-
是个执行管理类,里边的方法控制整个系统执行.是整个执行的支持与控制枢纽....
是个执行管理类,里边的方法控制整个系统执行.是整个执行的支持与控制枢纽.-is executive management category, along the way to control the whole system implementation. The entire implementation is the support and control hub.
- 2022-02-02 02:05:59下载
- 积分:1
-
安全启动delphi!具体看源代码吧
安全启动delphi!具体看源代码吧-The security starts delphi !
- 2022-04-09 14:24:11下载
- 积分:1
-
异步处理类, C++代码
异步处理类, C++代码-asynchronous processing and C code
- 2022-02-04 20:09:08下载
- 积分:1
-
小波神经网络程序,收敛性比BP神经网络好,可以避免局部最优,可用于分类,函数逼近等...
小波神经网络程序,收敛性比BP神经网络好,可以避免局部最优,可用于分类,函数逼近等-Wavelet neural network procedures, convergence than the BP neural network, and can avoid local optimum, can be used for classification, function approximation, etc.
- 2022-02-25 21:12:00下载
- 积分:1
-
推箱子游戏,游戏规则详见源代码注释部分,全C语言编程
推箱子游戏,游戏规则详见源代码注释部分,全C语言编程-Tuixiangzi game, the rules of the game as detailed source notes, the entire C language programming
- 2023-04-16 06:30:03下载
- 积分:1
-
混凝土结构动力非线性分析有限元程序,加州伯克力大学的牛人编制...
混凝土结构动力非线性分析有限元程序,加州伯克力大学的牛人编制-concrete structural dynamic analysis of nonlinear finite element program, the University of California, Berkeley computer cattle were prepared
- 2022-08-22 06:26:48下载
- 积分:1
-
computer graphics lectures, concise summary of the changes in basic knowledge Gr...
计算机图形学的讲义,简练的概括了图形变化基础知识-computer graphics lectures, concise summary of the changes in basic knowledge Graphics
- 2023-02-28 22:00:02下载
- 积分:1
-
对任何集体(如你自己的类)的问题描述…
一:问题描述
针对某个集体(比如你所在的班级)中的“人名”设计一个哈希表,使得平均查找长度不超过R,完成相对的建表和查表程序。
二:基本要求
假设人名为中国人姓名的汉语拼音形式。待填入哈希表的人名共有30个,取平均查找长度的上限为2。哈希函数用除留余数法构造,用伪随机探测再散列法处理冲突。
三:实现提示
如果随机函数自行构造,则应首先调整好随机函数,使其分布均匀。人名的长度均不超过19个字符(最长的人名如:庄双双(ZHAGN SHUANG SHUANG)。字符的取码方法可直接利用C语言中的tosacii函数,并可对过长的人名先作折叠处理。
四:需求分析
本演示程序是对哈希表的建立和查找进行演示,主要数据来自自己编写的人名“A~~Z”等字母组成,拼音由开头的字母组成的词组,查找时用伪随机探测再散列法处理冲突。随机产生人名的位置。具体的程序内容在源程序里面有比较详细的解析。程序的运行在下列有详细的介绍。
-one : Problem description against any collective (such as your own classes) of "names" design a hash table. you make the average length of not more than R, completes the construction and Lookup Table procedures. Two : the assumption that the basic requirements were known as the Chinese name of Chinese pinyin form. Hash Table question Enter the names of a total of 30, you take the average length of a maximum of two. Hash functions with a few exception I stay constructed using pseudo-random re-hash detection method to resolve disputes. 3 : Achieving suggested ra
- 2022-01-22 16:42:56下载
- 积分:1
-
用外积和法设计的权矩阵,不能保证p对模式全部正确的联想。若对记忆模式对加以限制(即要求p个记忆模式Xk是两两正交的),则用外积和法设计的BAM网具有较好的联想能...
用外积和法设计的权矩阵,不能保证p对模式全部正确的联想。若对记忆模式对加以限制(即要求p个记忆模式Xk是两两正交的),则用外积和法设计的BAM网具有较好的联想能力。 在难以保证要识别的样本(或记忆模式)是正交的情况下,如何求权矩阵,并保证具有较好的联想能力?这个问题在用BAM网络实现对字符的识别程序仿真中得到体现。我们做过尝试,用伪逆法求权矩阵,虽然能对未加干扰的字符全部进行识别,但对加有噪声的字符识别效果很差。至于采用改变结构和其他算法的方法来求权矩阵,将是下一步要做的工作。-foreign plot and the design of the power matrix, p is no guarantee that all the correct pattern association. If memory model, the limit (that is, p-memory model Xk is orthogonal to the February 2), then foreign plot and design of the BAM network has good ability to think. It is difficult to ensure the samples to identify (or memory mode) is orthogonal circumstances, the right to seek ways matrix, and to ensure that the association has good ability? The problem with the BAM network of characters identification procedures simulation can be manifested. We did try to use pseudo- inverse matrix for the right, although they would not increase the interference of the characters in the identification of all, However, a pair of noise increases the effects o
- 2022-03-10 00:41:43下载
- 积分:1
-
c版本的,很不错的能运行,我也是从网络下的
c版本的,很不错的能运行,我也是从网络下的-c version, and very good can run, I am also from the network
- 2023-07-08 00:45:03下载
- 积分:1