搜索结果
找到约 1,644 项符合
USED 的查询结果
按分类筛选
- 全部分类
- 技术资料 (371)
- 其他 (87)
- matlab例程 (73)
- 单片机开发 (64)
- 单片机编程 (62)
- 其他书籍 (56)
- 书籍 (55)
- Java编程 (51)
- Linux/Unix编程 (40)
- VHDL/FPGA/Verilog (34)
- 通讯/手机编程 (30)
- 嵌入式/单片机编程 (30)
- 数学计算 (29)
- 微处理器开发 (28)
- 软件设计/软件工程 (25)
- 数值算法/人工智能 (19)
- 通讯编程文档 (19)
- 人工智能/神经网络 (19)
- 其他嵌入式/单片机内容 (19)
- 电源技术 (18)
- 加密解密 (18)
- 软件工程 (18)
- 压缩解压 (17)
- 其他行业 (17)
- 电子书籍 (16)
- 可编程逻辑 (16)
- 模拟电子 (15)
- 驱动编程 (15)
- 文章/文档 (15)
- 系统设计方案 (15)
- VC书籍 (14)
- DSP编程 (13)
- 汇编语言 (13)
- Internet/网络编程 (11)
- 编译器/解释器 (11)
- 网络 (11)
- 数据结构 (11)
- 文件格式 (10)
- 教程资料 (9)
- 嵌入式Linux (9)
- VxWorks (9)
- 嵌入式综合 (8)
- 游戏 (8)
- 行业发展研究 (8)
- VIP专区 (8)
- 书籍源码 (7)
- 技术管理 (7)
- USB编程 (7)
- J2ME (7)
- Delphi控件源码 (7)
- GPS编程 (7)
- 无线通信 (6)
- 通信网络 (6)
- 串口编程 (6)
- 多国语言处理 (6)
- 论文 (5)
- 测试测量 (5)
- *行业应用 (5)
- Java书籍 (5)
- Symbian (5)
- SQL Server (5)
- Applet (4)
- Windows CE (4)
- 邮电通讯系统 (4)
- 并行计算 (4)
- 行业应用文档 (3)
- 教育系统应用 (3)
- 金融证券系统 (3)
- 其他数据库 (3)
- uCOS (3)
- 家庭/个人应用 (3)
- Windows Mobile (3)
- 中间件编程 (3)
- 3G开发 (3)
- 源码 (2)
- 软件 (2)
- 笔记 (2)
- C/C++语言编程 (2)
- 接口技术 (2)
- 操作系统开发 (2)
- 实用工具 (2)
- 手机短信编程 (2)
- Modem编程 (2)
- 编辑器/阅读器 (2)
- BREW编程 (2)
- STL (2)
- FlashMX/Flex源码 (2)
- Oracle数据库 (2)
- JavaScript (2)
- Jsp/Servlet (2)
- 能源行业(电力石油煤炭) (2)
- 教程 (1)
- PCB相关 (1)
- Linux/uClinux/Unix编程 (1)
- 设计相关 (1)
- 开关电源 (1)
- 多媒体处理 (1)
- 数据库系统 (1)
- 其他文档 (1)
- 技术书籍 (1)
汇编语言 This is an example how one could hide a process on Windows based operation systems from task viewer
This is an example how one could hide a process on Windows based
operation systems from task viewers like ProcDump (G-RoM, Lorian
& Stone) or ProcessExplorer (SysInternals).
It could e.g. be used as some kind of dump protection.
The way to get this done is very different on NT and 9x machines.
Linux/Unix编程 Six objects here: The document you re reading & its Chinese version Set of "HWDesign" includes
Six objects here:
The document you re reading & its Chinese version
Set of "HWDesign" includes all hardware design files
"SWDesign" includes all software design files(firmware/driver and maybe applications as well)
Set of "Documents" includes files of main part of thesis and its reference
...
电子书籍 modelsim_se_tutorThis is a set of notes I put together for my Computer Architecture class in 1990.
modelsim_se_tutorThis is a set of notes I put together for my Computer Architecture
class in 1990. Students had a project in which they had to model a
microprocessor architecture of their choice. They used these notes to
learn VHDL. The notes cover the VHDL-87 version of the language.
Not all of th ...
数学计算 Two functions, num2bin and bin2num are provided. num2bin takes a double and converts it to a binary
Two functions, num2bin and bin2num are provided. num2bin takes a double and converts it to a binary string representation. bin2num is its inverse operation. It can be used in a numerical analysis course when floating point arithmetic is discussed.
通讯/手机编程 %The phase locked loop(PLL),adjusts the phase of a local oscillator %w.r.t the incoming modulated
%The phase locked loop(PLL),adjusts the phase of a local oscillator
%w.r.t the incoming modulated signal.In this way,the phase of the
%incoming signal is locked and the signal is demodulated.This scheme
%is used in PM and FM as well.
%We will implement it by using a closed loop system.Control ...
微处理器开发 arm7系列芯片s3c44b0x的测试程序
arm7系列芯片s3c44b0x的测试程序,共测试开发板用。the test program of arm7 mcu s3c44b0x ,can be used in testing the board.
数学计算 The functionality is to be designated the corresponding year reign France Thus the year, which was t
The functionality is to be designated the corresponding year reign France Thus the year, which was the year of the zodiac. But can be designated a specific date date of the lunar calendar. Author Note : I used to do this as a commercial product development PDA calendar procedures in recent transplan ...
Java编程 印度高手Struts and Hibernate教程,用MyEclipse开发.书和源码In this tutorial we will show how the Web Framework Stru
印度高手Struts and Hibernate教程,用MyEclipse开发.书和源码In this tutorial we will show how the Web Framework Struts and the Database Persistence Solution
Hibernate can be used together. Though we explain some basic, you should try the basic tutorials
for each technology first when you are a beginner ...
加密解密 This is the source code for encryption using the latest AES algorithm. AES algorithm is also called
This is the source code for encryption using the latest AES algorithm.
AES algorithm is also called Rijndael algorithm. AES algorithm is
recommended for non-classified use by the National Institute of Standards
and Technology(NIST), USA. Now-a-days AES is being used for almost
all encryption appl ...
人工智能/神经网络 he algorithm is equivalent to Infomax by Bell and Sejnowski 1995 [1] using a maximum likelihood form
he algorithm is equivalent to Infomax by Bell and Sejnowski 1995 [1] using a maximum likelihood formulation. No noise is assumed and the number of observations must equal the number of sources. The BFGS method [2] is used for optimization.
The number of independent components are calculated using ...