搜索结果
找到约 1,375 项符合
one-chip 的查询结果
RFID编程 射频卡读写模块的资料
射频卡读写模块的资料,值得学习,发出来与大家共享。采用PHILIPS 公司的非接触技术设计的微型嵌入式非接触式IC卡读写模块。内嵌MF RC500射频基站,用户不必关心射频基站复杂的控制方法,只需要简单地通过选定的UART 或IIC 接口发送命令就可以对卡片进行所有的操作。该读卡模块是专门针对Mifare One读卡器设计的,带有默认 ...
单片机开发 Use this program to decode the Manchester Code of the RFID. Validate the accessibility of detected c
Use this program to decode the Manchester Code of the RFID. Validate the accessibility of detected card. Including a keypad controller, generally a all in one card access reader.
电子书籍 数字存储器和混合信号超大规模集成电路 本书系统地介绍了数字、存储器和混合信号VLSI系统的测试和可测试性设计。该书是根据作者多年的科研成果和教学实践
数字存储器和混合信号超大规模集成电路
本书系统地介绍了数字、存储器和混合信号VLSI系统的测试和可测试性设计。该书是根据作者多年的科研成果和教学实践,结合国际上关注的最新研究热点并参考大量的文献撰写的。全书共分三个部分。第一部分是测试基础,介绍了测试基本概念、测试设备、测试经济学和故障模型。第二部分是测 ...
Linux/Unix编程 Peers is a very minimalistic SIP User-Agent. It s a softphone, written in java, and it has been test
Peers is a very minimalistic SIP User-Agent. It s a softphone, written in java, and it has been tested on linux and windows. It allows a user to call from one PC to another on a local area network, using SIP/SDP/RTP with Ulaw encoding for voice.
系统设计方案 Multirate filters provide a practical approach to designing and implementing finite response (FIR) f
Multirate filters provide a practical approach to designing and implementing finite response (FIR) filters with narrow spectral constraints. By changing the input data rate at one or more intermediate points the filter lengths and computational rates can be greatly reduced when compared to a standar ...
软件设计/软件工程 In this paper, we present LOADED, an algorithm for outlier detection in evolving data sets containi
In this paper, we present LOADED, an algorithm for outlier
detection in evolving data sets containing both continuous
and categorical attributes. LOADED is a tunable algorithm,
wherein one can trade off computation for accuracy so that
domain-specific response times are achieved. Experimental
result ...
微处理器开发 This code is described in "Computational Geometry in C" (Second Edition), Chapter 8. It is not writ
This code is described in "Computational Geometry in C" (Second Edition),
Chapter 8. It is not written to be comprehensible without the
explanation in that book.
Prints out one arm configuration to reach given target.
Assumes number of links >= 3.
Input:
nlinks Number of links
L1 L2 ... Ln Link l ...
SQL Server Run the SQL script given to you to create a Library database. Note that each row in the Book table d
Run the SQL script given to you to create a Library database. Note that each row in the Book table denotes a book copy. Thus, if the library carries three copies of the title "DBMS", there will be three rows in the Book table, one for each copy. Write the SQL statements to do the following against t ...
人工智能/神经网络 libsvm is a simple, easy-to-use, and efficient software for SVM classification and regression. It s
libsvm is a simple, easy-to-use, and efficient software for SVM
classification and regression. It solves C-SVM classification, nu-SVM
classification, one-class-SVM, epsilon-SVM regression, and nu-SVM
regression. It also provides an automatic model selection tool for
C-SVM classification. This docume ...
其他书籍 The Ruby Way takes a "how-to" approach to Ruby programming with the bulk of the material consisting
The Ruby Way takes a "how-to" approach to Ruby programming with the bulk of the material consisting of more than 400 examples arranged by topic. Each example answers the question "How do I do this in Ruby?" Working along with the author, you are presented with the task description and a discussion o ...