As mentioned, most computers include a serial port. The only hardware setup required is connecting the serial cable to the serial port on the PC and the serial port on the instrument. The serial instrument may include some hardware drivers or software utilities for communication, and should include documentation on the baud rate, packet size, stop bits, and parity bits that the instrument will use. Additionally, check the National Instruments Instrument Driver Network to see if LabVIEW drivers already exist for yout instrument, as
标签: connecting mentioned computers hardware
上传时间: 2016-05-27
上传用户:gououo
第一只感染flash的病毒源代码。采用汇编语言编写。 SWF/LFM-926 Virus: ------------------ Description: WinNT/XP Virus dropper for Flash .SWF files! Masm Version 6.11: ML.EXE SWF.ASM Virus Size: 926 bytes Infection Size: 3247 bytes. Last Edit: 01/08/2002
标签: Virus Description flash WinNT
上传时间: 2016-06-02
上传用户:miaochun888
C/C++ implementation of the Levenberg-Marquardt non-linear least squares algorithm. levmar includes double and single precision LM versions, both with analytic and finite difference approximated jacobians
标签: Levenberg-Marquardt implementation non-linear algorithm
上传时间: 2013-12-28
上传用户:gxf2016
Design and test a category called Rectangle rectangular, rectangular attribute to the lower left corner of the upper-right corner and the coordinates of two points, to calculate the size of rectangular
标签: rectangular Rectangle attribute category
上传时间: 2013-12-09
上传用户:sssl
编写一个C程序,用char *malloc(unsigned size)函数向系统申请一次内存空间(如size=1000,单位为字节),用循环首次适应法 addr = (char *)lmalloc(unsigned size) 和 lfree(unsigned size,char * addr)模拟可变分区内存管理,实现对该内存区的分配和释放管理。
上传时间: 2016-06-18
上传用户:fredguo
中南赛区ACM竞赛题 Description Given a two-dimensional array of positive and negative integers, a sub-rectangle is any contiguous sub-array of size 1*1 or greater located within the whole array. The sum of a rectangle is the sum of all the elements in that rectangle. In this problem the sub-rectangle with the largest sum is referred to as the maximal sub-rectangle.
标签: two-dimensional Description negative integers
上传时间: 2013-12-22
上传用户:lijianyu172
Make Text-Overflow work on both IE and Firefox If the text inside each line exceed the width of each line, then you will see "..." (ellipsis) shows up at the end of each line. Try to resize the window or change the font size to see if "..." (ellipsis) will show up or disappear. Demo - Listing
标签: Text-Overflow the Firefox inside
上传时间: 2013-12-18
上传用户:lgnf
This is the source for a C compiler that generates 386 or m68K code. Code generation is fairly good although the optimizer is a little naive... the code itself should be highly portable although there are some issues involved with porting from MSDOS that have to be resolved for example the size of LONG on unix machines is so big some of the code generated gets messed up. Code generation requires TASM to assemble the compiler output you can use the borland TLINK to produce executables, or the Watcom WLINK can also be used. PMODE systems written by TRAN are used for the DPMI interface.
标签: generation generates compiler fairly
上传时间: 2016-08-01
上传用户:sxdtlqqjl
NIST Net – A Linux-based Network Emulation Tool, It is a raw IP packet filter with many controllable channel parameters such as packet loss ratio, jitter, bandwidth variation, delay, and network buffer size. To simulate different network environments
标签: controllable Linux-based Emulation Network
上传时间: 2014-01-26
上传用户:xauthu
D169 Demo - DMA0 Repeated Burst to-from RAM, Software Trigger Description A 32 byte block from 220h-240h is transfered to 240h-260h using DMA0 in a burst block using software DMAREQ trigger. After each transfer, source, destination and DMA size are reset to inital software setting because DMA transfer mode 5 is used. P1.0 is toggled durring DMA transfer only for demonstration purposes. ** RAM location 0x220 - 0x260 used - always make sure no compiler conflict ** ACLK= n/a, MCLK= SMCLK= default DCO ~ 800k
标签: Description Repeated Software to-from
上传时间: 2014-01-09
上传用户:thinode