BREW手机平台下的实例,实现苹果的移动。 通过按键盘的 “UP”、“Down”、“Left”、“Right”使整个苹果可以在屏幕上自由移动(Step=1),通过按“*”使苹果回到初始位置(屏幕的中间) 1,苹果是由4个对象组合而成,移动的时候如何成为一个整体 2、作为key事件驱动区分各个按键动作 3、苹果的每一次移动都是以上一次苹果的位置为参考
上传时间: 2015-04-10
上传用户:佳期如梦
Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to work in the random access memory(RAM). Some of them do provide some mechanism for dumping the whole tree into a file and loading it back to the memory in order to make data in that tree persistent. It serves well when there s just small amount of data. When the tree is somewhat bigger, the dumping/loading process could take a lengthy time and makes your mission-critical program less efficient. How about an AVL tree that can directly use the disk for data storage ? If there s something like that, we won t need to read through the whole tree in order to pick up just a little bit imformation(a node), but read only the sectors that are neccssary for locating a certain node and the sectors in which that node lies. This is my initial motivation for writing a storage-media independent AVL Tree. However, as you step forth, you would find that it not only works fine with disks but also fine with memorys, too.
标签: available libraries Although nearly
上传时间: 2014-01-22
上传用户:zhoujunzhen
C++ Demystified: A Self-Teaching Guide by Jeff Kent ISBN:0072253703 McGraw-Hill/Osborne © 2004 This hands-on, step-by-step resource will guide you through each phase of C++ programming, providing you with the foundation to discover how computer programs and programming languages work.
标签: Self-Teaching Demystified McGraw-Hill 0072253703
上传时间: 2013-12-13
上传用户:1427796291
Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.
标签: 802.11 introduction Beginning Security
上传时间: 2013-12-04
上传用户:CHINA526
8051 monitor programm: - use external ram to run user program - use eeprom to save user program - provide single step debug, can read internal register and ram
上传时间: 2015-07-11
上传用户:zhichenglu
使用到的参数跟谈到弹性网络的那一章里头所讲的是一样的, ke 则是终止条件。如果 step 被打勾,则程式在每一步之间会暂停 100毫秒(或其他使用者输入的数值)。如果 Random 被打勾,则程式会以系统时间作为乱数产生器的种子数,否则,就以使用者输入的数( Random 右边那一格)为种子数。 你可以利用 load 来载入推销员问题档与其最佳解,如此便可比较弹性网络所找出来的解与最佳解差了多少。 Central, Radius, and Error 这三个参数的前两个,只影响弹性网络的起使位置和大小,对求解没有影响。第三个参数代表城市与网络点之间的容忍距离,也就是说,如果某城市与某网络点之间的距离,小于容忍距离,那就把这个城市当成是被该网络点所拜访。 按下小 w按钮会将目前的结果与参数值写到“en.out”这个档案。使得我们可以很方便地来比较不同参数的效果。
上传时间: 2013-12-17
上传用户:84425894
it contains many classic Test Problems for Unconstrained Optimization such as camel6,treccani,goldstein,branin, shubert1,Ackley,dejong,dejong1,dejong2, dpower,rastrigin,Griewangk,Schwefel, rosenbrock2 and step. the package have the contour and mesh figures of these problem. it also give m files of these problems,and you can easily get your view of figures.
标签: Unconstrained Optimization contains Problems
上传时间: 2015-09-17
上传用户:bcjtao
CCS编程环境 使用的是汇编加C的混合编程方法: The programme of the Correlation Algorithm. Using INT2 to get the input signal. Array x, in first step, is the input signal produced by programme, in next step, is the input signal get from A/D, the length is 128, 32-bit floating point. Array y, in first step, is the input signal produced by programme, in next step, is the input signal get from A/D, the length is 128, 32-bit floating point. Array cor is the Correlation result, the length is 255, 32-bit floating point.
标签: Correlation Algorithm programme the
上传时间: 2013-12-21
上传用户:leixinzhuo
By building a nonlinear function relationship between an d the error signal,this paper presents a no— vel variable step size LMS(Least Mean Square)adaptive filtering algorithm.
标签: relationship nonlinear building function
上传时间: 2015-10-22
上传用户:hzy5825468
%BIQPBOX Bisection reflective line search for sqpbox % [nx,nsig,alpha] = BIQPBOX(s,c,strg,x,y,sigma,l,u,... % oval,po,normg,DS,mtxmpy,data,H) % returns the new feasible point nx, the corresponding sign vector nsig, % and the step size of the unreflected step, alpha. % Copyright (c) 1990-98 by The MathWorks, Inc. % $Revision: 1.2 $ $Date:
标签: BIQPBOX reflective Bisection search
上传时间: 2013-12-17
上传用户:sk5201314