亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

step-vary

  • STEP 7 V5.4 編程手冊

    學習西門子S7-300/400PLC編程用。

    標簽: STEP 5.4 編程手冊

    上傳時間: 2015-01-02

    上傳用戶:ifree2016

  • 磁盤調度設計

    磁盤調度設計,磁盤調度算法的實現,包括  先來先服務調度算法  最短尋道優先調度算法  掃描算法  循環掃描算法  N—Step—SCAN算法

    標簽: 磁盤 調度

    上傳時間: 2015-01-11

    上傳用戶:lhw888

  • BREW手機平臺下的實例

    BREW手機平臺下的實例,實現蘋果的移動。 通過按鍵盤的 “UP”、“Down”、“Left”、“Right”使整個蘋果可以在屏幕上自由移動(Step=1),通過按“*”使蘋果回到初始位置(屏幕的中間) 1,蘋果是由4個對象組合而成,移動的時候如何成為一個整體 2、作為key事件驅動區分各個按鍵動作 3、蘋果的每一次移動都是以上一次蘋果的位置為參考

    標簽: BREW 手機平臺

    上傳時間: 2015-04-10

    上傳用戶:佳期如夢

  • Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to w

    Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to work in the random access memory(RAM). Some of them do provide some mechanism for dumping the whole tree into a file and loading it back to the memory in order to make data in that tree persistent. It serves well when there s just small amount of data. When the tree is somewhat bigger, the dumping/loading process could take a lengthy time and makes your mission-critical program less efficient. How about an AVL tree that can directly use the disk for data storage ? If there s something like that, we won t need to read through the whole tree in order to pick up just a little bit imformation(a node), but read only the sectors that are neccssary for locating a certain node and the sectors in which that node lies. This is my initial motivation for writing a storage-media independent AVL Tree. However, as you step forth, you would find that it not only works fine with disks but also fine with memorys, too.

    標簽: available libraries Although nearly

    上傳時間: 2014-01-22

    上傳用戶:zhoujunzhen

  • C++ Demystified: A Self-Teaching Guide by Jeff Kent ISBN:0072253703 McGraw-Hill/Osborne © 20

    C++ Demystified: A Self-Teaching Guide by Jeff Kent ISBN:0072253703 McGraw-Hill/Osborne © 2004 This hands-on, step-by-step resource will guide you through each phase of C++ programming, providing you with the foundation to discover how computer programs and programming languages work.

    標簽: Self-Teaching Demystified McGraw-Hill 0072253703

    上傳時間: 2013-12-13

    上傳用戶:1427796291

  • Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in the

    Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.

    標簽: 802.11 introduction Beginning Security

    上傳時間: 2013-12-04

    上傳用戶:CHINA526

  • 8051 monitor programm: - use external ram to run user program - use eeprom to save user program

    8051 monitor programm: - use external ram to run user program - use eeprom to save user program - provide single step debug, can read internal register and ram

    標簽: program user use external

    上傳時間: 2015-07-11

    上傳用戶:zhichenglu

  • 使用到的參數跟談到彈性網絡的那一章里頭所講的是一樣的

    使用到的參數跟談到彈性網絡的那一章里頭所講的是一樣的, ke 則是終止條件。如果 step 被打勾,則程式在每一步之間會暫停 100毫秒(或其他使用者輸入的數值)。如果 Random 被打勾,則程式會以系統時間作為亂數產生器的種子數,否則,就以使用者輸入的數( Random 右邊那一格)為種子數。 你可以利用 load 來載入推銷員問題檔與其最佳解,如此便可比較彈性網絡所找出來的解與最佳解差了多少。 Central, Radius, and Error 這三個參數的前兩個,只影響彈性網絡的起使位置和大小,對求解沒有影響。第三個參數代表城市與網絡點之間的容忍距離,也就是說,如果某城市與某網絡點之間的距離,小于容忍距離,那就把這個城市當成是被該網絡點所拜訪。 按下小 w按鈕會將目前的結果與參數值寫到“en.out”這個檔案。使得我們可以很方便地來比較不同參數的效果。

    標簽: 參數 彈性 網絡

    上傳時間: 2013-12-17

    上傳用戶:84425894

  • it contains many classic Test Problems for Unconstrained Optimization such as camel6,treccani,goldst

    it contains many classic Test Problems for Unconstrained Optimization such as camel6,treccani,goldstein,branin, shubert1,Ackley,dejong,dejong1,dejong2, dpower,rastrigin,Griewangk,Schwefel, rosenbrock2 and step. the package have the contour and mesh figures of these problem. it also give m files of these problems,and you can easily get your view of figures.

    標簽: Unconstrained Optimization contains Problems

    上傳時間: 2015-09-17

    上傳用戶:bcjtao

  • CCS編程環境 使用的是匯編加C的混合編程方法: The programme of the Correlation Algorithm. Using INT2 to get the input s

    CCS編程環境 使用的是匯編加C的混合編程方法: The programme of the Correlation Algorithm. Using INT2 to get the input signal. Array x, in first step, is the input signal produced by programme, in next step, is the input signal get from A/D, the length is 128, 32-bit floating point. Array y, in first step, is the input signal produced by programme, in next step, is the input signal get from A/D, the length is 128, 32-bit floating point. Array cor is the Correlation result, the length is 255, 32-bit floating point.

    標簽: Correlation Algorithm programme the

    上傳時間: 2013-12-21

    上傳用戶:leixinzhuo

主站蜘蛛池模板: 格尔木市| 平和县| 赤水市| 建水县| 巴中市| 嘉定区| 合水县| 额济纳旗| 漳平市| 自治县| 台东市| 承德县| 大港区| 莒南县| 石家庄市| 昌图县| 灌阳县| 喜德县| 天峻县| 汉川市| 太和县| 尼勒克县| 曲松县| 罗城| 彭山县| 海伦市| 宿松县| 杨浦区| 连城县| 历史| 吉木萨尔县| 喀什市| 叙永县| 遂宁市| 鹿邑县| 亳州市| 普格县| 巴楚县| 阳高县| 永城市| 荔波县|