搜索结果
找到约 209 项符合
zero-mean 的查询结果
Java书籍 A Java virtual machine instruction consists of an opcode specifying the operation to be performed, f
A Java virtual machine instruction consists of an opcode specifying the operation to be performed, followed by zero or more operands embodying values to be operated upon. This chapter gives details about the format of each Java virtual machine instruction and the operation it performs.
Java书籍 A Java virtual machine instruction consists of an opcode specifying the operation to be performed, f
A Java virtual machine instruction consists of an opcode specifying the operation to be performed, followed by zero or more operands embodying values to be operated upon. This chapter gives details about the format of each Java virtual machine instruction and the operation it performs.
Java书籍 A Java virtual machine instruction consists of an opcode specifying the operation to be performed, f
A Java virtual machine instruction consists of an opcode specifying the operation to be performed, followed by zero or more operands embodying values to be operated upon. This chapter gives details about the format of each Java virtual machine instruction and the operation it performs.
Java书籍 A Java virtual machine instruction consists of an opcode specifying the operation to be performed, f
A Java virtual machine instruction consists of an opcode specifying the operation to be performed, followed by zero or more operands embodying values to be operated upon. This chapter gives details about the format of each Java virtual machine instruction and the operation it performs.
数学计算 The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: he
The tar file contains the following files:
ptfsf.c: heart of the perfect TFSF code
ptfsf.h: header file for same
ptfsf-demo.c: FDTD code which demonstrates use of perfect TFSF code. Essentially this program used to generate results shown in the paper
ptfsf-file-maker.c: code to generate an inci ...
人工智能/神经网络 bayeserr - Computes the Bayesian risk for optimal classifier. % bayescln - Classifier based on Baye
bayeserr - Computes the Bayesian risk for optimal classifier.
% bayescln - Classifier based on Bayes decision rule for Gaussians.
% bayesnd - Discrim. function, dichotomy, max aposteriori probability.
% bhattach - Bhattacharya s upper limit of mean class. error.
% pbayescln - Plots discriminat f ...
Linux/Unix编程 The Reed-Somolon code is specified by the finite field, the length (length <= 2^m-1), the numbe
The Reed-Somolon code is specified by the finite field, the length
(length <= 2^m-1), the number of redundant symbols (length-k), and
the initial zero of the code, init_zero, such that the zeros are:
init_zero, init_zero+1, ..., init_zero+length-k-1
书籍源码 zemax源码: This DLL models a standard ZEMAX surface type, either plane, sphere, or conic The surfac
zemax源码:
This DLL models a standard ZEMAX surface type, either plane, sphere, or conic
The surface also demonstrates a user-defined apodization filter
The filter is defined as part of the real ray trace, case 5
The filter can be used at the stop to produce x-y Gaussian apodization similar to t ...
单片机开发 MODE_Switch1Processing multi-interrupt request needs to set the priority of these interrupt requests
MODE_Switch1Processing multi-interrupt request needs to set the priority of these interrupt requests.
The IRQ flags of the 7 interrupt are controlled by the interrupt event occurring. But the
IRQ flag set doesn t mean the system to execute the interrupt vector. The IRQ flags can be
triggered by the ...
系统设计方案 This article describes Atmel’s FingerChip technology for electronic fingerprint sensing that combin
This article describes Atmel’s FingerChip technology for electronic fingerprint sensing that
combines the advantages of small size, low cost, high accuracy, zero maintenance, low energy
consumption and portability. This technology has applications in a wide range of fixed and
portable secured devic ...