希爾排序(縮小增量法) 排序過程:先取一個正整數d1<n,把所有相隔d1的記錄放一組,組內進行直接插入排序;然后取d2<d1,重復上述分組和排序操作;直至Di=1,即所有記錄放進一個組中排序為止
上傳時間: 2013-12-30
上傳用戶:waizhang
For solving the following problem: "There is No Free Lunch" Time Limit: 1 Second Memory Limit: 32768 KB One day, CYJJ found an interesting piece of commercial from newspaper: the Cyber-restaurant was offering a kind of "Lunch Special" which was said that one could "buy one get two for free". That is, if you buy one of the Dishes on their menu, denoted by Di with price pi , you may get the two neighboring Dishes Di-1 and Di+1 for free! If you pick up d1, then you may get d2 and the last one dn for free, and if you choose the last one dn, you may get dn-1 and d1 for free. However, after investigation CYJJ realized that there was no free lunch at all. The price pi of the i-th Dish was actually calculated by adDing up twice the cost ci of the Dish and half of the costs of the two "free" Dishes. Now given all the prices on the menu, you are asked to help CYJJ find the cost of each of the Dishes.
標簽: Limit following solving problem
上傳時間: 2014-01-12
上傳用戶:362279997
四種聚類算法源代碼及示例代碼,本程序的最終目的是形成一套標準的用于聚類、可擴展的工具。包括的內容有1. 聚類算法:Kmeans和Kmedoid算法、FCMclust, GKclust, GGclust算法 2. 評估分類原型:程序可以在二維圖像上繪制出聚類的結果 3. 驗證:程序給每一個算法提供驗證機制,每個聚類算法會統計Partition Coefficient (PC), Classification Entropy (CE), Partition Index (SC), Separation Index (S), Xie and Beni s Index (XB), Dunn s Index (Di) and Alternative Dunn Index (DiI)幾種衡量指標。
標簽: FCMclust GKclust GGclust Kmedoid
上傳時間: 2013-12-17
上傳用戶:13160677563
摩斯密碼電子鎖 電報最早是由美國的摩爾斯在1844年發明的,故也被叫做摩爾斯電碼。它由兩種基本信號和不同的間隔時間組成:短促的點信號" .", 讀" 嘀 "(Di);保持一定時間的長信號"—",讀"嗒 "(Da)。間隔時間:"嘀"1t;"嗒"3t;"滴嗒"間1t;字母間3t;字間5t。
上傳時間: 2013-12-23
上傳用戶:zhuimenghuaDie
Please read your package and describe it at least 40 bytes. System will automatically delete the Directory of debug and release
標簽: automatically describe package Please
上傳時間: 2014-12-03
上傳用戶:hzy5825468
system verilog This Directory has all the examples in chapter 1. The examples are in Different Directories. The table below lists the location of hte examples.
標簽: examples Directory Different chapter
上傳時間: 2017-03-05
上傳用戶:FreeSky
Please read your package and describe it at least 40 bytes. System will automatically delete the Directory of debug and release, so please do not put files on these two Directory
標簽: automatically describe package Please
上傳時間: 2014-02-15
上傳用戶:集美慧
Please read your package and describe it at least 40 bytes. System will automatically delete the Directory of debug and release, so please do not put files on these two Directory.
標簽: automatically describe package Please
上傳時間: 2017-03-28
上傳用戶:372825274
A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-Dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak with the ideal material parameters is a perfect invisibility cloak by systematically studying the change of the scattering coefficients from the near-ideal case to the ideal one. However, due to the slow convergence of the zeroth order scattering coefficients, a tiny perturbation on the cloak would induce a noticeable field scattering and penetration.
標簽: cylindrical scattering expansion developed
上傳時間: 2017-03-30
上傳用戶:lhc9102
通過vb與鴻格7000系列模塊進行通訊,與Di通訊源碼
上傳時間: 2014-11-17
上傳用戶:qazxsw