资源列表
69825034ISOface-marching
- 实现了图形图像的一个重要算法,有详细的文本说明-To achieve an important image of the image algorithm, a detailed text descr iption
tonemaping
- 实现了图形学中的tonemaping算法,有详细的文字说明-The realization of the graphics in the tonemaping algorithm, a detailed text descr iption
tq3358_can
- TQ3358 Cortex-A8嵌入式开发板CAN总线例程-TQ3358 architecture (A8 embedded development board CAN bus routines
an
- 易语言安全密码框源码例程程序调用API函数创建组件回调函数,判断取密码文本的消息值,根据内部逻辑判断是否可以取密码。 -Easy language security password box source routine procedure calls the API function to create a component callback function to determine the value of the message to take the password text,
xls
- 易语言xls到超级列表框源码例程程序结合易语言扩展界面支持库和易语言第三方ADODB数据驱动操作支持库,实现将EXCEL文件的数据导入到超级列表框中。 -Easy language XLS to the super list box source routine procedures combined with easy language extensions interface support libraries and easy language third party ADODB da
ya
- 易语言MP3压缩源码例程程序结合易语言扩展界面支持库并调用API函数,实现MP3体积的压缩,使MP3播放器或者手机能存放更多的歌曲。 -MP3 easy language source code routines combined with easy language interface to support the expansion of the library and call the API function to achieve the compression of MP3 vol
matalb_anli
- 购买matlab学习类书籍中光盘自带matlab实例教程,附有完整代码,希望有需要的朋友可以借鉴。-Buy them in the books matlab disc with matlab instance tutorial, with complete code, hope that a friend in need can draw lessons from.
ice_thinckness_dection_matlab
- 基于BP神经网络的冰层厚度检测,附有完成源程序,亲测可用。-Based on the BP neural network to detect the thickness of the ice, with complete source code, test available.
SearchableEncryption
- 云计算中的可搜索加密技术 其中数据加密采用的是全同态加密技术- U4E91 u8BA1 u7B97 u4E2D u7684 u53EF u641C u7D22 u52A0 u5BC6 u6280 u672F u5176 u4E2D u6570 u636E u52A0 u5BC6 u91C7 u7528 u7684 u662F u5168 u540C u6001 u52A0 u5BC6 u6280 u672F
vehicle_recognition_wyh
- 一个简单的车牌识别方法,附matlab完成源程序-A simple method of license plate recognition with matlab source program
EYES_TEST
- 基于FPGA的视力测试。使用的是altera13.0,用MODELSIM仿真,语言为Verilog。-EYES TEST based on FPGA
kmp
- 易语言KMP算法模块源码例程程序应用字节集每个位数的比较,实现两个字节集数据的匹配。 -Easy language KMP algorithm module source routine procedures for the application of the byte set of each bit comparison, to achieve the matching of two bytes of data sets.
