Welcome![Sign In][Sign Up]
Location:
Search - F-IN-B

Search list

[Other resourcefreqz_m

Description: 求取系统的绝对幅度响应、相对的db值幅度响应、相位响应和群延时响应的函数 % %db为相对振幅(dB) %mag为绝对振幅 %pha为相位响应 %grd为群延时 %w为频率样本点向量 %b为Ha(z)分子多项式系数(对FIR而言,b=h) %a为Hz(z)分母多项式系数(对FIR而言,a=1) %-strike rate system in response to the absolute and relative value range db response phase and group delay response to the response function%% db relative amplitude (dB)% mag as the absolute amplitude% of MTS Phase Response% for the group delay grd% w frequency of sample points for the vector b Ha% (z) elements polynomial coefficient (F IR, b = h)% for a Hz (z) denominator polynomial coefficient (right FIR, a = 1)%
Platform: | Size: 813 | Author: 吴江华 | Hits:

[Other resource100WaystoMotivateYourself

Description: In this first-ever paperback edition of his long-time best-seller, motivational speaker Steve Chandler helps you create an action plan for living your vision in business and in life. It features 100 proven methods to positively change the way you think and act-methods based on feedback from the hundreds of thousands of corporate and public seminar attendees Chandler speaks to each year. 100 Ways to Motivate Yourself will help you break through the negative barriers and banish the pessimistic thoughts that are preventing you from fulfilling your lifelong goals and dreams. Whether you re self-employed, a manager, or a high-level executive, it s still easy to get stuck in the daily routines of life, fantasizing about what could have been. Steve Chandler helps you turn that way of thinking around and make what could have been into what can and will be. -In this first-ever paperback edition of hi 's long-time best-seller. motivational speaker Steve Chandler helps you create an action plan for living your vision in b usiness and in life. It features 100 proven meth ods to positively change the way you think and ac t-methods based on feedback from the hundreds o f thousands of corporate and public seminar att endees Chandler speaks to each year. 100 Ways to Motivate Yourself will help you break through t he negative barriers and banish the pessimisti c thoughts that are preventing you from fulfill ing your lifelong goals and dreams. Whether you 're self-employed, a manager, or a high-level executive, it's still easy to get stuck in the daily routines of life, fantasizing about what could have been. Steve C. handler helps you turn
Platform: | Size: 106311 | Author: wu | Hits:

[Other resourceLCD4

Description: LCD-7279的经过调试多次已经能够实现在指定的位置显示特定的数据。 程序lcd1.c实现基本的功能,即:键盘输入0、1、2、3、4、5、6、7、8、9、a\\b\\c\\d\\e\\f 在液晶的指定位置显示实现满屏或半屏显示点阵和字符,调入一幅图画的代码进行显示;-LCD-7279 after the repeated testing has been able to achieve the specified location-specific data. Lcd1.c procedures to achieve the basic functions, namely : the keyboard input 0, ,36.2. 8,9. a \\ b \\ c \\ d \\ e \\ f in the designated location LCD realize Manping or semi-Screen Display and characters, transferred to a picture of the code display;
Platform: | Size: 1191 | Author: 吴新明 | Hits:

[Other算法ebook(10部算法经典著作的合集)

Description: 算法ebook(10部算法经典著作的合集) 算法ebook> 10部算法经典著作的合集 chm格式 (1)Fundamentals of Data Structures by Ellis Horowitz and Sartaj Sahni (2)Data Structures, Algorithms and Program Style Using C by James F. Korsh and Leonard J. Garrett (3)Data Structures and Algorithm Analysis in C by Mark Allen Weiss (4)Data Structures: From Arrays to Priority Queues by Wayne Amsbury (5)Information Retrieval: Data Structures & Algorithms edited by William B. Frakes and Ricardo Baeza-Yates (6)Introduction to Algorithms by Thomas H. Cormen, Charles E. Leiserson, and Ronald L. Rivest (7)Practical Data Structures in C++ by Bryan Flamig (8)Reliable Data Structures in C by Thomas Plum (9)Data Structures and Algorithms Alfred V. Aho, Bell Laboratories, Murray Hill, New Jersey John E. Hopcroft, Cornell University, Ithaca, New York Jeffrey D. Ullman, Stanford University, Stanford, California (10)DDJ Algorithms and Data Structures Articles-algorithm ebook (10 Algorithm classics Collection) algorithm ebookgt; Gt; Ten algorithm classics Collection chm format (1) Fundamentals of Data Structures by Ellis Horowitz and Sartaj Sahni (2) Data Structures and Algorithms and Program Using C by Style Asperula and James F. Leonard J. Garrett (3) Data Structures and Analysis Algorithm in C by Mark Allen Weiss (4) Data Structures : From Arrays to Priority Queues by Wayne Amsbury (5) Information Retrieval : Data Structures Algorithms edited by William B . Frakes and Ricardo Baeza- Yates (6) Introduction to Algorithms by Thomas H. Cormen, Charles E. Leiserson, and Ronald L. Rivest (7) Practical Data Structures in C by Bryan Flamig (8) Reliable Data Structures in C by Thomas Plum (9) Data Structures and Algorithms Alfred V. Aho, Bell Laborat
Platform: | Size: 29000704 | Author: 狼狼 | Hits:

