搜索结果
找到约 218 项符合
three-dimensiona 的查询结果
其他 The worm will produce Arod.exe and " get to C: WINDOWS catalogue . After starting the machine again
The worm will produce Arod.exe and " get to C: \WINDOWS catalogue . After starting the machine again , will put worm shelf Arod.exe into C: \, C:\WINDOWS,In zip file under WINDOWS \system32 , these three catalogues ,. As the user opens Outlook Express, the worm will search Outlook Express and accept ...
数值算法/人工智能 China ancient times the official system was China ancient times in a political history science, this
China ancient times the official system was China ancient times in a political history science, this book divided three parts: The first part of all previous dynasties government system outline, the second part of introduction ancient times the government official control system, third part of all p ...
微处理器开发 In term project, we will take the baseline JPEG codec in ARM-based platform system as an example to
In term project, we will take the baseline JPEG codec in ARM-based platform system as an example to practice the design flow in SoC. We divide the project into three
parts, and the goal of each part is described as follow.
Part I: Design a baseline JPEG software codec in C/C++ and port it to ARM cor ...
数学计算 cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used
cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used to calculate a whole range of scientific functions including sin, cos, tan, arctan, arcsin, arccos, sinh, cosh, tanh, arctanh, log, exp, square root and even multiply and divide.
the method dates ba ...
matlab例程 This package is a free collection of Matlab routines for computing wave atom transforms in one, two
This package is a free collection of Matlab routines for computing
wave atom transforms in one, two and three dimensions.
文章/文档 We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f
We analyze, both analytically and numerically, the effectiveness
of cloaking an infinite cylinder from observations by electromagnetic
waves in three dimensions. We show that, as truncated approximations
of the ideal permittivity and permeability tensors tend towards
the singular ideal cloaking fiel ...
Java编程 In the bank all the activities are being done manually .As the bank widens its services & it finds d
In the bank all the activities are being done manually .As the bank widens its services & it finds difficult to manage its operations manually and hence this leads to the automation of some of its operations.
Banking Information system is a windows based applications. This project mainly deal ...
软件工程 This book is for systems architects who are interested in building security into their application
This book is for systems architects
who are interested in building security into their applications. The book is designed to
be useful to architects in three ways: as an introduction to security architecture, as a
handbook on security issues for architecture review, and as a catalog of designs to ...
文件格式 MATLAB-based program that generates plots of input power and shaft torque for variable-frequency op
MATLAB-based program that generates plots of
input power and shaft torque for variable-frequency operation of
three-phase induction motors
其他 The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for firmwa
The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for
firmware updating. The instruction set of the W78E58B is fully compatible with the standard 8052. The
W78E58B contains a 32K bytes of main ROM and a 4K bytes of auxiliary ROM which allows the
contents of t ...