资源列表
C-ATM
- 很好的实现ATM取款机功能的程序代码,值得借鉴,欢迎分享并提出宝贵意见!-ATM cash machines to achieve good functional code, should learn to welcome and valuable advice to share!
shuzihewenti
- 描述: 数字河中的一个数n 的后继数是n 加上其每位数字的和。例如,12345的后继数是12360,因为12345+1+2+3+4+5=12360。如果数字河的第一个数为k,我们就称此数字河为river k。例如,river 480 代表序列{480, 492, 507, 519, ...},river 483 代表序列{483, 498, 519, ...}。 当两个数字河有相同的元素时,我们称这两个数字河在此元素处相遇。例如,river 480 和river 483 在元素5
mycurses
- example of curses library
peopledetect.py.tar
- people detection using opencv
ejdlb
- 二级倒立摆的s封装函数 用于建立环形二级倒立摆的系统 -Level 2 inverted pendulum s packaging function
VanishingMoment
- showing vanishing moment-vanishing moment
forbid_run_program
- 批处理禁止运行程序.默认密码为mscxw-Batch prohibited run the program. Default password is mscxw
7_2_15
- 随机产生N个整数值,N由用户输入,存于动态数组中,并计算其和与均值-Random integer values to generate N, N input by the user, stored in a dynamic array, and calculate and mean
ELVS
- 利用ardvino编写的切换控制程序,mega8单片机与上位机通讯,当收到上位机的切换命令时发送相应的命令至单片机输出口。-Switch control procedures utilize ardvino written, mega8 microcontroller and PC communication, when a switch command is received from the host computer to send the appropriate commands to
StrCpy
- 使用指针实现库函数StrCpy以处理字符串复制功能,并返回指针!-Using pointers to handle string library functions StrCpy copy function, and returns the pointer!
hash
- 这是关于哈希查找的算法,采用线性探测再散列的方法处理冲突-This is about the hash lookup algorithm, using linear probing re-hash approach to conflict
ceshi
- 以实际所测随机中子脉冲数据的自相关函数为研究对象,借助仿真实验,开展Elman神经网络对不同浓度核材料进行识别的研究。在实测数据的基础上,通过叠加随机噪声,模拟产生了不同浓度核材料的相关函数样本用于神经网络的训练与测试,实验结果表明,-Calculating the stochastic neutron pulse autocorrelation function with the actually measured data as the research object, we carry o