搜索结果
找到约 1,331 项符合
widely-used 的查询结果
微处理器开发 The GRLIB IP Library is an integrated set of reusable IP cores, designed for system-on-chip (SOC) de
The GRLIB IP Library is an integrated set of reusable IP cores, designed for system-on-chip (SOC) development. The IP cores are centered around the common on-chip bus, and use a coherent method for simulation and synthesis. The library is vendor independent, with support for different CAD tools and ...
微处理器开发 LPC2148 USB Audio Device Example This USB example project implements an USB Audio Device that conne
LPC2148 USB Audio Device Example
This USB example project implements an USB Audio Device that connects via the USB interface to the PC. It may be used on the following devices:
LPC2141
LPC2142
LPC2144
LPC2146
LPC2148
An USB Audio Device (HID) does not require any special USB driver, since the ...
数值算法/人工智能 The Molgedey and Schuster decorrelation algorithm, having square mixing matrix and no noise . Trunca
The Molgedey and Schuster decorrelation algorithm, having square mixing matrix and no noise . Truncation is used for the time shifted matrix, and it is forced to be symmetric . The delay Tau is estimated .
The number of independent components are calculated using Bayes Information Criterion (BIC), ...
软件工程 Software Testing, Second Edition provides practical insight into the world of software testing and q
Software Testing, Second Edition provides practical insight into the world of software testing and quality assurance. Learn how to find problems in any computer program, how to plan an effective test approach and how to tell when software is ready for release. Updated from the previous edition in 20 ...
汇编语言 Base64 demonstrates how easy it is to decipher plaintext usernames and passwords. Never login to a
Base64 demonstrates how easy it is to decipher
plaintext usernames and passwords. Never login to a public network resource
unless some type of encryption is being used, secure socket layer is one example.
Most FTP sites also use plaintext passwords.
汇编语言 This is an example how one could hide a process on Windows based operation systems from task viewer
This is an example how one could hide a process on Windows based
operation systems from task viewers like ProcDump (G-RoM, Lorian
& Stone) or ProcessExplorer (SysInternals).
It could e.g. be used as some kind of dump protection.
The way to get this done is very different on NT and 9x machines.
USB编程 pic mcu code:This application note describes the design and implementation of a USB Mass Storage De
pic mcu code:This application note describes the design and
implementation of a USB Mass Storage Device (MSD)
using a Secure Digital card, which should prove useful
to developers of USB mass storage solutions. This
application may be used as a stand-alone MSD or as a
Secure Digital/Multimedia Card ( ...
嵌入式/单片机编程 JAPAN RTOS TOPPERS/JSP kernel 1.4 PreRelease simulation environment JSP kernel Windows simulation
JAPAN RTOS TOPPERS/JSP kernel 1.4 PreRelease simulation environment
JSP kernel Windows simulation environment is used for this exercise
program.
单片机开发 This project is created using the Keil ARM CA Compiler. The Logic Analyzer built into the simula
This project is created using the Keil ARM CA Compiler.
The Logic Analyzer built into the simulator may be used to monitor and display any variable or peripheral I/O register. It is already configured to show the PWM output signal on PORT3.0 and PORT3.1
This ARM Example may be debugged using onl ...
通讯/手机编程 This m-file displays the time waveform for the Gaussian pulse function and the first and second deri
This m-file displays the time waveform for the Gaussian pulse function and the first and second derivatives of the Gaussian pulse function for a 0.5 nanosecond pulse width. Other values of pulse widths may be used by changing fs,t,t1. The program uses the actual first and second derivative equations ...