搜索结果

找到约 106 项符合 too 的查询结果

VC书籍 MFC Black Book Introduction: Are you an MFC programmer? Good. There are two types of MFC programme

MFC Black Book Introduction: Are you an MFC programmer? Good. There are two types of MFC programmers. What kind are you? The first kind are the good programmers who write programs that conform to the way MFC wants you to do things. The second bunch are wild-eyed anarchists who insist on getting thin ...
https://www.eeworm.com/dl/686/158832.html
下载: 30
查看: 1077

数学计算 cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used

cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used to calculate a whole range of scientific functions including sin, cos, tan, arctan, arcsin, arccos, sinh, cosh, tanh, arctanh, log, exp, square root and even multiply and divide. the method dates ba ...
https://www.eeworm.com/dl/641/410485.html
下载: 80
查看: 1090

数据结构 Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to w

Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to work in the random access memory(RAM). Some of them do provide some mechanism for dumping the whole tree into a file and loading it back to the memory in order to make data in that tree persistent. It ...
https://www.eeworm.com/dl/654/154678.html
下载: 115
查看: 1142

其他数据库 This a simple database management system. It doesn t use any other code (i.e. ODBC, ADO, etc.) and h

This a simple database management system. It doesn t use any other code (i.e. ODBC, ADO, etc.) and has it s own database file format. I wrote it because I found the other DBMSs code too bulky and hard to debug. It s designed for small applications and I doubt it could handle anything on a large scal ...
https://www.eeworm.com/dl/645/349298.html
下载: 165
查看: 1177

书籍 Physical Layer Security in Wireless Communications

The ever-increasing demand for private and sensitive data transmission over wireless net- works has made security a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, computer scientists and engineers have trie ...
https://www.eeworm.com/dl/522054.html
下载: 1
查看: 117

书籍 System+Design+for+Telecommunication+Gateways

The idea for this book was born during one of my project-related trips to the beautiful city of Hangzhou in China, where in the role of Chief Architect I had to guide a team of very young, very smart and extremely dedicated software developers and verification engineers. Soon it became clear that as ...
https://www.eeworm.com/dl/522133.html
下载: 1
查看: 48

书籍 The 3G IP Multimedia Subsystem (IMS)

When 3GPP started standardizing the IMS a few years ago, most analysts expected the number of IMS deploymentsto grow dramatically as soon the initial IMS specifications were ready (3GPP Release 5 was functionallyfrozenin the first half of 2002and completedshortly after that). While those predictions ...
https://www.eeworm.com/dl/522150.html
下载: 1
查看: 82

技术资料 基于52单片机的车内温度调节系统

根据单片机的控制技术,与温度传感器、空调组件,电池组相结合,设计车内温度过高降温,防止温度过高发生意外,提高舒适性。工作原理:在车辆熄火后,车门关闭,驾驶员控制装置启动,温度传感器检测车内温度,当温度高于车主设定的温度时,单片机会控制空调启动将温度控制在车主设定温度以内,从而达到舒适性的要求。according to the S ...
https://www.eeworm.com/dl/895518.html
下载: 4
查看: 3631

技术资料 基于视觉的车辆控制系统设计与实现

介绍了基于视觉的车辆控制系统的设计与实现,主要包括:机械结构、硬件电路、软件设计。在机械结构中,主要分析了硬件设备的安装与位置的选择,并解释了位置的不同对于小车的影响;在硬件电路中,重点介绍了舵机,鹰眼、液晶屏、MCU等供电电路的设计;在软件设计中,主要介绍了路径边线的提取,以及驱动电机的PID控制算法。测试表明, ...
https://www.eeworm.com/dl/894766.html
下载: 2
查看: 4217

技术资料 基于单片机的粉尘检测报警防护系统研究

粉尘检测是环境保护的重要环节,传统的粉尘检测防护系统的预防方式较为单一。本文设计了一种基于单片机的粉尘检测报警防护系统,能有效地检测粉尘浓度,进行多种方式的报警防护,以保证工作人员的生命健康和安全。当检测的粉尘浓度为中度时,通过继电器控制风扇转动,浓度过高时,蜂鸣器报警,开启定点喷雾,降低粉尘浓度。适用于面 ...
https://www.eeworm.com/dl/895486.html
下载: 3
查看: 7269