资源列表
ICA2171
- A Permutation Genetic Algorithm for Variable Ordering in Learning Bayesian Networks from Data英文文献,遗传算法
Image-Search-App-Specification-2.0
- Specifications of search images in android a-Specifications of search images in android app
Q1
- 在应用IC芯片的电路中,电源进来的明明已经转换成直流信号了,为何后续电路中有那么多电容电感?-In the application circuit of the IC chip, the power supply to convert the incoming current signal clearly has, why there are so many subsequent circuit capacitance and inductance?
Q2
- 强电一般是电力系统中的电,比如说220v的照明电,以及1000多v的工业用电等,强电的特点是电压高,频率低,电流大,强电是用来驱动大功率的电力设备的。比如说电动机,电灯等用电设备。-Strong power is generally the electric power system, such as 220v electrical lighting, and more than 1,000 v industrial electricity, etc., characterized by str
Accurate_Short_Fiber_Simulations
- SIMULATION OF PULSE PROPAGATION
RBFN_Example_v2015_08_26
- radial basis function
4K3-mini
- msp430 4k3 msp430 单片机的键盘扫描程序,可用于检测-msp430 4k3 msp430 microcontroller keyboard scanning procedure can be used to detect
aoyunhui
- 奥运会脚印 ppt 课件 希望大家给点意见-Games footprints
C-language-deficiencies
- 如题,C语言的缺陷,眼下一部很适合C语言开发提升的书。C语言像一把雕刻刀,锋利,并且在技师手中非常有用。和任何锋利的工具一样,C会伤到那些不能掌握它的人。本文介绍C语言伤害粗心的人的方法,以及如何避免伤害。-As stated, C language deficiencies, now a very suitable C language development to enhance the book. C language like a chisel, sharp, and very usef
chaos-
- 主要讲了语音加密解密,是基于混沌的语音加密解密。-Mainly talked about the voice encryption to decrypt, is based on the voice of chaos encryption to decrypt.
jiajiemi-
- 这个是我自己总结的关于混沌加解密的基础概念和举例,欢迎下载~-This is my own summary of the on the chaotic added decryption basic concepts and examples are welcome to download ~
ABs
- 模拟股票软件,计算RSI数值,可以预测未来走势。-Simulate stock software,can calculate RSI value.