虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

non-weighted

  • 【下载说明】这里提供的是《》一书的CHm格式电子书下载。【内容简介】Ruby has been readily adopted by programmers in Japan and has had

    【下载说明】这里提供的是《》一书的CHm格式电子书下载。【内容简介】Ruby has been readily adopted by programmers in Japan and has had much documentation written for it in Japanese. As programmers outside of Japan learn about the benefits of Ruby, there is a growing need for documentation in English. The first book I wrote for O Reilly, Ruby Pocket Reference, was in Japanese. Since then Ruby has changed significantly. To meet the needs of non-Japanese programmers, we translated, updated, and expanded Ruby Pocket Reference into Ruby in a Nutshell.

    标签: programmers has adopted readily

    上传时间: 2014-01-14

    上传用户:kikye

  • THIS DESIGN IS PROVIDED TO YOU "AS IS". XILINX MAKES AND YOU RECEIVE NO WARRANTIES OR CONDITIONS, EX

    THIS DESIGN IS PROVIDED TO YOU "AS IS". XILINX MAKES AND YOU RECEIVE NO WARRANTIES OR CONDITIONS, EXPRESS, IMPLIED, STATUTORY OR OTHERWISE, AND XILINX SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT, OR FITNESS FOR A PARTICULAR PURPOSE. This design has not been verified on hardware (as opposed to simulations), and it should be used only as an example design, not as a fully functional core. XILINX does not warrant the performance, functionality, or operation of this Design will meet your requirements, or that the operation of the Design will be uninterrupted or error free, or that defects in the Design will be corrected. Furthermore, XILINX does not warrant or make any representations regarding use or the results of the use of the Design in terms of correctness, accuracy, reliability or otherwise.

    标签: CONDITIONS WARRANTIES YOU PROVIDED

    上传时间: 2016-03-21

    上传用户:1427796291

  • This document is a simplified version of the original. This version is not required to be treated as

    This document is a simplified version of the original. This version is not required to be treated as confidential and Non Disclosure Agreement with neither the 3C LLC nor the SDA is required. Reproduction in whole or in part is prohibited without prior written permission of SDA.

    标签: version This simplified document

    上传时间: 2014-12-08

    上传用户:zhangyi99104144

  • PTypes (C++ Portable Types Library) is a simple alternative to the STL that includes multithreading

    PTypes (C++ Portable Types Library) is a simple alternative to the STL that includes multithreading and networking. It defines dynamic strings, variants, character sets, lists and other basic data types along with threads, synchronization objects, IP sockets and named pipes. PTypes also offers message queues as an alternative method of thread synchronization. Its main `target audience is developers of complex network daemons, robots or non-visual client/server applications of any kind

    标签: multithreading alternative Portable includes

    上传时间: 2016-03-25

    上传用户:lz4v4

  • Noncoherent receivers are attractive for pulsed UWB systems due to the implementation simplicity. To

    Noncoherent receivers are attractive for pulsed UWB systems due to the implementation simplicity. To alleviate the noise effect in detecting UWB PPM signals, this letter proposes a simple yet flexible weighted noncoherent receiver structure, which adopts a square-law integrator multiplied with a window function.

    标签: implementation Noncoherent attractive simplicity

    上传时间: 2013-12-01

    上传用户:wys0120

  • 遗传算法

    遗传算法,里面分为4个部分,第一,二部分主要是看sexual reproduction 和asxuel reproduction的区别。第三部分里面有spatial 和 non-spatial的比较。第4部分是遗传算法中有关modularity 的相关代码。

    标签: 算法

    上传时间: 2013-12-25

    上传用户:fnhhs

  • JLAB is a set of Matlab functions I have written or co-written over the past fifteen years for the p

    JLAB is a set of Matlab functions I have written or co-written over the past fifteen years for the purpose of analyzing data. It consists of four hundred m-files spanning thirty thousand lines of code. JLAB includes functions ranging in complexity from one-line aliases to high-level algorithms for certain specialized tasks. These have been collected together and made publicly available for you to use, modify, and --- subject to certain very reasonable constraints --- to redistribute. Some of the highlights are: a suite of functions for the rapid manipulation of multi-component, potentially multi-dimensional datasets a systematic way of dealing with datasets having components of non-uniform length tools for fine-tuning figures using compact, straightforward statements and specialized functions for spectral and time / frequency analysis, including advanced wavelet algorithms developed by myself and collaborators.

    标签: co-written functions the fifteen

    上传时间: 2014-01-26

    上传用户:hjshhyy

  • This directory builds the miniport driver for Adaptec’s 1540 family of SCSI controllers. This driver

    This directory builds the miniport driver for Adaptec’s 1540 family of SCSI controllers. This driver exports several functions which are used by SCSIPORT.SYS to issue SCSI requests to the devices attached to the controller, process adapter interrupts, and various other SCSI activities. This driver is also responsible for detecting non-Plug and Play 1540 SCSI controllers—the Plug and Play controllers are detected by the operating system—and for shutting down the controller during device removal or power management operations. This sample also demonstrates the use of the SCSIWMI library to add WMI functionality to SCSI miniports. This library can be linked into a miniport and provides most of the framework needed to expose WMI data blocks to SCSIPORT and the system.

    标签: driver This controllers directory

    上传时间: 2016-06-28

    上传用户:caiiicc

  • This is the source code for encryption using the latest AES algorithm. AES algorithm is also called

    This is the source code for encryption using the latest AES algorithm. AES algorithm is also called Rijndael algorithm. AES algorithm is recommended for non-classified use by the National Institute of Standards and Technology(NIST), USA. Now-a-days AES is being used for almost all encryption applications all around the world.

    标签: algorithm encryption AES the

    上传时间: 2014-01-18

    上传用户:xc216

  • Program main BIOS image | | /B - Program Boot Block | | /N - Program NVRAM | | /C - Destroy CM

    Program main BIOS image | | /B - Program Boot Block | | /N - Program NVRAM | | /C - Destroy CMOS checksum | | /E - Program Embedded Controller Block | | /K - Program all non-critical blocks | | /Kn - Program n th non-critical block only(n=0-7) | | /Q - Silent execution | | /REBOOT - Reboot after programming | | /X - Don t Check ROM ID | | /S - Display current system s ROMID | | /Ln - Load CMOS defaults

    标签: Program Destroy Block NVRAM

    上传时间: 2016-07-26

    上传用户:wfl_yy