登录
首页 » PPT » ppt-jiqiao03

ppt-jiqiao03

于 2010-10-09 发布 文件大小:7KB
0 307
下载积分: 1 下载次数: 6

代码说明:

  ppt高级技巧系列03,让你成为ppt制作高手。(ppt series of 03 advanced techniques, so that you become a master production ppt.)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • infraredtransmission
    远红外数据传输粮情检测系统 远红外数据传输粮情检测系统(far-infrared data transmission Grain far-infrared detection system data transmission Grain Frederick Measuring System)
    2006-06-10 23:40:09下载
    积分:1
  • DDKzhongwen
    称它为“驱动程序超级宝典“一点也不过分,因为它是被译为中文的MSDN DDK文档。这个文档不是我翻译的,我只不过将它编辑了一下。翻译它的同志是个高手,非常专业,在此先谢谢他给我们作的工作。 ( Called it is "the driver super precious book" not excessively, because it is translated for Chinese MSDN the DDK documents. This documents are not I translate, I only have edited it. Translates it comrade is a master, extremely specialized, first thanks him in this the work which does to us. )
    2006-06-15 17:45:23下载
    积分:1
  • LATEX-install-and-use
    中文LATEX_安装与使用(优秀教程),用于latex学习应用。(Chinese LATEX_ install and use (excellent tutorial) for latex-learning applications.)
    2014-02-19 20:06:50下载
    积分:1
  • Deep
    说明:  本文提出了一种用于通信系统中无线电信号检测的自动调制识别框架。该框架考虑了深度卷积神经网络(CNN)和长期短期记忆网络(LSTM)。 此外,我们提出了一种预处理信号表示,其组合了调制信号的同相,正交和四阶统计。所提供的数据表示允许我们的CNN和LSTM模型对我们的测试数据集实现8%的改进。(Automatic Modulation Recognition using Deep Learning Architectures, 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC))
    2020-11-12 21:19:44下载
    积分:1
  • The little SAS book(中文版全文)
    SAS编程书籍-The little SAS book中文版(The little SAS book- Lora D. Delwiche / Susan J. Slaughter The Little SAS Book is a classic, helping many people learn SAS programming.)
    2018-04-10 19:26:15下载
    积分:1
  • P020180608516798097666
    说明:  BeiDou Navigation Satellite System Signal In Space
    2020-06-19 16:20:01下载
    积分:1
  • ecc
    This paper analyzes the cryptography scheme of the Trust Platform Model(TPM). The focus of the discussion would be the comparison of elliptic curve cryptography and the nowadays widely used 2048-bit RSA in evaluating which would be better suited to be used on TPM. A TPM implementation scheme based on ECC is proposed, which includes encryption and decryption schemes, signature and verification scheme, key agreement scheme. Corresponding examples of TPM commands would also be given.
    2019-06-13 14:53:45下载
    积分:1
  • IDA.Pro.5.4help
    ida的帮助文件,翻译成中文的,查函数很方便(ida' s help file, translated into Chinese, it is convenient search function)
    2020-07-02 16:00:02下载
    积分:1
  • [计算机网络第五版]计算机网络第五版
    计算机网络第五版: 计算机网络在信息时代中的作用, 因特网概述,网络的网络(Computer network Fifth Edition: the role of computer networks in the information age, Internet overview, network network)
    2021-02-18 09:59:46下载
    积分:1
  • theArtOfDeception
    美国著名黑客凯文出狱后的大作,本书介绍了各种入侵手法,和案例。(英文原著)(The United States after his release a well-known hacker Kevin s masterpiece, this book introduces all kinds of invasion of practices, and cases. (English original))
    2007-12-31 06:02:50下载
    积分:1
  • 696518资源总数
  • 106148会员总数
  • 10今日下载