Edge Disjoint Cycles. You are given an input graph that is either directed or undirected. Write a program that reads in a vertex number and lists the number of edge disjoint cycles that start and end at this vertex. The output should also list the edges in each of the cycle discovered. Input will be the adjacency matrix preceded by a 0 or 1 representing Directed or Undirected graphs respectively.
标签: undirected Disjoint directed Cycles
上传时间: 2017-04-08
上传用户:13188549192
This application note describes the three methods that can be used to program the Flash code memory of the 89C51Rx+/Rx2/66x families of microcontrollers. It discusses in detail the operation of the In-System Programming (ISP) capability which allows these microcontrollers to be programmed while mounted in the end product. These microcontrollers also have an In-Application Programming (IAP) capability which allows them to be programmed under firmware control of the embedded application. This capability is also described
标签: application describes the methods
上传时间: 2014-01-16
上传用户:woshiayin
Using an easy-to-follow format, this book explains the basics of MATLAB up front. You ll find out how to plot functions, solve algebraic equations, and compute integrals. You ll also learn how to solve differential equations, generate numerical solutions of ODEs, and work with special functions. Packed with hundreds of sample equations and explained solutions, and featuring end-of-chapter quizzes and a final exam, this book will teach you MATLAB essentials in no time at all.
标签: easy-to-follow explains MATLAB basics
上传时间: 2017-04-10
上传用户:时代电子小智
lDocumentation for VxVorks 6.2. Migration Guide, Application API Reference, Driver API Reference, BSP developers Guide, CLI Tools Users Guide, Device Driver Developers Guide and more.
标签: Reference lDocumentation Application Migration
上传时间: 2014-01-23
上传用户:songyue1991
Symbolic Representations of Time Series... SAX is just as good as other representations, or working on the raw data for most problems (Slides shown at the end of this presentation)
标签: Representations representations Symbolic working
上传时间: 2014-01-16
上传用户:dongqiangqiang
procedure senddata var i:integer commflg : Boolean begin commflg:=true for i:=1 to 8 do begin if not fcomm comml writecommdata(sendbutter,i) then begin Commflg=false break end end end (4) 接收数据 在编写基于串口的计算机工业测控时,通常需要由下位机向PC机发送数据以使PC机了解系统的测试数据或下位机的运行状态,并进而控制下位机的行为。利用Spcomm串口控件接收下位机发送的数据信息的示例代码如下: //事件驱动方式接收数据程序 procedure TForm1.CommlReceiveData(Sender:Tobject Buffer:Pointer bufferLength:Word) var receivedata:array of byte begin sleep(100) //等待100ms,保证接收到所有数据 move(buffef ,receivedata,bufferlength) //将接收缓存区中的数据转移到数组中 …… end (5) 关闭串口 在系统开发中,应注意在不使用串口时应及时关闭串口,释放系统资源,否则可能会影响系统的其它应用。关闭串口的代码如下: procedure TForm1.FormClose ( Sender TObj ect:var Action:TCIoseAction ) begin comml.StopComm end
标签: commflg procedure senddata integer
上传时间: 2014-01-26
上传用户:懒龙1988
Face Recognition Library ======================== Advanced face recognition DLL using two functions : Train and Recognize. Uses neural net back propogation alogorithm with more AI tools added for imaging optimization. Library works great even for a low resolution web cam image and requires the user to align to a mirror frame on screen. Complete Source Code with Video capture and feature extraction kit for Registered Users. Please register here for only $299 with Source Code : http://www.research-lab.com/facerecognitionorder.htm (c) www.research-lab.com
标签: Recognition recognition Advanced Library
上传时间: 2017-04-25
上传用户:784533221
This volume is an instructor鈥檚 manual for the 4th edition of Database System Concepts by Abraham Silberschatz, Henry F. Korth and S. Sudarshan. It contains answers to the exercises at the end of each chapter of the book.
标签: instructor Database Concepts Abraham
上传时间: 2017-04-29
上传用户:manking0408
Learn to model various modern communication systems with this book from one of the world s leading authors in communications, John G. Proakis. A very helpful reference to MATLAB users of various levels
标签: communication leading systems various
上传时间: 2017-05-07
上传用户:jing911003
Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two main problems seriously darken the future of this technology though. Firstly, the large number of attacks and weaknesses which appear as fast as new algorithms are proposed, emphasizes the limits of this technology and in particu-lar the fact that it may not match users expectations. Secondly, the requirements, tools and methodologies to assess the current technologies are almost non-existent. The lack of benchmarking of current algorithms is bla-tant. This confuses rights holders as well as software and hardware manufacturers and prevents them from using the solution appropriate to their needs. Indeed basing long-lived protection schemes on badly tested watermarking technology does not make sense.
标签: Watermarking watermarking evaluation presented
上传时间: 2013-12-04
上传用户:thinode