登录
首页 » SQL » exceru

exceru

于 2019-04-08 发布
0 115
下载积分: 1 下载次数: 0

代码说明:

说明:  Twitter Snowflake 生产唯一ID,C#版源码,支持排序(Twitter Snowflake produces unique ID,C# version source code that supports sorting)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 迁移学习对花进行分类
    迁移学习简单算法,涉及到迁移学习的一些简单原理,学习参考使用(transfer_learning.py)
    2018-10-20 19:06:35下载
    积分:1
  • ListButtonToolBarView
    实现PING功能,很不错的代码,很详细,很好看(To achieve PING function, very good code, very detailed, very nice)
    2017-03-18 20:16:17下载
    积分:1
  • PSO_WNN
    用PSO算法优化小波网络的权值,简单易懂,可以在此基础上作改进(Wavelet Network optimization with PSO algorithm weights, easy to understand, we can make improvements based on this)
    2016-05-24 16:43:26下载
    积分:1
  • ipman
    IP包监听程序 (IP packet sniffer)
    2020-06-26 12:40:01下载
    积分:1
  • GA-RBF
    说明:  1.利用GA算法优化RBFNN的各种权值; 2.利用RBFNN进行函数跟踪; 3.比较测试未用GA优化的和使用GA优化的RBFNN的结果。(1.Use GA algorithm to optimize a variety of weights in RBFNN 2. Use RBFNN to realize tracking function 3. Compare and test the results of using GA and not using GA.)
    2010-03-21 13:38:45下载
    积分:1
  • feijishugongji
    《菜鸟也能防黑客之非技术攻击》就是向大家介绍这种方法。正如书名所述,这些方法并不是多么高深的技米,你也一样可以做到。看过《菜鸟也能防黑客之非技术攻击》之后,你会发现在非技术攻击面前,那些所谓的高科技设备是多么的脆弱。想知道黑客怎样从电脑中获取数据而不留痕迹吗?如何不用碰键盘就能侵入邮件服务器吗?这不是魔幻大片,而是真真正正发生在我们身边。 我们都知道信息的重要性。随着计算机时代的来临,大量的信息以电子的形式存储。而用高科技的电子保护系统来保护信息也就是自然而然的事情。作为一名职业黑客,作者的主要工作就是发现这些系统的弱点。在一次又一次的入侵后,作者发现了可以绕开那些所谓高科技防御系统的方法。 你和你身边的人很可能现在就正在受到此种攻击,你准备好了吗?("Rookie also can prevent unskilled hackers attack" is to introduce this method. As the title said, these methods are not rocket technology meters, you can do it too. Read the "rookie can prevent unskilled hackers attack" after, you will find in front of non-technical attacks, how fragile is the so-called high-tech equipment. Want to know how to get data from hackers computer without leaving traces of it? How not to touch the keyboard can invade the mail server? It s not magic movies, but really in our midst. We all know the importance of information. With the advent of the computer age, a lot of information stored in electronic form. And with high-tech electronic protection systems to protect information that is a natural thing. As a professional hacker, author of the main job is to find weaknesses in these systems. Again and again after the invasion, the authors found that can bypass the so-called high-tech defense systems. You and the people around you are likely to suffer such att)
    2013-12-06 14:56:44下载
    积分:1
  • syytem_report
    超级报表系统软件VclSkin,v2,60,4,29,完整源代码版(Super report system software VclSkin,v2,60,4,29, complete source code version)
    2018-12-21 06:44:27下载
    积分:1
  • <vc视频会议开发技术与实例>第八章代码,基于实时通信(RTC)API的视频会议系统...
    第八章代码,基于实时通信(RTC)API的视频会议系统- Chapter VIII of the code, based on real-time communication (RTC) API of the video conference system
    2022-01-31 06:27:30下载
    积分:1
  • BP2cma
    基于BP神经网络的盲均衡算法,已经详细给了注释,是另外一个哦。 与常模算法相结合的内容国。(blind equalization based n bp neutralneowkrs.)
    2014-06-03 21:08:07下载
    积分:1
  • jrtp library jrtp library jrtp library jrtp library jrtp library jrtp libra...
    jrtp library jrtp library jrtp library -jrtp library jrtp library jrtp library jrtp library jrtp library jrtp library
    2022-03-06 00:00:42下载
    积分:1
  • 696518资源总数
  • 105949会员总数
  • 22今日下载