虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

not-setup-CHINESE

  • 在三次样条中

    在三次样条中,要寻找三次多项式,以逼近每对数据点间的曲线。在样条术语中,这些数据点称之为断点。因为,两点只能决定一条直线,而在两点间的曲线可用无限多的三次多项式近似。因此,为使结果具有唯一性。在三次样条中,增加了三次多项式的约束条件。通过限定每个三次多项式的一阶和二阶导数,使其在断点处相等,就可以较好地确定所有内部三次多项式。此外,近似多项式通过这些断点的斜率和曲率是连续的。然而,第一个和最后一个三次多项式在第一个和最后一个断点以外,没有伴随多项式。因此必须通过其它方法确定其余的约束。最常用的方法,也是函数spline所采用的方法,就是采用非扭结(not-a-knot)条件。这个条件强迫第一个和第二个三次多项式的三阶导数相等。对最后一个和倒数第二个三次多项式也做同样地处理。

    标签: 三次样条

    上传时间: 2015-05-12

    上传用户:bcjtao

  • RFC1661 PPP协议 (RFC1661 The Point-to-Point Protocol (PPP)) 本备忘录状态 This memo provides informatio

    RFC1661 PPP协议 (RFC1661 The Point-to-Point Protocol (PPP)) 本备忘录状态 This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited.

    标签: 1661 Point-to-Point informatio RFC

    上传时间: 2014-12-07

    上传用户:569342831

  • The LT® 1529/LT1529-3.3/LT1529-5 are 3A low dropout regulators with micropower quiescent current

    The LT® 1529/LT1529-3.3/LT1529-5 are 3A low dropout regulators with micropower quiescent current and shutdown. The devices are capable of supplying 3A of output current with a dropout voltage of 0.6V. Designed for use in battery-powered systems, the low quiescent current, 50mA operating and 16mA in shutdown, make them an ideal choice. The quiescent current is well controlled it does not rise in dropout as it does with many other low dropout PNP regulators.

    标签: 1529 micropower regulators quiescent

    上传时间: 2013-12-17

    上传用户:qiao8960

  • The module LSQ is for unconstrained linear least-squares fitting. It is based upon Applied Statisti

    The module LSQ is for unconstrained linear least-squares fitting. It is based upon Applied Statistics algorithm AS 274 (see comments at the start of the module). A planar-rotation algorithm is used to update the QR- factorization. This makes it suitable for updating regressions as more data become available. The module contains a test for singularities which is simpler and quicker than calculating the singular-value decomposition. An important feature of the algorithm is that it does not square the condition number. The matrix X X is not formed. Hence it is suitable for ill- conditioned problems, such as fitting polynomials. By taking advantage of the MODULE facility, it has been possible to remove many of the arguments to routines. Apart from the new function VARPRD, and a back-substitution routine BKSUB2 which it calls, the routines behave as in AS 274.

    标签: least-squares unconstrained Statisti Applied

    上传时间: 2015-05-14

    上传用户:aig85

  • I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco

    I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. II. Screenshots $ ./kill-bill.pl . kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007) by Solar Eclipse <solareclipse@phreedom.org> Usage: kill-bill -p <port> -s <service> host Services: iis IIS HTTP server (port 80) iis-ssl IIS HTTP server with SSL (port 443) exchange Microsoft Exchange SMTP server (port 25) smb-nbt SMB over NetBIOS (port 139) smb SMB (port 445) If a service is running on its default port you don t have to specify both the service and the port. Examples: kill-bill -s iis 192.168.0.1 kill-bill -p 80 192.168.0.1 kill-bill -p 1234 -s smb 192.168.0.1

    标签: I. vulnerability Introduction undisclosed

    上传时间: 2015-05-15

    上传用户:xhz1993

  • ARM下 Implement matrix multiplication of 2 square matrices, with data read from an input file and pri

    ARM下 Implement matrix multiplication of 2 square matrices, with data read from an input file and printed both to the console and to an output file. • Assume a file with correct data (no garbage, characters, etc.). • you must check and provide appropriate execution for 2 extra cases, namely when the matrix size given is either “0” , or when the size is greater than the maximum handled of “5” . In these 2 cases you must implement the following behaviour: o If size = 0, then print a message “Size = 0 is unacceptable” and continue by reading the next size for the next 2 matrices (if not end of file). o If size >5, then print two messages: “Size is too big - unacceptable”. Then read and discard the next (size2 ) integers and continue by reading the next size for the next 2 matrices (if not end of file).

    标签: multiplication Implement matrices matrix

    上传时间: 2014-08-30

    上传用户:dsgkjgkjg

  • Easy installation Support servers like Tomcat, Resin, WebSphere, WebLogic etc. Multi-languages(E

    Easy installation Support servers like Tomcat, Resin, WebSphere, WebLogic etc. Multi-languages(English/Chinese...) Support RSS 2.0 RSS syndication Unlimited XML news source Customizable fetch time interval Customizable max entry count Customizable max content size

    标签: Multi-languages installation WebSphere WebLogic

    上传时间: 2014-01-03

    上传用户:懒龙1988

  • abel Tool Sample Requires: Visual Basic 6 and MapObjects 2.x Data: redlands.shp (Redlands sample

    abel Tool Sample Requires: Visual Basic 6 and MapObjects 2.x Data: redlands.shp (Redlands sample data set from MO 2.x) Interactive Labeling Tool If the check box is checked, then the mouse down location will search for the closest line, and label it with the street name. If the check box is not checked, then the mouse down will turn into a pan/zoom tool. There is a slider bar to control the search tolerance in screen pixels for the labeling.

    标签: MapObjects Requires Redlands redlands

    上传时间: 2013-12-17

    上传用户:sunjet

  • 从dos下装载内核

    从dos下装载内核,运行。AA为工具软件,它在当前目录下读取Image文件,去掉前面的bootsect和setup程序,仅剩下内核 main.c和loader.asm为主程序文件。

    标签: dos 内核

    上传时间: 2013-11-29

    上传用户:lingzhichao

  • Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to w

    Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to work in the random access memory(RAM). Some of them do provide some mechanism for dumping the whole tree into a file and loading it back to the memory in order to make data in that tree persistent. It serves well when there s just small amount of data. When the tree is somewhat bigger, the dumping/loading process could take a lengthy time and makes your mission-critical program less efficient. How about an AVL tree that can directly use the disk for data storage ? If there s something like that, we won t need to read through the whole tree in order to pick up just a little bit imformation(a node), but read only the sectors that are neccssary for locating a certain node and the sectors in which that node lies. This is my initial motivation for writing a storage-media independent AVL Tree. However, as you step forth, you would find that it not only works fine with disks but also fine with memorys, too.

    标签: available libraries Although nearly

    上传时间: 2014-01-22

    上传用户:zhoujunzhen