Both

共 402 篇文章
Both 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 402 篇文章,持续更新中。

RS_latch using vhdl, When using static gates as building blocks, the most fundamental latch is the

RS_latch using vhdl, When using static gates as building blocks, the most fundamental latch is the simple SR latch, where S and R stand for set and reset. It can be constructed from a pair of cross-c

This software is developed to provide ease with controller design. For PID control, options are give

This software is developed to provide ease with controller design. For PID control, options are given to design and analyse the compensated and uncompensated system. You are free to choice among Pr

Mastering Dojo will teach you how to build an Internet application that will impress your end users

Mastering Dojo will teach you how to build an Internet application that will impress your end users and delight you while you’re writing it. The book also explains Dojo’s JavaScript underpinnings, b

both http and ftp file upload

both http and ftp file upload

Software-defined radios (SDRs) have been around for more than a decade. The first complete Global P

Software-defined radios (SDRs) have been around for more than a decade. The first complete Global Positioning System (GPS) implementation was described by Dennis Akos in 1997. Since then several res

Novell.Press.Linux.Kernel.Development linux内核开发的经典书籍之一 The Linux kernel is one of the most interes

Novell.Press.Linux.Kernel.Development linux内核开发的经典书籍之一 The Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. T

C Algorithms for Real-Time DSP Chapters 1 and 2 cover the basic principles of digital signal proces

C Algorithms for Real-Time DSP Chapters 1 and 2 cover the basic principles of digital signal processing and C programming. Readers familiar with these topics may wish to skip one or both chapters.

Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2

Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an exa

source code which tells whether customer has to given loan or not depending on the details of the cu

source code which tells whether customer has to given loan or not depending on the details of the customer,it is run in scilab (both in linux,windows)

A full implementation of ICA,PCA,LDA,SVM,in both orginal and incremental in model of real time learn

A full implementation of ICA,PCA,LDA,SVM,in both orginal and incremental in model of real time learnign for face recognition.

机器学习-ID3算法

机器学习ID3算法的简单实现, <div class="lemma-summary" label-module="lemmaSummary" style="clear:both;font-size:14px;color:#333333;margin-bottom:15px;text-indent:2em;line-height:24px;zoom:1;font-family:arial, 宋体,

A necessary book containing many FFT algorithms, both serial and parallel.

A necessary book containing many FFT algorithms, both serial and parallel.

伸展树

伸展树,基本数据结构,The tree is drawn in such a way that both of the edges down from a node are the same length. This length is the minimum such that the two subtrees are separated by at least two blanks.

chat room

chat room,have both server and client.client can talk publicly or privatly sever can send message to all clients or choose one.

eye matching using Circular hough transform for eyedetection and precise eyes location. it is a very

eye matching using Circular hough transform for eyedetection and precise eyes location. it is a very good code that works on both grayscale and jpg image.

this is ram both asynchronous and synchronous reset signals which is basic for any registers and bas

this is ram both asynchronous and synchronous reset signals which is basic for any registers and basic memory element

The ONE is a Opportunistic Network Environment simulator which provides a powerful tool for generat

The ONE is a Opportunistic Network Environment simulator which provides a powerful tool for generating mobility traces, running DTN messaging simulations with different routing protocols, and visual

We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f

We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approxima

MCPU is a minimal cpu aimed to fit into a 32 Macrocell CPLD - one of the smallest available programm

MCPU is a minimal cpu aimed to fit into a 32 Macrocell CPLD - one of the smallest available programmable logic devices. While this CPU is not powerful enough for real world applications it has proven

An analysis tool for both continuous- and discrete-time control systems. -Includes a parameter so

An analysis tool for both continuous- and discrete-time control systems. -Includes a parameter solving tool