搜索结果
找到约 6 项符合
Remainder 的查询结果
数学计算 Chinese Remainder theorem implementation. Its done in php. Its implemented with interactive gui.ind
Chinese Remainder theorem implementation. Its done in php. Its implemented with interactive gui.index.php contain all the code.Rest folders contain the css images and js scripts that enhance the gui
单片机编程 DS1820 C51 子程序 (一线数据传输)
//芯片资料请到www.elecfans.com查找
//DS1820 C51 子程序//这里以11.0592M晶体为例,不同的晶体速度可能需要调整延时的时间//sbit DQ =P2^1;//根据实际情况定义端口
typedef unsigned char byte;typedef unsigned int  word;
//延时void delay(word useconds){  for(;useconds>0;useconds--);}
//复位byte ow_re ...
书籍源码 Intro/: Directory containing introductory examples. HelloWorld.c A simple program that draws a bo
Intro/: Directory containing introductory examples.
HelloWorld.c A simple program that draws a box and writes "Hello World" in
HelloWorld.f it.
data The data file for the introductory progressive example.
Lines.c Reads the data from file "data" and plots just the curve with
Lines.f no label ...
VHDL/FPGA/Verilog verilog code radix-2 SRT divider input [7:0]Dividend input [3:0]Divisor output [4:0]Quotient
verilog code
radix-2 SRT divider
input [7:0]Dividend
input [3:0]Divisor
output [4:0]Quotient
output [8:0]Remainder
书籍 Spread-Spectrum Communication Systems 3rd
The continuing vitality of spread-spectrum communication systems and the devel-
opment of new mathematical methods for their analysis provided the motivation to
undertake this new edition of the book. This edition is intended to enable readers
to understand the current state-of-the-art in this field ...
书籍 RFID_Security_and_Privacy_Concepts
In the first chapter, the topic of this book is classified into the area of pervasive com-
puting. Further, security and privacy in the scope of RFID technology is motivated
and the vision that guides the remainder of this book is introduced.