虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

case

  • Instead of finding the longest common subsequence, let us try to determine the length of the LCS.

    Instead of finding the longest common subsequence, let us try to determine the length of the LCS. 􀂄 Then tracking back to find the LCS. 􀂄 Consider a1a2…am and b1b2…bn. 􀂄 case 1: am=bn. The LCS must contain am, we have to find the LCS of a1a2…am-1 and b1b2…bn-1. 􀂄 case 2: am≠bn. Wehave to find the LCS of a1a2…am-1 and b1b2…bn, and a1a2…am and b b b b1b2…bn-1 Let A = a1 a2 … am and B = b1 b2 … bn 􀂄 Let Li j denote the length of the longest i,g g common subsequence of a1 a2 … ai and b1 b2 … bj. 􀂄 Li,j = Li-1,j-1 + 1 if ai=bj max{ L L } a≠b i-1,j, i,j-1 if ai≠j L0,0 = L0,j = Li,0 = 0 for 1≤i≤m, 1≤j≤n.

    标签: the subsequence determine Instead

    上传时间: 2013-12-17

    上传用户:evil

  • xyzzy is a program for the Nintendo Wii which will read a console s OTP key storage and dump out the

    xyzzy is a program for the Nintendo Wii which will read a console s OTP key storage and dump out the private encryption keys to screen and to SD card. This is useful information in case your Wii ever gets bricked and you need to re-initialize the firmware.

    标签: the Nintendo console program

    上传时间: 2013-12-19

    上传用户:清风冷雨

  • Last week I posted an article on a simple C++ template class, XYDataArray, I used in my system devel

    Last week I posted an article on a simple C++ template class, XYDataArray, I used in my system development tool. The main purpose of this template class is to store and sort general data types. I needed to implement the same thing in Java, since the tool I developed has a compatible Java version. I checked the Java SDK documentation before writing my own code, and found that almost everything I needed is already there, like the C++ case.

    标签: XYDataArray template article posted

    上传时间: 2017-03-03

    上传用户:问题问题

  • "Readers can pick up this book and become familiar with C++ in a short time. Stan has taken a very b

    "Readers can pick up this book and become familiar with C++ in a short time. Stan has taken a very broad and complicated topic and reduced it to the essentials that budding C++ programmers need to know to write real programs. His case study is effective and provides a familiar thread throughout the book.

    标签: familiar Readers become short

    上传时间: 2014-01-19

    上传用户:luke5347

  • 成绩数据库管理系统. 1.能够实现菜单显示、菜单选择、编辑(录入、插入、修改、删除等)、查找、显示、求总成绩、按总成绩排序(高→低)并显示、装入数据文件、数据文件存盘、退出、为数据动态分配存储空间[

    成绩数据库管理系统. 1.能够实现菜单显示、菜单选择、编辑(录入、插入、修改、删除等)、查找、显示、求总成绩、按总成绩排序(高→低)并显示、装入数据文件、数据文件存盘、退出、为数据动态分配存储空间[10.3.1]等功能。 2.至少分为主、子两个模块,其中主控菜单必须在主模块中。 3.主控程序用case结构,显示用宏指令,排序用子程序并且在子模,其它功能随意。 4.数据用结构定义,并单独存在一个文件中(文件扩展名随意)。 5.排序子程序要求:十(ASCII)→ 二 →排序(二进制)→ 十(ASCII)→ 输出。 6.编辑可以全屏幕也可文本行方式,若为文本行方式,以姓名为关键字,以其它字段为关键字作为可选项。 7.查找条件以姓名为关键字。 8.学号、姓名、各科成绩从键盘输入。 9.网格。

    标签: 菜单 数据文件 数据库管理系统 修改

    上传时间: 2014-01-25

    上传用户:天诚24

  • function to compute an expression using int value parameters throw an exception of type illegalPara

    function to compute an expression using int value parameters throw an exception of type illegalParameterValue in case one of the parameters is <= 0

    标签: illegalPara expression parameters exception

    上传时间: 2014-01-20

    上传用户:a6697238

  • This book is an introduction to Ada 95. It uses an example-driven approach which gradually develops

    This book is an introduction to Ada 95. It uses an example-driven approach which gradually develops small trivial programs into large case-study type programs. The main emphasis of this book is on maintenance problems, and using object-oriented technology to write maintainable, extensible programs. Program design is introduced throughout the book, with hypothetical maintenance scenarios used to shoe design shortcomings. and revise them to accomodate maintenance needs. Practical issues such as debugging programs are tackled, and important Ada features not found in other languages are dealt with practically and early on in the text. These include exception handling, user-defined types, procedures, functions, packages and child packages.

    标签: example-driven introduction gradually approach

    上传时间: 2014-01-12

    上传用户:koulian

  • A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di

    A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak with the ideal material parameters is a perfect invisibility cloak by systematically studying the change of the scattering coefficients from the near-ideal case to the ideal one. However, due to the slow convergence of the zeroth order scattering coefficients, a tiny perturbation on the cloak would induce a noticeable field scattering and penetration.

    标签: cylindrical scattering expansion developed

    上传时间: 2017-03-30

    上传用户:lhc9102

  • -The existence of numerous imaging modalities makes it possible to present different data present in

    -The existence of numerous imaging modalities makes it possible to present different data present in different modalities together thus forming multimodal images. Component images forming multimodal images should be aligned, or registered so that all the data, coming from the different modalities, are displayed in proper locations. Mutual Information is the similarity measure used in this case for optimizing the two images. This method requires estimating joint histogram of the two images. The fusion of images is the process of combining two or more images into a single image retaining important features from each. The Discrete Wavelet Transform (DWT) has become an attractive tool for fusing multimodal images. In this work it has been used to segment the features of the input images to produce a region map. Features of each region are calculated and a region based approach is used to fuse the images in the wavelet domain.

    标签: present modalities existence different

    上传时间: 2014-03-04

    上传用户:15736969615

  • c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlyin

    c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths. Note that, these paths are not vertex-disjoint i.e., the vertices may repeat but they are all edge-disjoint i.e., no two paths have the same edges. The input is the adjacency matrix of a directed acyclic graph and a pair(s) of source and destination vertices and the output should be the number of such disjoint paths and the paths themselves on separate lines. In case of multiple paths the output should be in order of paths with minimum vertices first. In case of tie the vertex number should be taken in consideration for ordering.

    标签: fault-tolerant algorithms redundant underlyin

    上传时间: 2013-12-18

    上传用户:jkhjkh1982