搜索结果

找到约 773 项符合 function 的查询结果

按分类筛选

显示更多分类

其他 This folder has some scritps that you may find usefull. All of it comes from questions that I ve r

This folder has some scritps that you may find usefull. All of it comes from questions that I ve received in my email. If you have a new request/question, feel free to send it to marceloperlin@gmail.com. But please, don t ask me to do your homework. Passing_your_param0 This folder contains inst ...
https://www.eeworm.com/dl/534/293336.html
下载: 73
查看: 1097

压缩解压 Image Compression A collection of simple routines for image compression using different techniqu

Image Compression A collection of simple routines for image compression using different techniques. 图象压缩的不同方法 BTCODE: Image compression Using Block Truncation Coding. PYRAMID: Image compression based on Gaussian Pyramids. DCTCOMPR: Image compression based on Discrete Cosine Transform. ...
https://www.eeworm.com/dl/617/294636.html
下载: 121
查看: 1071

RFID编程 Abstract:This article elaborats the RFID system

Abstract:This article elaborats the RFID system,multianalysised the concrete function of RFID middleware,and proposed a kind of RFID data transmission design model with news transmission mechanism,for realizing data transmission more effectively, RFID data transmission design model with news ...
https://www.eeworm.com/dl/697/295949.html
下载: 84
查看: 1032

其他 I made a lot of changed on this object,such as * // 1.Encapsulates all code in one userobjet,s

I made a lot of changed on this object,such as * // 1.Encapsulates all code in one userobjet,since PB does not * // support "Address of Function" , so we can not set new * // WndProc, just makes the object more easy to use. * // 2.Uses structure array instead of Datastore * // 3. ...
https://www.eeworm.com/dl/534/301971.html
下载: 49
查看: 1035

加密解密 This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message au

This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared secret key. The cryptographic strength of HMAC de ...
https://www.eeworm.com/dl/519/303374.html
下载: 76
查看: 1028

加密解密 This file contains a C++Builder 4 project called SimplyChaos-X ver 3.1 (SCX31). SCX31 is an encry

This file contains a C++Builder 4 project called SimplyChaos-X ver 3.1 (SCX31). SCX31 is an encryption tool. I designed it as my graduation paper work. SCX31 is a symmetric stream cipher built on chaos function, one time pad cipher and inspiration from Ground Effect (aviation). The key length can b ...
https://www.eeworm.com/dl/519/305307.html
下载: 101
查看: 1057

数学计算 数值分析算法源码(java) 这个学期一边学习java一边学习数值分析,因此用java写了一个数值分析算法的软件包numericalAnalysis. [说明] 适合使用者:会java的

数值分析算法源码(java) 这个学期一边学习java一边学习数值分析,因此用java写了一个数值分析算法的软件包numericalAnalysis. [说明] 适合使用者:会java的,想要学习数值分析算法的人. 本代码对照书:数值分析第二版,史万明等编,北京理工大学出版社. 本代码尽量按书中描述的来写,可以提供参考. [使用方法] 在java的ide ...
https://www.eeworm.com/dl/641/309760.html
下载: 37
查看: 1091

SQL Server Of the password is: Server: "1." Client: + for the month of the date of the machine. Such as

Of the password is: Server: "1." Client: + for the month of the date of the machine. Such as "2005/08/05", compared with the number "85" Database: "xzxq". I made the changes: 1, stations and customer-service once every 30 seconds to exchange information (to ensure continuous line) 2, co ...
https://www.eeworm.com/dl/689/313303.html
下载: 177
查看: 1078

VHDL/FPGA/Verilog 本文介绍了VHDL硬件描述语言基础

本文介绍了VHDL硬件描述语言基础,包括: 1.简介 2.基本结构 3.基本数据类型 4.设计组合电路 5.设计时序电路 6.设计状态机 7.大规模电路的层次化设计 8.Function and Procedure
https://www.eeworm.com/dl/663/313829.html
下载: 140
查看: 1079

matlab例程 Viterbi Algorithm & Viterbi Decoder Matlab Code.(Provided both soft & hard decision ability). Note:

Viterbi Algorithm & Viterbi Decoder Matlab Code.(Provided both soft & hard decision ability). Note: The main function is viterbi.m
https://www.eeworm.com/dl/665/315072.html
下载: 159
查看: 1070