搜索:done
找到约 115 项符合「done」的查询结果
结果 115
按分类筛选
- 全部
- 技术资料 (17)
- 电子书籍 (8)
- 其他 (6)
- 单片机编程 (5)
- Linux/Unix编程 (5)
- 其他书籍 (4)
- 压缩解压 (4)
- 数学计算 (4)
- 通讯编程文档 (4)
- 单片机开发 (4)
- 文章/文档 (4)
- VHDL/FPGA/Verilog (4)
- 书籍 (3)
- Java编程 (3)
- matlab例程 (3)
- 数值算法/人工智能 (2)
- 通讯/手机编程 (2)
- 可编程逻辑 (2)
- 嵌入式/单片机编程 (2)
- 微处理器开发 (2)
- MySQL数据库 (2)
- 行业发展研究 (2)
- DSP编程 (1)
- 操作系统开发 (1)
- 软件工程 (1)
- 嵌入式综合 (1)
- 教程资料 (1)
- Internet/网络编程 (1)
- 编辑器/阅读器 (1)
- 网络 (1)
- 技术管理 (1)
- 汇编语言 (1)
- uCOS (1)
- 人工智能/神经网络 (1)
- 嵌入式Linux (1)
- Java书籍 (1)
- Windows CE (1)
- 系统设计方案 (1)
- 中间件编程 (1)
- 软件设计/软件工程 (1)
- VC书籍 (1)
- 其他嵌入式/单片机内容 (1)
- 人物传记/成功经验 (1)
- Ajax (1)
- 能源行业(电力石油煤炭) (1)
https://www.eeworm.com/dl/652/417784.html
文章/文档
This is brief doccumentation done on the clock syncronasation in distributed systems.ths includes al
This is brief doccumentation done on the clock syncronasation in distributed systems.ths includes algorithem for physical and logical clocks and mutual exclusion.
https://www.eeworm.com/dl/649/221724.html
uCOS
UCOS/II for ICCAVR - The version of UCOS/II is 2.04 - the original port was done by Ole Saether
UCOS/II for ICCAVR
- The version of UCOS/II is 2.04
- the original port was done by Ole Saether for the IAR compiler. Jens E.
Holtegaard ported one version using ICCAVR. Joerg Meyer did another port
(using Jens port as a start?). This is basically Joerg s port plus a
littl ...
https://www.eeworm.com/dl/633/422493.html
Java编程
In the bank all the activities are being done manually .As the bank widens its services & it finds d
In the bank all the activities are being done manually .As the bank widens its services & it finds difficult to manage its operations manually and hence this leads to the automation of some of its operations.
Banking Information system is a windows based applications. This ...
https://www.eeworm.com/dl/687/434313.html
其他嵌入式/单片机内容
This is the source code for GSM - GPS based Vehicle Tracking System done using PIC microcontroller a
This is the source code for GSM - GPS based Vehicle Tracking System done using PIC microcontroller and CCS C Compiler
https://www.eeworm.com/dl/646/478507.html
通讯编程文档
this is a document about radio frequency identification RFID, this was a project ,i have done last y
this is a document about radio frequency identification RFID, this was a project ,i have done last year ,actually this technology is a very inpotrtant one due to its relation with newest technologies , like GPS , or the miniturization of integrated circuits ,and that is described ...
https://www.eeworm.com/dl/527/478509.html
通讯/手机编程
this is a project i have done about planing and dimensioning a PSTN network , the document is very i
this is a project i have done about planing and dimensioning a PSTN network , the document is very interesting .
https://www.eeworm.com/dl/650/135076.html
人工智能/神经网络
This software was done in part for a textbook on AI I ve written called _The Basis of AI_ (tentative
This software was done in part for a textbook on AI I ve written called _The Basis of AI_ (tentative title, subject to change but not if I get my way). For details see: http://www.mcs.com/~drt/basisofai.html
https://www.eeworm.com/dl/542/151012.html
其他书籍
This book is about using Python to get jobs done on Windows.This intended to be a practical book foc
This book is about using Python to get jobs done on Windows.This intended to be a practical book focused on tasks. It doesn t aim to teach Python programming, although we do provide a brief tutorial. Instead, it aims to cover:How Python works on Windows The key integration techno ...
https://www.eeworm.com/dl/665/237657.html
matlab例程
A simple (de)compression program using Run Length Encoding. Compression is done that easy: compr
A simple (de)compression program using Run Length Encoding.
Compression is done that easy:
compressedData = rle(originalData)
Decompression:
originalData = rle(compressedData)
https://www.eeworm.com/dl/652/417795.html
文章/文档
this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryp
this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.