搜索结果
找到约 286 项符合
order 的查询结果
按分类筛选
- 全部分类
- 单片机编程 (25)
- matlab例程 (22)
- 其他 (18)
- 数学计算 (16)
- 书籍 (14)
- 技术资料 (13)
- 其他书籍 (11)
- Java编程 (10)
- DSP编程 (8)
- 人工智能/神经网络 (8)
- 文章/文档 (8)
- Linux/Unix编程 (8)
- 数值算法/人工智能 (7)
- 通讯编程文档 (7)
- 可编程逻辑 (6)
- 通讯/手机编程 (6)
- VHDL/FPGA/Verilog (6)
- VC书籍 (6)
- 模拟电子 (5)
- Java书籍 (5)
- 单片机开发 (5)
- 电源技术 (4)
- 微处理器开发 (4)
- 系统设计方案 (4)
- 学术论文 (3)
- 教程资料 (3)
- 加密解密 (3)
- Delphi控件源码 (3)
- 嵌入式综合 (2)
- 无线通信 (2)
- 测试测量 (2)
- 数据结构 (2)
- 其他数据库 (2)
- 行业发展研究 (2)
- 电子书籍 (2)
- 文件格式 (2)
- Jsp/Servlet (2)
- Internet/网络编程 (2)
- 源码 (2)
- 论文 (2)
- PCB相关 (1)
- 传感与控制 (1)
- 工控技术 (1)
- 其他嵌入式/单片机内容 (1)
- Windows CE (1)
- Applet (1)
- 其他行业 (1)
- 邮电通讯系统 (1)
- SCSI/ASPI (1)
- 驱动编程 (1)
- 3G开发 (1)
- 书籍源码 (1)
- 金融证券系统 (1)
- 数据库系统 (1)
- 技术管理 (1)
- SQL Server (1)
- 编译器/解释器 (1)
- 软件工程 (1)
- JavaScript (1)
- 编辑器/阅读器 (1)
- 嵌入式/单片机编程 (1)
- 手机短信编程 (1)
- 源码/资料 (1)
- VIP专区 (1)
加密解密 SA Encryption and Decryption using Matlab The program set contains thirteen files listed below.
SA Encryption and Decryption using Matlab
The program set contains thirteen files listed below.
errormeg.fig
errormsg.m
helpmsg.fig
helpmsg.m
inputmsg.fig
inputmsg.m
mesgcut.m
pro2.fig
pro2.m
rsacore.m
readme.txt
screenshot.gif
In order to run the program please call pro2.m under Matlab 6.0 Envi ...
Delphi控件源码 1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click
1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click on Security button
in order to Add/Remove users and set user rights. Once you entered Security dialog you may select your Supervisor password.
2. Click OK when finished configuring users. Don t forg ...
编译器/解释器 c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlyin
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths ...
软件工程 Fortran 90 versions of all the Numerical Recipes routines appear in the following Chapters B1 throu
Fortran 90 versions of all the Numerical Recipes routines appear in the following
Chapters B1 through B20, numbered in correspondence with Chapters 1 through 20
in Volume 1. Within each chapter, the routines appear in the same order as in Volume
1, but not broken out separately by section number wit ...
通讯编程文档 The files adi_ssl_init.h and adi_ssl_init.c are used to define the functions adi_ssl_Init()
The files adi_ssl_init.h and adi_ssl_init.c are used to define the functions
adi_ssl_Init() and 慳di_ssl_Terminate()?which initialize and terminate all the
Blackfin System Services in the appropriate order, for a particular EZ-Kit, depending
on the Blackfin processor used.
DSP编程 C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and exam
C280x C/C++ Header Files and Peripheral Examples
The DSP28xx C/C++ peripheral header files and example projects files facilitate writing C/C++ Code for the TI鈥檚 28xx MCUs. The code can be used as a learning tool or as the basis for a development platform depending on the current needs of the user. ...
matlab例程 Matlab script for solution to the driven cavity problem on a staggered grid using a divergence formu
Matlab script for solution to the driven cavity problem on a staggered grid using a divergence formulation and second-order Runge-Kutta time integration.
其他 C in A Nutshell Learning a language--any language--involves a process wherein you learn to rely les
C in A Nutshell
Learning a language--any language--involves a process wherein you learn to rely less and less on instruction and more increasingly on the aspects of the language you ve mastered. Whether you re learning French, Java, or C, at some point you ll set aside the tutorial and attempt to co ...
数学计算 The code performs a number (ITERS) of iterations of the Bailey s 6-step FFT alg
The code performs a number (ITERS) of iterations of the
Bailey s 6-step FFT algorithm (following the ideas in the
CMU Task parallel suite).
1.- Generates an input signal vector (dgen) with size
n=n1xn2 stored in row major order
...
编辑器/阅读器 Normally a list view is updated by a user directly by selecting a list view item and then editing or
Normally a list view is updated by a user directly by selecting a list view item and then editing or deleting it. New items are usually added at the bottom of the list. This works fine since the user knows which items have been changed or deleted and where the new items will pop up. A drawback of it ...