Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode Mathimatics-Numerical algorithms
Mathimatics-Numerical algorithms list
Sort by :
« 1 2 ... .28 .29 .30 .31 .32 28033.34 .35 .36 .37 .38 ... 28522 »
Downloaded:0
Interpolation algorithm, very good, very useful. Need to do so as soon as possible under the. Believe that your help.
Update : 2008-10-13 Size : 19.02kb Publisher : wei

Introduced a digital image encryption technology, the status quo, mainly introduced the chaos in the field of digital image encryption applications. Provides a dual-chaos-based digital image encryption algorithm
Update : 2008-10-13 Size : 1.61mb Publisher : 刘伟

Downloaded:0
VC source. For primality testing of large numbers can be used to 2048 bits of large numbers
Update : 2008-10-13 Size : 1.14kb Publisher : 懒猪

Downloaded:0
UA rate voice compression algorithm, but not the c language, who have the c language?
Update : 2008-10-13 Size : 1.41kb Publisher : 王荣川

Downloaded:0
AIC AND MDL algorithm, input eigenvalue
Update : 2008-10-13 Size : 1.35kb Publisher :

Downloaded:0
k-means algorithm. Including a test of the 4 types of test data sets.
Update : 2008-10-13 Size : 3.78kb Publisher : 马晓艳

Downloaded:0
huffman encoding c++ achieve source, which is described in detail.
Update : 2008-10-13 Size : 41.26kb Publisher : 刘亦羽

Downloaded:0
Harrington of the moment method, a very classic books electromagnetic field numerical calculation
Update : 2008-10-13 Size : 15.74mb Publisher : shenchen

In achieving learning mechanism based on the online features of the tracking algorithm, the paper will give a great help.
Update : 2008-10-13 Size : 835.75kb Publisher : 陈霄恒

Downloaded:0
Olympic Middle School information electronic tutorial that involves many different algorithm strategies. For all of us may be a bit to use it.
Update : 2008-10-13 Size : 646.44kb Publisher : andy

Downloaded:0
This system library management system, its realization is the library management system subsystems
Update : 2008-10-13 Size : 601.54kb Publisher : zhouliming

Downloaded:0
All of the above applications and database operations are carried out to verify the legitimacy of the validity of restrictive conditions and related inspection, if they meet the operating conditions related to the operat
Update : 2008-10-13 Size : 1005.86kb Publisher : zhouliming
« 1 2 ... .28 .29 .30 .31 .32 28033.34 .35 .36 .37 .38 ... 28522 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.