搜索结果
找到约 106 项符合
too 的查询结果
按分类筛选
- 全部分类
- 技术资料 (10)
- 文件格式 (10)
- 书籍 (9)
- 其他 (9)
- 其他书籍 (7)
- VC书籍 (6)
- Java编程 (4)
- 通讯/手机编程 (3)
- 汇编语言 (3)
- matlab例程 (3)
- 数值算法/人工智能 (2)
- 可编程逻辑 (2)
- Linux/Unix编程 (2)
- 游戏 (2)
- USB编程 (2)
- 单片机开发 (2)
- 数据结构 (2)
- 微处理器开发 (2)
- VHDL/FPGA/Verilog (2)
- 行业发展研究 (2)
- 单片机编程 (1)
- 加密解密 (1)
- 数据库系统 (1)
- 软件工程 (1)
- 模拟电子 (1)
- 教程资料 (1)
- allegro (1)
- 手机短信编程 (1)
- 编译器/解释器 (1)
- 数学计算 (1)
- 技术管理 (1)
- 其他数据库 (1)
- 通讯编程文档 (1)
- 嵌入式/单片机编程 (1)
- 文章/文档 (1)
- Delphi控件源码 (1)
- 家庭/个人应用 (1)
- Windows CE (1)
- 中间件编程 (1)
- 软件设计/软件工程 (1)
- 其他嵌入式/单片机内容 (1)
- GPS编程 (1)
书籍 From GSM to LTE-Advanced Pro and 5G
Wireless technologies like GSM, UMTS, LTE, Wireless LAN and Bluetooth have
revolutionized the way we communicate by making services like telephony and Internet
access available anytime and from almost anywhere. Today, a great variety of technical
publications offer background information about these ...
教程资料 FPGA设计重利用方法(Design Reuse Methodology)
 
FPGAs have changed dramatically since Xilinx first introduced them just 15 years ago. In thepast, FPGA were primarily used for prototyping and lower volume applications; custom ASICswere used for high volume, cost sensitive designs. FPGAs had also been too expensive and tooslow for many a ...
可编程逻辑 FPGA设计重利用方法(Design Reuse Methodology)
 
FPGAs have changed dramatically since Xilinx first introduced them just 15 years ago. In thepast, FPGA were primarily used for prototyping and lower volume applications; custom ASICswere used for high volume, cost sensitive designs. FPGAs had also been too expensive and tooslow for many a ...
汇编语言 Video-DVM is a very cheap DVM that shows how an output as complex as a videocomposite signal can be
Video-DVM is a very cheap DVM that shows how an output as complex as a videocomposite signal can be generated entirely in software: two I/O pins and three resistors are all the hardware required. Connected to any TV set it displays voltages, included max and min peaks, using both giant digits and an ...
书籍 GSM+to+LTE-Advanced
Wireless technologies like GSM, UMTS, LTE, Wireless LAN and Bluetooth have revolu-
tionized the way we communicate and exchange data by making services like telephony and
Internet access available anytime and from almost anywhere. Today, a great variety of techni-
cal publications offer background i ...
matlab例程 %CHECKBOUNDS Move the initial point within the (valid) bounds. % [X,LB,UB,X,FLAG] = CHECKBOUNDS(X0,
%CHECKBOUNDS Move the initial point within the (valid) bounds.
% [X,LB,UB,X,FLAG] = CHECKBOUNDS(X0,LB,UB,nvars)
% checks that the upper and lower
% bounds are valid (LB <= UB) and the same length as X (pad with -inf/inf
% if necessary) warn if too long. Also make LB and UB vectors if not
% a ...
书籍 Ultra Wideband Signals and Systems
In the two years since this book was first published, ultra wideband (UWB) has
advanced and consolidated as a technology, and many more people are aware of the
possibilities for this exciting technology. We too have expanded and consolidated
materials in this second edition in the hope that ‘Ultra ...
通讯/手机编程 Computes BER v EbNo curve for convolutional encoding / soft decision Viterbi decoding scheme assum
Computes BER v EbNo curve for convolutional encoding / soft decision
Viterbi decoding scheme assuming BPSK.
Brute force Monte Carlo approach is unsatisfactory (takes too long)
to find the BER curve.
The computation uses a quasi-analytic (QA) technique that relies on the
estimation (approximate on ...
其他 1. 输入caculator
1. 输入caculator,程序开始执行,继续输入3*4+5,回车后输出17,继续下一个计算或Ctrl+C退出。
2. 输入caculator 3*4+5,程序执行输出结果17。
3. 输入caculator 3*4+5 33,程序执行输出结果error: too many arguments。
其他书籍 Every day, patches are created to cover up security holes in software applications and operating sys
Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one st ...