搜索:tracking+algorithm
找到约 1,374 项符合「tracking+algorithm」的查询结果
结果 1,374
按分类筛选
- 全部
- matlab例程 (161)
- 人工智能/神经网络 (103)
- 数学计算 (77)
- 加密解密 (70)
- 技术资料 (55)
- 数值算法/人工智能 (51)
- 其他 (50)
- 数据结构 (31)
- 其他书籍 (30)
- 压缩解压 (27)
- Java编程 (26)
- 软件设计/软件工程 (20)
- 通讯/手机编程 (17)
- 文章/文档 (17)
- 书籍源码 (14)
- Linux/Unix编程 (13)
- 通讯编程文档 (13)
- 技术管理 (12)
- 行业发展研究 (11)
- 单片机开发 (10)
- DSP编程 (9)
- 文件格式 (9)
- VHDL/FPGA/Verilog (9)
- GPS编程 (9)
- 软件工程 (8)
- 电子书籍 (8)
- 系统设计方案 (8)
- JavaScript (6)
- 操作系统开发 (5)
- CA认证 (5)
- 汇编语言 (5)
- 其他嵌入式/单片机内容 (5)
- 驱动编程 (4)
- 编辑器/阅读器 (4)
- 网络 (4)
- 多国语言处理 (4)
- *行业应用 (3)
- 其他数据库 (3)
- 嵌入式/单片机编程 (3)
- STL (3)
- 中间件编程 (3)
- VC书籍 (3)
- 书籍 (3)
- 游戏 (2)
- 编译器/解释器 (2)
- 其他行业 (2)
- 生物技术 (2)
- 并行计算 (2)
- Jsp/Servlet (2)
- Linux/uClinux/Unix编程 (1)
- 设计相关 (1)
- 数据库系统 (1)
- 教程资料 (1)
- Modem编程 (1)
- 语音压缩 (1)
- 磁盘编程 (1)
- Applet (1)
- 微处理器开发 (1)
- Java书籍 (1)
- J2ME (1)
- 家庭/个人应用 (1)
- 交通/航空行业 (1)
- Windows CE (1)
- SQL Server (1)
- RFID编程 (1)
- 3G开发 (1)
- 源码 (1)
- 论文 (1)
- 习题答案 (1)
https://www.eeworm.com/dl/519/463889.html
加密解密
Algorithm Festel. Programs read from file to array byte[]. key block = 64 data block = 128 if use
Algorithm Festel.
Programs read from file to array byte[].
key block = 64
data block = 128 if use classis Festel
data block = 256 if use modification Festel
https://www.eeworm.com/dl/665/469688.html
matlab例程
genetic algorithm (or GA) is a search technique used in computing to find true or approximate soluti
genetic algorithm (or GA) is a search technique used in computing to find true or approximate solutions to optimization and search problems
for function of 2 variable
https://www.eeworm.com/dl/678/448246.html
系统设计方案
This is a simple algorithm that downloads trading data from yahoo database. It is basically a large
This is a simple algorithm that downloads trading data from yahoo database. It is basically a large scale application of sqq.m which was originally submitted by Michael Boldin, link at acknowledgements.
Some of the functionalities of the package:
- User defined ticker list. ...
https://www.eeworm.com/dl/665/450689.html
matlab例程
This code proposes genetic algorithm (GA) to optimize the point-to-point trajectory planning for a 3
This code proposes genetic algorithm (GA) to optimize the point-to-point trajectory planning for a 3-link robot arm. The objective function for the proposed GA is to minimizing traveling time and space, while not exceeding a maximum
pre-defined torque, without collision with a ...
https://www.eeworm.com/dl/633/435265.html
Java编程
this is the java code which describe the sdes algorithm and help us to encrypt the information
this is the java code which describe the sdes algorithm and help us to encrypt the information
https://www.eeworm.com/dl/684/491642.html
软件设计/软件工程
I found this document very useful. This has the algorithm for extracting the license plate from the
I found this document very useful. This has the algorithm for extracting the license plate from the image
https://www.eeworm.com/dl/531/484927.html
操作系统开发
很全很好有关操作系统B的Storage Management District Allocation Algorithm
很全很好有关操作系统B的Storage Management District Allocation Algorithm
https://www.eeworm.com/dl/626/485240.html
编辑器/阅读器
Functorized Undo/Redo .The idea to marry the algorithm with the functor was encouraging and this is
Functorized Undo/Redo .The idea to marry the algorithm with the functor was encouraging and this is example code for it
https://www.eeworm.com/dl/633/490265.html
Java编程
Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the N
Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
https://www.eeworm.com/dl/654/490559.html
数据结构
I implement Dijkstra s Single Source Shortest Path, say SSP, algorithm for directed graphs using a s
I implement Dijkstra s Single Source Shortest Path, say SSP, algorithm for directed graphs using a simple data structure, say simple scheme, Fibonacci heaps, say F-heap scheme, and Pairing heaps, say P-heap scheme, and measure the relative performance of the three implementations ...