-
23opencv
车道线检测效果较好,检测准确,其中包括曲线拟合追踪。(Lane detection is effective and accurate, including curve fitting and tracking.)
- 2020-07-04 11:40:02下载
- 积分:1
-
jjjxm
包含光伏电池模块、MPPT模块、BOOST模块、逆变模块,基于欧几里得距离的聚类分析,MIMO OFDM matlab仿真。( PV modules contain, MPPT module, BOOST module, inverter module, Clustering analysis based on Euclidean distance, MIMO OFDM matlab simulation.)
- 2017-05-03 16:17:30下载
- 积分:1
-
24Points
24点游戏,找出所有解。给任意4个数,该程序能找出所有通过加,减,乘,除,括号算出24结果的算式。(24-point game, find all solutions. To any four numbers, the program can identify all through add, subtract, multiply, divide, calculate 24 results parentheses formula.)
- 2013-08-19 12:02:21下载
- 积分:1
-
VBMouseWheehao
VB6开发环境的鼠标滚轮插件
VB6开发环境,无法使用鼠标的滚轮,这个插件解决了这个问题.
使用方法是用VB把这个插件编译好,编译时,把动态库指向windows目录.(plug-in for vb , vb mouse wheel
original vb donot support mouse wheel. so someone develop this plug for vb.
It write by vb. So you have to compile it by visual basic, then registe it in your computer.)
- 2009-06-18 21:16:27下载
- 积分:1
-
VB创建ACCESS数据库
VB 创建 ACCESS 数据库,个人练习,一起学习,谢谢(VB Creates ACCESS Database)
- 2020-06-23 15:40:02下载
- 积分:1
-
multifractal
平均功率谱密度多维分形,可以计算二维位场数据的分维值(Average power spectral density multi-dimensional fractal, can calculate the two-dimensional potential field data, fractal dimension)
- 2008-03-18 22:34:25下载
- 积分:1
-
SOURCE KOFD 7556
Segue abaixo a source code do wyd do cliente 760
- 2020-06-24 16:20:02下载
- 积分:1
-
tanhaoqiangdiwuzhang
谭浩强c++课件第五章 是一个很好的C++学习课件 值得拥有(Hemopurification c++ courseware fifth chapter is a good learning courseware deserve C++)
- 2014-01-14 11:40:14下载
- 积分:1
-
lua-design
lua程序设计,lua入门最经典的电子书,高清版本(lua programming, lua Getting the most classic books, HD version)
- 2014-11-29 00:28:05下载
- 积分:1
-
简易网络嗅探器
网络嗅探器在网路安全方面扮演很重要的角色。使用网络嗅探器可以把网卡设置为混杂模式,并可实现对网络上传输的数据包的捕获与分析。次分析结果可供网络安全分析之用,更有可能被用来做一些黑客行为。本文将详细介绍嗅探器的实现原理,并给出一个简单的实例。(Network sniffer plays a very important role in network security. The network sniffer can be used to set the network card as promiscuous mode, and it can capture and analyze the data packets transmitted on the network. The results of sub analysis can be used for network security analysis, and more likely to be used to do some hacker behavior. In this paper, the implementation principle of sniffer is introduced in detail, and a simple example is given.)
- 2017-10-27 20:45:09下载
- 积分:1