虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

GeneRated

  • Please read this document before attempting to compile and run the libraries and applications! The p

    Please read this document before attempting to compile and run the libraries and applications! The projects must be compiled in a particular order. Standard support questions are about compiler and/or linker errors that are GeneRated when users try to compile the projects in the wrong order. Other information of interest is available here, so read the entire document fi rst. Wild Magic Version 2.1 is what ships with the fi rst printing of the Game Physics book. Some of the applications that are referenced in the book did not make it onto the CD–ROM for the book. Version 2.2 contains those applications, plus more

    标签: applications attempting and libraries

    上传时间: 2014-01-16

    上传用户:Late_Li

  • 本人大二学习汇编语言程序设计时的全部源代码

    本人大二学习汇编语言程序设计时的全部源代码,均已经编译通过生成可执行文件,每个目录是一个程序。希望对学习汇编语言的同志有所帮助。-my sophomore year learning assembly language programming at all the source code, have already GeneRated by compiler executable files, each directory is a process. Want to learn assembly language comrades help.

    标签: 汇编语言 程序设计 源代码

    上传时间: 2013-12-17

    上传用户:zmy123

  • This function calculates Akaike s final prediction error % estimate of the average generalization e

    This function calculates Akaike s final prediction error % estimate of the average generalization error for network % models GeneRated by NNARX, NNOE, NNARMAX1+2, or their recursive % counterparts. % % [FPE,deff,varest,H] = nnfpe(method,NetDef,W1,W2,U,Y,NN,trparms,skip,Chat) % produces the final prediction error estimate (fpe), the effective number % of weights in the network if it has been trained with weight decay, % an estimate of the noise variance, and the Gauss-Newton Hessian. %

    标签: generalization calculates prediction function

    上传时间: 2016-12-27

    上传用户:脚趾头

  • observable distribution grid are investigated. A distribution grid is observable if the state of th

    observable distribution grid are investigated. A distribution grid is observable if the state of the grid can be fully determined. For the simulations, the modified 34-bus IEEE test feeder is used. The measurements needed for the state estimation are GeneRated by the ladder iterative technique. Two methods for the state estimation are analyzed: Weighted Least Squares and Extended Kalman Filter. Both estimators try to find the most probable state based on the available measurements. The result is that the Kalman filter mostly needs less iterations and calculation time. The disadvantage of the Kalman filter is that it needs some foreknowlegde about the state.

    标签: distribution observable grid investigated

    上传时间: 2014-12-08

    上传用户:ls530720646

  • 在线考试系统完整版源码(C#&Access) 该考试系统为一同学毕业设计

    在线考试系统完整版源码(C#&Access) 该考试系统为一同学毕业设计,采用Access数据库,三层开发 DB_51aspx下为Access数据库文件,Web为网站文件夹 目录下的Auto GeneRated Code均为代码生成器自动生成的代码 ExamDAL/DBHelp.cs为数据处理文件,注意使用时请先配置其中string strPath = "E:\\downCode\\ExamOnline\\DB_51aspx\\ExamOnline.mdb" 的数据库路径并编译才能使用。 首页登录地址:login.aspx 默认测试学生学号/密码:001/001 管理员学号/密码:51aspx/51aspx

    标签: Access 源码 毕业设计

    上传时间: 2017-03-08

    上传用户:003030

  • This project demonstrates the use of secure hash functions technique to implement a file encryption

    This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is GeneRated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.

    标签: demonstrates encryption functions implement

    上传时间: 2017-03-08

    上传用户:xuanchangri

  • This project demonstrates the use of secure hash functions technique to implement a file encryption

    This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is GeneRated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.

    标签: demonstrates encryption functions implement

    上传时间: 2014-01-10

    上传用户:yyq123456789

  • Video-DVM is a very cheap DVM that shows how an output as complex as a videocomposite signal can be

    Video-DVM is a very cheap DVM that shows how an output as complex as a videocomposite signal can be GeneRated entirely in software: two I/O pins and three resistors are all the hardware required. Connected to any TV set it displays voltages, included max and min peaks, using both giant digits and an analog bar-display . A serial data output for computer data logging is provided, too.

    标签: videocomposite Video-DVM complex output

    上传时间: 2014-12-09

    上传用户:xuan‘nian

  • This file is distributed in the hope that it will be useful, but WITHOUT WARRANTY OF ANY KIND.

    This file is distributed in the hope that it will be useful, but WITHOUT WARRANTY OF ANY KIND. Author(s): Ole Saether DESCRIPTION: This example should be used together with ex2a-tx433.asm. One nRF9E5 evaluation board (receiver) should be programmed with the hex-file GeneRated from assembling this file and the other evaluation board (transmitter) programmed with the hex-file GeneRated from assembling ex2a-tx433.asm. All switches on the DIP-swith S206 on the receiver must be set to the "on" position and all switches on the DIP-swith S205 on the transmitter must be set to the "on" position. When one of the switched SW1-SW4 on the transmitter is pressed the corresponding LED on the receiver is turned on. The functionality is the same as in ex2c-rx.c.

    标签: distributed WARRANTY WITHOUT useful

    上传时间: 2017-05-17

    上传用户:xieguodong1234

  • Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/

    Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/e)x] step3:Slove x=1/F(u) step4:Repeat Step1~Step3 by using different u,you can get x1,x2,x3,...,xn step5:If the first packet was GeneRated at time [0], than the second packet will be GeneRated at time [0+x1],The third packet will be GeneRated at time [0+x1+x2], and so on …. Random-number generation 1.static method random from class Math -Returns doubles in the range 0.0 <= x < 1.0 2.class Random from package java.util -Can produce pseudorandom boolean, byte, float, double, int, long and Gaussian values -Is seeded with the current time of day to generate different sequences of numbers each time the program executes

    标签: Generate Possion between random

    上传时间: 2017-05-25

    上传用户:bibirnovis