搜索结果
找到约 562 项符合
second-order 的查询结果
技术管理 simple ATM [Automatic Teller Machine] system the basic functions Login including write-offs, inquiri
simple ATM [Automatic Teller Machine] system the basic functions Login including write-offs, inquiries, deposits, withdrawals and alter the code. Simulation of ATM terminal users logged in, their account numbers and passwords through the ATM network to transmit to the server, ATM database server bas ...
matlab例程 This code takes data received from a bearing and converts it from the time domain to the frequency
This code takes data received from a bearing and converts it from the time
domain to the frequency domain in order to determine bearing defect size.
SQL Server 合同与报价系统 PB8开发
合同与报价系统
PB8开发,sysbase sql anywhere7
默认密码:user:admin password:admin
ODBC设置为
Database=HxFirm
UserId=tt
ServerName=order
LogId=tt
数值算法/人工智能 FIR Filter Design This chapter treats the design of linear-phase FIR filters. The assignments are
FIR Filter Design
This chapter treats the design of linear-phase FIR filters. The assignments are
divided in two parts, the first part focuses on the design of FIR filters using the
window design method while the second part focuses on design
VC书籍 this program is insertion_sort that writted with c++. this program get an array and sort it in orde
this program is insertion_sort that writted with c++.
this program get an array and sort it in order n^2.
其他书籍 This paper shows the development of a 1024-point radix-4 FFT VHDL core for applications in hardware
This paper shows the development of a 1024-point
radix-4 FFT VHDL core for applications in hardware signal processing, targeting low-cost FPGA technologies. The developed core is targeted into a Xilinx庐 Spartan鈩?3 XC3S200 FPGA with the inclusion of a VGA display interface and an external 16-bit da ...
文章/文档 It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom
It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic
illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally
demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon ...
文章/文档 A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di
A cylindrical wave expansion method is developed to obtain the scattering field for an ideal
two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up
to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak
with the ...
文章/文档 In an electromagnetic cloak based on a transformation approach, reduced sets of material properties
In an electromagnetic cloak based on a transformation approach, reduced sets of
material properties are generally favored due to their easier implementation in reality,
although a seemingly inevitable drawback of undesired reflection exists in such cloaks.
Here we suggest using high-order transforma ...
行业发展研究 In computer vision, sets of data acquired by sampling the same scene or object at different times, o
In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessa ...