搜索结果

找到约 207 项符合 Check 的查询结果

matlab例程 This LDPC software is intended as an introduction to LDPC codes computer based simulation. The pseud

This LDPC software is intended as an introduction to LDPC codes computer based simulation. The pseudo-random irregular low density parity check matrix is based on Radford M. Neal’s programs collection, which can be found in [1]. While Neal’s collection is well documented, in my opinion, C source c ...
https://www.eeworm.com/dl/665/305244.html
下载: 25
查看: 1051

Linux/Unix编程 linux下用C语言写的聊天程序!/*BUG and NOTE: Not join protect to Shared Memory Segments,example Semaphore Array

linux下用C语言写的聊天程序!/*BUG and NOTE: Not join protect to Shared Memory Segments,example Semaphore Arrays. Not check the parameters validity. When transmit may be error. If the client program no right exit,others cannot know,the service program shouldbe check the client program whether exist t ...
https://www.eeworm.com/dl/619/306943.html
下载: 24
查看: 1090

matlab例程 6自由度puma机器人仿真程序源码。This is PUMA3d.M, a 3D Matlab Kinematic model of a Puma robot located in the robot

6自由度puma机器人仿真程序源码。This is PUMA3d.M, a 3D Matlab Kinematic model of a Puma robot located in the robotics lab of Walla Walla University. The file uses CAD data converted to Matlab using cad2matdemo.m, which is located on the Mathworks central file exchange. % % This file is still being ...
https://www.eeworm.com/dl/665/316407.html
下载: 74
查看: 1279

其他  在远距离数据通信中

 在远距离数据通信中,为确保高效而无差错地传送数据,必须对数据进行校验即差错控制。循环冗余校验CRC(Cyclic Redundancy Check)是对一个传送数据块进行校验,
https://www.eeworm.com/dl/534/322033.html
下载: 193
查看: 1035

汇编语言 Program main BIOS image | | /B - Program Boot Block | | /N - Program NVRAM | | /C - Destroy CM

Program main BIOS image | | /B - Program Boot Block | | /N - Program NVRAM | | /C - Destroy CMOS checksum | | /E - Program Embedded Controller Block | | /K - Program all non-critical blocks | | /Kn - Program n th non-critical block only(n=0-7) | | /Q - Silent execution | | /REBOOT - Reboot a ...
https://www.eeworm.com/dl/644/325014.html
下载: 142
查看: 1141

软件工程 This article introduces how to construct a Hospital Ward Information System with three-tiered techno

This article introduces how to construct a Hospital Ward Information System with three-tiered technology. The System applies to UML, BDE, MIDAS, distributed compute theory and a special architecture to make such functions: patients check in and check out, prescription input, drug-delivery at center ...
https://www.eeworm.com/dl/540/333545.html
下载: 86
查看: 1054

Linux/Unix编程 ELinks is an advanced and well-established feature-rich text mode web (HTTP/FTP/..) browser. ELinks

ELinks is an advanced and well-established feature-rich text mode web (HTTP/FTP/..) browser. ELinks can render both frames and tables, is highly customizable and can be extended via Lua or Guile scripts. It is quite portable and runs on a variety of platforms. Check the about page for a more complet ...
https://www.eeworm.com/dl/619/368572.html
下载: 97
查看: 1058

Java书籍 dwr.xml说明文档。配置文件init部分声明那些用于建立远程bean和在方法调用中转换bean的类.这部分是可选择性配置的,多数情况下可以不必使用它,如果你想定义一个新的creator或者conv

dwr.xml说明文档。配置文件init部分声明那些用于建立远程bean和在方法调用中转换bean的类.这部分是可选择性配置的,多数情况下可以不必使用它,如果你想定义一个新的creator或者converter那么就必须在部分中声明,but do double check on the ones that are currently available first. ...
https://www.eeworm.com/dl/656/370288.html
下载: 183
查看: 1070

电子书籍 BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You ll learn that th

BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You ll learn that the BlackBerry is capable of things you never thought possible, and you ll learn how to make it an even better email and web workhorse: Get the most out of the built-in applications Take control of em ...
https://www.eeworm.com/dl/cadence/ebook/375981.html
下载: 185
查看: 1037

加密解密 加密算法实现 Pegwit is a program for performing public key file encryption and authentication. Encr

加密算法实现 Pegwit is a program for performing public key file encryption and authentication. Encryption means that pegwit allows you to keep the information in files you send by email (or other means) confidential. Eavesdroppers will not be able to read the email. Authentication allows you to c ...
https://www.eeworm.com/dl/519/378022.html
下载: 26
查看: 1043