虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

INformation

  • This program applies Message Digest (MD5) Algorithm Developed by Maimouna Al-ammar

    This program applies Message Digest (MD5) Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus INformation and Network Security Material

    标签: Algorithm Developed Al-ammar Maimouna

    上传时间: 2017-08-10

    上传用户:13188549192

  • This document specifies a collection of compiler directives, library routines, and environment vari

    This document specifies a collection of compiler directives, library routines, and environment variables that can be used to specify shared-memory parallelism in C, C++ and Fortran programs. This functionality collectively defines the specification of the OpenMP Application Program Interface (OpenMP API). This specification provides a model for parallel programming that is portable across shared memory architectures from different vendors. Compilers from numerous vendors support the OpenMP API. More INformation about OpenMP can be found at the following web site:

    标签: environment collection directives specifies

    上传时间: 2013-12-25

    上传用户:shinesyh

  • This book is for merging practical electronic devices with the Internet, for hardware and software

    This book is for merging practical electronic devices with the Internet, for hardware and software designers looking to expand their skills of JAVA programming.This book is a complete introduction to Internet-enabled devices,it provide all of the INformation to inexpensively build web-enabled hardware.

    标签: electronic for practical Internet

    上传时间: 2013-12-15

    上传用户:dengzb84

  • 在本教程中

    在本教程中,我们将基于 CLDC(连接有限设备配置,Connected Limited Device Configuration)和 MIDP(移动信息设备概要,Mobile INformation Device Profile)API 构建一个名为 UniStocks 的典型 Java 2 Platform, Micro Edition(J2ME)应用程序。

    标签: 教程

    上传时间: 2013-12-10

    上传用户:jqy_china

  • This book is for someone who wants to quickly master the basics of how to install, run, and maintai

    This book is for someone who wants to quickly master the basics of how to install, run, and maintain Linux on an Intel-based personal computer. All of the tools you need are included. Your computer should have a monitor, or display, keyboard, mouse, hard drive, floppy drive, and CD-ROM drive. Although you can jump right in and install Linux onto your hard drive, you should have some technical INformation about your computer and its hardware on hand before you start.

    标签: install someone quickly maintai

    上传时间: 2017-08-19

    上传用户:zhuoying119

  • The potential of solving real-time demanding industrial applications, using vision-based algorithms

    The potential of solving real-time demanding industrial applications, using vision-based algorithms, drastically grew due to an increasing availability of computational power. In this thesis a novel real-time, vision-based Blackjack analysis system is presented. The embedding of the vision algorithms in a compound system of other INformation sources such as an electronic chip tray, reduces the vision task to detect cards and chips. Robust results are achieved by not just analyzing single frames but an image stream regarding game-ß ow INformations. The requirements for such a system are a highly robust and adaptive behav- ior. This is motivated by the vital interest of casino entrepreneurs in a 100 statistical analysis of their offered gambling in order to support the business plan, measuring table and dealer performance and give accurate player rating. Extensive experiments show the robustness and applicability of the proposed system.

    标签: applications vision-based algorithms industrial

    上传时间: 2017-08-20

    上传用户:liansi

  • The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of cla

    The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of classified examples a decision tree is induced, biased by the INformation gain measure, which heuristically leads to small trees. The examples are given in attribute-value representation. The set of possible classes is finite. Only tests, that split the set of instances of the underlying example languages depending on the value of a single attribute are supported.

    标签: algorithm induction decision top-down

    上传时间: 2017-08-20

    上传用户:hzy5825468

  • face detection Face detection can be regarded as a more general case of face localization In face

    face detection Face detection can be regarded as a more general case of face localization In face localization, the task is to find the locations and sizes of a known number of faces (usually one). In face detection, one does not have this additional INformation. Early face-detection algorithms focused on the detection of frontal human faces, whereas newer algorithms attempt to solve the more general and difficult problem of multi-view face detection. That is, the detection of faces that are either rotated along the axis from the face to the observer (in-plane rotation), or rotated along the vertical or left-right axis (out-of-plane rotation),or both.

    标签: detection face localization regarded

    上传时间: 2014-01-10

    上传用户:wfeel

  • Installation of PelcoNet NET300 requires support from your network administrator. Contact your admi

    Installation of PelcoNet NET300 requires support from your network administrator. Contact your administrator to assist with STEP 2A – Configuring PelcoNet Using HyperTerminal. Write down the following INformation from your network administrator:

    标签: your administrator Installation PelcoNet

    上传时间: 2014-01-02

    上传用户:钓鳌牧马

  • Received Signal Strength Indicator in PIC24 with wireless communication. Ping a char and add RSSI in

    Received Signal Strength Indicator in PIC24 with wireless communication. Ping a char and add RSSI INformation to the message.

    标签: communication Indicator Received Strength

    上传时间: 2013-12-25

    上传用户:pinksun9