Both
共 402 篇文章
Both 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 402 篇文章,持续更新中。
RS_latch using vhdl, When using static gates as building blocks, the most fundamental latch is the
RS_latch using vhdl,
When using static gates as building blocks, the most fundamental latch is the simple SR latch, where S and R stand for set and reset. It can be constructed from a pair of cross-c
This software is developed to provide ease with controller design. For PID control, options are give
This software is developed to provide ease with controller design. For PID control, options are given
to design and analyse the compensated and uncompensated system. You are free to choice among Pr
Mastering Dojo will teach you how to build an Internet application that will impress your end users
Mastering Dojo will teach you how to build an Internet application
that will impress your end users and delight you while you’re writing
it. The book also explains Dojo’s JavaScript underpinnings, b
both http and ftp file upload
both http and ftp file upload
Software-defined radios (SDRs) have been around for more than a decade. The first complete Global P
Software-defined radios (SDRs) have been around for more than a decade. The
first complete Global Positioning System (GPS) implementation was described
by Dennis Akos in 1997. Since then several res
Novell.Press.Linux.Kernel.Development linux内核开发的经典书籍之一 The Linux kernel is one of the most interes
Novell.Press.Linux.Kernel.Development
linux内核开发的经典书籍之一
The Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. T
C Algorithms for Real-Time DSP Chapters 1 and 2 cover the basic principles of digital signal proces
C Algorithms for Real-Time DSP
Chapters 1 and 2 cover the basic principles of digital signal processing and C programming. Readers familiar with these topics may wish to skip one or both chapters.
Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2
Playfair Cipher
1.not even the large number of keys in a monoalphabetic cipher provides security
2.one approach to improving security was to encrypt multiple letters
3.the Playfair Cipher is an exa
source code which tells whether customer has to given loan or not depending on the details of the cu
source code which tells whether customer has to given loan or not depending on the details of the customer,it is run in scilab (both in linux,windows)
A full implementation of ICA,PCA,LDA,SVM,in both orginal and incremental in model of real time learn
A full implementation of ICA,PCA,LDA,SVM,in both orginal and incremental in model of real time learnign for face recognition.
机器学习-ID3算法
机器学习ID3算法的简单实现,
<div class="lemma-summary" label-module="lemmaSummary" style="clear:both;font-size:14px;color:#333333;margin-bottom:15px;text-indent:2em;line-height:24px;zoom:1;font-family:arial, 宋体,
A necessary book containing many FFT algorithms, both serial and parallel.
A necessary book containing many FFT algorithms, both serial and parallel.
伸展树
伸展树,基本数据结构,The tree is drawn in such a way that both of the edges down from a node are the same length. This length is the minimum such that the two subtrees are separated by at least two blanks.
chat room
chat room,have both server and client.client can talk publicly or privatly sever can send message to all clients or choose one.
eye matching using Circular hough transform for eyedetection and precise eyes location. it is a very
eye matching using Circular hough transform for eyedetection and precise eyes location. it is a very good code that works on both grayscale and jpg image.
this is ram both asynchronous and synchronous reset signals which is basic for any registers and bas
this is ram both asynchronous and synchronous reset signals which is basic for any registers and basic memory element
The ONE is a Opportunistic Network Environment simulator which provides a powerful tool for generat
The ONE is a Opportunistic Network Environment simulator which provides a
powerful tool for generating mobility traces, running DTN messaging
simulations with different routing protocols, and visual
We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f
We analyze, both analytically and numerically, the effectiveness
of cloaking an infinite cylinder from observations by electromagnetic
waves in three dimensions. We show that, as truncated approxima
MCPU is a minimal cpu aimed to fit into a 32 Macrocell CPLD - one of the smallest available programm
MCPU is a minimal cpu aimed to fit into a 32 Macrocell CPLD - one of the smallest available programmable logic devices. While this CPU is not powerful enough for real world applications it has proven
An analysis tool for both continuous- and discrete-time control systems. -Includes a parameter so
An analysis tool for both continuous- and discrete-time control systems.
-Includes a parameter solving tool