资源列表
code-of-conduct
- Contributor Covenant Code of Conduct, v1.4
diskspace-3.6.tar
- gysdahgvjcfdvghdsgcagvc vuycdavgas gsgvsg hjgkvcashbgcsda cdajhcsda ghcsa vgfhj csdaggu vcsavuyocsfda vhgud
MARC_Fiber_Example
- 清华大学编辑的纤维文件,将梁柱截面分成36截面4个钢筋(The fiber document of the editor of Tsinghua University divides the cross section of the beam and column into 36 sections and 4 steel bars)
DNS_Redirect
- 最新的,系统DNS劫持C++代码,已经经过测试,非常好用的。(The latest, system DNS hijacking C++ code, has been tested, very good use.)
WMIProcessCreateMonitor
- 通过WMIProcessCreateMonitor 监视电脑上的进程启动退出。可以做出任务管理器的效果。(Start out by WMIProcessCreateMonitor monitoring the process on the computer. The effect of the task manager can be made.)
chicken
- 已知鸡和兔的总数量为n,总腿数为m。输入n和m,依次输出鸡的数目和兔的数目。如果无解,则输出No answer。(The total number of chickens and rabbits was known to be n, and the total leg number was m. Input n and m to output the number of chickens and the number of rabbits in turn. If there is no solu
蚁群算法
- 仅仅是一份按照蚁群算法的原理写的代码,没有做任何优化。(Ant colony algorithm)
simplelte
- simulate simple lte in ns3
Tee
- tee wave guide for power using hfss pro
Flat_Lens
- flat lens using hfss pro - project file
指纹识别
- 指纹图像基于小波变换的各种处理进行了分析、总结。图像处理包括基于小波变换的指纹图像滤波处理和基于小波的指纹图像增强处理。同时介绍指纹图像的预处理:目的是去除指纹图像中的噪音,将其转化为一幅清晰的点线图,便于提取正确的指纹特征。它分四步进行,即灰度滤波、二值化、二值去噪、细化。(The fingerprint image is analyzed and summed up based on the various processing of wavelet transform. Image pro
mega8.01
- card adapter DIP32 QFP32