搜索资源列表
求解方程
- Basic theory: 1. # of roots = highest power 2. All rational roots will be factors of k / factors of a in the general equation of ax^n + bx^(n-1) + ... + cx + k 3. Quadratic formula can solve for irrational / imaginary roots (i dont know cubic /
welding subroutine
- it is used to simulate the flux during the welding process
HMM (GUI) 可视化的隐马尔可夫程序
- VC6.0 这是一个可视化的HMM(隐马尔可夫)程序~ This program lets you to solve the classic problems 1 and 3 over Hidden Markov Models.
插头DP模板
- 插头DP模板,一类二进制状态压缩DP,适用于ACM比赛时使用的模板-Plug DP template, a class of binary state of compression DP, ACM competition for the use of templates
multi Lang 点阵字库制作软件
- 多国语言点阵字库制作软件完美破解版windows版可执行程序-Dot-matrix multi-language font software version of the perfect break
vinlfei CPU
- 英飞凌7880.7870.7860.7850.6850解密、解锁全操作-Infineon 7880.7870.7860.7850.6850 decrypt, unlock the whole operation
DeblurringImages Using theBlindDeconvolutionAlgorithm.rar
- The Blind Deconvolution Algorithm can be used effectively when no information about the distortion (blurring and noise) is known. The algorithm restores the image and the point-spread function (PSF) simultaneously. The accelerated, damped Richardson-
网狐6603平台服务端可架设全套
- 网狐6603平台服务端可架设全套,架设交流群6776014-6603 Fox network server platform can be set up complete, set up the exchange group 6776014
UAR components ssd4 e2
- In course section 1.3.3 How to Write a Usability Aspect Report (UAR) you will learn about the major components of a UAR. For this exercise, you are to create an application that will help you memorize what each component of a UAR should contain. The
Sasser (computer worm) source code
- Sasser is a computer worm that affects computers running vulnerable versions of the Microsoft operating systems Windows XP and Windows 2000. Sasser spreads by exploiting the system through a vulnerable network port (as do certain other worms). RAR PA
MyDoom.A source code
- Mydoom, also known as W32.MyDoom@mm, Novarg, Mimail.R and Shimgapi is a computer worm affecting Microsoft Windows. It was first sighted on 26 January 2004. It became the fastest-spreading e-mail worm ever (as of January 2004), exceeding previous reco
ios的API解析
- 天气预报解析 NSString *urlString = [NSString stringWithFormat:@"http://m.weather.com.cn/data/%1$@.html",nameString]; NSURL *url = [NSURL URLWithString:urlString]; NSURLRequest *request = [[NSURLRequest alloc] initWithURL:url];
various bios
- This file contains a lot of the Bios most people are looking for.
网狐6603数据库完整版
- 网狐6603数据库文件希望大家下载··完整版-6603 database files that you download the full version ·
heart rate
- Heart rate of an ECG signal is determined with the QRS detection
Further Insights in TFET Operation
- systematic measurements, comprehensive descr iption of the output characteristics of tunnel FETs (TFETs) operation is proposed. We show that both tunneling junctions have to be considered simultaneously to explain TFET behavior correctly. For the fir
MIPS Pipeline
- A program to simluate the MIPS pipeline
edge.zip
- this is the start of the code for edge detection
Judd-Ofelt Pro
- A Fortran Program based on the Judd-Ofelt theory
data
- Assuming principal point is in the center of the image for initialisation. We are now going to estimate the generalised focal (gammac) from line images. Please select at least 4 ALIGNED edge points on a NON-RADIAL line on the grid. Click with the rig