搜索结果
找到约 1,368 项符合
Assignation-based 的查询结果
其他 PIC 16f84 based dtmf operating system
PIC 16f84 based dtmf operating system
系统设计方案 Design of a protoype of an FPGA-based RFID reader supporting the ISO/IEC 18000-6C UHF RFID protocol.
Design of a protoype of an FPGA-based RFID reader supporting the ISO/IEC 18000-6C UHF RFID protocol. Designed by Suh et al. used mainly for testing anticollision algorithms
嵌入式Linux Embeded bootloader (rrload by ridgerun) for TI linux based platform v5.36
Embeded bootloader (rrload by ridgerun) for TI linux based platform v5.36
matlab例程 基于matlab的图像或者序列的哈夫曼编码及解码程序-Matlab-based image or sequence of Huffman coding and decoding procedures
基于matlab的图像或者序列的哈夫曼编码及解码程序-Matlab-based image or sequence of Huffman coding and decoding procedures
数值算法/人工智能 DWT based watermarking technique
DWT based watermarking technique
数学计算 The following source code shows an example for generating of 3bytes per 256bytes, based on hamming c
The following source code shows an example for generating of 3bytes per 256bytes, based on hamming code ecc
通讯编程文档 Description of a pipeline architecture for a FFT processor, based on the R22SDF algorithm.
Description of a pipeline architecture for a FFT processor, based on the R22SDF algorithm.
嵌入式/单片机编程 PIC based Counter count from 0 to99
PIC based Counter count from 0 to99
其他数据库 A Perl-based statistics management system designed for academic competition tournaments. These tourn
A Perl-based statistics management system designed for academic competition tournaments. These tournaments, which are called "College Bowl," "quiz bowl," and a variety of other names, involve teams playing against each other in either timed or untime
The latest file releases
加密解密 This method is based upon the image hiding technic into another image using LSB algorithm called as
This method is based upon the image hiding technic into another image using LSB algorithm called as Steganography.