亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

step

  • BREW手機平臺下的實例

    BREW手機平臺下的實例,實現蘋果的移動。 通過按鍵盤的 “UP”、“Down”、“Left”、“Right”使整個蘋果可以在屏幕上自由移動(step=1),通過按“*”使蘋果回到初始位置(屏幕的中間) 1,蘋果是由4個對象組合而成,移動的時候如何成為一個整體 2、作為key事件驅動區分各個按鍵動作 3、蘋果的每一次移動都是以上一次蘋果的位置為參考

    標簽: BREW 手機平臺

    上傳時間: 2015-04-10

    上傳用戶:佳期如夢

  • Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to w

    Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to work in the random access memory(RAM). Some of them do provide some mechanism for dumping the whole tree into a file and loading it back to the memory in order to make data in that tree persistent. It serves well when there s just small amount of data. When the tree is somewhat bigger, the dumping/loading process could take a lengthy time and makes your mission-critical program less efficient. How about an AVL tree that can directly use the disk for data storage ? If there s something like that, we won t need to read through the whole tree in order to pick up just a little bit imformation(a node), but read only the sectors that are neccssary for locating a certain node and the sectors in which that node lies. This is my initial motivation for writing a storage-media independent AVL Tree. However, as you step forth, you would find that it not only works fine with disks but also fine with memorys, too.

    標簽: available libraries Although nearly

    上傳時間: 2014-01-22

    上傳用戶:zhoujunzhen

  • C++ Demystified: A Self-Teaching Guide by Jeff Kent ISBN:0072253703 McGraw-Hill/Osborne © 20

    C++ Demystified: A Self-Teaching Guide by Jeff Kent ISBN:0072253703 McGraw-Hill/Osborne © 2004 This hands-on, step-by-step resource will guide you through each phase of C++ programming, providing you with the foundation to discover how computer programs and programming languages work.

    標簽: Self-Teaching Demystified McGraw-Hill 0072253703

    上傳時間: 2013-12-13

    上傳用戶:1427796291

  • Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in the

    Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.

    標簽: 802.11 introduction Beginning Security

    上傳時間: 2013-12-04

    上傳用戶:CHINA526

  • 8051 monitor programm: - use external ram to run user program - use eeprom to save user program

    8051 monitor programm: - use external ram to run user program - use eeprom to save user program - provide single step debug, can read internal register and ram

    標簽: program user use external

    上傳時間: 2015-07-11

    上傳用戶:zhichenglu

  • 使用到的參數跟談到彈性網絡的那一章里頭所講的是一樣的

    使用到的參數跟談到彈性網絡的那一章里頭所講的是一樣的, ke 則是終止條件。如果 step 被打勾,則程式在每一步之間會暫停 100毫秒(或其他使用者輸入的數值)。如果 Random 被打勾,則程式會以系統時間作為亂數產生器的種子數,否則,就以使用者輸入的數( Random 右邊那一格)為種子數。 你可以利用 load 來載入推銷員問題檔與其最佳解,如此便可比較彈性網絡所找出來的解與最佳解差了多少。 Central, Radius, and Error 這三個參數的前兩個,只影響彈性網絡的起使位置和大小,對求解沒有影響。第三個參數代表城市與網絡點之間的容忍距離,也就是說,如果某城市與某網絡點之間的距離,小于容忍距離,那就把這個城市當成是被該網絡點所拜訪。 按下小 w按鈕會將目前的結果與參數值寫到“en.out”這個檔案。使得我們可以很方便地來比較不同參數的效果。

    標簽: 參數 彈性 網絡

    上傳時間: 2013-12-17

    上傳用戶:84425894

  • it contains many classic Test Problems for Unconstrained Optimization such as camel6,treccani,goldst

    it contains many classic Test Problems for Unconstrained Optimization such as camel6,treccani,goldstein,branin, shubert1,Ackley,dejong,dejong1,dejong2, dpower,rastrigin,Griewangk,Schwefel, rosenbrock2 and step. the package have the contour and mesh figures of these problem. it also give m files of these problems,and you can easily get your view of figures.

    標簽: Unconstrained Optimization contains Problems

    上傳時間: 2015-09-17

    上傳用戶:bcjtao

  • CCS編程環境 使用的是匯編加C的混合編程方法: The programme of the Correlation Algorithm. Using INT2 to get the input s

    CCS編程環境 使用的是匯編加C的混合編程方法: The programme of the Correlation Algorithm. Using INT2 to get the input signal. Array x, in first step, is the input signal produced by programme, in next step, is the input signal get from A/D, the length is 128, 32-bit floating point. Array y, in first step, is the input signal produced by programme, in next step, is the input signal get from A/D, the length is 128, 32-bit floating point. Array cor is the Correlation result, the length is 255, 32-bit floating point.

    標簽: Correlation Algorithm programme the

    上傳時間: 2013-12-21

    上傳用戶:leixinzhuo

  • By building a nonlinear function relationship between an d the error signal

    By building a nonlinear function relationship between an d the error signal,this paper presents a no— vel variable step size LMS(Least Mean Square)adaptive filtering algorithm.

    標簽: relationship nonlinear building function

    上傳時間: 2015-10-22

    上傳用戶:hzy5825468

  • %BIQPBOX Bisection reflective line search for sqpbox % [nx,nsig,alpha] = BIQPBOX(s,c,strg,x,y,sigma

    %BIQPBOX Bisection reflective line search for sqpbox % [nx,nsig,alpha] = BIQPBOX(s,c,strg,x,y,sigma,l,u,... % oval,po,normg,DS,mtxmpy,data,H) % returns the new feasible point nx, the corresponding sign vector nsig, % and the step size of the unreflected step, alpha. % Copyright (c) 1990-98 by The MathWorks, Inc. % $Revision: 1.2 $ $Date:

    標簽: BIQPBOX reflective Bisection search

    上傳時間: 2013-12-17

    上傳用戶:sk5201314

主站蜘蛛池模板: 木里| 绥化市| 金乡县| 新田县| 伊吾县| 武山县| 泰兴市| 镇巴县| 伊宁市| 科技| 昭通市| 邯郸县| 若羌县| 龙川县| 郑州市| 闵行区| 修文县| 年辖:市辖区| 孝感市| 新丰县| 永福县| 中江县| 绥德县| 读书| 伊宁市| 福泉市| 偏关县| 衡水市| 郸城县| 海原县| 通山县| 巴楚县| 资讯 | 鄂托克旗| 兴仁县| 竹北市| 外汇| 靖州| 泗洪县| 宝山区| 宁德市|