搜索结果

找到约 203 项符合 implemented 的查询结果

单片机编程 使用软件程序仿真C500微控制器系列SSC(同步串行通道)功

The solution presented in this paper and in the attached source files emulates the mostimportant SSC functions by using SW routines implemented in C. The code is focused onthe SAB C513, but will fit to all C500 derivatives.Beyond the low level software drivers a test shell is delivered. This shell a ...
https://www.eeworm.com/dl/502/31367.html
下载: 31
查看: 1053

Linux/Unix编程 BoboMail is a so called webmail application, which provides mail access through a web interface. It

BoboMail is a so called webmail application, which provides mail access through a web interface. It handles MIME messages properly (including HTML mails) and is implemented in Python BoboMail是一个webmail应用程序,它提供通过一个web接口的邮件访问。它可以正确处理MIME消息(包括HTML邮件),用Python实现 ...
https://www.eeworm.com/dl/619/138908.html
下载: 114
查看: 1072

软件设计/软件工程 A class--the basic building block of an object-oriented language such as Java--is a template that de

A class--the basic building block of an object-oriented language such as Java--is a template that describes the data and behavior associated with instances of that class. When you instantiate a class you create an object that looks and feels like other instances of the same class. The data associate ...
https://www.eeworm.com/dl/684/412468.html
下载: 200
查看: 1175

VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/686/413130.html
下载: 134
查看: 1101

加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/519/413134.html
下载: 97
查看: 1093

VHDL/FPGA/Verilog In this work an implementation of a geometric nonlinear controller for chaos synchronization in a Fi

In this work an implementation of a geometric nonlinear controller for chaos synchronization in a Field Programmable Gate Array (FPGA) is presented. The Lorenz chaotic system is used to show the implementation of chaos synchronization via nonlinear controller implemented in a Xilinx FPGA Virtex-II 2 ...
https://www.eeworm.com/dl/663/469405.html
下载: 124
查看: 1092

嵌入式/单片机编程 NORTi3 is a realtime multitasking operating system conforming to the micro-ITRON 3.0 specification.

NORTi3 is a realtime multitasking operating system conforming to the micro-ITRON 3.0 specification. NORTi3 is divided into two packages: NORTi3 Standard and NORTi3 Extended. The product NORTi3 Extended has implemented all the system calls of level E placed as "added and extended functions” in the m ...
https://www.eeworm.com/dl/647/152665.html
下载: 65
查看: 1190

matlab例程 The main file in this list of programs is "vblast.m". Type "help vblast" on the command line for det

The main file in this list of programs is "vblast.m". Type "help vblast" on the command line for details.Study the coding by stepping through the program. These programs require around 5000 packets for reasonable plotting accuracy.This has been implemented for a 2x2 system. The reader can program o ...
https://www.eeworm.com/dl/665/337085.html
下载: 79
查看: 1122

数值算法/人工智能 This program incorporates the FV method for solving the Navier-Stokes equations using 2D, Cartesian

This program incorporates the FV method for solving the Navier-Stokes equations using 2D, Cartesian grids and the staggered arrangement of variables. Variables are stored as 2D arrays. SIMPLE method is used for pressure calculation. UDS and CDS are implemented for the discretization of convective te ...
https://www.eeworm.com/dl/518/440155.html
下载: 149
查看: 1093

其他书籍 Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and n

Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and network administration tasks. This section explains how to enable and disable the perl scripting service, and how to use Cisco E-DI Perl API for daily tasks. When a perl script is implemented by an admi ...
https://www.eeworm.com/dl/542/461785.html
下载: 125
查看: 1047