash算法的C#实现!
https://www.eeworm.com/dl/519/206918.html
下载: 93
查看: 1174

其他嵌入式/单片机内容 This source file may be used and distributed without restriction provided that this copyright statem

This source file may be used and distributed without restriction provided that this copyright statement is not removed from the file and that any derivative work contains the original copyright notice and the associated disclaimer.
https://www.eeworm.com/dl/687/212062.html
下载: 94
查看: 1060

matlab例程 Some algorithms of variable step size LMS adaptive filtering are studied.The VS—LMS algorithm is imp

Some algorithms of variable step size LMS adaptive filtering are studied.The VS—LMS algorithm is improved. Another new non-linear function between肛and e(/ t)is established.The theoretic analysis and computer simulation results show that this algorithm converges more quickly than the origina1. ...
https://www.eeworm.com/dl/665/212270.html
下载: 107
查看: 1044

其他 In this paper we propose to reduce the textural components by modelling the coefficients of a wedg

In this paper we propose to reduce the textural components by modelling the coefficients of a wedgelet based regression tree instead of the original pixel intensities
https://www.eeworm.com/dl/534/212428.html
下载: 146
查看: 1056

其他 Input The input contains blocks of 2 lines. The first line contains the number of sticks parts afte

Input The input contains blocks of 2 lines. The first line contains the number of sticks parts after cutting, there are at most 64 sticks. The second line contains the lengths of those parts separated by the space. The last line of the file contains zero. Output The output should contains the small ...
https://www.eeworm.com/dl/534/214271.html
下载: 59
查看: 1088

数值算法/人工智能 The CUBA library provides new implementation of four general-purpose multidimensional integration al

The CUBA library provides new implementation of four general-purpose multidimensional integration algorithms: Vegas, Suave, Divonne, and Cuhre. Suave is a new algorithm, Divonne is a known algorithm to which important details have been added, and Vegas and Cuhre are new implementations of existing a ...
https://www.eeworm.com/dl/518/215323.html
下载: 70
查看: 1137

书籍源码 This CD-ROM is distributed by Kluwer Academic Publishers with ABSOLUTELY NO SUPPORT and NO WARRANTY

This CD-ROM is distributed by Kluwer Academic Publishers with ABSOLUTELY NO SUPPORT and NO WARRANTY from Kluwer Academic Publishers. Use or reproduction of the information provided on this CD-ROM for commercial gain is strictly prohibited. Explicit permission is given for the reproduction and use of ...
https://www.eeworm.com/dl/532/229593.html
下载: 56
查看: 1093

其他书籍 This document outlines what is necessary to install and run the LEACH protocol on version 2.27 of n

This document outlines what is necessary to install and run the LEACH protocol on version 2.27 of ns2. At the time of this writing, this is the newest version of ns2. The LEACH implementation was written as a stand-alone application. Thus, in the past a version compiled for LEACH may or may not work ...
https://www.eeworm.com/dl/542/240069.html
下载: 55
查看: 1052

文件格式 We present a particle filter construction for a system that exhibits time-scale separation. The sep

We present a particle filter construction for a system that exhibits time-scale separation. The separation of time-scales allows two simplifications that we exploit: i) The use of the averaging principle for the dimensional reduction of the system needed to solve for each particle and ii) the factor ...
https://www.eeworm.com/dl/639/241531.html
下载: 80
查看: 1066