[matlabfreqz_m

Description: 求取系统的绝对幅度响应、相对的db值幅度响应、相位响应和群延时响应的函数 % %db为相对振幅(dB) %mag为绝对振幅 %pha为相位响应 %grd为群延时 %w为频率样本点向量 %b为Ha(z)分子多项式系数(对FIR而言,b=h) %a为Hz(z)分母多项式系数(对FIR而言,a=1) %-strike rate system in response to the absolute and relative value range db response phase and group delay response to the response function%% db relative amplitude (dB)% mag as the absolute amplitude% of MTS Phase Response% for the group delay grd% w frequency of sample points for the vector b Ha% (z) elements polynomial coefficient (F IR, b = h)% for a Hz (z) denominator polynomial coefficient (right FIR, a = 1)%
Platform: | Size: 1024 | Author: 吴江华 | Hits:

[AI-NN-PRSubstituter.java

Description: 代入法的启发示搜索 我的代码实现是:按照自然语言各字母出现频率的大小从高到低(已经有人作国统计分析了)先生成一张字母出现频率统计表(A)--------(e),(t,a,o,i,n,s,h,r),(d,l),(c,u,m,w,f,g,y,p,b),(v,k,j,x,q,z) ,再对密文字母计算频率,并按频率从高到低生成一张输入密文字母的统计表(B),通过两张表的对应关系,不断用A中的字母去替换B中的字母,搜索不成功时就回退,在这里回朔是一个关键。 -generation into a search of inspiration I said a code is : According to the Natural Language alphabet frequency of the size of precedence (has been for the State Statistical Analysis), Mr. into an alphabet frequency tables (A )--------( e), (t, a, o, i, n, s, h r), (d, l), (c, u, m, w, f, g, y, p, b), (v, k, j, x, q, z), again close to the mother language calculated frequency and frequency input precedence generate a secret letter to the mother TAB (B), Table 2 by the corresponding relations, use of the letters A to B to replace the letters of the alphabet, when unsuccessful search regression, Here is a retrospective key.
Platform: | Size: 4096 | Author: rtshen | Hits:

[Successful incentive100WaystoMotivateYourself

Description: In this first-ever paperback edition of his long-time best-seller, motivational speaker Steve Chandler helps you create an action plan for living your vision in business and in life. It features 100 proven methods to positively change the way you think and act-methods based on feedback from the hundreds of thousands of corporate and public seminar attendees Chandler speaks to each year. 100 Ways to Motivate Yourself will help you break through the negative barriers and banish the pessimistic thoughts that are preventing you from fulfilling your lifelong goals and dreams. Whether you re self-employed, a manager, or a high-level executive, it s still easy to get stuck in the daily routines of life, fantasizing about what could have been. Steve Chandler helps you turn that way of thinking around and make what could have been into what can and will be. -In this first-ever paperback edition of hi 's long-time best-seller. motivational speaker Steve Chandler helps you create an action plan for living your vision in b usiness and in life. It features 100 proven meth ods to positively change the way you think and ac t-methods based on feedback from the hundreds o f thousands of corporate and public seminar att endees Chandler speaks to each year. 100 Ways to Motivate Yourself will help you break through t he negative barriers and banish the pessimisti c thoughts that are preventing you from fulfill ing your lifelong goals and dreams. Whether you 're self-employed, a manager, or a high-level executive, it's still easy to get stuck in the daily routines of life, fantasizing about what could have been. Steve C. handler helps you turn
Platform: | Size: 106496 | Author: wu | Hits:

