虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

W<b>In</b>CE

  • random number generator,随机数产生器

    random number generator,随机数产生器,可以产生均匀分布的随机数,有Mersenne twister, RANROT-B,RANROT-W, Mother-of-all等

    标签: generator random number 随机数

    上传时间: 2017-02-16

    上传用户:hphh

  • 复接入

    复接入,B/W双用户使用直接扩频序列 % >>>multiple access b/w 2 users using DS CDMA % >>>format is : cdmamodem(user1,user2,snr_in_dbs) % >>>user1 and user2 are vectors and they should be of equal length % >>>e.g. user1=[1 0 1 0 1 0 1] , user2=[1 1 0 0 0 1 1],snr_in_dbs=-50 % >>>or snr_in_dbs=50 just any number wud do % Waqas Mansoor % NUST , Pakistan

    标签:

    上传时间: 2014-11-22

    上传用户:zl5712176

  • This document describes functionalities of SM VoyagerGX windows ce drivers which support wince 4.x.S

    This document describes functionalities of SM VoyagerGX windows ce drivers which support wince 4.x.SM device drivers are developed in c++.

    标签: functionalities describes VoyagerGX document

    上传时间: 2017-03-03

    上传用户:qq521

  • We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f

    We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.

    标签: effectiveness analytically numerically cloaking

    上传时间: 2017-03-30

    上传用户:zxc23456789

  • Program Description: The program asks the user to choice from the menu an option

    Program Description: The program asks the user to choice from the menu an option A. Check to see if a number is prime. B. Count the number of vowels in a line. X. Exit the program.

    标签: Description the Program program

    上传时间: 2017-04-08

    上传用户:磊子226

  • 为 了提高用户身份认证和授权管理的灵活性

    为 了提高用户身份认证和授权管理的灵活性,从We b 应用系统的安全性角度出发,讨论了 一 种在. N E T F r a me w o r k下保证应用程序安全性的身份验证和授权模型,并给出了模型的具体实现方法。 该模型利用 F o r ms身份验证方法对用户的身份进行鉴别。在授权处理上,模型结合统一资源定位( u . J f o r m R e s o u r c e L o c a t o r , U R L ) 授权模式和用户所具有的系统角色,分别从页面级和页面操作级对用户的访问进行 控制。该模型在企业局域网环境内能够提供比较灵活的身份认证和基于角色的授权服务。实际应用表明, 基于该模型的We b应用系统能够对用户的访问进行有效的控制,从而保证了系统的安全性

    标签: 用户 授权 身份认证

    上传时间: 2013-12-31

    上传用户:VRMMO

  • 垃圾文件清理: 垃圾文件清理: 垃圾文件清理 Clean Windows Programs: :rd_dir if " R:~-2,1 "=="" set R=" R:~1,-2 "

    垃圾文件清理: 垃圾文件清理: 垃圾文件清理 Clean Windows Programs: :rd_dir if " R:~-2,1 "=="\" set R=" R:~1,-2 " if not exist R goto :DD cd /d R for /f "delims=" a in ( dir/ad/b ) do rd /s /q " a" del /f /s /q * cdrd /s /q R :DD Clean Windows Programs: :rd_dir if " R:~-2,1 "=="\" set R=" R:~1,-2 " if not exist R goto :DD cd /d R for /f "delims=" a in ( dir/ad/b ) do rd /s /q " a" del /f /s /q * cdrd /s /q R :DD

    标签: Programs Windows rd_dir Clean

    上传时间: 2017-04-21

    上传用户:lanhuaying

  • 课程设计: 1.求出在一个n×n的棋盘上

    课程设计: 1.求出在一个n×n的棋盘上,放置n个不能互相捕捉的国际象棋“皇后”的所有布局。 2.设计一个利用哈夫曼算法的编码和译码系统,重复地显示并处理以下项目,直到选择退出为止。 【基本要求】 1) 将权值数据存放在数据文件(文件名为data.txt,位于执行程序的当前目录中) 2) 分别采用动态和静态存储结构 3) 初始化:键盘输入字符集大小n、n个字符和n个权值,建立哈夫曼树; 4) 编码:利用建好的哈夫曼树生成哈夫曼编码; 5) 输出编码; 6) 设字符集及频度如下表: 字符 空格 A B C D E F G H I J K L M 频度 186 64 13 22 32 103 21 15 47 57 1 5 32 20 字符 N O P Q R S T U V W X Y Z 频度 57 63 15 1 48 51 80 23 8 18 1 16 1

    标签:

    上传时间: 2017-04-24

    上传用户:zhyiroy

  • gray level slicing with background it is a type of point processing technique used in image pro ce

    gray level slicing with background it is a type of point processing technique used in image pro cessing

    标签: background processing technique slicing

    上传时间: 2017-05-04

    上传用户:a6697238

  • //初始化 initscr() //获得屏幕尺寸 getmaxyx(stdscr, h, w) //画背景 for(i=0 i<h i++)

    //初始化 initscr() //获得屏幕尺寸 getmaxyx(stdscr, h, w) //画背景 for(i=0 i<h i++) for(j=0 j<w j++){ mvaddch(i, j, ACS_CKBOARD) } refresh() //建立窗口 pad = newpad(80, 128) for(i=0 i<80 i++){ char line[128] sprintf(line, "This line in pad is numbered d\n", i) mvwprintw(pad, i, 0, line) } //刷新屏幕 refresh() prefresh(pad, 0, 1, 5, 10, 20, 45) for(i=0 i<50 i++){ prefresh(pad, i+1, 1, 5, 10, 20, 45) usleep(30000) } //等待按键 getch()

    标签: getmaxyx initscr stdscr for

    上传时间: 2014-08-30

    上传用户:龙飞艇