搜索结果
找到约 240 项符合
step 的查询结果
按分类筛选
- 全部分类
- 技术资料 (27)
- 其他书籍 (19)
- matlab例程 (19)
- 电源技术 (15)
- 其他 (12)
- 单片机编程 (10)
- 电子书籍 (8)
- 单片机开发 (7)
- VC书籍 (6)
- 文件格式 (6)
- Linux/Unix编程 (6)
- 行业应用文档 (5)
- 软件工程 (5)
- Java编程 (5)
- 文章/文档 (5)
- 嵌入式综合 (4)
- 数据结构 (4)
- 数值算法/人工智能 (4)
- Java书籍 (4)
- 嵌入式/单片机编程 (4)
- VIP专区 (4)
- 模拟电子 (3)
- 编译器/解释器 (3)
- 游戏 (3)
- 书籍 (3)
- 可编程逻辑 (2)
- 源码/资料 (2)
- USB编程 (2)
- 人工智能/神经网络 (2)
- 其他嵌入式/单片机内容 (2)
- 软件设计/软件工程 (2)
- 并行计算 (2)
- 其他行业 (2)
- J2ME (2)
- 数学计算 (2)
- 工业控制 (1)
- PCB相关 (1)
- autocad教程 (1)
- 无线通信 (1)
- 开关电源 (1)
- 技术书籍 (1)
- 开发工具 (1)
- 实用工具 (1)
- 工控技术 (1)
- 压缩解压 (1)
- BREW编程 (1)
- Windows CE (1)
- 汇编语言 (1)
- DSP编程 (1)
- Modem编程 (1)
- 通讯编程文档 (1)
- 操作系统开发 (1)
- *行业应用 (1)
- VxWorks (1)
- 微处理器开发 (1)
- Symbian (1)
- 技术管理 (1)
- 书籍源码 (1)
- MySQL数据库 (1)
- 通讯/手机编程 (1)
- 系统设计方案 (1)
- 自动化控制 (1)
- 手册 (1)
- 源码 (1)
其他书籍 Every day, patches are created to cover up security holes in software applications and operating sys
Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one st ...
Modem编程 Make and answer phone calls Detect tone and pulse digit from the phone line Capture Caller ID
Make and answer phone calls
Detect tone and pulse digit from the phone line
Capture Caller ID
Support blind transfer, single-step transfer/conference, consultation transfer/conference, hold, unhold.
Control of the local phone handset, microphone and speaker of the modem
Send and receive fa ...
编译器/解释器 this a pack include source code for quartus 2. It is an implementation of the LC2. The LC-2 compu
this a pack include source code for quartus 2.
It is an implementation of the LC2. The LC-2 computer is described in Introduction to Computing Systems from Bits & Gates to C & Beyond by Yale Patt and Sanjay Patel, McGraw Hill, 2001. The LC2 model can be run as a simulation or downloaded to the UP3 ...
其他 DAGON Approach Object of this exercise: Given a subject graph and a set of pattern graph in canoni
DAGON Approach
Object of this exercise:
Given a subject graph and a set of pattern graph in canonical representation (2-input
NAND and INV), implement the second step of DAGON approach. (Both the subject
graph and the pattern graphs are trees.)
文件格式 We present a particle filter construction for a system that exhibits time-scale separation. The sep
We present a particle filter construction for a system that exhibits
time-scale separation. The separation of time-scales allows two simplifications
that we exploit: i) The use of the averaging principle for the
dimensional reduction of the system needed to solve for each particle
and ii) the factor ...
其他书籍 ollydbg完全教程。OllyDbg 是一种具有可视化界面的 32 位汇编-分析调试器。它的特别之处在于可以在没有源代码时解决问题
ollydbg完全教程。OllyDbg 是一种具有可视化界面的 32 位汇编-分析调试器。它的特别之处在于可以在没有源代码时解决问题,并且可以处理其它编译器无法解决的难题。
一,什么是 OllyDbg?
二,一般原理[General principles]
三,反汇编器[Disassembler]
四,分析器[Analysis]
五,Object扫描器[Object scanner]
六, ...
软件工程 this will produce the dci program in the src/ directory, or in /path/to/your/installation/bin if y
this will produce the dci program in the src/ directory, or in
/path/to/your/installation/bin if you used the--prefix option during the
configure step and issued a "make install".
matlab例程 matlab 实现系统的参数计算
matlab 实现系统的参数计算,系统单位阶跃响应的相关参数计算。Matlab real system parameters, the system unit step response of the relevant parameters.
游戏 Ink Blotting One method for escaping from a maze is via ‘ink-blotting’. In this method your startin
Ink Blotting
One method for escaping from a maze is via ‘ink-blotting’. In this method your starting square
is marked with the number ‘1’. All free, valid squares north, south, east and west around the
number ‘1‘ are marked with a number ‘2’. In the next step, all free, valid squares around ...
其他书籍 UNIX下的硬件代码检查工具的使用
UNIX下的硬件代码检查工具的使用,step by step.Synopsys很好的工具文档。