Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode Mathimatics-Numerical algorithms
Mathimatics-Numerical algorithms list
Sort by :
« 1 2 ... .88 .89 .90 .91 .92 26993.94 .95 .96 .97 .98 ... 28522 »
Downloaded:0
examples of achievement, the data structure an important algorithm
Update : 2025-03-10 Size : 269kb Publisher : shisanyu

Downloaded:0
VC prepared by the numerical analysis to catch up, may amend N changes to the value of the matrix size.
Update : 2025-03-10 Size : 7kb Publisher : 陈怀铭

Downloaded:0
VC prepared by the numerical analysis inside the triangular matrix algorithm, I have read several certification.
Update : 2025-03-10 Size : 7kb Publisher : 陈怀铭

Downloaded:0
using a genetic algorithm for optimal solution of the main procedures is the use of genetic algorithms for optimal iterative approximation Solutions
Update : 2025-03-10 Size : 2kb Publisher : 薛燕

Downloaded:0
using a genetic algorithm for the optimal solution, including crossover and mutation processes
Update : 2025-03-10 Size : 2kb Publisher : 薛燕

Downloaded:0
MATLAB inside with the LPC parameter extraction procedures.
Update : 2025-03-10 Size : 3kb Publisher :

Downloaded:0
GA source, run-off, can definitely learning GA can refer to the trial
Update : 2025-03-10 Size : 3kb Publisher : 张立

Downloaded:0
good blend of witty renju artificial intelligence source. Rar good blend of witty renju artificial intelligence source. Rar
Update : 2025-03-10 Size : 145kb Publisher : zaisheng

Downloaded:0
a terrific network control system simulation software, truetime Toolbox including Computer and TrueTime Truetime Ne allow two interface modules. The computer module with flexible real-time kernel, A/D and D/A converters,
Update : 2025-03-10 Size : 955kb Publisher : 张茸擎

Downloaded:0
digital watermarking technology is currently more popular anti-piracy technology, the process includes the embedded watermark, the general attack Extraction watermark, watermark detection
Update : 2025-03-10 Size : 550kb Publisher : 魏凯

Downloaded:0
prepared by the genetic algorithm, Markov is the application Intrusion Detection of the data used is http :// ~ www.cs.unm.edu/ immsec/data/Jr.-sm.h the 27-31
Update : 2025-03-10 Size : 11kb Publisher : 唐宇

Downloaded:0
when used, the post "Control Panel/management tools/ODBC data source," the source of configuration data, known as "TRANSACTION", the database Apriori folder.
Update : 2025-03-10 Size : 103kb Publisher : 唐宇
« 1 2 ... .88 .89 .90 .91 .92 26993.94 .95 .96 .97 .98 ... 28522 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.