亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

On-The-<b>Go</b>

  • DtWinVer is a C++ class which provides a comprehensive method to determine which OS the program that

    DtWinVer is a C++ class which provides a comprehensive method to determine which OS the program that calls it is running on. All methods it uses are fully documented on various articles on the MSDN CD

    標簽: which comprehensive determine DtWinVer

    上傳時間: 2013-12-23

    上傳用戶:日光微瀾

  • Description The art galleries of the new and very futuristic building of the Center for Balkan Coop

    Description The art galleries of the new and very futuristic building of the Center for Balkan Cooperation have the form of polygons (not necessarily convex). When a big exhibition is organized, watching over all of the pictures is a big security concern. Your task is that for a given gallery to write a program which finds the surface of the area of the floor, from which each point on the walls of the gallery is visible. On the figure 1. a map of a gallery is given in some co-ordinate system. The area wanted is shaded on the figure 2.

    標簽: Description futuristic galleries the

    上傳時間: 2017-02-17

    上傳用戶:1427796291

  • The BNL toolbox is a set of Matlab functions for defining and estimating the parameters of a Bayesi

    The BNL toolbox is a set of Matlab functions for defining and estimating the parameters of a Bayesian network for discrete variables in which the conditional probability tables are specified by logistic regression models. Logistic regression can be used to incorporate restrictions on the conditional probabilities and to account for the effect of covariates. Nominal variables are modeled with multinomial logistic regression, whereas the category probabilities of ordered variables are modeled through a cumulative or adjacent-categories response function. Variables can be observed, partially observed, or hidden.

    標簽: estimating parameters functions defining

    上傳時間: 2014-12-05

    上傳用戶:天誠24

  • Many CAD users dismiss schematic capture as a necessary evil in the process of creating PCB layout

    Many CAD users dismiss schematic capture as a necessary evil in the process of creating PCB layout but we have always disputed this point of view. With PCB layout now offering automation of both component placement and track routing, getting the design into the computer can often be the most time consuming element of the exercise. And if you use circuit simulation to develop your ideas, you are going to spend even more time working on the schematic.

    標簽: schematic necessary creating dismiss

    上傳時間: 2014-01-25

    上傳用戶:WMC_geophy

  • observable distribution grid are investigated. A distribution grid is observable if the state of th

    observable distribution grid are investigated. A distribution grid is observable if the state of the grid can be fully determined. For the simulations, the modified 34-bus IEEE test feeder is used. The measurements needed for the state estimation are generated by the ladder iterative technique. Two methods for the state estimation are analyzed: Weighted Least Squares and Extended Kalman Filter. Both estimators try to find the most probable state based on the available measurements. The result is that the Kalman filter mostly needs less iterations and calculation time. The disadvantage of the Kalman filter is that it needs some foreknowlegde about the state.

    標簽: distribution observable grid investigated

    上傳時間: 2014-12-08

    上傳用戶:ls530720646

  • This project demonstrates the use of secure hash functions technique to implement a file encryption

    This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.

    標簽: demonstrates encryption functions implement

    上傳時間: 2017-03-08

    上傳用戶:xuanchangri

  • This project demonstrates the use of secure hash functions technique to implement a file encryption

    This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.

    標簽: demonstrates encryption functions implement

    上傳時間: 2014-01-10

    上傳用戶:yyq123456789

  • In this project we analyze and design the minimum mean-square error (MMSE) multiuser receiver for un

    In this project we analyze and design the minimum mean-square error (MMSE) multiuser receiver for uniformly quantized synchronous code division multiple access (CDMA) signals in additive white Gaussian noise (AWGN) channels.This project is mainly based on the representation of uniform quantizer by gain plus additive noise model. Based on this model, we derive the weight vector and the output signal-to-interference ratio (SIR) of the MMSE receiver. The effects of quantization on the MMSE receiver performance is characterized in a single parameter named 鈥漞quivalent noise variance鈥? The optimal quantizer stepsize which maximizes the MMSE receiver output SNR is also determined.

    標簽: mean-square multiuser receiver project

    上傳時間: 2014-11-21

    上傳用戶:ywqaxiwang

  • simple ATM [Automatic Teller Machine] system the basic functions Login including write-offs, inquiri

    simple ATM [Automatic Teller Machine] system the basic functions Login including write-offs, inquiries, deposits, withdrawals and alter the code. Simulation of ATM terminal users logged in, their account numbers and passwords through the ATM network to transmit to the server, ATM database server based on the information to confirm the account number and password is correct, the results back to the ATM terminal. If the correct account number and password, the ATM into the next terminal interface Otherwise prompt mistakes. Cancellation notice for the operation of the server ATM transactions concluded inquiries, deposits, withdrawals and alter the code operations are first sent an order to ATM servers, ATM by the database server implementation of the corresponding operation and operating res

    標簽: write-offs Automatic functions including

    上傳時間: 2014-01-20

    上傳用戶:semi1981

  • The Bit Array structure provides a compacted arrays of Booleans, with one bit for each Boolean value

    The Bit Array structure provides a compacted arrays of Booleans, with one bit for each Boolean value. A 0 [1] bit corresponds to the Boolean value false [true], respectively. We can look at a stream of bytes as a stream of bits each byte contains 8 bits, so any n bytes hold n*8 bits. And the operation to manipulate this stream or bits array is so easy, jut read or change the bits state or make any Boolean operation on the whole bits array, like 鈥楢ND鈥? 鈥極R鈥? or 鈥榅OR鈥?

    標簽: structure compacted Booleans provides

    上傳時間: 2014-01-15

    上傳用戶:壞天使kk

主站蜘蛛池模板: 凤凰县| 汶上县| 巫溪县| 新竹市| 南康市| 宝丰县| 石家庄市| 青冈县| 新邵县| 黄冈市| 丹棱县| 扎赉特旗| 姚安县| 互助| 桓仁| 苏州市| 宣城市| 旬阳县| 遂宁市| 夹江县| 嘉祥县| 玛多县| 西昌市| 汝阳县| 保定市| 天等县| 黄山市| 栾川县| 丹巴县| 甘孜县| 台湾省| 贡山| 太仓市| 滨海县| 根河市| 黑山县| 韩城市| 泗阳县| 永嘉县| 勐海县| 印江|