-
Bluetooth firmware
SIM800 firmware with bluetooth
- 2018-09-06 01:20:10下载
- 积分:1
-
Matlab数值微分法汇总
说明: Matlab数值微分法汇总:MidPoint 中点公式求取导数
ThreePoint 三点法求函数的导数
FivePoint 五点法求函数的导数
DiffBSample 三次样条法求函数的导数
SmartDF 自适应法求函数的导数
CISimpson 辛普森数值微分法法求函数的导数
Richason 理查森外推算法求函数的导数
ThreePoint2 三点法求函数的二阶导数
FourPoint2 四点法求函数的二阶导数
FivePoint2 五点法求函数的二阶导数
Diff2BSample 三次样条法求函数的二阶导数(Summary of numerical differentiation in Matlab)
- 2021-04-04 11:29:04下载
- 积分:1
-
网站模版
发布基于风讯CMS的各类模版,您可以在这里交流设计经验,也可从此处下载免费的精美风讯模版!...
网站模版
发布基于风讯CMS的各类模版,您可以在这里交流设计经验,也可从此处下载免费的精美风讯模版!-website template-based CMS wind-- the various templates, you can exchange experience in the design, can be downloaded free from here exquisite style templates appear!
- 2023-04-18 16:35:03下载
- 积分:1
-
G11_loader
富士G11变频器通用连接程序,调试组态王时,做参考。这是厂家内部提供软件,我做大工程时,套关系才给的(Fujitsu General G11 inverter connection procedures, debugging KingView when reference. This is the provision of software manufacturers, I make a big project, sets of relations to the)
- 2008-12-13 12:41:55下载
- 积分:1
-
对于 c# 的 CPM 代码
此代码包含在 C# 语言中实现的关键路径方法。
- 2022-02-15 22:07:32下载
- 积分:1
-
matalab--optimization
最优化理论和算法日益受到重视,已经渗透到各行各业中,并得到了广泛应用(Optimization theory and algorithm have attracted more and more attention, and have penetrated into all walks of life, and have been widely used)
- 2017-11-20 16:43:11下载
- 积分:1
-
快速排序的经典算法
快速排序的经典算法-Quick Sort of the classic algorithm
- 2022-02-13 01:29:10下载
- 积分:1
-
asp.net多种分页格式 asp.net多种分页格式
asp.net多种分页格式 asp.net多种分页格式-asp.net pager asp.net pager
- 2023-03-17 08:30:04下载
- 积分:1
-
TCN-with-attention-master
说明: 基于注意力的的方法,预测使用的tcn,tcn是比lstm更好的一种预测方法,附数据(Based on the attention method, TCN is better than LSTM in prediction, with data attached)
- 2020-12-06 16:19:24下载
- 积分:1
-
Security
安卓权限动态监控系统是一套基于安卓的软件权限和个人应用数据监控系统,实现了敏感权限访问记录生成、网络流量和短信的监控、软件行为分析、用户交互模块采用数据报表可视化的方式,让用户直观地了解到手机中各应用程序访问了哪些敏感权限,是否有非授权流量或短信的流出,同时系统还可视化地给出了应用程序的危险系数和行为分析。(Android permission dynamic monitoring system is a software permission and personal application data monitoring system based on Android. It realizes the generation of sensitive permission access records, the monitoring of network traffic and short messages, the analysis of software behavior, and the visualization of user interaction module by data report forms, so that users can intuitively understand which sensitive permissions are accessed by various applications in mobile phones, and whether there are non-users. Authorized traffic or SMS outflow, while the system can visually give the application risk factor and behavior analysis.)
- 2019-04-23 09:47:57下载
- 积分:1