exsys covid: EXSYS, the EXSYS logo, CORVID, the CORVID logo, Exsys RuleBook, the Exsys RuleBook logos are either registered trademarks or trademarks of EXSYS Inc in the United States and /or other countries.
资源简介:exsys covid: EXSYS, the EXSYS logo, CORVID, the CORVID logo, Exsys RuleBook, the Exsys RuleBook logos are either registered trademarks or trademarks of EXSYS Inc in the United States and /or other countries.
上传时间: 2014-11-26
上传用户:924484786
资源简介:Enter Two Numbers:26 35 the sum is 61 Enter Two Numbers:26 35 the sum is 61
上传时间: 2014-01-13
上传用户:1159797854
资源简介:the book presents the entire Java programming language and essential parts of the class libraries: the collection classes and the input-output classes.
上传时间: 2015-03-02
上传用户:yulg
资源简介:the practice of enterprise application development has benefited from the emergence of many new enabling technologies. Multi-tiered object-oriented platforms, such as Java and .NET, have become commonplace.
上传时间: 2015-03-11
上传用户:aig85
资源简介:A simple C program to strobe the LEDsvia Port D. the strobe rate is to be set by adjusting the voltage drop over a potentiometer that is sampled by an ADC.
上传时间: 2014-01-09
上传用户:lifangyuan12
资源简介:An assembly to strobe the LEDsvia Port D. the strobe rate is to be set by adjusting the voltage drop over a potentiometer that is sampled by an ADC
上传时间: 2015-03-20
上传用户:13681659100
资源简介:This sample demonstrates the handling of DIF_ calls during device installation and the insertion of a property page into the install wizard and into the device properties.
上传时间: 2014-01-25
上传用户:yy541071797
资源简介:This code implements the basic functions for an I2C slave device using the SSP module. All I2C functions are handled in an ISR. Bytes written to the slave are stored in a buffer. After a number of bytes have been written, the master device ...
上传时间: 2015-04-02
上传用户:邶刖
资源简介:the purpose of this computer program is to allow the user to construct, train and test differenttypes of artificial neural networks. By implementing the concepts of templates, inheritance andderived classes from C++ object oriented programm...
上传时间: 2013-12-06
上传用户:13517191407
资源简介:this code is a simulator to simulate the paging system such as first come first service. the comment in this code can help you to run it.
上传时间: 2014-01-02
上传用户:Late_Li
资源简介:the goal of this lab is (1) to under the defects of software timers, (2) to write a periodic program without timers, (3) to write a periodic program using timer Hardware:Host computer PC Software: GNU GCC
上传时间: 2014-08-13
上传用户:古谷仁美
资源简介:This code ports the uC/OS operating system by Jean LaBrosse to the TI TMS320C2xx family of DSP s.
上传时间: 2014-11-27
上传用户:朗朗乾坤
资源简介:the INTRODUCE ABOUT JAVA ,WHICH CAN MAKE YOU KOOW the BASIC ABOUT IT
上传时间: 2014-11-22
上传用户:nanxia
资源简介:the file is substitution cipher assistant.It Will display the ciphertext underneath the guessed plaintext.
上传时间: 2014-11-29
上传用户:从此走出阴霾
资源简介:the "JTAG-GDB server" is a program for integrating the ARM-Embedded ICE logic with the GNU-Debugger GDB.
上传时间: 2014-01-24
上传用户:LouieWu
资源简介:the intention is to show you how to incorporate the AWGN/Rayleigh fading models in the basic decoding program.
上传时间: 2014-01-04
上传用户:ANRAN
资源简介:/* This program generates the DApkg.vhd file that is used to define * the DA filter core and gives its parameters and the contents of the * Distributed Arithmetic Look-up-table "DALUT" according to the DA algorithm
上传时间: 2015-07-07
上传用户:wangchong
资源简介:the DSP Design Flow workshop provides an introduction to the advanced tools you need to design and implement DSP algorithms targeting FPGAs. This intermediate workshop in implementing DSP functions focuses on learning how to use System Gene...
上传时间: 2014-12-05
上传用户:sammi
资源简介:This the first cellphone worm with source code available in the world ! Do you can modify, rename, delete, insert any code...
上传时间: 2015-08-03
上传用户:xiaohuanhuan
资源简介:Lighthouse within the software developer heart- 《 the myth of month of person 》 , this is the edition of PDF, very convenient
上传时间: 2015-08-14
上传用户:kristycreasy
资源简介:Lighthouse within the software developer heart- 《 the myth of month of person 》 , this is the edition of PDF, very convenient
上传时间: 2014-01-16
上传用户:xg262122
资源简介:This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. ...
上传时间: 2013-12-28
上传用户:离殇
资源简介:the standard optimum Kalman filter demands complete knowledge of the system parameters, the input forcing functions, and the noise statistics. Several adaptive methods have already been devised to obtain the unknown information using the...
上传时间: 2013-12-17
上传用户:541657925
资源简介:A general technique for the recovery of signicant image features is presented. the technique is based on the mean shift algorithm, a simple nonparametric pro- cedure for estimating density gradients. Drawbacks of the current methods (i...
上传时间: 2015-10-14
上传用户:410805624
资源简介:HDOJ ACM input:the input consists of T test cases. the number of test cases ) (T is given in the first line of the input. Each test case begins with a line containing an integer N , 1<=N<=200 , that represents the number of tables to move....
上传时间: 2015-10-18
上传用户:三人用菜
资源简介:This book is the definitive guide to EJB 3.0 persistence technology. the authors provide unparalleled insight and expertise on this topic, fully examining and explaining EJB 3.0B
上传时间: 2014-11-28
上传用户:wfeel
资源简介:the purpose of this application note is to describe the main elements of an RS-422 and RS-485 system. This application note attempts to cover enough technical details so that the system designer will have considered all the important asp...
上传时间: 2013-12-28
上传用户:sxdtlqqjl
资源简介:Most of the developers of the AVR binutils and gcc ports in addition to the devleopers of avr-libc subscribe to the list,
上传时间: 2013-12-28
上传用户:上善若水
资源简介:ICP fit points in data to the points in model. Fit with respect to minimize the sum of square errors with the closest model points and data points. Ordinary usage: [R, T] = icp(model,data) INPUT: model - matrix with model points...
上传时间: 2014-01-01
上传用户:gyq
资源简介:the Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based Encryption from the Weil Pairing", CRYPTO 2001.) there are a few modifications and addition...
上传时间: 2013-12-19
上传用户:yan2267246