搜索资源列表
Improving
- Each arc of a binary-state network has good/bad states. The system reliability, the probability that source s communicates with sink t, can be computed in terms of minimal paths (MPs). An MP is an ordered sequence of arcs from s to t that has no
rtklib_2.4.1 卫星数据解算的程序
- rtklib 版本2.4.1 An Open Source Program Package for GNSS Positioning 日本开源网站上提供的关于卫星数据解算的程序。All of the executable binary APs for Windows are included in the package as well as whole source programs of the library and the APs. * For real-time PP
chengxuyuan
- [程序员考试视频教程]硬件基础_二进制编码.rar-[Video Guide programmer exam] _ basic hardware binary code. Rar
142461___binaryfloatingpointarithmetic
- binary arthimetic related document
EdgeDetection_BoundaryTracing
- Edge detection to find the boundary of an object in binary image
GA_SOURCE_CODE
- 二进制编码的遗传算法源程序,可以对此算法进行改进,编写出自己需要的程序-Binary-coded genetic algorithm source code, you can improve on this algorithm, write out the procedures they need
QRCode_Standard
- 二维码 (2-dimensional bar code) 是用某种特定的几何图形按一定规律在平面(二维方向上)分布的黑白相间的图形记录数据符号信息的;在代码编制上巧妙地利用构成计算机内部逻辑基础的“0”、“1”比特流的概念,使用若干个与二进制相对应的几何形体来表示文字数值信息,通过图象输入设备或光电扫描设备自动识读以实现信息自动处理: 二维条码/二维码能够在横向和纵向两个方位同时表达信息,因此能在很小的面积内表达大量的信息。-Two-dimensional code (2-dimensional
folding_encoding_scheme
- Efficient way of coding FI-ADC. Output of FI_ADC is in gray code format. Gray to binary coding of FI-ADC
modified-booth-algorithm
- this document describe method of binary multiplication of signed and unsigned integer. it represent also the booth algorithm wich compounded with shift and adder blocks this optimise the comsumption of the alu
software-vulnerability-detection
- 基于二进制文件的漏洞挖掘关键技术研究,博士论文-research on binary-executable-oriented software vulnerability detection, doctor thesis
num_util
- float to binary conversion using matlab
DES
- The Data Encryption Standard (DES) shall consist of the following Data Encryption Algorithm (DE S) and Triple Data Encryption Algorithm ( TDEA, as described in ANSI X9.52). These devices shall be designed in such a way that they may be used in
FEBioBinaryDatabaseSpecification
- This document describes the structure of the FEBio binary database (that is, the FEBio plot file format), which stores the results of an FEBio analysis. The FEBio binary database format is both self-describing and extendible. A user can underst
RFID-lunwen
- 针对射频识别系统中的标签碰撞问题,提出了一种基于分组策略的RFID自适应防碰撞算法。该算法在二叉树搜索算法的基础上引入分组策略、后退策略、自适应地选择四叉树搜索策略、动态调整标签碰撞检测过程策略,减少了搜索次数和读写器与标签间的通信量,提高了识别效率。-Systems for radio frequency identification tag collision problem, a packet-based strategy RFID adaptive anti-collision algo
Binary-Patch-Comparison
- 针对软件二进制补丁分析过程,提出一种指令归一化算法,用于判别补丁前后的相应基本块内指令是否发生重排序-Aiming at the analyzing process of software binary patch, this paper proposes an instruction normalization algorithm to distinguish whether the corresponding basic blocks are reordered
A-Binary-Level-Set-Model-
- 二值水平集方法在图像分割中的新应用,改进原来的水平集方法-New applications of the binary level set method of image segmentation, improved the original level set method
[1999]_Procedural_Abstraction_Recovery_from_Binar
- This paper deals with the recovery of high-level procedure calls from binary code namely, the recovery of parameters and return locations, in a machine-independent way.-This paper deals with the recovery of high-level procedure calls from binary code
6
- local binary pattern paper.
lbp_x
- local binary pattern document
A-Binary-Tree-for-Probability-Learning-in-Eye-Det
- A Binary Tree for Probability Learning in Eye Detection