搜索结果

找到约 5,457 项符合 COde 的查询结果

按分类筛选

显示更多分类

人工智能/神经网络 1.   首先要把文件夹中的rsa.c文件拷贝到运行工具(如TURBOC2)下文件夹名为INCLUDE的文件夹中。   (在本机上已经做过

1.   首先要把文件夹中的rsa.c文件拷贝到运行工具(如TURBOC2)下文件夹名为INCLUDE的文件夹中。   (在本机上已经做过,所以不需要做)     2.   RSA的加密对象为C盘下文件名为CODE.txt的前8位(如果没有一定要在C盘下建立一个文件名为CODE.txt的文件,  把要加密的数据写到文件里),加密后在C盘下生成一个文 ...
https://www.eeworm.com/dl/650/143348.html
下载: 76
查看: 1109

Linux/Unix编程 FIST可堆叠文件系统

FIST可堆叠文件系统,linux文件系统修改相关的开源软件,使得对linux文件系统功能的改进很简单了 The FiST (File System Translator) system combines two methods to solve the above problems in a novel way: a set of stackable file system templates for each operating system, and a high-level language that can ...
https://www.eeworm.com/dl/619/251187.html
下载: 135
查看: 1296

matlab例程 一种比较好的抗锯齿算法 Add myaa.m to your path and enjoy anti-aliased professionally looking graphics in Matla

一种比较好的抗锯齿算法 Add myaa.m to your path and enjoy anti-aliased professionally looking graphics in Matlab at any time. Myaa works with any kind of graphic (3-D, plots, scatterplots, ...) and even adds anti-aliasing to text, ui controls and grids. Myaa is ideal for complex, cluttered and satura ...
https://www.eeworm.com/dl/665/347558.html
下载: 98
查看: 1225

数学计算 cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used

cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used to calculate a whole range of scientific functions including sin, cos, tan, arctan, arcsin, arccos, sinh, cosh, tanh, arctanh, log, exp, square root and even multiply and divide. the method dates ba ...
https://www.eeworm.com/dl/641/410485.html
下载: 80
查看: 1090

技术资料 spi协议英文详解

In this presentation, we will look at what the Serial Peripheral Interface, otherwise known as the SPI, is. and how it is used to communicate data to and from the PICmicro microcontroller.SPl is frequently used when few 1/O lines are available, but communication between two or more devices must be f ...
https://www.eeworm.com/dl/836065.html
下载: 7
查看: 9259

单片机编程 使用软件程序仿真C500微控制器系列SSC(同步串行通道)功

The solution presented in this paper and in the attached source files emulates the mostimportant SSC functions by using SW routines implemented in C. The code is focused onthe SAB C513, but will fit to all C500 derivatives.Beyond the low level software drivers a test shell is delivered. This shell a ...
https://www.eeworm.com/dl/502/31367.html
下载: 31
查看: 1053

Linux/Unix编程 SDL Library Documentation. The SDL library is designed to make it easy to write games that run on Li

SDL Library Documentation. The SDL library is designed to make it easy to write games that run on Linux, *BSD, MacOS, Win32 and BeOS using the various native high-performance media interfaces, (for video, audio, etc) and presenting a single source-code level API to your application. SDL is a fairly ...
https://www.eeworm.com/dl/619/167892.html
下载: 100
查看: 1139

VC书籍 This article shows that by using the tools available and understanding the programming system, it is

This article shows that by using the tools available and understanding the programming system, it is possible to improve programming productivity. Microsoft Foundation Classes (MFC) and other tools let the user build GUIs while working in the same development program that was used to write the rest ...
https://www.eeworm.com/dl/686/202622.html
下载: 31
查看: 1090

Windows CE wince EVC 简单的图片浏览功能,自已随意扩展 支持 *.bmp *.jpg *.gif *.png 等等 // TODO: Add your control notification

wince EVC 简单的图片浏览功能,自已随意扩展 支持 *.bmp *.jpg *.gif *.png 等等 // TODO: Add your control notification handler code here CString defFilter("选中其中一个文件|*.bmp *.jpg *.gif *.png") CFileDialog dlg(TRUE,NULL,NULL,OFN_ALLOWMULTISELECT,defFilter) if(dlg.DoModal()==IDOK){ PathName=dl ...
https://www.eeworm.com/dl/674/345350.html
下载: 171
查看: 1216

VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/686/413130.html
下载: 134
查看: 1101