登录
首页 » matlab » potential

potential

于 2021-03-03 发布 文件大小:240KB
0 229
下载积分: 1 下载次数: 23

代码说明:

  基于改进人工势场法的路径规划,解决了局部极小值问题和目标不可达问题(The path planning based on the improved artificial potential field method solves the local minimum problem and the target unreachable problem.)

文件列表:

potential, 0 , 2017-12-25
potential\astart.m, 6500 , 2014-06-06
potential\distanceCost.m, 557 , 2014-06-06
potential\feasiblePoint.m, 751 , 2014-06-06
potential\map1.bmp, 251078 , 2014-06-06
potential\map1.m, 0 , 2017-05-02
potential\map2.bmp, 251078 , 2014-06-06
potential\map3.bmp, 251078 , 2014-06-06
potential\map4.bmp, 251078 , 2014-06-06
potential\map5.bmp, 251078 , 2014-06-06
potential\plotRobot.m, 1376 , 2017-05-02
potential\potential.pdf, 192524 , 2014-06-06
potential\Thumbs.db, 97792 , 2014-06-06

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • ssh3框架集成项目
    开发工具:eclipse 环境:jdk1.7以上  功能描述:这个框架集成了struts2 spring hibernate3 前端用的是easyui 数据库是oracle,这个demo实现了简单的权限管理,菜单配给及相应的业务逻辑(实现了增删改查),业务模块实现了邮件的发送,会对一定条件的信息进行邮件发送,并且调用了websocket接口,请大神们指正,谢谢!
    2022-06-15 21:21:52下载
    积分:1
  • feijishugongji
    《菜鸟也能防黑客之非技术攻击》就是向大家介绍这种方法。正如书名所述,这些方法并不是多么高深的技米,你也一样可以做到。看过《菜鸟也能防黑客之非技术攻击》之后,你会发现在非技术攻击面前,那些所谓的高科技设备是多么的脆弱。想知道黑客怎样从电脑中获取数据而不留痕迹吗?如何不用碰键盘就能侵入邮件服务器吗?这不是魔幻大片,而是真真正正发生在我们身边。 我们都知道信息的重要性。随着计算机时代的来临,大量的信息以电子的形式存储。而用高科技的电子保护系统来保护信息也就是自然而然的事情。作为一名职业黑客,作者的主要工作就是发现这些系统的弱点。在一次又一次的入侵后,作者发现了可以绕开那些所谓高科技防御系统的方法。 你和你身边的人很可能现在就正在受到此种攻击,你准备好了吗?("Rookie also can prevent unskilled hackers attack" is to introduce this method. As the title said, these methods are not rocket technology meters, you can do it too. Read the "rookie can prevent unskilled hackers attack" after, you will find in front of non-technical attacks, how fragile is the so-called high-tech equipment. Want to know how to get data from hackers computer without leaving traces of it? How not to touch the keyboard can invade the mail server? It s not magic movies, but really in our midst. We all know the importance of information. With the advent of the computer age, a lot of information stored in electronic form. And with high-tech electronic protection systems to protect information that is a natural thing. As a professional hacker, author of the main job is to find weaknesses in these systems. Again and again after the invasion, the authors found that can bypass the so-called high-tech defense systems. You and the people around you are likely to suffer such att)
    2013-12-06 14:56:44下载
    积分:1
  • 上传组件
    aspupload
    2022-12-14 23:15:03下载
    积分:1
  • The-knowledge-of-computer-hackers.208
    黑客电脑全知识,208篇。The knowledge of computer hackers. 208(The knowledge of computer hackers. 208)
    2010-06-24 15:23:20下载
    积分:1
  • Alternate-Transactions-Articles-LaTeX-template
    说明:  IEEE期刊模板,不错可以用,写作环境是latex语言(IEEE Journal Template)
    2020-06-25 15:00:02下载
    积分:1
  • Deitel 信使案例研究
    Deitel的Java套接字编程实例,是Java大学教程上的源码,展示了一个完整的消息发送接收的过程。
    2022-11-21 08:35:04下载
    积分:1
  • 用UDP实现的一个点对点聊天序。 用异步方式实现
    用UDP实现的一个点对点聊天程序。 用异步方式实现-using UDP achieve a peer-to-peer chat program. Asynchronous means
    2022-08-07 05:36:40下载
    积分:1
  • Client
    VC++ 2008客户端实现 可以模拟多个服务器链接(VC++ 2008 client implementation can simulate multiple servers link)
    2012-10-02 03:31:21下载
    积分:1
  • 很好的事情我们一起分享
    很好的事情我们一起分享-good things we share
    2023-02-19 15:25:03下载
    积分:1
  • 基于客户端|服务器模式的socket
    基于客户端|服务器模式的socket编程-Based on the c/s mode of socket programming
    2022-11-20 14:45:03下载
    积分:1
  • 696516资源总数
  • 106478会员总数
  • 6今日下载