[SCMLCD4

Description: LCD-7279的经过调试多次已经能够实现在指定的位置显示特定的数据。 程序lcd1.c实现基本的功能,即:键盘输入0、1、2、3、4、5、6、7、8、9、a\b\c\d\e\f 在液晶的指定位置显示实现满屏或半屏显示点阵和字符,调入一幅图画的代码进行显示;-LCD-7279 after the repeated testing has been able to achieve the specified location-specific data. Lcd1.c procedures to achieve the basic functions, namely : the keyboard input 0, ,36.2. 8,9. a \ b \ c \ d \ e \ f in the designated location LCD realize Manping or semi-Screen Display and characters, transferred to a picture of the code display;
Platform: | Size: 1024 | Author: 吴新明 | Hits:

[DocumentsHuffman-tree

Description: 数据结构 1、算法思路: 哈夫曼树算法:a)根据给定的n个权值{W1,W2… ,Wn }构成 n棵二叉树的集合F={T1,T2…,T n },其中每棵二叉树T中只有一个带权为W i的根结点,其左右子树均空;b)在F中选取两棵根结点的权值最小的树作为左右子树构造一棵新的二叉树,且置新的二叉树的根结点的权值为其左、右子树上结点的权值之和;c)F中删除这两棵树,同时将新得到的二叉树加入F中; d)重复b)和c),直到F只含一棵树为止。 -Data Structure 1, Algorithm idea: Huffman tree algorithm: a) in accordance with a given value of n of the right (W1, W2 ..., Wn) constitute a set of n binary tree trees F = (T1, T2 ..., T n) , which for each binary tree T with only one right for the W i of the root node, its about subtree are empty b) in the F 2 in the root node of the right to select the smallest value of the tree as a subtree structure around a new binary tree, binary tree and the new home of the root node of the right value for the left and right sub-tree nodes and the right value c) F in the deletion of the two trees, at the same time obtained by adding a new binary tree F in d) repeat b) and c), until a tree F containing only so far.
Platform: | Size: 28672 | Author: Anson | Hits:

[Embeded-SCM DevelopE8_manual

Description: 主要介绍了如何使用E8仿真器在以Renesas芯片为MCU的开发板上进行仿真调试。 第1 章 概要 第2 章 E8 仿真器功能 第3 章 使用前的准备 第4 章 调试的准备 第5 章 调试 第6 章 教程示例 附录A E8 仿真器的构成 附录B 窗口功能一览 附录C 命令行功能 附录D High-performance Embedded Workshop 的注意事项 附录E 有关硬件诊断程序 E.1 为了执行诊断程序的系统设置 E.2 诊断程序的执行 E.3 错误发生时的处理-Mainly introduce how to use the E8 emulator to Renesas chip in for the MCU development board simulation debugging. Chapter 1 Summary Chapter 2 E8 Emulator functions in Chapter 3 of the preparation before use Chapter 4 debug debugging preparation Chapter 5 Tutorial examples Chapter 6 Appendix A E8 emulator window function constitutes Appendix B Appendix C List of command-line functions Appendix D High-performance Embedded Workshop Notes Appendix E on the hardware diagnostic procedures for the implementation of diagnostic procedures E.1 system settings E.2 diagnostic procedures E.3 error occurred when the treatment
Platform: | Size: 2606080 | Author: Rae | Hits:

[Algorithm05050822222628

Description: !逐步回归分析程序: ! M:输入变量,M=N+1,其中N为自变量的个数;M包括的因变量个数 ! K:输入变量,观测点数; ! F1:引入因子时显著性的F-分布值; ! F2:剔除因子时显著性的F-分布值; ! XX:存放自变量和因变量的平均值; ! B:存放回归系数; ! V:存放偏回归平方和和残差平方和Q; ! S:存放回归系数的标准偏差和估计的标准偏差; ! C:存放复相关系数; ! F:存放F-检验值;-! Stepwise regression analysis procedure:! M: input variables, M = N+ 1, in which N is the number of independent variables M, including the number of the dependent variable! K: input variables, observation points ! F1: when to introduce a significant factor of the F-distribution value ! F2: remove significant factor when the F-distribution value ! XX: storage self-variables and the dependent variable on average ! B: regression coefficient storage ! V: store partial regression sum of squares and residual sum of squares Q ! S: storage of the standard deviation of regression coefficients and the estimated standard deviation ! C: storage of multiple correlation coefficient ! F: storing F-test value
Platform: | Size: 2048 | Author: wang hanting | Hits:

