Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode Mathimatics-Numerical algorithms
Mathimatics-Numerical algorithms list
Sort by :
« 1 2 ... .34 .35 .36 .37 .38 26939.40 .41 .42 .43 .44 ... 28522 »
Downloaded:0
brought against Delay second oscillation link system transfer function, we studied here, and the second time constant oscillation links increased, the dynamic properties of readers, the procedure for amending time consta
Date : 2025-07-07 Size : 1kb User : 阳关

Downloaded:0
Using the basic genetic algorithm (SGA) to optimize the function, a good result is obtained. Access to basic genetic algorithm (SGA) to the function for excellent, with good results
Date : 2025-07-07 Size : 1.44mb User : 成开志

Downloaded:0
I use C++ series of matrices, to facilitate the realization of matrix arithmetic operations
Date : 2025-07-07 Size : 3kb User : 乔木人

Downloaded:0
bp network lt identification bp network lt identification of problems
Date : 2025-07-07 Size : 780kb User : cx

Downloaded:0
This is a TC to do with the Queen's traversal algorithm eight procedures, simple and efficient, I do curriculum design work.
Date : 2025-07-07 Size : 1kb User : 刘娇

Downloaded:0
This is a TC to do with the Queen's traversal algorithm eight procedures, simple and efficient, I do curriculum design work.
Date : 2025-07-07 Size : 1kb User : 刘娇

Downloaded:0
This is a niche evolutionary algorithm, with the aim of solving a function, with the hope to head off audit
Date : 2025-07-07 Size : 91kb User : 王骁

Downloaded:0
a niche evolutionary algorithm procedure is used to calculate a function, hoping to head off with the review.
Date : 2025-07-07 Size : 95kb User : 王骁

Downloaded:0
a niche evolutionary algorithm procedure is used to calculate a function, hoping to head off with the review.
Date : 2025-07-07 Size : 92kb User : 王骁

Downloaded:0
random sequences generated (by using the same method I have a random number)
Date : 2025-07-07 Size : 1kb User :

Downloaded:0
of random noise with the second-order system model (used to improve the neural network algorithm for identification MBP)
Date : 2025-07-07 Size : 2kb User :

Downloaded:1
recursive use of the maximum likelihood method of system identification (recursive maximum likelihood method identification procedures) through head of audit
Date : 2025-07-07 Size : 1kb User :
« 1 2 ... .34 .35 .36 .37 .38 26939.40 .41 .42 .43 .44 ... 28522 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.