may
共 454 篇文章
may 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 454 篇文章,持续更新中。
改进离散二进制粒子群算法
参考文献:M.Rostami Shahrbabak and H.Nezamabadi-pour, " A New Approach to Binary PSO Algorithm" 14th Iranian Conference on Electrical Engineering, may 2006.
Fundamental Limits on a Class of Secure
Abstract—In the future communication applications, users<br />
may obtain their messages that have different importance levels<br />
distributively from several available sources, such as distributed<
JAVA SMPP 源码
<h2 style="box-sizing:border-box;margin-bottom:16px;line-height:1.25;border-bottom:1px solid #EAECEF;padding-bottom:0.3em;color:#24292E;font-family:-apple-system, BlinkMacSystemFont, "white-space
segd格式说明
地震采集数据segd格式的详细说明文档。seg_d_rev3_may2011
Memory allocation in C Dynamic memory allocation and the structures that implement it in C are so u
Memory allocation in C
Dynamic memory allocation and the structures that implement it in C are so universal that they re sometimes treated as a black box. In the real world of embedded systems, that
RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digit
RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key.
卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章
卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章,全英文,2003年完成,Probabilistic Noise Identification and Data Cleaning,Real world data is never as perfect as we would like it
to be and can often suffer from corruptions that ma
Information in this document is provided in connection with Intel products. No license, express or i
Information in this document is provided in connection with Intel products. No license, express or implied, by estoppels or otherwise, to any intellectual property rights is granted by this document.
You may read code because you have to-to fix it, inspect it, or improve it. You may read code the wa
You may read code because you have to-to fix it, inspect it, or improve it. You may read code the way an engineer examines a machine--to discover what makes it tick. Or you may read code because you a
This is a book about a revolution that quietly began a few years ago. It is about change in a funct
This is a book about a revolution that quietly began a few years ago.
It is about change in a function that you may not have given much
thought to: your payment function. It may not be very differen
Functions are mappings from one Manifold to another. Discrete Functions are functions which can be r
Functions are mappings from one Manifold to another. Discrete Functions are functions which can be represented using a finite number of values. Given the finite extent of computer memory, algorithms w
it may help to drive DS1302
it may help to drive DS1302
The Pages 2.0 specification is one of the most exciting Java Community Process releases of the year.
The Pages 2.0 specification is one of the most exciting Java Community Process releases of the year. Chances are you picked this book to learn more about the new features of 2.0. Or you may be interes
base implementaion of the protein (starting from the amino acid sequence) feature extractor used in
base implementaion of the protein (starting from the amino acid sequence) feature extractor used in "L. Nanni and A. Lumini, An ensemble of Support Vector Machines for predicting virulent proteins, Ex
This chapter enables the reader to: • Know the content and organization of this book, and how
This chapter enables the reader to:
• Know the content and organization of this book, and how to use it to analyze
and model radar system performance
• Understand the concept of radar
A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digi
A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities
through digital certificates. A PKI includes components that issue digital certificates and
distribute certific
This article discusses some issues that a typical Windows C++ programmer will encounter when approac
This article discusses some issues that a typical Windows C++ programmer will encounter when approaching
Symbian OS for the first time. Our experience in developing for three successive versions of S
it an important indruction to wimax , that explans main points that may be important to all wimax re
it an important indruction to wimax , that explans main points that may be important to all wimax readers
Because WDM networks are circuit switched loss networks blocking may occur because of lack of resour
Because WDM networks are circuit switched loss networks blocking may occur because of lack of resources. Also in circuit switched networks many paths use the same links. This toolbox answers the quest
This application provides much functionality for creating data-driven reports, including preview, gr
This application provides much functionality for creating data-driven reports, including preview, graphics, and formatting. There is no documentation so you may have to work with it awhile, but there