虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Agile-flow

  • ADS原理图版图联合仿真Cosimulation_with_layout

    Current design flow challenges

    标签: Cosimulation_with_layout ADS 原理图 版图

    上传时间: 2013-11-06

    上传用户:jiangxiansheng

  • OFELI is an object oriented library of C++ classes for development of finite element codes. Its main

    OFELI is an object oriented library of C++ classes for development of finite element codes. Its main features are : * Various storage schemes of matrices (dense, sparse, skyline). * Direct methods of solution of linear systems of equations as well as various combinations of iterative solvers and preconditioners. * Shape functions of most "popular" finite elements * Element arrays of most popular problems (Heat Transfer, Fluid Flow, Solid Mechanics, Electromagnetics, ...).

    标签: development oriented classes element

    上传时间: 2015-03-03

    上传用户:kbnswdifs

  • the minimun square elimination in curve fitting,introduction how to orgnize the data and has the pro

    the minimun square elimination in curve fitting,introduction how to orgnize the data and has the program flow chat

    标签: the introduction elimination minimun

    上传时间: 2015-04-25

    上传用户:凌云御清风

  • 物流分析工具包。Facility location: Continuous minisum facility location, alternate location-allocation (ALA)

    物流分析工具包。Facility location: Continuous minisum facility location, alternate location-allocation (ALA) procedure, discrete uncapacitated facility location Vehicle routing: VRP, VRP with time windows, traveling salesman problem (TSP) Networks: Shortest path, min cost network flow, minimum spanning tree problems Geocoding: U.S. city or ZIP code to longitude and latitude, longitude and latitude to nearest city, Mercator projection plotting Layout: Steepest descent pairwise interchange (SDPI) heuristic for QAP Material handling: Equipment selection General purpose: Linear programming using the revised simplex method, mixed-integer linear programming (MILP) branch and bound procedure Data: U.S. cities with populations of at least 10,000, U.S. highway network (Oak Ridge National Highway Network), U.S. 3- and 5-digit ZIP codes

    标签: location location-allocation Continuous alternate

    上传时间: 2015-05-17

    上传用户:kikye

  • Easy to use SMS/MMS Messaging Gateway to develop Content Delivery Platforms by GSM Operators,Content

    Easy to use SMS/MMS Messaging Gateway to develop Content Delivery Platforms by GSM Operators,Content Providers and even non-telecom guys. Uses file system for data flow.Written for .NET 2.0 in C#

    标签: Content Messaging Platforms Operators

    上传时间: 2014-01-01

    上传用户:1109003457

  • Coriander is a GUI for controlling a Digital Camera (in the sense of the IIDC specs issued by the 1

    Coriander is a GUI for controlling a Digital Camera (in the sense of the IIDC specs issued by the 1394 Trade Association [1]). Due to the properties of the IEEE1394 protocol, Coriander can control an IEEE1394 camera without interferring with the image flow from that camera. It can thus be used to setup a camera with Coriander while the video flow is used by another application

    标签: the controlling Coriander Digital

    上传时间: 2015-08-07

    上传用户:TF2015

  • PSTN to PSTN Dialing via SIP Network.This is a representation, as a slide show, of the SIP examples

    PSTN to PSTN Dialing via SIP Network.This is a representation, as a slide show, of the SIP examples detailed in RFC 3666 - RFC3666 SIP PSTN Call Flow.

    标签: PSTN representation SIP examples

    上传时间: 2015-08-30

    上传用户:weixiao99

  • 书名:基本商业程序的建模 Essential Business Process Modeling (Paperback) 作者: Mike Havey 出版商:O Reilly 1 editio

    书名:基本商业程序的建模 Essential Business Process Modeling (Paperback) 作者: Mike Havey 出版商:O Reilly 1 edition (August 18, 2005) 内容介绍: Ten years ago, groupware bundled with email and calendar applications helped track the flow of work from person to person within an organization. Workflow in today s enterprise means more monitoring and orchestrating massive systems. A new technology called Business Process Management, or BPM, helps software architects and developers design, code, run, administer, and monitor complex network-based business processes. BPM replaces those sketchy flowchart diagrams that business analysts draw on whiteboards with a precise model that uses standard graphical and XML representations, and an architecture that allows it converse with other services, systems, and users.

    标签: Essential Paperback Business Modeling

    上传时间: 2015-10-21

    上传用户:zhangyigenius

  • This paper presents an interactive technique that produces static hairstyles by generating individu

    This paper presents an interactive technique that produces static hairstyles by generating individual hair strands of the desired shape and color, subject to the presence of gravity and collisions. A variety of hairstyles can be generated by adjusting the wisp parameters, while the deformation is solved efficiently, accounting for the effects of gravity and collisions. Wisps are generated employing statistical approaches. As for hair deformation, we propose a method which is based on physical simulation concepts but is simplified to efficiently solve the static shape of hair. On top of the statistical wisp model and the deformation solver, a constraint-based styler is proposed to model artificial features that oppose the natural flow of hair under gravity and hair elasticity, such as a hairpin. Our technique spans a wider range of human hairstyles than previously proposed methods, and the styles generated by this technique are fairly realistic.

    标签: interactive hairstyles generating technique

    上传时间: 2013-12-20

    上传用户:sssl

  • What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the poss

    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)

    标签: Sometimes the contents desire

    上传时间: 2013-12-25

    上传用户:playboys0