搜索结果
找到约 1,038 项符合
High-order 的查询结果
VHDL/FPGA/Verilog Very low cost, low component count charger/adapter – replaces linear transformer based solutions &#
Very low cost, low component count charger/adapter – replaces linear transformer based solutions
• Extremely simple circuit configuration designed for high volume, low cost manufacturing
matlab例程 Very low cost, low component count charger/adapter – replaces linear transformer based solutions &#
Very low cost, low component count charger/adapter – replaces linear transformer based solutions
• Extremely simple circuit configuration designed for high volume, low cost manufacturing
文章/文档 A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di
A cylindrical wave expansion method is developed to obtain the scattering field for an ideal
two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up
to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak
with the ...
软件设计/软件工程 This contains the following topics and more ADA versus C and Cplus plus Ada_training ADA 2005 for
This contains the following topics and more
ADA versus C and Cplus plus
Ada_training
ADA 2005 for High Integrity Systems
ada_language_notes
Sample programs
其他书籍 The second edition of WiMax Operator鈥檚 Manual includes most of the material from the first edition
The second edition of WiMax Operator鈥檚 Manual includes most of the material from the first
edition, plus new discussions of
鈥?The ultra-high-speed mobile telephone standard, HSDPA
鈥?Ultrawideband (UWB)
鈥?Changes to DSL technologies
鈥?Mobile voice
鈥?Mobile entertainment
鈥?New backup systems ...
行业发展研究 In computer vision, sets of data acquired by sampling the same scene or object at different times, o
In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessa ...
加密解密 SA Encryption and Decryption using Matlab The program set contains thirteen files listed below.
SA Encryption and Decryption using Matlab
The program set contains thirteen files listed below.
errormeg.fig
errormsg.m
helpmsg.fig
helpmsg.m
inputmsg.fig
inputmsg.m
mesgcut.m
pro2.fig
pro2.m
rsacore.m
readme.txt
screenshot.gif
In order to run the program please call pro2.m under Matlab 6.0 Envi ...
Delphi控件源码 1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click
1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click on Security button
in order to Add/Remove users and set user rights. Once you entered Security dialog you may select your Supervisor password.
2. Click OK when finished configuring users. Don t forg ...
编译器/解释器 c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlyin
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths ...
系统设计方案 R1EX24xxx series are two-wire serial interface EEPROM (Electrically Erasable and Programmable ROM).
R1EX24xxx series are two-wire serial interface EEPROM (Electrically Erasable and Programmable
ROM). They realize high speed, low power consumption and a high level of reliability by employing
advanced MNOS memory technology and CMOS process and low voltage circuitry technology. They
also have a 128- ...