亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

generated

  • Please read this document before attempting to compile and run the libraries and applications! The p

    Please read this document before attempting to compile and run the libraries and applications! The projects must be compiled in a particular order. Standard support questions are about compiler and/or linker errors that are generated when users try to compile the projects in the wrong order. Other information of interest is available here, so read the entire document fi rst. Wild Magic Version 2.1 is what ships with the fi rst printing of the Game Physics book. Some of the applications that are referenced in the book did not make it onto the CD–ROM for the book. Version 2.2 contains those applications, plus more

    標簽: applications attempting and libraries

    上傳時間: 2014-01-16

    上傳用戶:Late_Li

  • 本人大二學習匯編語言程序設計時的全部源代碼

    本人大二學習匯編語言程序設計時的全部源代碼,均已經編譯通過生成可執行文件,每個目錄是一個程序。希望對學習匯編語言的同志有所幫助。-my sophomore year learning assembly language programming at all the source code, have already generated by compiler executable files, each directory is a process. Want to learn assembly language comrades help.

    標簽: 匯編語言 程序設計 源代碼

    上傳時間: 2013-12-17

    上傳用戶:zmy123

  • This function calculates Akaike s final prediction error % estimate of the average generalization e

    This function calculates Akaike s final prediction error % estimate of the average generalization error for network % models generated by NNARX, NNOE, NNARMAX1+2, or their recursive % counterparts. % % [FPE,deff,varest,H] = nnfpe(method,NetDef,W1,W2,U,Y,NN,trparms,skip,Chat) % produces the final prediction error estimate (fpe), the effective number % of weights in the network if it has been trained with weight decay, % an estimate of the noise variance, and the Gauss-Newton Hessian. %

    標簽: generalization calculates prediction function

    上傳時間: 2016-12-27

    上傳用戶:腳趾頭

  • observable distribution grid are investigated. A distribution grid is observable if the state of th

    observable distribution grid are investigated. A distribution grid is observable if the state of the grid can be fully determined. For the simulations, the modified 34-bus IEEE test feeder is used. The measurements needed for the state estimation are generated by the ladder iterative technique. Two methods for the state estimation are analyzed: Weighted Least Squares and Extended Kalman Filter. Both estimators try to find the most probable state based on the available measurements. The result is that the Kalman filter mostly needs less iterations and calculation time. The disadvantage of the Kalman filter is that it needs some foreknowlegde about the state.

    標簽: distribution observable grid investigated

    上傳時間: 2014-12-08

    上傳用戶:ls530720646

  • 在線考試系統完整版源碼(C#&Access) 該考試系統為一同學畢業設計

    在線考試系統完整版源碼(C#&Access) 該考試系統為一同學畢業設計,采用Access數據庫,三層開發 DB_51aspx下為Access數據庫文件,Web為網站文件夾 目錄下的Auto generated Code均為代碼生成器自動生成的代碼 ExamDAL/DBHelp.cs為數據處理文件,注意使用時請先配置其中string strPath = "E:\\downCode\\ExamOnline\\DB_51aspx\\ExamOnline.mdb" 的數據庫路徑并編譯才能使用。 首頁登錄地址:login.aspx 默認測試學生學號/密碼:001/001 管理員學號/密碼:51aspx/51aspx

    標簽: Access 源碼 畢業設計

    上傳時間: 2017-03-08

    上傳用戶:003030

  • This project demonstrates the use of secure hash functions technique to implement a file encryption

    This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.

    標簽: demonstrates encryption functions implement

    上傳時間: 2017-03-08

    上傳用戶:xuanchangri

  • This project demonstrates the use of secure hash functions technique to implement a file encryption

    This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.

    標簽: demonstrates encryption functions implement

    上傳時間: 2014-01-10

    上傳用戶:yyq123456789

  • Video-DVM is a very cheap DVM that shows how an output as complex as a videocomposite signal can be

    Video-DVM is a very cheap DVM that shows how an output as complex as a videocomposite signal can be generated entirely in software: two I/O pins and three resistors are all the hardware required. Connected to any TV set it displays voltages, included max and min peaks, using both giant digits and an analog bar-display . A serial data output for computer data logging is provided, too.

    標簽: videocomposite Video-DVM complex output

    上傳時間: 2014-12-09

    上傳用戶:xuan‘nian

  • This file is distributed in the hope that it will be useful, but WITHOUT WARRANTY OF ANY KIND.

    This file is distributed in the hope that it will be useful, but WITHOUT WARRANTY OF ANY KIND. Author(s): Ole Saether DESCRIPTION: This example should be used together with ex2a-tx433.asm. One nRF9E5 evaluation board (receiver) should be programmed with the hex-file generated from assembling this file and the other evaluation board (transmitter) programmed with the hex-file generated from assembling ex2a-tx433.asm. All switches on the DIP-swith S206 on the receiver must be set to the "on" position and all switches on the DIP-swith S205 on the transmitter must be set to the "on" position. When one of the switched SW1-SW4 on the transmitter is pressed the corresponding LED on the receiver is turned on. The functionality is the same as in ex2c-rx.c.

    標簽: distributed WARRANTY WITHOUT useful

    上傳時間: 2017-05-17

    上傳用戶:xieguodong1234

  • Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/

    Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/e)x] step3:Slove x=1/F(u) step4:Repeat Step1~Step3 by using different u,you can get x1,x2,x3,...,xn step5:If the first packet was generated at time [0], than the second packet will be generated at time [0+x1],The third packet will be generated at time [0+x1+x2], and so on …. Random-number generation 1.static method random from class Math -Returns doubles in the range 0.0 <= x < 1.0 2.class Random from package java.util -Can produce pseudorandom boolean, byte, float, double, int, long and Gaussian values -Is seeded with the current time of day to generate different sequences of numbers each time the program executes

    標簽: Generate Possion between random

    上傳時間: 2017-05-25

    上傳用戶:bibirnovis

主站蜘蛛池模板: 临沭县| 丽江市| 黎平县| 大同县| 隆林| 达尔| 易门县| 丰宁| 彩票| 贵州省| 旬阳县| 龙泉市| 娄底市| 泸溪县| 同德县| 瑞昌市| 石泉县| 宣武区| 旌德县| 建阳市| 贡觉县| 巴东县| 嘉禾县| 金塔县| 邹城市| 平南县| 江城| 明光市| 青岛市| 密山市| 布尔津县| 佛坪县| 富平县| 蕉岭县| 通山县| 遵化市| 开鲁县| 财经| 阜新| 金川县| 额尔古纳市|