搜索资源列表
000
- 求标准偏差 > function c=myfunction(x) > [m,n]=size(x) > t=0 > for i=1:numel(x) > t=t+x(i)*x(i) > end > c=sqrt(t/(m*n-1)) function c=myfunction(x) [m,n]=size(x) t=0 for i=1:m for j=1:n t=
111
- 求标准偏差 > function c=myfunction(x) > [m,n]=size(x) > t=0 > for i=1:numel(x) > t=t+x(i)*x(i) > end > c=sqrt(t/(m*n-1)) function c=myfunction(x) [m,n]=size(x) t=0 for i=1:m for j=1:n t=
4441
- 求标准偏差 > function c=myfunction(x) > [m,n]=size(x) > t=0 > for i=1:numel(x) > t=t+x(i)*x(i) > end > c=sqrt(t/(m*n-1)) function c=myfunction(x) [m,n]=size(x) t=0 for i=1:m for j=1:n t=
1111
- 求标准偏差 > function c=myfunction(x) > [m,n]=size(x) > t=0 > for i=1:numel(x) > t=t+x(i)*x(i) > end > c=sqrt(t/(m*n-1)) function c=myfunction(x) [m,n]=size(x) t=0 for i=1:m for j=1:n t=
20070410110853762
- MOV P2 ,#0FFH MOV P3 ,#0FFH ACALL DEL AJMP MAIN ORG 0200H DEL: MOV R5,#04H F3: MOV R6,#0FFH F2: MOV R7,#0FFH F1: DJNZ R7,F1 DJNZ R6,F2 DJNZ R5,F3 RET END
pathload.tar
- pashload是应用在linux下的网络带宽测试源程序精确度比较高 ///////////////////////////////////// Pathload is a tool for estimating the available bandwidth of an end-to-end path from a host S (sender) to a host R (receiver). The available bandwidth is the maximum IP
LibraryManagementSystem
- As information technology is more and more in-depth and wide range of applications, management information system has been gradually implemented in the technical maturity. Management Information System is a continuous development of new disciplines.
6
- 构造一个简单程序设计语言的词法分析器,要求: 1) 含有保留字program, begin, end, var, integer, if, then, else, do, while. 2) 标识符和无符号的整常数,其中保留字和标识符不区分大小写. 3) 含有界符和运算符如下:+,-, (, ), =, >, <, , :, :=.,,。 4) 输出二元组。
dll_test_MD5
- MD5变换动态链接库文件调用:(delphi例子) ========================================================================= function transfer(tran:widestring):widestring stdcall external md5.dll name transfer //edit1为输入字符,edit2为输出md5摘要 procedure TFor
MC-ACT-RSENC_DS
- MemecCoreReed-Solomon coding is a method of forward error correction in the form of block coding. Block coding consists of calculating a number of parity symbols over a number of message symbols. The parity symbols are appended to the end of the
qishiyouli
- 任务一的源程序: const dx:array[1..4]of integer=(2,2,1,1) dy:array[1..4]of integer=(1,-1,2,-2) type map=record x,y:integer end var i,j,n,m,k:integer a:array[0..50,0..50]of map begin re
laborsentimentinformation
- Under the labor sentiment monitor system has several parts of compositions: The mobile termination software and hardware development, the central server software development as well as opens video frequency the prompt reflection. The labor sentiment
asm
- 实现中断复制功能. 除非输入i(I),否则会在屏幕上显出输入的字母或字符值. 以end结束. 具体解释见源程序.
010
- Make Text-Overflow work on both IE and Firefox If the text inside each line exceed the width of each line, then you will see \"...\" (ellipsis) shows up at the end of each line. Try to resize the window or change the font size to see if \"...\
STUDY1
- 300 km 传输线和功率补偿仿真 The circuit below represents an equivalent power system feeding a 300 km transmission line. The line is compensated by a shunt inductor at its receiving end. A circuit breaker allows energizing and de-energizing of the line. To si
lccnet
- This hierarchy augments an lcc version 4.2 distribution with a MSIL back end, which makes it possible to ANSI/ISO C program under .NET. lcc编译器的MSIL后端, 让开发者可以在.NET下开发标准C程序, 全部源代码
yuanwenjian
- Private Sub cancel_Click(Index As Integer) Unload form1 End Sub
adwallpaper
- 桌面设置源程序 Private Sub cmbBrowse_Click() With CommonDialog1 .Flags = cdlOFNFileMustExist Or cdlOFNHideReadOnly Or cdlOFNLongNames Or cdlOFNExplorer .FileName = txtFilename.Text .ShowOpen If .FileName <> \"\" Then txtFilename
WCDMAModelpresentation
- The WCDMA Physical Layer Demo consists of an end-to-end (transmitter-to-receiver) simulation of the Frequency Division Duplex (FDD) Downlink physical layer for several Dedicated Channels (DCH) as specified by the 3GPP standard (Release 99).
Semantic_Session_Analysis_for_Web_Usage_Mining
- A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log preparation model enhances usage logs with semantic.The M arkov chain mode1 based on ontology semantic measurement is used to identi. ing which ac