-
C 编程示例
C 编程示例: 这些程序说明各种编程元素的概念,如使用运算符、 循环、 函数、 单人和双人的二维数组,字符串、 文件、 指针等上执行的操作。浏览到你正在寻找,其中每个之一提供输出复杂的简单的 c 程序中的代码。
- 2023-06-20 15:55:03下载
- 积分:1
-
利用PML吸收边界条件计算对称阵子天线的辐射,并且画出动态图像...
利用PML吸收边界条件计算对称阵子天线的辐射,并且画出动态图像-PML absorbing boundary conditions for the use of Symmetric stream of the antenna radiation, and to draw dynamic image
- 2022-11-25 23:15:03下载
- 积分:1
-
FreeFEM is an implementation of the GFEM language dedicated
to the finite elem...
FreeFEM is an implementation of the GFEM language dedicated
to the finite element method. It provides you a way to solve Partial
Differential Equations (PDE) simply. Although you can solve quite complicated
problems can be solved also.
- 2022-12-29 17:00:03下载
- 积分:1
-
最小函数依赖
用c语言编辑数据库中的最小函数依赖, 求属性集X(XU)关于U上的函数依赖集F 的闭包XF+
- 2022-04-19 13:20:58下载
- 积分:1
-
Matlab、基于 MATLAB系统的信号FFT
Matlab、基于 MATLAB系统的信号FFT-Matlab, based on MATLAB FFT signal system
- 2022-05-10 20:53:36下载
- 积分:1
-
C4.5 is a simplified version of the Decision Tree Algorithm
C4.5的简化版本是一个决策树的算法-C4.5 is a simplified version of the Decision Tree Algorithm
- 2022-01-22 07:48:49下载
- 积分:1
-
可用于3维或者4维的fourier变换程序
可用于3维或者4维的fourier变换程序-can be used for three-dimensional or four-dimensional fourier transform procedures
- 2022-03-24 10:49:35下载
- 积分:1
-
Minute calculation method of quadrature formula
计算方法复化求积公式-Minute calculation method of quadrature formula
- 2022-10-31 08:40:02下载
- 积分:1
-
sha1和sha256 C语言实现源码
本资源是sha1和sha256算法的C语言源码实现,可以供读者了解和学习sha1和sha256算法的计算过程和具体实现步骤。本资源本人已经实测过,测试没有问题,可以供其他读者直接使用。
- 2022-03-12 15:55:29下载
- 积分:1
-
该程序是用C语言写的采用了动量方法的BP神经网络,它具有极其强大的扩展性,可用于函数的逼近及分类识别等各方面,语言书写规范,其中大量使用了动态分配一、二维数组的...
该程序是用C语言写的采用了动量方法的BP神经网络,它具有极其强大的扩展性,可用于函数的逼近及分类识别等各方面,语言书写规范,其中大量使用了动态分配一、二维数组的方法,该网络实例中实现的是对某一函数的逼近,输入层为二层,中间层可自己设定多达十几层,逼近精度非常精确。读者可根据自己的需要设定各层的数目以及相应的训练样本进行训练与测试。-The program is written in C language using the momentum method of BP neural network, which has extremely powerful scalability, can be used for function approximation and classification in areas such as language specification, including large-scale use of a dynamically allocated one, two dimensional array of methods, examples of the network realize that the approximation of a function, for the second input layer, middle layer can be set as many as a dozen layers, close to very precise accuracy. Readers may need to be set in accordance with its own number of floors and the corresponding training samples for training and testing.
- 2022-09-23 15:35:02下载
- 积分:1