搜索结果
找到约 8,542 项符合
with-code 的查询结果
金融证券系统 This package contains the following source code files: - demo.c Demo application sourc
This package contains the following source code files:
- demo.c
Demo application source, with message packing/unpacking example
- benchmark.c
Benchmark source, to benchmark pack/unpack operations
- dl_c_iso8583_v0_0_3 (16th July 2008)
DL ISO-8583 library source files
...
数学计算 This is a code of Pseudo-Arc Length Continuation Method , the method can be used for solving the non
This is a code of Pseudo-Arc Length Continuation Method , the method can be used for solving the nonlinear equations, the principle can re found in some text books.
In the code,I prove the agreement of the code with other methods
matlab例程 H. Yang, A.P. Petropulu, X. Yang and T. Camp, ?ALLIANCES with Optimal Relay Selection,"IEEE Trans. o
H. Yang, A.P. Petropulu, X. Yang and T. Camp, ?ALLIANCES with Optimal Relay Selection,"IEEE Trans. on Vehicular Technology, January 2008. (MATLAB Code)
加密解密 Huffman codes 1.In telecommunication, how do we represent a set of messages, each with an access fr
Huffman codes
1.In telecommunication, how do we represent a set of messages, each with an access frequency, by a sequence of 0 s and 1 s?
2.To minimize the transmission and decoding costs, we may use short strings to represent more frequently used messages.
3.This problem can be solved by using an e ...
手机短信编程 This is full set of procedures used to communicate with any GSM module for SMS sending/receiving (
This is full set of procedures used to communicate with
any GSM module for SMS sending/receiving (it uses standard AT commands).
Original code is for ATMega162 microcontroller, but code is general to
be easy ported to others platforms.
Code can be compiled with IAR AVR compiler.
微处理器开发 configure HID devices like USB mouse with A91SAM7SE CPU. Inlcude initilization for necessary periphe
configure HID devices like USB mouse with A91SAM7SE CPU. Inlcude initilization for necessary peripherials. Developer can modify this piece code to do their development on HID devices. This is speically for GNU
软件工程 the second volume for intel processor documentation it continues first volume with more processor ac
the second volume for intel processor documentation it continues first volume with more processor acces code and specs
matlab例程 This code proposes genetic algorithm (GA) to optimize the point-to-point trajectory planning for a 3
This code proposes genetic algorithm (GA) to optimize the point-to-point trajectory planning for a 3-link robot arm. The objective function for the proposed GA is to minimizing traveling time and space, while not exceeding a maximum
pre-defined torque, without collision with any obstacle in the r ...
数学计算 The code performs a number (ITERS) of iterations of the Bailey s 6-step FFT alg
The code performs a number (ITERS) of iterations of the
Bailey s 6-step FFT algorithm (following the ideas in the
CMU Task parallel suite).
1.- Generates an input signal vector (dgen) with size
n=n1xn2 stored in row major order
...
人工智能/神经网络 A complete implementation of neural network with different example of training set generation. http
A complete implementation of neural network with different example of training set generation.
http://takinginitiative.wordpress.com/2008/04/23/basic-neural-network-tutorial-c-implementation-and-source-code/