控制傳輸的 icon Control Transfer

FloydWarshall shortest pat...

Input several coordinates and this algorithm will find the s...
邊緣運算傳輸iconEdge computing transmission

The maximum number of poin...

Given a two-dimensional plane with n points on the plane, ca...
裝置數據iconDevice data

Air pollution PM25 predict...

Taking Hsinchu Science Park Lixing Station as the research o...
議題分析iconIssue Analysis

Morse Code Encryption and ...

Enter Morse Code plaintext or ciphertext to encrypt and decr...
社群偏好iconCommunity preferences

Cosine similarity

uses the cosine value of the angle between two vectors in ve...
社群偏好iconCommunity preferences

SVM classification algorit...

Supervised learning and generation of models for analyzing d...
議題分析iconIssue Analysis

One-time password encrypti...

Enter plain text or cipher text and key to encrypt and decry...
議題分析iconIssue Analysis

Crack password-protected Z...

Enter a ZIP or RAR file and the algorithm will try to crack ...
社群偏好iconCommunity preferences

MLP Machine Learning Class...

Input the data set, this algorithm will use MLP Multi-Layer ...
議題分析iconIssue Analysis

Get information related to...

By obtaining the thermal hazard index of designated work are...
議題分析iconIssue Analysis

JWT Token

Generateobtain JWT token content, compare key
邊緣運算傳輸iconEdge computing transmission

Distribute cookies

Suppose you are a great parent and want to give your childre...
rows
Rows:189, 16 pages