Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode Mathimatics-Numerical algorithms
Mathimatics-Numerical algorithms list
Sort by :
« 1 2 ... .67 .68 .69 .70 .71 26172.73 .74 .75 .76 .77 ... 28524 »
Downloaded:0
Basic genetic algorithm the basic genetic algorithm
Date : 2026-01-24 Size : 304kb User :

Downloaded:0
Procedures given by the cycle of robot joint variables (o1, 02), obtained through the Positive Solutions for computing the end of the corresponding position and orientation (x, y)
Date : 2026-01-24 Size : 1kb User : mushi

Downloaded:0
Through the initial value to initialize neural networks, training neural networks, neural networks have been the right value and the threshold
Date : 2026-01-24 Size : 1kb User : mushi

Downloaded:0
Enter the location of robot joints, the robot
Date : 2026-01-24 Size : 1kb User : mushi

Downloaded:0
Manipulator kinematics equation. Manipulator, respectively, the end of input coordinates, the perspective of the first group obtained solution, and the second group of solutions perspective.
Date : 2026-01-24 Size : 1kb User : mushi

Downloaded:0
Pattern Recognition Clustering Method: C-means algorithm to obtain the classification of different
Date : 2026-01-24 Size : 1kb User : mushi

Downloaded:0
The source for the C++ Version of the library management system, additions and deletions to the book, adds to, deletes from readers and administrators
Date : 2026-01-24 Size : 7kb User :

Downloaded:0
java Reversi, also a good thing, looking for a long time. What is needed on their own, are you a friend ~ hope that help
Date : 2026-01-24 Size : 100kb User : peijunlong

Downloaded:0
SharPKUngfu title online system to do high-precision multiplication 1001 title
Date : 2026-01-24 Size : 1kb User : victordu

Downloaded:0
DCT domain using spread-spectrum watermark embedding, with the experimental images, and various classical attacks. The option embedded in the strength and intensity of attacks. Prepared using Matlab
Date : 2026-01-24 Size : 113kb User : 张湛

Downloaded:0
LSB embedding algorithm using hidden images, can be generalized to set up modified LSB bit-plane and returned to the bit error rate and peak signal to noise ratio. Containing a variety of classic attack methods can be us
Date : 2026-01-24 Size : 108kb User : 张湛

Downloaded:0
It's interesting to do the problem 1676
Date : 2026-01-24 Size : 1kb User : victordu
« 1 2 ... .67 .68 .69 .70 .71 26172.73 .74 .75 .76 .77 ... 28524 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.