[Windows DevelopWordCount

Description: a) 从指定的文本文件中读取文本信息; b) 将除去标点符号外的单词进行统计; c) 统计的单词不区分大小写(选做); d) 统计结果包含单词名称及在文本中出现的次数 e) 统计结果结束输出到控制台屏幕; f) 统计结果输出到指定的统计文件中; g) 统计结果按字母顺序排列。 -a) from the specified text file to read text messages b) to remove the punctuation outside the word statistics c) statistics are not case-sensitive (elected to do) d) results contain the names and words in the text number of emerging e) Statistical results of the end of the output to the console screen f) statistical results of the statistical output to the specified document g) results in alphabetical order.
Platform: | Size: 41984 | Author: 鲍辉云 | Hits:

[matlabarithmetic

Description: MATLAB编写的一个M文件,实现二分法求函数f在[a,b]上的一个零点,牛顿插值法-MATLAB prepared a document M, realize dichotomy for function f in [a, b] a zero, the Newton interpolation
Platform: | Size: 1024 | Author: lubeizi | Hits:

[OS programfilesystem

Description: 用c#实现的在内存中模拟的简易文件系统,整个文件系统可保存至硬盘。系统设计参照fat格式。文件系统提供的操作: a) 格式化 b) 创建子目录 c) 删除子目录 d) 显示目录 e) 更改当前目录 f) 创建文件 g) 打开文件 h) 关闭文件 i) 写文件 j) 读文件 k) 删除文件 -With c# Realize the simulation in memory of the simple file system, the entire file system can be stored to the hard disk. System design with reference to fat format. File system operation to provide: a) format b) create a subdirectory c) delete the subdirectory d) show the directory e) Change the current directory f) create a file g) open the file h) close the file i) Write a document j) reading a document k ) delete files
Platform: | Size: 808960 | Author: twofox | Hits:

[Internet-NetworkVC_FTP

Description: 目录ftp服务器是一个基于控制台的ftp服务器程序,能够实现大部分的FTP的服务器程序; 注意: a.帐号密码为toldo b.主目录为c:/temp,在连接之前请先建立 2.目录ftp客户端是一个比较简单的ftp程序,但是程序提供了各种接口,能够让读者看法出各种复杂的ftp程序,程序中的各个程序模块均已经实现;-Directory ftp server is a console based on the ftp server program, able to realize most of the FTP server process Note: a. Account password for toldo b. the main directory is c:/temp, before you establish the connection 2 . directory ftp client is a relatively simple ftp program, but the program offers a variety of interface, that allows readers to view a variety of complex ftp procedures, procedures in the various program modules have been realized
Platform: | Size: 70656 | Author: zhangshouying | Hits:

[Internet-Networksfjs

Description: 为 了提高用户身份认证和授权管理的灵活性,从We b 应用系统的安全性角度出发,讨论了 一 种在. N E T F r a me w o r k下保证应用程序安全性的身份验证和授权模型,并给出了模型的具体实现方法。 该模型利用 F o r ms身份验证方法对用户的身份进行鉴别。在授权处理上,模型结合统一资源定位( u . J f o r m R e s o u r c e L o c a t o r , U R L ) 授权模式和用户所具有的系统角色,分别从页面级和页面操作级对用户的访问进行 控制。该模型在企业局域网环境内能够提供比较灵活的身份认证和基于角色的授权服务。实际应用表明, 基于该模型的We b应用系统能够对用户的访问进行有效的控制,从而保证了系统的安全性-In order to enhance user authentication and authorization management flexibility, from the We b application system security point of view, discussed 1 Species. NETF ra me work to ensure application security identity authentication and authorization model, and give a model of the specific methods of implementation. The model F or ms using authentication methods on the user s identity were identified. At authorized treatment, the model combination of Uniform Resource Locator (u. J form R esource L ocator, URL) authorization model and the user has the role of the system, separately from the page-level and page-level operations on the user s visit Control. The model in the enterprise LAN environment can provide a more flexible role-based identity authentication and authorization services. Practical application shows that Based on the model We b applications can access the user s effective control, thereby ensuring the system security
Platform: | Size: 250880 | Author: 楚知 | Hits:

