搜索结果

找到约 248 项符合 pre-implemented 的查询结果

Linux/Unix编程 BoboMail is a so called webmail application, which provides mail access through a web interface. It

BoboMail is a so called webmail application, which provides mail access through a web interface. It handles MIME messages properly (including HTML mails) and is implemented in Python BoboMail是一个webmail应用程序,它提供通过一个web接口的邮件访问。它可以正确处理MIME消息(包括HTML邮件),用Python实现 ...
https://www.eeworm.com/dl/619/138908.html
下载: 114
查看: 1049

人工智能/神经网络 Description: C4.5Rule-PANE is a rule learning method which could generate accurate and comprehensibl

Description: C4.5Rule-PANE is a rule learning method which could generate accurate and comprehensible symbolic rules, through regarding a neural network ensemble as a pre-process of a rule inducer. Reference: Z.-H. Zhou and Y. Jiang. Medical diagnosis with C4.5 rule preceded by artificial neural net ...
https://www.eeworm.com/dl/650/139303.html
下载: 162
查看: 1059

VC书籍 This companion disc contains the source code for the sample programs presented in INSIDE VISUAL C++

This companion disc contains the source code for the sample programs presented in INSIDE VISUAL C++ 5.0, as well as pre- compiled copies of the programs. To copy all of the sample code onto your hard disk, run the SETUP.EXE program and follow the instructions that appear on the screen. The sample c ...
https://www.eeworm.com/dl/686/150692.html
下载: 79
查看: 1125

嵌入式/单片机编程 NORTi3 is a realtime multitasking operating system conforming to the micro-ITRON 3.0 specification.

NORTi3 is a realtime multitasking operating system conforming to the micro-ITRON 3.0 specification. NORTi3 is divided into two packages: NORTi3 Standard and NORTi3 Extended. The product NORTi3 Extended has implemented all the system calls of level E placed as "added and extended functions” in the m ...
https://www.eeworm.com/dl/647/152665.html
下载: 65
查看: 1129

Linux/Unix编程 The Viterbi algorithm is the same as the binary case with one main difference: The survivor sequence

The Viterbi algorithm is the same as the binary case with one main difference: The survivor sequences include the uncoded bits, which are decided at each trellis stage when selecting one of two parallel branches with the largest correlation metric. Presently, only 8-PSK modulation is considered. E ...
https://www.eeworm.com/dl/619/171810.html
下载: 175
查看: 1080

VHDL/FPGA/Verilog BurchED B5-X300 Spartan2e using XC2S300e device Top level file for 6809 compatible system on a chi

BurchED B5-X300 Spartan2e using XC2S300e device Top level file for 6809 compatible system on a chip Designed with Xilinx XC2S300e Spartan 2+ FPGA. Implemented With BurchED B5-X300 FPGA board, B5-SRAM module, B5-CF module and B5-FPGA-CPU-IO module
https://www.eeworm.com/dl/663/172733.html
下载: 61
查看: 1073

系统设计方案 Wavelets have widely been used in many signal and image processing applications. In this paper, a ne

Wavelets have widely been used in many signal and image processing applications. In this paper, a new serial-parallel architecture for wavelet-based image compression is introduced. It is based on a 4-tap wavelet transform, which is realised using some FIFO memory modules implementing a pixel-level ...
https://www.eeworm.com/dl/678/174073.html
下载: 184
查看: 1096

Linux/Unix编程 fsmlabs的real time linux的内核

fsmlabs的real time linux的内核,版本rtl-3.2-pre
https://www.eeworm.com/dl/619/180227.html
下载: 64
查看: 1037

手机短信编程 This serial client in JAVA allows sending, reading and writing of SMS via a serial COM port. The too

This serial client in JAVA allows sending, reading and writing of SMS via a serial COM port. The tool uses the PDU SMS format. IRDA drivers are included. The functionality can be implemented into applications for remote alerting or SMS authentification.
https://www.eeworm.com/dl/622/191697.html
下载: 168
查看: 1037

Linux/Unix编程 About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based o

About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only on ...
https://www.eeworm.com/dl/619/201822.html
下载: 188
查看: 1111