搜索结果
找到约 846 项符合
Set-TOP 的查询结果
文件格式 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
人物传记/成功经验 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
VC书籍 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
汇编语言 Video-DVM is a very cheap DVM that shows how an output as complex as a videocomposite signal can be
Video-DVM is a very cheap DVM that shows how an output as complex as a videocomposite signal can be generated entirely in software: two I/O pins and three resistors are all the hardware required. Connected to any TV set it displays voltages, included max and min peaks, using both giant digits and an ...
单片机开发 This file is distributed in the hope that it will be useful, but WITHOUT WARRANTY OF ANY KIND.
This file is distributed in the hope that it will be useful, but WITHOUT
WARRANTY OF ANY KIND.
Author(s): Ole Saether
DESCRIPTION:
This example should be used together with ex2a-tx433.asm. One nRF9E5
evaluation board (receiver) should be programmed with the hex-file generated
...
Java编程 在J2ME中实现虚拟代理
在J2ME中实现虚拟代理,然后过滤user-agent ,用于突破广东移动等的cmwap限制使用方法,启动后将相应软件(如Opera)的代理设成localhost 8080,即可-J2ME virtual agents, then filter user-agent, Guangdong Mobile breakthrough for the restrictions on the use of SMS, will start corresponding software (such as th ...
CA认证 Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2
Playfair Cipher
1.not even the large number of keys in a monoalphabetic cipher provides security
2.one approach to improving security was to encrypt multiple letters
3.the Playfair Cipher is an example
4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair
Playfair Key M ...
DSP编程 This experiment uses the Blackfi n BF533/BF537 EZ-KIT to run a simple FIR fi lter on stereo channe
This experiment uses the Blackfi n BF533/BF537 EZ-KIT to run a simple FIR fi lter on stereo
channels at a sampling frequency of 48 kHz. The
CYCLE register is embedded in the main
program (
process_data.c) to benchmark the time needed to process two FIR fi lters. A
background telemetry channel (B ...
单片机开发 温度传感器用单总线DS18B20
温度传感器用单总线DS18B20,CPU为2051,三个按键,分别为UP,DOWN,SET温度调节上限为125度,下限为-55度。
软件工程 this is the documentation for intel processors, first volume. it contains detailed specification and
this is the documentation for intel processors, first volume. it contains detailed specification and instrucion set - for hardcore programers on assembly