资源列表
排序选择:
[图形图象] vb
说明:一个展示分形图的程序,你可以修改一些参数,就可以看到更多不同的分形图,颜色搭配不好请原谅,不过你可以尝试修改一下颜色,也许会比我做的好. -A display of fractal images of the procedure, you can modify some of the parameters, we can see a greater variety of fractal images, bad colors, please forgive, but you can try to<zge> 在 2025-09-20 上传 | 大小:4kb | 下载:0
[行业发展研究] Discrete-choice-analysis-of-spatial-attack-sites.
说明:This paper presents an algorithm for the complete specification of multinomial discrete choice models to predict the spatial preferences of attackers. The formulation employed is a modification of models previously applied in transportation flo<ahmed > 在 2025-09-20 上传 | 大小:531kb | 下载:0
[图形图象] vb665577232444
说明:vc 图像程序设计 word 实践程序设计-vc 图像程序设计 word 程序!<环境光> 在 2025-09-20 上传 | 大小:8kb | 下载:0
[图形图象] VBactionofball
说明:此小程序用于进行一个小球的运动路线分析。-This small program used to carry out a small ball movement path analysis.<乙烯项目> 在 2025-09-20 上传 | 大小:3kb | 下载:0
[行业发展研究] EFFECTIVENESS-OF-SUPPORT-VECTOR-MACHINE-FOR-CRIME
说明:Crime hot-spot location prediction is important for public safety. The output from the prediction can provide useful information to improve the activities aimed at detecting and preventing safety and security problems. Location prediction is a sp<ahmed > 在 2025-09-20 上传 | 大小:443kb | 下载:0
[其他小程序] secure-password
说明:turbo c 学习课程题目,实现“安全的密码”。-Achieve " secure password."<姜笑天> 在 2025-09-20 上传 | 大小:1kb | 下载:0
[微处理器(ARM/PowerPC等)] jpg-decoding
说明:ARM STM32F407 jpg 解码测试程序 -jpg decording test program of ARM STM32F407<> 在 2025-09-20 上传 | 大小:318kb | 下载:0
[单片机(51,AVR,MSP430等)] STM32_SIM908
说明:创思通信的开发板上的源码。有GPS模块、GSM模块、涉及GPRS和GSM的编程使用,使用AT指令控制的。硬件是STM32控制SIM908。程序测试可用。-program on the board sold by Chuangsitongxin,using GPRS or SMS to send GPS info。<4864868> 在 2025-09-20 上传 | 大小:11.45mb | 下载:0
[行业发展研究] GAPatrol--An-Evolutionary-Multiagent-Approach-for
说明:In this work, we present a novel evolutionary multiagent-based simulation tool, named as GAPatrol. Such system is devoted to the specification of effective police patrol route strategies for coping with criminal activities happening in a given<ahmed > 在 2025-09-20 上传 | 大小:226kb | 下载:0
[行业发展研究] Insider-threat-mitigation--preventing-unauthorize
说明:This paper investigates insider threat in relational database systems. It discusses the problem of inferring unauthorized information by insiders and proposes methods to prevent such threats. The paper defines various types of dependencies as<ahmed > 在 2025-09-20 上传 | 大小:549kb | 下载:0