搜索结果
找到约 1,679 项符合
clock-based 的查询结果
系统设计方案 DIGITAL CLOCK!看了就知道了!很不错的东西!可以帮助你省下不少精力!
DIGITAL CLOCK!看了就知道了!很不错的东西!可以帮助你省下不少精力!
数学计算 This folder contains all the codes based on Matlab Language for the book <《Iterative Methods for
This folder contains all the codes based on Matlab Language for the book <《Iterative Methods for Linear and Nonlinear Equations》, and there are totally 21 M files, which can solve most of linear and nonlinear equations problems.
matlab例程 there are some newly released Neural Network Example Programs for Character Recognition, which based
there are some newly released Neural Network Example Programs for Character Recognition, which based on Image Processing Toolbox,Neural Network Toolbox in MATLAB, which is quite informative for the beginners in Neural networks applicators
其他 Ontology based personalized search A master thesis
Ontology based personalized search
A master thesis
数学计算 Gabor Transformation based on a Exocortex dsp d
Gabor Transformation based on a Exocortex dsp d
matlab例程 Second and Higher-Order Statistics based Multiple-Input-Multiple-Output System Blind Identification
Second and Higher-Order Statistics based Multiple-Input-Multiple-Output System
Blind Identification Matlab Code
嵌入式/单片机编程 用java写的GUI Analog Clock,用上了Observer,可以更改时间
用java写的GUI Analog Clock,用上了Observer,可以更改时间,对学习observer的运用很有帮助!
通讯编程文档 Session Initiation Protocol (SIP) [1] is fast becoming the protocol of choice for IP based communica
Session Initiation Protocol (SIP) [1] is fast becoming the protocol of choice for IP based communication
– specifically telephony (Voice over Internet Protocol - VoIP), video, and instant
messaging.
其他 Stack-based sequential decoder for M-QAM modulated MIMO-type problems, i.e., of fixed tree depth.
Stack-based sequential decoder for M-QAM modulated MIMO-type problems, i.e., of fixed tree depth.
Linux/Unix编程 About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based o
About WepDecrypt:
Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed.
WepDecrypt highlights:
- Implemented packet filters.
- Only on ...