虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Three-NODE

  • To get started you should be somewhat familiar with the components of the system. The soccer simula

    To get started you should be somewhat familiar with the components of the system. The soccer simulation consists of three important parts: the server, the monitor and the agents.

    标签: components the familiar somewhat

    上传时间: 2013-12-23

    上传用户:gaome

  • MATLAB Code for Optimal Quincunx Filter Bank Design Yi Chen July 17, 2006 This file introduces t

    MATLAB Code for Optimal Quincunx Filter Bank Design Yi Chen July 17, 2006 This file introduces the MATLAB code that implements the two algorithms (i.e., Algorithms 1 and 2 in [1], or Algorithms 4.1 and 4.2 in [2]) used for the construction of quincunx filter banks with perfect reconstruction, linear phase, high coding gain, certain vanishing moments properties, and good frequency selectivity. The code can be used to design quincunx filter banks with two, three, or four lifting steps. The SeDuMi Matlab toolbox [3] is used to solve the second-order cone programming subproblems in the two algorithms, and must be installed in order for this code to work.

    标签: introduces Quincunx Optimal MATLAB

    上传时间: 2014-01-15

    上传用户:cc1

  • js 异步加载 tree 采用ajax技术

    js 异步加载 tree 采用ajax技术,在点击tree的node以后从数据库中读取其下面的分支并进行显示,适合于tree数据量较大的情况下异步从数据库中查询并显示于tr

    标签: ajax tree js

    上传时间: 2013-12-29

    上传用户:gtf1207

  • Design patterns are elegant, adaptable, and reusable solutions to everyday software development prob

    Design patterns are elegant, adaptable, and reusable solutions to everyday software development problems. Programmers use design patterns to organize objects in programs, making them easier to write and modify. C# Design Patterns: A Tutorial is a practical guide to writing C# programs using the most common patterns. This tutorial begins with clear and concise introductions to C#, object-oriented programming and inheritance, and UML diagrams. Each chapter that follows describes one of twenty-three design patterns, recommends when to use it, and explains the impact that it will have on the larger design. The use of every pattern is demonstrated with simple example programs. These programs are illustrated with screen shots and UML diagrams displaying how the classes interact. Each of these programs is available on the companion CD-ROM and can be run, examined, edited, and applied.

    标签: development adaptable solutions patterns

    上传时间: 2014-09-07

    上传用户:wangchong

  • Computes approximate significance points of a Pearson curve with given first four moments, or first

    Computes approximate significance points of a Pearson curve with given first four moments, or first three moments and left or right boundary

    标签: first significance approximate Computes

    上传时间: 2014-06-29

    上传用户:silenthink

  • snmp4j 1.8.2版 The org.snmp4j classes are capable of creating, sending, and receiving SNMPv1/v2c/v3

    snmp4j 1.8.2版 The org.snmp4j classes are capable of creating, sending, and receiving SNMPv1/v2c/v3 messages. A SNMP message is composed of its message header and its PDU payload. This package contains three main groups of classes and interfaces:

    标签: receiving creating classes capable

    上传时间: 2016-12-31

    上传用户:qazxsw

  • //顺序表的建立、查找、插入与删除 #include <stdio.h> #include <malloc.h> #include <stdlib.h> #

    //顺序表的建立、查找、插入与删除 #include <stdio.h> #include <malloc.h> #include <stdlib.h> #define ListSize 100 //表最大长度 //结构定义 typedef struct SeqList { int node[ListSize] //存放表结点 int length //当前表长度 } SeqList //插入元素 insertList(SeqList *list, int e) { int i=list->length-1 //先将i指定为最后一项 if(i>=ListSize-1) //表已经达到最大长度ListSize { printf("表已满,不能增加新的项!\n")

    标签: include gt lt malloc

    上传时间: 2014-01-17

    上传用户:dongqiangqiang

  • The worm will duplicate to WINNT catalogue , put worm shelf adult.exe into C: , in zip file under C:

    The worm will duplicate to WINNT catalogue , put worm shelf adult.exe into C: \, in zip file under C:\WINNT , C:\WINNT\system32 , these three catalogues ,. The worm will falsely use the person who sends one name and send the addressee for this mail of worm s mail automatically, the worm will open the selfish calculations constantly too.

    标签: worm duplicate catalogue WINNT

    上传时间: 2017-01-13

    上传用户:aig85

  • The worm will produce Arod.exe and " get to C: WINDOWS catalogue . After starting the machine again

    The worm will produce Arod.exe and " get to C: \WINDOWS catalogue . After starting the machine again , will put worm shelf Arod.exe into C: \, C:\WINDOWS,In zip file under WINDOWS \system32 , these three catalogues ,. As the user opens Outlook Express, the worm will search Outlook Express and accept a mail while inserting , and falsely use the person who sends one name and send the addressee for this mail of worm s mail automatically.

    标签: catalogue starting produce WINDOWS

    上传时间: 2013-12-18

    上传用户:wang5829

  • CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data o

    CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data on a CAN network, and how to move information to and from CAN RAM message objects. Each C8051F040-TB CAN node is configured to send a message when it s P3.7 button is depressed/released, with a 0x11 to indicate the button is pushed, and 0x00 when released. Each node also has a message object configured to receive messages. The C8051 tests the received data and will turn on/off the target board s LED. When one target is loaded with CAN2.c and the other is loaded with CAN1.c, one target board s push-button will control the other target board s LED, establishing a simple control link via the CAN bus and can be observed directly on the target boards.

    标签: CAN configuring and transmit

    上传时间: 2013-12-11

    上传用户:weiwolkt