搜索结果
找到约 69 项符合
taken 的查询结果
按分类筛选
- 全部分类
- 技术资料 (13)
- 书籍 (8)
- 其他书籍 (8)
- 其他 (3)
- 单片机开发 (3)
- 单片机编程 (2)
- Linux/Unix编程 (2)
- Java编程 (2)
- 数学计算 (2)
- 软件设计/软件工程 (2)
- VC书籍 (2)
- 3G开发 (2)
- 论文 (1)
- 电源技术 (1)
- 无线通信 (1)
- DSP编程 (1)
- 加密解密 (1)
- 通讯/手机编程 (1)
- 书籍源码 (1)
- 电子书籍 (1)
- allegro (1)
- 可编程逻辑 (1)
- 源码/资料 (1)
- Internet/网络编程 (1)
- 语音压缩 (1)
- 编译器/解释器 (1)
- 文章/文档 (1)
- 数据结构 (1)
- J2ME (1)
- Windows CE (1)
- Windows Mobile (1)
- 其他嵌入式/单片机内容 (1)
数据结构 Recognizing its importance is only the fist step to advocate invetion or innovation
Recognizing its importance is only the fist step to advocate invetion or innovation, and some effective measures should be taken for it. For one thing, our authority should continue to enlarge the recruit of graduate. For another, the conditions of scientists and skilled workers should be furth ...
书籍 Fundamentals_of_Global_Positioning_System3
If one examines the current literature on GPS receiver design, most of it is quite a
bit above the level of the novice. It is taken for granted that the reader is already at a
fairly high level of understanding and proceeds from there. This text will be an
attempt to take the reader through the conc ...
技术资料 PHP.Web.2.0.开发实战.英文原版
The information in this book is distributed on an “as is” basis, without warranty. Although every precaution
has been taken in the preparation of this work, neither the author(s) nor Apress shall have any liability to any
person or entity with respect to any loss or damage caused or alleged to be ...
其他书籍 Every day, patches are created to cover up security holes in software applications and operating sys
Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one st ...
数学计算 program which uses hashing techniques for storing and retrieving the data. Input to the program:
program which uses hashing techniques for storing and retrieving the data.
Input to the program: Some random numbers. Input will be from a file.
Output: First the program reads all the input and store it properly using some hash techniques.
Once your program reads the complete input,it waits for ...
其他 SensorSimII is the framework of a simulator that I have been working on to study how future sensor n
SensorSimII is the framework of a simulator that I have been working on to study how future sensor networks should operate. the simulator is written in a modular fashion so that it can be adapted to serve a number of needs. However, please remember that it is still a work in progress. This web page ...
allegro Verilog Coding Style for Efficient Digital Design
 
In this paper, we discuss efficient coding and design styles using verilog. This can beimmensely helpful for any digital designer initiating designs. Here, we address different problems rangingfrom RTL-Gate Level simulation mismatch to race conditions in writing behavioral models. All the ...
可编程逻辑 Verilog Coding Style for Efficient Digital Design
 
In this paper, we discuss efficient coding and design styles using verilog. This can beimmensely helpful for any digital designer initiating designs. Here, we address different problems rangingfrom RTL-Gate Level simulation mismatch to race conditions in writing behavioral models. All the ...
其他书籍 As a general rule, PhD students and their supervisors tend to focus primarily, or even exclusively,
As a general rule, PhD students and their supervisors tend to focus
primarily, or even exclusively, on the content of the research that will
go into the doctoral thesis. Other issues are often taken for granted:
how to organize your work, give a presentation, work in a team, cope
with your superviso ...
无线通信 如何优化ISM无线电频率(RF)系统
Abstract: With industrial/scientific/medical (ISM) band radio frequency (RF) products, often times users are new to the structure of Maxim's low pin-count transmitters andfully integrated superheterodyne receivers. This tutorial provides simple steps that can be taken to get the best performan ...