虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

f<b>or</b>

  • 黄金分割法求极小

    黄金分割法求极小,返回值fm为函数极小值,tm为极小值点,f为给定函数,t为函数变量,[a,b]为变量t的搜索区间

    标签: 分割

    上传时间: 2017-01-23

    上传用户:Miyuki

  • This document provides guidelines and describes how to easily port S60 2nd Edition C++ application

    This document provides guidelines and describes how to easily port S60 2nd Edition C++ applications to S60 3rd Edition. The document has been written based on experiences of porting regular S60 2nd Edition applications, such as the S60 Platform: POP/IMAP Example [4] that can be downloaded from Forum Nokia. Code snippets from the example are shown in Chapter 8, “Application build changes,” and in Appendix A, “Code example." In addition, Appendix B, "Commonly used functions that require capabilities," and Appendix C, "Commonly used interfaces that have been changed or removed," provide useful information on some frequently used functions and interfaces in third-party applications.

    标签: application guidelines describes document

    上传时间: 2017-01-29

    上传用户:wang5829

  • tensor   向量的推广。在一个坐标系下

    tensor   向量的推广。在一个坐标系下,由若干个数(称为分量)来表示,而在不同坐标系下的分量之间应满足一定的变换规则,如矩阵、多变量线性形式等。一些物理量如弹性体的应力、应变以及运动物体的能量动量等都需用张量来表示。在微分几何的发展中,C.F.高斯、B.黎曼、E.B.克里斯托费尔等人在19世纪就导入了张量的概念,随后由G.里奇及其学生T.列维齐维塔发展成张量分析,A.爱因斯坦在其广义相对论中广泛地利用了张量。

    标签: tensor 向量 坐标系

    上传时间: 2014-01-20

    上传用户:silenthink

  • 复接入

    复接入,B/W双用户使用直接扩频序列 % >>>multiple access b/w 2 users using DS CDMA % >>>format is : cdmamodem(user1,user2,snr_in_dbs) % >>>user1 and user2 are vectors and they should be of equal length % >>>e.g. user1=[1 0 1 0 1 0 1] , user2=[1 1 0 0 0 1 1],snr_in_dbs=-50 % >>>or snr_in_dbs=50 just any number wud do % Waqas Mansoor % NUST , Pakistan

    标签:

    上传时间: 2014-11-22

    上传用户:zl5712176

  • 【问题描述】 设计一个利用哈夫曼算法的编码和译码系统

    【问题描述】 设计一个利用哈夫曼算法的编码和译码系统,重复地显示并处理以下项目,直到选择退出为止。 【基本要求】 (1)初始化:键盘输入字符集大小n、n个字符和n个权值,建立哈夫曼树; (2)编码:利用建好的哈夫曼树生成哈夫曼编码; (3)输出编码; (4)设字符集及频度如下表: 字符:A B C D E F 频度:4 9 23 2 17 15 字符:G H I J K 频度:1 2 3 3 4

    标签: 哈夫曼算法 编码 译码

    上传时间: 2017-03-07

    上传用户:qwe1234

  • 本程序是ARM7系列下LPC2148的例程

    本程序是ARM7系列下LPC2148的例程,通过K7I开发板实现的数码管显示 1-2-3-4-5-6-7-8-9-0-A-b-C-d-E-F

    标签: ARM7 2148 LPC 程序

    上传时间: 2017-03-30

    上传用户:1966640071

  • We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f

    We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.

    标签: effectiveness analytically numerically cloaking

    上传时间: 2017-03-30

    上传用户:zxc23456789

  • Creating barcodes in Microsoft庐 Office has never been easier. With BarCodeWiz Toolbar you can add b

    Creating barcodes in Microsoft庐 Office has never been easier. With BarCodeWiz Toolbar you can add barcodes to Microsoft庐 Office applications with a click of a button. In Microsoft庐 Word, create single barcodes, pages of labels, or mail merge documents. In Microsoft庐 Excel庐, select a range of cells and automatically convert each cell to a barcode. In Microsoft庐 Access庐, create reports with barcodes based on your data tables.

    标签: BarCodeWiz Microsoft Creating barcodes

    上传时间: 2013-12-18

    上传用户:asddsd

  • 为 了提高用户身份认证和授权管理的灵活性

    为 了提高用户身份认证和授权管理的灵活性,从We b 应用系统的安全性角度出发,讨论了 一 种在. N E T F r a me w o r k下保证应用程序安全性的身份验证和授权模型,并给出了模型的具体实现方法。 该模型利用 F o r ms身份验证方法对用户的身份进行鉴别。在授权处理上,模型结合统一资源定位( u . J f o r m R e s o u r c e L o c a t o r , U R L ) 授权模式和用户所具有的系统角色,分别从页面级和页面操作级对用户的访问进行 控制。该模型在企业局域网环境内能够提供比较灵活的身份认证和基于角色的授权服务。实际应用表明, 基于该模型的We b应用系统能够对用户的访问进行有效的控制,从而保证了系统的安全性

    标签: 用户 授权 身份认证

    上传时间: 2013-12-31

    上传用户:VRMMO

  • 垃圾文件清理: 垃圾文件清理: 垃圾文件清理 Clean Windows Programs: :rd_dir if " R:~-2,1 "=="" set R=" R:~1,-2 "

    垃圾文件清理: 垃圾文件清理: 垃圾文件清理 Clean Windows Programs: :rd_dir if " R:~-2,1 "=="\" set R=" R:~1,-2 " if not exist R goto :DD cd /d R for /f "delims=" a in ( dir/ad/b ) do rd /s /q " a" del /f /s /q * cdrd /s /q R :DD Clean Windows Programs: :rd_dir if " R:~-2,1 "=="\" set R=" R:~1,-2 " if not exist R goto :DD cd /d R for /f "delims=" a in ( dir/ad/b ) do rd /s /q " a" del /f /s /q * cdrd /s /q R :DD

    标签: Programs Windows rd_dir Clean

    上传时间: 2017-04-21

    上传用户:lanhuaying