搜索结果
找到约 357 项符合
different 的查询结果
按分类筛选
- 全部分类
- 书籍 (41)
- matlab例程 (28)
- 其他 (19)
- 其他书籍 (18)
- 微处理器开发 (17)
- 单片机开发 (17)
- Java编程 (16)
- 单片机编程 (14)
- 行业发展研究 (10)
- 数学计算 (9)
- 通讯/手机编程 (9)
- 技术资料 (9)
- VHDL/FPGA/Verilog (8)
- 人工智能/神经网络 (7)
- 网络 (6)
- Linux/Unix编程 (6)
- VC书籍 (6)
- 通讯编程文档 (6)
- 文件格式 (5)
- Java书籍 (5)
- 电子书籍 (5)
- 电源技术 (4)
- 可编程逻辑 (4)
- 压缩解压 (4)
- DSP编程 (4)
- 软件设计/软件工程 (4)
- Internet/网络编程 (4)
- 模拟电子 (3)
- 数值算法/人工智能 (3)
- 文章/文档 (3)
- 书籍源码 (3)
- 系统设计方案 (3)
- 其他嵌入式/单片机内容 (3)
- 加密解密 (3)
- *行业应用 (2)
- 汇编语言 (2)
- 编译器/解释器 (2)
- 交通/航空行业 (2)
- 嵌入式/单片机编程 (2)
- 技术管理 (2)
- 3G开发 (2)
- 软件工程 (2)
- 数据库系统 (2)
- 驱动编程 (2)
- 行业应用文档 (1)
- 技术书籍 (1)
- allegro (1)
- 教程资料 (1)
- 通信网络 (1)
- 无线通信 (1)
- 开发工具 (1)
- 测试测量 (1)
- 仿真技术 (1)
- GPS编程 (1)
- 数据结构 (1)
- VxWorks (1)
- Delphi/CppBuilder (1)
- J2ME (1)
- Oracle数据库 (1)
- 邮电通讯系统 (1)
- RFID编程 (1)
- STL (1)
- 手机短信编程 (1)
- BREW编程 (1)
- 教育系统应用 (1)
- 嵌入式Linux (1)
- SQL Server (1)
- Jsp/Servlet (1)
- 其他行业 (1)
- 电子政务应用 (1)
- JavaScript (1)
- 其他文档 (1)
- 学术论文 (1)
- 手册 (1)
- VIP专区 (1)
数值算法/人工智能 Rainbow is a C program that performs document classification usingone of several different methods,
Rainbow is a C program that performs document classification usingone of several different methods, including naive Bayes, TFIDF/Rocchio,K-nearest neighbor, Maximum Entropy, Support Vector Machines, Fuhr sProbabilitistic Indexing, and a simple-minded form a shrinkage withnaive Bayes.
微处理器开发 ATmega8 taillight circuitAn assembly language program that generates 5 different static patterns wit
ATmega8 taillight circuitAn assembly language program that generates 5 different static patterns with switching from pattern-to-pattern controlled by the depression of one push-button switch (S2).
微处理器开发 ATmega8 taillight circuitA more complex C program that implements different flashing patterns under
ATmega8 taillight circuitA more complex C program that implements different flashing patterns under the control of both the push buttons and potentiometer. Use your imagination to come up with some novel ideas here. Remember however that more marks are to be awarded for the quality of the code than ...
*行业应用 gperiodic is a program for browsing the periodic table and looking up data for different elements. I
gperiodic is a program for browsing the periodic table and looking up data for different elements. It also features a non-graphical interface. gperiodicOrb是一个浏览元素周期表和查询不同元素的数据的程序。它有一个非图形化的界面。
其他 FISMAT accommodates different arithmetic operators, fuzzification and defuzzification algorithm, imp
FISMAT accommodates different arithmetic operators, fuzzification and defuzzification algorithm, implication relations, and different method of approximate reasoning such as Compositional Rule of Inference (CRI) and Approximate Analogical Reasoning Scheme based on Similarity Measure.
压缩解压 The original NuLib has been ported to many different systems. Version 3.2.5 is functionally similar
The original NuLib has been ported to many different systems. Version 3.2.5 is functionally similar to v3.2.4, but the source code and documentation were cleaned up by Devin Reade, making it easier to build. NuLib2 is generally superior, but NuLib does have the advantage of running under 16-bit MS-D ...
编译器/解释器 lex and yacc, trying to identify the different words
lex and yacc, trying to identify the different words
其他书籍 1)Learn more about the capabilities in Quartus: 2)Learn to use different design entry techniques 2
1)Learn more about the capabilities in Quartus:
2)Learn to use different design entry techniques
2)Design entry methods available within Quartus Text editor,Block diagram/schematic file editor,
Quartus interface with design entry/synthesis tools from Exemplar, Synopsys, Synplicity and Viewlogic
文件格式 this a java example,it is concernging array instance,give some different type form
this a java example,it is concernging array instance,give some different type form
网络 The Network Security Response Framework (NSRF) allows for testing different computer security respon
The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.