-
Pro.C#.2008.and.the.NET.3.5.Platform.Fourth.Edition Part 4
Pro.C#.2008.and.the.NET.3.5.Platform.Fourth.Edition Part 4
- 2022-05-16 23:18:59下载
- 积分:1
-
约束最小二乘滤波复原
用真实的PSF函数和噪声强度作为参数进行图像复原
另一程序
盲卷积滤波复原
图像模糊化...
约束最小二乘滤波复原
用真实的PSF函数和噪声强度作为参数进行图像复原
另一程序
盲卷积滤波复原
图像模糊化
-Constrained least squares filter to recover the PSF with the real function and the noise intensity as a parameter to another program Blind Image Restoration to recover convolution filtering of image blurring
- 2022-03-22 15:42:37下载
- 积分:1
-
算法在程序设计的作用基础性、重要性已经毋庸质疑。
算法在程序设计的作用基础性、重要性已经毋庸质疑。-算法在程序设计的作用基础性、重要性已经毋庸质疑
- 2022-07-08 15:10:32下载
- 积分:1
-
该书在国内被翻译为《零错误编程》,中文版的,对于提高代码质量帮助挺大的...
该书在国内被翻译为《零错误编程》,中文版的,对于提高代码质量帮助挺大的-book has been translated in China as "zero-error programming", the Chinese version of the code for improving the quality of the help Tingda
- 2022-02-07 18:03:00下载
- 积分:1
-
MIMO reference
the time reversal and MIMO system will conquer the multi-path in underwater acoustic communication, time reversal can omit multi-path adaptively, MIMO system will use the channel wideband efficiently
- 2022-07-28 10:49:35下载
- 积分:1
-
有m¥n(m£100,n£100)个金币在桌面上排成一个m行n列的金币阵列。每一枚金
币或正面朝上或背面朝上。用数字表示金币状态,0表示金币正面朝上,1 表...
有m¥n(m£100,n£100)个金币在桌面上排成一个m行n列的金币阵列。每一枚金
币或正面朝上或背面朝上。用数字表示金币状态,0表示金币正面朝上,1 表示背面朝上。
金币阵列游戏的规则是:
(1)每次可将任一行金币翻过来放在原来的位置上;
(2)每次可任选2列,交换这2 列金币的位置。 -¥ m has n (m £ 100, n £ 100) a gold coin on the desktop line up a row m column n gold arrays. Each gold coin or a positive upward or back up. Gold status with the number of express, 0 gold express positive upward, the back up that one. Gold arrays the rules of the game are: (1) each can be any turn over his gold on the original position (2) each can choose 2, the exchange of two gold coins in this position.
- 2023-04-09 10:20:04下载
- 积分:1
-
While cryptography can still be a controversial topic in the programming communi...
While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.
This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in application
- 2022-05-15 03:54:08下载
- 积分:1
-
Detailed PDIUSBD12 _ the Chinese version, it is good information
PDIUSBD12详解_中文版,很不错的资料-Detailed PDIUSBD12 _ the Chinese version, it is good information
- 2023-01-22 02:05:04下载
- 积分:1
-
此文档经网上整理 简要介绍了MFC控件变成方面的一些知识
此文档经网上整理 简要介绍了MFC控件变成方面的一些知识-This document briefly describes the order through the Internet into a MFC control, in some knowledge
- 2023-06-20 10:25:03下载
- 积分:1
-
《Master EJB 第二版》
《Master EJB 第二版》-"Master EJB 2nd Edition"
- 2022-01-24 17:13:10下载
- 积分:1