搜索结果

找到约 409 项符合 WHEN 的查询结果

按分类筛选

显示更多分类

通讯编程文档 The Kalman filter is a set of mathematical equations that provides an efficient computational [recu

The Kalman filter is a set of mathematical equations that provides an efficient computational [recursive] means to estimate the state of a process, in a way that minimizes the mean of the squared error. The filter is very powerful in several aspects: it supports estimations of past, present, and eve ...
https://www.eeworm.com/dl/646/417482.html
下载: 167
查看: 1048

VHDL/FPGA/Verilog Code was successfully implemented within ALtera FPGA with Quartus 6.0. It presents two polish own fe

Code was successfully implemented within ALtera FPGA with Quartus 6.0. It presents two polish own female names: ULA and ALA whose are scrolling on the 4-columns crystal LED. When you press the switch it will turn from ULA into ALA and continue scrolling.
https://www.eeworm.com/dl/663/418800.html
下载: 172
查看: 1043

软件工程 Managing Humans is a selection of the best essays from Michael Lopps web site, Rands In Repose. Draw

Managing Humans is a selection of the best essays from Michael Lopps web site, Rands In Repose. Drawing on Lopp s management experiences at Apple, Netscape, Symantec, and Borland, this book is full of stories based on companies in the Silicon Valley where people have been known to yell at each other ...
https://www.eeworm.com/dl/540/420955.html
下载: 22
查看: 1087

文章/文档 We obtained the energy transport velocity distribution for a three dimensional ideal cloak explicit

We obtained the energy transport velocity distribution for a three dimensional ideal cloak explicitly. Near the operation frequency, the energy transport velocity has rather peculiar distribution. The velocity along a line joining the origin of the cloak is a constant, while the velocity approaches ...
https://www.eeworm.com/dl/652/421412.html
下载: 33
查看: 1051

微处理器开发 Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits.

Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits. It has proved to be an extremely versatile tool on the unix platform. So why should NT always be unix s poor cousin when it comes to tcp/ip testing and exploration? I bet many NT admins out there ke ...
https://www.eeworm.com/dl/655/422617.html
下载: 109
查看: 1037

电子书籍 Passion is sweet Love makes weak You said you cherised freedom so You refused to let it go Follow yo

Passion is sweet Love makes weak You said you cherised freedom so You refused to let it go Follow your faith Love and hate never failed to seize the day Don t give yourself away Oh when the night
https://www.eeworm.com/dl/cadence/ebook/423772.html
下载: 129
查看: 1076

行业发展研究 OpenOffice.org document containing: List of codes i have tested on a JinPeng C2000 mobile and the

OpenOffice.org document containing: List of codes i have tested on a JinPeng C2000 mobile and their results. Some works, others not it is explained what code does if work. They are introduced where you type digits when making a call, unless specify it is not necesary to press call, like for well ...
https://www.eeworm.com/dl/692/423821.html
下载: 198
查看: 1025

行业发展研究 OpenOffice.org document containing: List of codes i have tested on a JinPeng C2000 mobile and the

OpenOffice.org document containing: List of codes i have tested on a JinPeng C2000 mobile and their results. Some works, others not it is explained what code does if work. They are introduced where you type digits when making a call, unless specify it is not necesary to press call, like for well ...
https://www.eeworm.com/dl/692/423822.html
下载: 150
查看: 1031

Delphi控件源码 1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click

1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click on Security button in order to Add/Remove users and set user rights. Once you entered Security dialog you may select your Supervisor password. 2. Click OK when finished configuring users. Don t forg ...
https://www.eeworm.com/dl/666/424794.html
下载: 178
查看: 1102

通讯编程文档 We simulate uncoded BER of BPSK modulated data as a function of SNR -in an AWGN channel -in a R

We simulate uncoded BER of BPSK modulated data as a function of SNR -in an AWGN channel -in a Rayleigh fading channel -in an AWGN channel when direct sequence spreading is used and compare results to the theoretical ones. We assume coherent receiver and perfect synchronization.
https://www.eeworm.com/dl/646/425938.html
下载: 148
查看: 1034