搜索:Detected
找到约 45 项符合「Detected」的查询结果
结果 45
按分类筛选
https://www.eeworm.com/dl/534/422510.html
其他
CRC循环冗余检测CRC Cyclic Redundancy Detected
CRC循环冗余检测CRC Cyclic Redundancy Detected
https://www.eeworm.com/dl/648/310154.html
单片机开发
Use this program to decode the Manchester Code of the RFID. Validate the accessibility of detected c
Use this program to decode the Manchester Code of the RFID. Validate the accessibility of detected card. Including a keypad controller, generally a all in one card access reader.
https://www.eeworm.com/dl/619/165479.html
Linux/Unix编程
Memtest86 is thorough, stand alone memory test for Intel/AMD x86 architecture systems. BIOS based m
Memtest86 is thorough, stand alone memory test for Intel/AMD x86 architecture
systems. BIOS based memory tests are only a quick check and often miss
failures that are detected by Memtest86.
https://www.eeworm.com/dl/693/413605.html
GPS编程
This is GPS Acquisition..by Matlab, this file performs cold start acquisition on the collected "data
This is GPS Acquisition..by Matlab, this file performs cold start acquisition on the collected "data". It
searches for GPS signals of all satellites, which are listed in field
"acqSatelliteList" in the settings structure. Function saves code phase
and frequency of the detected ...
https://www.eeworm.com/dl/693/413611.html
GPS编程
This is GPS Matlab acquisition code. Function performs cold start acquisition on the collected "data
This is GPS Matlab acquisition code. Function performs cold start acquisition on the collected "data". It
searches for GPS signals of all satellites, which are listed in field
"acqSatelliteList" in the settings structure. Function saves code phase
and frequency of the detected ...
https://www.eeworm.com/dl/620/262175.html
Internet/网络编程
The tool presented below tries to detect from remote if the target machine was compromised with the
The tool presented below tries to detect from remote if the target machine was compromised with the HACKER Defender rootkit. The tool connect to the remote host, and compares the reply to several known replies. The rootkits that can be detected by the tool are: HACKER Defender v1 ...
https://www.eeworm.com/dl/518/425873.html
数值算法/人工智能
Here are the functions for Hamming code 7.4 and Extended Hamming code 8.4 encoding and decoding. F
Here are the functions for Hamming code 7.4 and Extended Hamming code 8.4
encoding and decoding.
For 7.4 code, one error per 7-bit codeword can be corrected.
For 8.4 code, one error per 8-bit codeword can be corrected
and not less than 2 errors can be detected.
https://www.eeworm.com/dl/648/377163.html
单片机开发
Quality control of production has always been a necessity in stainless steel mills. The users of st
Quality control of production has always been a necessity
in stainless steel mills. The users of stainless
steel set ever-increasing requirements on product
quality. Many material properties can still only be
measured in laboratory but more and more measurements
are now made on-l ...
https://www.eeworm.com/dl/502/31376.html
单片机编程
Input Signal Rise and Fall Tim
All inputs of the C16x family have Schmitt-Trigger input characteristics. These Schmitt-Triggers are intended to always provide proper internal low and high levels, even if anundefined voltage level (between TTL-VIL and TTL-VIH) is externally applied to the pin.The hysteresis of ...
https://www.eeworm.com/dl/692/329545.html
行业发展研究
A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log
A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log preparation model enhances usage logs with semantic.The M arkov chain
mode1 based on ontology semantic measurement is used to identi.
ing which active session a request should b ...