may

共 454 篇文章
may 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 454 篇文章,持续更新中。

改进离散二进制粒子群算法

参考文献:M.Rostami Shahrbabak and H.Nezamabadi-pour, " A New Approach to Binary PSO Algorithm" 14th Iranian Conference on Electrical Engineering, may 2006.

Fundamental Limits on a Class of Secure

Abstract—In the future communication applications, users<br /> may obtain their messages that have different importance levels<br /> distributively from several available sources, such as distributed<

JAVA SMPP 源码

<h2 style="box-sizing:border-box;margin-bottom:16px;line-height:1.25;border-bottom:1px solid #EAECEF;padding-bottom:0.3em;color:#24292E;font-family:-apple-system, BlinkMacSystemFont, &quot;white-space

segd格式说明

地震采集数据segd格式的详细说明文档。seg_d_rev3_may2011

Memory allocation in C Dynamic memory allocation and the structures that implement it in C are so u

Memory allocation in C Dynamic memory allocation and the structures that implement it in C are so universal that they re sometimes treated as a black box. In the real world of embedded systems, that

RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digit

RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key.

卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章

卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章,全英文,2003年完成,Probabilistic Noise Identification and Data Cleaning,Real world data is never as perfect as we would like it to be and can often suffer from corruptions that ma

Information in this document is provided in connection with Intel products. No license, express or i

Information in this document is provided in connection with Intel products. No license, express or implied, by estoppels or otherwise, to any intellectual property rights is granted by this document.

You may read code because you have to-to fix it, inspect it, or improve it. You may read code the wa

You may read code because you have to-to fix it, inspect it, or improve it. You may read code the way an engineer examines a machine--to discover what makes it tick. Or you may read code because you a

This is a book about a revolution that quietly began a few years ago. It is about change in a funct

This is a book about a revolution that quietly began a few years ago. It is about change in a function that you may not have given much thought to: your payment function. It may not be very differen

Functions are mappings from one Manifold to another. Discrete Functions are functions which can be r

Functions are mappings from one Manifold to another. Discrete Functions are functions which can be represented using a finite number of values. Given the finite extent of computer memory, algorithms w

it may help to drive DS1302

it may help to drive DS1302

The Pages 2.0 specification is one of the most exciting Java Community Process releases of the year.

The Pages 2.0 specification is one of the most exciting Java Community Process releases of the year. Chances are you picked this book to learn more about the new features of 2.0. Or you may be interes

base implementaion of the protein (starting from the amino acid sequence) feature extractor used in

base implementaion of the protein (starting from the amino acid sequence) feature extractor used in "L. Nanni and A. Lumini, An ensemble of Support Vector Machines for predicting virulent proteins, Ex

This chapter enables the reader to: &#8226 Know the content and organization of this book, and how

This chapter enables the reader to: &#8226 Know the content and organization of this book, and how to use it to analyze and model radar system performance &#8226 Understand the concept of radar

A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digi

A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certific

This article discusses some issues that a typical Windows C++ programmer will encounter when approac

This article discusses some issues that a typical Windows C++ programmer will encounter when approaching Symbian OS for the first time. Our experience in developing for three successive versions of S

it an important indruction to wimax , that explans main points that may be important to all wimax re

it an important indruction to wimax , that explans main points that may be important to all wimax readers

Because WDM networks are circuit switched loss networks blocking may occur because of lack of resour

Because WDM networks are circuit switched loss networks blocking may occur because of lack of resources. Also in circuit switched networks many paths use the same links. This toolbox answers the quest

This application provides much functionality for creating data-driven reports, including preview, gr

This application provides much functionality for creating data-driven reports, including preview, graphics, and formatting. There is no documentation so you may have to work with it awhile, but there