[Data structsduct4

Description: duct.f computes a fully developed viscous laminar flow in a rectangular channel of aspect ratio b/a (=bar). solve the equation: d^2u/dx^2 + d^2u/dy^2 = -1, -a<x<a, -b<y<b method of discretisation: 3-point centered differences method of linear system solution: gauss-seidel + sor -duct.f computes a fully developed viscous laminar flow in a rectangular channel of aspect ratio b/a (=bar). solve the equation: d^2u/dx^2+ d^2u/dy^2 =-1,-a<x<a,-b<y<b method of discretisation: 3-point centered differences method of linear system solution: gauss-seidel+ sor
Platform: | Size: 2048 | Author: Barboy | Hits:

[JSPDiscrete-Event-Simulation-in-Java

Description: Roskilde大学的一篇关于Java离散事件仿真的PDF文章,共105页,第65-105页是Java source code, 目录如下: A. The simset package B. Source code of the simset package C. The random package D. Source code of the random package E. Source code of the simulation.event package F. Car wash simulation with simulation.event G. Source code of the simulation.activity package H. Car wash simulation with simulation.activity I. Source code of the simulation.events package J. Car wash simulation with simulation.events K. Source code of javaSimulation L. Process-based car wash simulation with javaSimulation M. Event-based car wash simulation with javaSimulation N. Activity-based car wash simulation with javaSimulation O. Source code of the javaCoroutine package P. Test program for javaCoroutine-英文说明: A literature title" Discrete Event Simulation in Java", writen by Keld Helsgaun of department of Computer Science Roskilde University. Contents: 1 introduction 2 Discrete event simulation in Java 3 A package for coroutine sequencing in Java 4 Implementation of Java Simulation 5 Evaluation of Java Simulation 6 Conclusions
Platform: | Size: 214016 | Author: lijuan | Hits:

[.netF-in-Box_v3.1.2_fro_.NET-retail

Description: F-IN-BOX - COOL using Flash with VB.NET-F-IN-BOX- COOL using Flash with VB.NET
Platform: | Size: 2494464 | Author: marko pelovic | Hits:

[Mathimatics-Numerical algorithmsDichotomyModel

Description: 二分法 数学方面: 一般地,对于函数f(x),如果存在实数c,当x=c是f(c)=0,那么把x=c叫做函数f(x)的零点。 解方程即要求f(x)的所有零点。 先找到a、b,使f(a),f(b)异号,说明在区间(a,b)内一定有零点,然后求f[(a+b)/2], 现在假设f(a)<0,f(b)>0,a<b ①如果f[(a+b)/2]=0,该点就是零点, 如果f[(a+b)/2]<0,则在区间((a+b)/2,b)内有零点,(a+b)/2=>a,从①开始继续使用 中点函数值判断。 如果f[(a+b)/2]>0,则在区间(a,(a+b)/2)内有零点,(a+b)/2=>b,从①开始继续使用 中点函数值判断。 这样就可以不断接近零点。 通过每次把f(x)的零点所在小区间收缩一半的方法,使区间的两个端点逐步迫近函数的零点,以求得零点的近似值,这种方法叫做二分法。 由于计算过程的具体运算复杂,但每一步的方式相同,所以可通过编写程序来运算。-A dichotomy is any splitting of a whole into exactly two non-overlapping parts. In other words, it is a partition of a whole (or a set) into two parts (subsets) that are: mutually exclusive: nothing can belong simultaneously to both parts, and jointly exhaustive: everything must belong to one part or the other. The two parts thus formed are complements. In logic, the partitions are opposites if there exists a proposition such that it holds over one and not the other.
Platform: | Size: 1024 | Author: kelly | Hits:
« 12 3 4 5 6 7 8 9 10 ... 15 »

CodeBus www.codebus.net