搜索:Detected

找到约 45 项符合「Detected」的查询结果

结果 45
https://www.eeworm.com/dl/534/422510.html 其他

CRC循环冗余检测CRC Cyclic Redundancy Detected

CRC循环冗余检测CRC Cyclic Redundancy Detected
下载 184
·
查看 1067
https://www.eeworm.com/dl/648/310154.html 单片机开发

Use this program to decode the Manchester Code of the RFID. Validate the accessibility of detected c

Use this program to decode the Manchester Code of the RFID. Validate the accessibility of detected card. Including a keypad controller, generally a all in one card access reader.
下载 151
·
查看 1089
https://www.eeworm.com/dl/619/165479.html Linux/Unix编程

Memtest86 is thorough, stand alone memory test for Intel/AMD x86 architecture systems. BIOS based m

Memtest86 is thorough, stand alone memory test for Intel/AMD x86 architecture systems. BIOS based memory tests are only a quick check and often miss failures that are detected by Memtest86.
下载 131
·
查看 1132
https://www.eeworm.com/dl/693/413605.html GPS编程

This is GPS Acquisition..by Matlab, this file performs cold start acquisition on the collected "data

This is GPS Acquisition..by Matlab, this file performs cold start acquisition on the collected "data". It searches for GPS signals of all satellites, which are listed in field "acqSatelliteList" in the settings structure. Function saves code phase and frequency of the detected ...
下载 133
·
查看 1129
https://www.eeworm.com/dl/693/413611.html GPS编程

This is GPS Matlab acquisition code. Function performs cold start acquisition on the collected "data

This is GPS Matlab acquisition code. Function performs cold start acquisition on the collected "data". It searches for GPS signals of all satellites, which are listed in field "acqSatelliteList" in the settings structure. Function saves code phase and frequency of the detected ...
下载 101
·
查看 1142
https://www.eeworm.com/dl/620/262175.html Internet/网络编程

The tool presented below tries to detect from remote if the target machine was compromised with the

The tool presented below tries to detect from remote if the target machine was compromised with the HACKER Defender rootkit. The tool connect to the remote host, and compares the reply to several known replies. The rootkits that can be detected by the tool are: HACKER Defender v1 ...
下载 115
·
查看 1072
https://www.eeworm.com/dl/518/425873.html 数值算法/人工智能

Here are the functions for Hamming code 7.4 and Extended Hamming code 8.4 encoding and decoding. F

Here are the functions for Hamming code 7.4 and Extended Hamming code 8.4 encoding and decoding. For 7.4 code, one error per 7-bit codeword can be corrected. For 8.4 code, one error per 8-bit codeword can be corrected and not less than 2 errors can be detected.
下载 115
·
查看 1141
https://www.eeworm.com/dl/648/377163.html 单片机开发

Quality control of production has always been a necessity in stainless steel mills. The users of st

Quality control of production has always been a necessity in stainless steel mills. The users of stainless steel set ever-increasing requirements on product quality. Many material properties can still only be measured in laboratory but more and more measurements are now made on-l ...
下载 183
·
查看 1073
https://www.eeworm.com/dl/502/31376.html 单片机编程

Input Signal Rise and Fall Tim

All inputs of the C16x family have Schmitt-Trigger input characteristics. These Schmitt-Triggers are intended to always provide proper internal low and high levels, even if anundefined voltage level (between TTL-VIL and TTL-VIH) is externally applied to the pin.The hysteresis of ...
下载 184
·
查看 1112
https://www.eeworm.com/dl/692/329545.html 行业发展研究

A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log

A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log preparation model enhances usage logs with semantic.The M arkov chain mode1 based on ontology semantic measurement is used to identi. ing which active session a request should b ...
下载 33
·
查看 1053