搜索结果

找到约 2,845 项符合 Data Science 的查询结果

按分类筛选

显示更多分类

书籍 Short-Range+Wireless

Over the past ten years there has been a revolution in the devel- opment and acceptance of mobile products. In that period, cel- lular telephony and consumer electronics have moved from the realm of science fiction to everyday reality. Much of that revolu- tion is unremarkable – we use wireless, in ...
https://www.eeworm.com/dl/522113.html
下载: 1
查看: 73

技术资料 单片机与PC机并行数据传输分析

单片机与PC 机并行方式较为少见,其主要适应于短距离数据传输,且对于串口数据校验有着严格要求,数据传输过程也具备较多优点,可以得到令人满意的效果。以计算机Windows 系统为例,分析实现单片机与PC 机并行数据传输方法,提出了以中断脉冲为数据载体的传输方法,旨在节省开发时间,满足使用需求。The parallel mode between sing ...
https://www.eeworm.com/dl/897810.html
下载: 2
查看: 7434

其他 RW - Read & Write utility, for hardware engineers, firmware (BIOS) engineers, driver developers, QA

RW - Read & Write utility, for hardware engineers, firmware (BIOS) engineers, driver developers, QA engineers, performance test engineers, diagnostic engineers, etc., This utility access almost all the computer hardware, including PCI (PCI Express), PCI Index/Data, Memory, Memory Index/Data, I/O Spa ...
https://www.eeworm.com/dl/534/173429.html
下载: 181
查看: 1139

人工智能/神经网络 The tca package is a Matlab program that implements the tree-dependent component analysis (TCA) alg

The tca package is a Matlab program that implements the tree-dependent component analysis (TCA) algorithms that extends the independent component analysis (ICA), where instead of looking for a linear transform that makes the data components independent, we are looking for components that can be bes ...
https://www.eeworm.com/dl/650/343492.html
下载: 67
查看: 1130

其他 数据异常处理。The main source file is "dabort.s": with suitable -PreDefines or a corresponding "options-s

数据异常处理。The main source file is "dabort.s": with suitable -PreDefines or a corresponding "options-setting" file, it assembles to the data abort veneer. This is described in detail in the documentation. The "dabort.h" file contains definitions of some constants used in the data abort veneer s ...
https://www.eeworm.com/dl/534/408205.html
下载: 82
查看: 1169

软件设计/软件工程 A class--the basic building block of an object-oriented language such as Java--is a template that de

A class--the basic building block of an object-oriented language such as Java--is a template that describes the data and behavior associated with instances of that class. When you instantiate a class you create an object that looks and feels like other instances of the same class. The data associate ...
https://www.eeworm.com/dl/684/412468.html
下载: 200
查看: 1175

VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/686/413130.html
下载: 134
查看: 1101

加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/519/413134.html
下载: 97
查看: 1093

通讯编程文档 SPREAD SPECTRUM MODULATION TECHNIQUES -spread spectrum - those modulation methods that are producin

SPREAD SPECTRUM MODULATION TECHNIQUES -spread spectrum - those modulation methods that are producing a signal whose spectrum is more wider than of the data signal, the occupied frequency band being independent by the signal of data band. -The signals with spread spectrum of direct sequence type BPSK ...
https://www.eeworm.com/dl/646/448883.html
下载: 59
查看: 1106

文章/文档 What happens with your machine when you need to move away from the computer for 10 or more minutes?

What happens with your machine when you need to move away from the computer for 10 or more minutes? How secure is your data? Can someone sit on your chair while you are at a coworkers office and play with your data? Maybe you need a computer locking tool that is small and easy to use yet powerful ...
https://www.eeworm.com/dl/652/481813.html
下载: 64
查看: 1166