亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

When

  • WiseMAC is a medium access control protocol designed for the WiseNETTMwireless sensor network. It i

    WiseMAC is a medium access control protocol designed for the WiseNETTMwireless sensor network. It is based on CSMA and uses the preamble sampling technique to minimize the power consumed When listening to an idle medium.

    標簽: WiseNETTMwireless designed protocol WiseMAC

    上傳時間: 2014-01-20

    上傳用戶:x4587

  • Like many of my colleagues in this industry, I learned Windows programming from Charles Petzold s Pr

    Like many of my colleagues in this industry, I learned Windows programming from Charles Petzold s Programming Windows—a classic programming text that is the bible to an entire generation of Windows programmers. When I set out to become an MFC programmer in 1994, I went shopping for an MFC equivalent to Programming Windows. After searching in vain for such a book and spending a year learning MFC the old-fashioned way, I decided to write one myself. It s the book you hold in your hands. And it s the book I would like to have had When I was learning to program Windows the MFC way.

    標簽: programming colleagues industry Charles

    上傳時間: 2014-01-10

    上傳用戶:曹云鵬

  • The running time of quicksort can be improved in practice by taking advantage of the fast running t

    The running time of quicksort can be improved in practice by taking advantage of the fast running time of insertion sort When its input is “nearly” sorted. When quicksort is called on a subarray with fewer than k elements, let it simply return without sorting the subarray. After the top-level call to quicksort returns, run insertion sort on the entire array to finish the sorting process.

    標簽: running advantage quicksort improved

    上傳時間: 2013-12-01

    上傳用戶:梧桐

  • Behavioral models are used in games and computer graphics for realistic simulation of massive crowd

    Behavioral models are used in games and computer graphics for realistic simulation of massive crowds. In this paper, we present a GPU based implementation of Reynolds [1987] algorithm for simulating flocks of birds and propose an extension to consider environment self occlusion. We performed several experiments and the results showed that the proposed approach runs up to three times faster than the original algorithm When simulating high density crowds, without compromising significantly the original crowd behavior.

    標簽: Behavioral simulation realistic computer

    上傳時間: 2017-09-08

    上傳用戶:hanli8870

  • As a general rule, PhD students and their supervisors tend to focus primarily, or even exclusively,

    As a general rule, PhD students and their supervisors tend to focus primarily, or even exclusively, on the content of the research that will go into the doctoral thesis. Other issues are often taken for granted: how to organize your work, give a presentation, work in a team, cope with your supervisor, and how to effectively manage your time.When asked, former PhD students usually claim that the general experience of being a graduate student, which includes learning how to solve complex problems and work well with others, was of greater value to their careers than the actual topic of their thesis.

    標簽: exclusively supervisors primarily students

    上傳時間: 2013-12-16

    上傳用戶:qlpqlq

  • These codes require an ASCII input file called input.dat of the following form: Lower Limit on x

    These codes require an ASCII input file called input.dat of the following form: Lower Limit on x Upper Limit on x Final Time Pressure for x<0 When t=0 Density for x<0 When t=0 Speed for x<0 When t=0 Pressure for x>0 When t=0 Density for x>0 When t=0 Speed for x>0 When t=0 These codes produce 8 ASCII output files: density.out. Density vs. x entropy.out. Entropy vs. x mach.out. Mach number vs. x massflux.out. Mass flux vs. x pressure.out. Pressure vs. x sound.out. Speed-of-sound vs. x velocity.out. Velocity vs. x waves.out. A description of the solution in terms of the three waves defined in the book (+,-,0).

    標簽: input following require called

    上傳時間: 2017-09-21

    上傳用戶:希醬大魔王

  • as a message came into prominence with the publication in 1948 of an influential paper by Claude Sha

    as a message came into prominence with the publication in 1948 of an influential paper by Claude Shannon, "A Mathematical Theory of Communication." This paper provides the foundations of information theory and endows the word information not only with a technical meaning but also a measure. If the sending device is equally likely to send any one of a set of N messages, then the preferred measure of "the information produced When one message is chosen from the set" is the base two logarithm of N (This measure is called self-information). In this paper, Shannon cont

    標簽: influential publication prominence message

    上傳時間: 2014-01-21

    上傳用戶:2404

  • USART init

    this is for usart When enable it.

    標簽: Serial USART

    上傳時間: 2015-03-10

    上傳用戶:13589202641

  • ISIS Timer Design

    A design about 8051 (running at 12MHz) based system with 3 7-Seg displays and two buttons to implement the following functions.  1. When press the + button, the display C = A+B.  2. When press the button, the display C = A - B.  “A” and “B” are 8-bit inputs When “C” is 9-bit output. 

    標簽: ISIS AT89C52

    上傳時間: 2015-05-05

    上傳用戶:guoxiy

  • Delphi 泛型容器 TDictionary 的用法 Demo

    Collection of key-value pairs.  TDictionary represents a generic collection of key-value pairs.  This class provides a mapping from a collection of keys to a collection of values. When you create a TDictionary object, you can specify various combinations of initial capacity, equality operation, and initial content.  You can add a key that is associated with a corresponding value with the Add or AddOrSetValue methods. You can remove entries with Remove or Clear, which removes all key-value pairs. Adding or removing a key-value pair and looking up a key are efficient, close to O(1), because keys are hashed. A key must not be nil (though a value may be nil) and there must be an equality comparison operation for keys.  You can test for the presence or keys and values with the TryGetValue, ContainsKey and ContainsValue methods.  The Items property lists all Count dictionary entries. You can also set and get values by indexing the Items property. Setting the value this way overwrites any existing value.  The class TObjectDictionary inherits from TDictionary and provides an automatic mechanism for freeing objects removed from dictionary entries. 

    標簽: Delphi 泛型

    上傳時間: 2015-07-01

    上傳用戶:mirage

主站蜘蛛池模板: 奎屯市| 潞西市| 泉州市| 阳江市| 北宁市| 习水县| 木兰县| 金堂县| 塔城市| 荥阳市| 秦安县| 文水县| 贵港市| 奈曼旗| 京山县| 河池市| 耿马| 二连浩特市| 永福县| 施甸县| 四平市| 家居| 聂拉木县| 资兴市| 松阳县| 塘沽区| 岱山县| 富裕县| 巨野县| 赣榆县| 郴州市| 弥勒县| 灵丘县| 江永县| 石家庄市| 云南省| 绿春县| 灵寿县| 揭东县| 曲松县| 大姚县|