搜索结果

找到约 1,644 项符合 USED 的查询结果

按分类筛选

显示更多分类

汇编语言 This is an example how one could hide a process on Windows based operation systems from task viewer

This is an example how one could hide a process on Windows based operation systems from task viewers like ProcDump (G-RoM, Lorian & Stone) or ProcessExplorer (SysInternals). It could e.g. be used as some kind of dump protection. The way to get this done is very different on NT and 9x machines.
https://www.eeworm.com/dl/644/147983.html
下载: 80
查看: 1062

Linux/Unix编程 Six objects here: The document you re reading & its Chinese version Set of "HWDesign" includes

Six objects here: The document you re reading & its Chinese version Set of "HWDesign" includes all hardware design files "SWDesign" includes all software design files(firmware/driver and maybe applications as well) Set of "Documents" includes files of main part of thesis and its reference ...
https://www.eeworm.com/dl/619/165337.html
下载: 192
查看: 1103

电子书籍 modelsim_se_tutorThis is a set of notes I put together for my Computer Architecture class in 1990.

modelsim_se_tutorThis is a set of notes I put together for my Computer Architecture class in 1990. Students had a project in which they had to model a microprocessor architecture of their choice. They used these notes to learn VHDL. The notes cover the VHDL-87 version of the language. Not all of th ...
https://www.eeworm.com/dl/cadence/ebook/172691.html
下载: 145
查看: 1075

数学计算 Two functions, num2bin and bin2num are provided. num2bin takes a double and converts it to a binary

Two functions, num2bin and bin2num are provided. num2bin takes a double and converts it to a binary string representation. bin2num is its inverse operation. It can be used in a numerical analysis course when floating point arithmetic is discussed.
https://www.eeworm.com/dl/641/200438.html
下载: 142
查看: 1188

通讯/手机编程 %The phase locked loop(PLL),adjusts the phase of a local oscillator %w.r.t the incoming modulated

%The phase locked loop(PLL),adjusts the phase of a local oscillator %w.r.t the incoming modulated signal.In this way,the phase of the %incoming signal is locked and the signal is demodulated.This scheme %is used in PM and FM as well. %We will implement it by using a closed loop system.Control ...
https://www.eeworm.com/dl/527/202728.html
下载: 121
查看: 1093

微处理器开发 arm7系列芯片s3c44b0x的测试程序

arm7系列芯片s3c44b0x的测试程序,共测试开发板用。the test program of arm7 mcu s3c44b0x ,can be used in testing the board.
https://www.eeworm.com/dl/655/213164.html
下载: 28
查看: 1073

数学计算 The functionality is to be designated the corresponding year reign France Thus the year, which was t

The functionality is to be designated the corresponding year reign France Thus the year, which was the year of the zodiac. But can be designated a specific date date of the lunar calendar. Author Note : I used to do this as a commercial product development PDA calendar procedures in recent transplan ...
https://www.eeworm.com/dl/641/223342.html
下载: 47
查看: 1088

Java编程 印度高手Struts and Hibernate教程,用MyEclipse开发.书和源码In this tutorial we will show how the Web Framework Stru

印度高手Struts and Hibernate教程,用MyEclipse开发.书和源码In this tutorial we will show how the Web Framework Struts and the Database Persistence Solution Hibernate can be used together. Though we explain some basic, you should try the basic tutorials for each technology first when you are a beginner ...
https://www.eeworm.com/dl/633/225358.html
下载: 33
查看: 1087

加密解密 This is the source code for encryption using the latest AES algorithm. AES algorithm is also called

This is the source code for encryption using the latest AES algorithm. AES algorithm is also called Rijndael algorithm. AES algorithm is recommended for non-classified use by the National Institute of Standards and Technology(NIST), USA. Now-a-days AES is being used for almost all encryption appl ...
https://www.eeworm.com/dl/519/320008.html
下载: 120
查看: 1096

人工智能/神经网络 he algorithm is equivalent to Infomax by Bell and Sejnowski 1995 [1] using a maximum likelihood form

he algorithm is equivalent to Infomax by Bell and Sejnowski 1995 [1] using a maximum likelihood formulation. No noise is assumed and the number of observations must equal the number of sources. The BFGS method [2] is used for optimization. The number of independent components are calculated using ...
https://www.eeworm.com/dl/650/343494.html
下载: 120
查看: 1116