搜索结果

找到约 1,476 项符合 sha-based 的查询结果

其他 second order differential funvtionls in total variation-based image restoration

second order differential funvtionls in total variation-based image restoration
https://www.eeworm.com/dl/534/266037.html
下载: 61
查看: 1024

文章/文档 In this correspondence, the computational complexity of this sphere-decoding based MSDD is analyzed

In this correspondence, the computational complexity of this sphere-decoding based MSDD is analyzed.
https://www.eeworm.com/dl/652/266800.html
下载: 37
查看: 1063

通讯编程文档 An Application Circuit of Phonetic Chip ISD4004 Based on the Control of Single Board Computer

An Application Circuit of Phonetic Chip ISD4004 Based on the Control of Single Board Computer
https://www.eeworm.com/dl/646/267194.html
下载: 94
查看: 1058

其他 CANopen is a networking system based on the CAN serial bus. CANopen assumes that the device’s hardw

CANopen is a networking system based on the CAN serial bus. CANopen assumes that the device’s hardware has a CAN transceiver and CAN controller as specified in ISO 11898. CANopen profile family specifies standardized communication mechanisms and device functionality. The profile family is available ...
https://www.eeworm.com/dl/534/267283.html
下载: 137
查看: 1055

软件设计/软件工程 for Masking Based Subspace Speech Enhancement 一篇关于语音增强的 pdf !值得共享

for Masking Based Subspace Speech Enhancement 一篇关于语音增强的 pdf !值得共享
https://www.eeworm.com/dl/684/268051.html
下载: 48
查看: 1067

CA认证 实现密码算法里的sha-1功能对数据进行加密过程当中进行哈希

实现密码算法里的sha-1功能对数据进行加密过程当中进行哈希
https://www.eeworm.com/dl/640/268147.html
下载: 74
查看: 1064

电子书籍 A salient-boundary extraction software package based on the paper: S. Wang, T. Kubota, J. M. Siskind

A salient-boundary extraction software package based on the paper: S. Wang, T. Kubota, J. M. Siskind, J. Wang. Salient Closed Boundary Extraction with Ratio Contour, IEEE Transactions on Pattern Analysis and Machine Intelligence, 27(4):546-561, 2005
https://www.eeworm.com/dl/cadence/ebook/269266.html
下载: 71
查看: 1040

加密解密 windowxp 下各种系统提供的加密方法:rsa,des,sha,md5

windowxp 下各种系统提供的加密方法:rsa,des,sha,md5
https://www.eeworm.com/dl/519/269805.html
下载: 173
查看: 1040

技术管理 AQ1206:Building Linux based Internet Gateways.The file includes Development Process,Hardware Bring-u

AQ1206:Building Linux based Internet Gateways.The file includes Development Process,Hardware Bring-up and Creating the Platform using Linux.In the end there is Q&A session.
https://www.eeworm.com/dl/642/270246.html
下载: 100
查看: 1046

游戏 MegaMek is a networked Java clone of BattleTech, a turn-based sci-fi boardgame for 2+ players. Fight

MegaMek is a networked Java clone of BattleTech, a turn-based sci-fi boardgame for 2+ players. Fight using giant robots, tanks, and/or infantry on a hex-based map.
https://www.eeworm.com/dl/625/270745.html
下载: 115
查看: 1057