【问题描述】已知线性方程组AX=B,求解该方程组。参考算法: 消去法:将列向量B加到矩阵A的最后一列,构成增广矩阵AB。对AB进行下列三种初等变换,使原矩阵A的部分的主对角线上的元素均为1,其余元素均为0,则原列向量B的部分即为X的值: 1. 将矩阵的一行乘以一个不为0的数 2. 将矩阵的一行加上另一行的倍数 3. 交换矩阵中两行的位置
上传时间: 2015-06-18
上传用户:stvnash
剖析Intel IA32 架构下C 语言及CPU 浮点数机制 Version 0.01 哈尔滨工业大学 谢煜波 (email: xieyubo@126.com 网址:http://purec.binghua.com) (QQ:13916830 哈工大紫丁香BBSID:iamxiaohan) 前言 这两天翻看一本C 语言书的时候,发现上面有一段这样写到 例:将同一实型数分别赋值给单精度实型和双精度实型,然后打印输出。 #include <stdio.h> main() { float a double b a = 123456.789e4 b = 123456.789e4 printf(“%f\n%f\n”,a,b) } 运行结果如下:
标签: Version xieyubo Intel email
上传时间: 2013-12-25
上传用户:徐孺
本书第一部分讲述的是传统的网络接口N e t B I O S、重定向器以及通过重定向器进行的各类 网络通信。尽管本书大部分内容均围绕Wi n s o c k编程这一主题展开,但是, A P I比起Wi n s o c k 来,仍然具有某些独到之处
上传时间: 2015-07-08
上传用户:恋天使569
加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]
标签: Cryptographic Primitives generate Library
上传时间: 2015-07-16
上传用户:wqxstar
MATLAB 6_5 辅助优化计算与设计 1、文件命名说明 a)文件夹“第1章”中的文件对应书中第1章的例程,其他以此类推; b) 文件名exampleX1_X2.m:对应例程X1_X2 例如:example2_1表示例程2_1. 2、注意 为了方便起见,书中的每一个例程存为一个文件;而有些例程中将其调用的函数文件也放在这个例程文件中,所以读者在运行光盘中的例程文件时注意这一点,如果是这样的例程文件应该将其调用的函数文件分离出来另存为一个文件。
上传时间: 2015-08-05
上传用户:王小奇
Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search main.cpp Then you can run it: ./search The input is loaded from a input file in.txt Here is the format of the input file: The first line of the input file shoud contain two chars indicate the source and destination city for breadth first and depth first algorithm. The second line of input file shoud be an integer m indicate the number of connections for the map. Following m lines describe the map, each line represents to one connection in this form: dist city1 city2, which means there is a connection between city1 and city2 with the distance dist. The following input are for A* The following line contains two chars indicate the source and destination city for A* algorithm. Then there is an integer h indicate the number of heuristic. The following h lines is in the form: city dist which means the straight-line distance from the city to B is dist.
标签: Implemented following compile command
上传时间: 2014-01-01
上传用户:lhc9102
EIA(ELECTRONIC INDUSTRIES ALLIANCE)标准文档EIA-CEA-861-B,A DTV Profile for Uncompressed High Speed Digital Interfaces。
标签: ELECTRONIC INDUSTRIES ALLIANCE EIA-CEA
上传时间: 2015-09-27
上传用户:hphh
palm编成,这种书很少,有兴趣看看 Title: Palm Programming: The Developer s Guide URL: http://safari.oreilly.com/JVXSL.asp?x=1&mode=section&sortKey=rank&sortOrder=desc&view=book&xmlid=1-56592-525-4&open=false&srchText=palm+programming&code=&h=&m=&l=1&catid=&s=1&b=1&f=1&t=1&c=1&u=1&page=0 ISBN: 1-56592-525-4 Author: Julie McKeehan/ Neil Rhodes Publisher: O Reilly Page: 478 Edition: 1st edition (December 1998) Catalog: PDA programming / Palm Format: pdf Size: 2.06M Supplier: Summary: Emerging as the bestselling hand-held computers of all time, PalmPilots have spawned intense developer activity and a fanatical following. Used by Palm in their developer training, this tutorial-style book shows intermediate to experienced C programmers how to build a Palm application from the ground up. Includes a CD-ROM with source code and third-party developer tools
标签: Programming Developer oreilly safari
上传时间: 2013-12-10
上传用户:litianchu
This I develops based on the B/S structure student managementsystem management system, hoped brings a help to the novice
标签: managementsystem management structure develops
上传时间: 2014-01-07
上传用户:钓鳌牧马
代入法的启发示搜索 我的代码实现是:按照自然语言各字母出现频率的大小从高到低(已经有人作国统计分析了)先生成一张字母出现频率统计表(A)--------(e),(t,a,o,i,n,s,h,r),(d,l),(c,u,m,w,f,g,y,p,b),(v,k,j,x,q,z) ,再对密文字母计算频率,并按频率从高到低生成一张输入密文字母的统计表(B),通过两张表的对应关系,不断用A中的字母去替换B中的字母,搜索不成功时就回退,在这里回朔是一个关键。
上传时间: 2015-10-24
上传用户:wanqunsheng