搜索结果

找到约 797 项符合 other 的查询结果

按分类筛选

显示更多分类

教程资料 为您的FPGA选择合适的电源

Abstract: There are many things to consider when designing a power supply for a field-programmablegate array (FPGA). These include (but are not limited to) the high number of voltage rails, and thediffering requirements for both sequencing/tracking and the voltage ripple limits. This application n ...
https://www.eeworm.com/dl/fpga/doc/32306.html
下载: 186
查看: 1085

压缩解压 zlib 1.2.2 is a general purpose data compression library. All the code is thread safe. The data form

zlib 1.2.2 is a general purpose data compression library. All the code is thread safe. The data format used by the zlib library is described by RFCs (Request for Comments) 1950 to 1952 in the files http://www.ietf.org/rfc/rfc1950.txt (zlib format), rfc1951.txt (deflate format) and rfc1952.txt (gzip ...
https://www.eeworm.com/dl/617/136691.html
下载: 176
查看: 1105

其他书籍 The LT&reg 1529/LT1529-3.3/LT1529-5 are 3A low dropout regulators with micropower quiescent current

The LT&reg 1529/LT1529-3.3/LT1529-5 are 3A low dropout regulators with micropower quiescent current and shutdown. The devices are capable of supplying 3A of output current with a dropout voltage of 0.6V. Designed for use in battery-powered systems, the low quiescent current, 50mA operating and 16mA ...
https://www.eeworm.com/dl/542/152491.html
下载: 36
查看: 1099

Windows Mobile There is an example of how to use the LDPC encode/decode with AWGN channel model in files .ldpc_de

There is an example of how to use the LDPC encode/decode with AWGN channel model in files .\ldpc_decode.m and .\GFq\ldpc_decode.m. There are a few parity check matrices available in the code but you can use other matrices provided you have enough memory to load them. I suggest checking out matri ...
https://www.eeworm.com/dl/677/199088.html
下载: 166
查看: 1099

Linux/Unix编程 About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based o

About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only on ...
https://www.eeworm.com/dl/619/201822.html
下载: 188
查看: 1170

文件格式 An unsatisfactory property of particle filters is that they may become inefficient when the observa

An unsatisfactory property of particle filters is that they may become inefficient when the observation noise is low. In this paper we consider a simple-to-implement particle filter, called ‘LIS-based particle filter’, whose aim is to overcome the above mentioned weakness. LIS-based particle filte ...
https://www.eeworm.com/dl/639/241530.html
下载: 138
查看: 1080

驱动编程 This the third edition of the Writing Device Drivers articles. The first article helped to simply ge

This the third edition of the Writing Device Drivers articles. The first article helped to simply get you acquainted with device drivers and a simple framework for developing a device driver for NT. The second tutorial attempted to show to use IOCTLs and display what the memory layout of Windows NT ...
https://www.eeworm.com/dl/618/252358.html
下载: 34
查看: 1071

其他 Artistic Style is a reindenter and reformatter of C, C++, C# and Java source code. When indentin

Artistic Style is a reindenter and reformatter of C, C++, C# and Java source code. When indenting source code, we as programmers have a tendency to use both spaces and tab characters to create the wanted indentation. Moreover, some editors by default insert spaces instead of tabs when pressing the ...
https://www.eeworm.com/dl/534/325838.html
下载: 69
查看: 1125

其他书籍 In this book, you will learn about what drives the Linux development process. You will discover the

In this book, you will learn about what drives the Linux development process. You will discover the wide variety of tools commonly used by Linux developers – compilers, debuggers, Software Configuration Management – and how those tools are used to build application software, tools, utilities and e ...
https://www.eeworm.com/dl/542/368186.html
下载: 164
查看: 1078

Linux/Unix编程 在网络安全中经常会遇到rootkit

在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor in ...
https://www.eeworm.com/dl/619/423501.html
下载: 79
查看: 1057