Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode Mathimatics-Numerical algorithms
Mathimatics-Numerical algorithms list
Sort by :
« 1 2 ... .43 .44 .45 .46 .47 27248.49 .50 .51 .52 .53 ... 28522 »
data structure with 1,800 examples, I would like to answer students useful ah
Date : 2025-07-27 Size : 763kb User : 平时了

Downloaded:0
Runge_Kutta_Fehlber method
Date : 2025-07-27 Size : 4kb User :

Downloaded:0
using FORTRAN language of the procedure so in FORTRAN operating system directly, to provide a convenient point.
Date : 2025-07-27 Size : 2kb User : 刘文艳

Downloaded:0
Linear MMSE equalizer's matlab source, adaptive channel attenuation is not very severe -linear MMSE equalizer in matlab source, adaptation channel is not very dramatic situation
Date : 2025-07-27 Size : 1kb User : 张于

Downloaded:0
VC under the TIN generation algorithm, which is triangular irregular network growth algorithm, through the establishment of TIN category, the category TIN achieve some ways.
Date : 2025-07-27 Size : 2kb User : feng

Downloaded:0
bm algorithm is a string matching algorithm! Source code introduced bm Algorithm c achieve.
Date : 2025-07-27 Size : 1kb User : 文万志

Downloaded:0
It is used to locate car plate with color background. I d like to share with all of you.
Date : 2025-07-27 Size : 1kb User : 张驰

using FORTRAN language prepared by the procedure, the system can be run directly. We hope that more criticism.
Date : 2025-07-27 Size : 3kb User : 刘文艳

Strassen expansion algorithm can even order any calculation of matrix multiplication, general Strassen only two terms of the n-th-order (to prepare themselves, English Notes ~)
Date : 2025-07-27 Size : 44kb User : 建麟

Downloaded:0
a vc achieved using Kruskal algorithm, program flow is very clear, contribute to the understanding of the algorithm.
Date : 2025-07-27 Size : 282kb User : 刘后

Downloaded:0
Butterworth, Chebyshev I and elliptic filter design of the source! Very rare! Concise C language
Date : 2025-07-27 Size : 63kb User : 王新

Downloaded:0
data structure on the realization of Chain Cross, Cross List can be good for sparse matrix highly efficient storage and computing. For example, in communications-correction coding ldpc encryption it is necessary to use t
Date : 2025-07-27 Size : 500kb User : 杨翔
« 1 2 ... .43 .44 .45 .46 .47 27248.49 .50 .51 .52 .53 ... 28522 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.