Set

共 829 篇文章
Set 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 829 篇文章,持续更新中。

A complete implementation of neural network with different example of training set generation. http

A complete implementation of neural network with different example of training set generation. http://takinginitiative.wordpress.com/2008/04/23/basic-neural-network-tutorial-c-implementation-and-sour

The objective is to set up SPI communication between VTI Technologies digital pressure sensor comp

The objective is to set up SPI communication between VTI Technologies digital pressure sensor component and an MCU of an application device ATMEGA16L. In this code example: ?The MCU is configured

TMS320C54x DSP Reference Set Volume 2: Mnemonic Instruction Set

TMS320C54x DSP Reference Set Volume 2: Mnemonic Instruction Set

form = new_form(fields) scale_form(form, &rows, &cols) win = newwin(rows+3, cols+4, 3, 20)

form = new_form(fields) scale_form(form, &rows, &cols) win = newwin(rows+3, cols+4, 3, 20) subwin = derwin(win, rows, cols, 1, 2) set_form_sub(form, subwin) box(win, 0, 0) ke

要读懂linux 内核

要读懂linux 内核 ,还有比这再好的资料么,什么都不说了,赶快下吧。 目 录 进程 信号 sched.c 进程信号队列 SMP 内核线程页目录的借用 代码分析 线程 进程描述符 init进程从内核态切换到用户态 SET_LINKS REMOVE_LINKS

this is the documentation for intel processors, first volume. it contains detailed specification and

this is the documentation for intel processors, first volume. it contains detailed specification and instrucion set - for hardcore programers on assembly

This contribution provides functions for finding an optimum parameter set using the evolutionary alg

This contribution provides functions for finding an optimum parameter set using the evolutionary algorithm of Differential Evolution. Simply speaking: If you have some complicated function of which yo

JXTA&#8482 is a set of open, generalized peer-to-peer (P2P) protocols that allow any networked devi

JXTA&#8482 is a set of open, generalized peer-to-peer (P2P) protocols that allow any networked device — sensors, cell phones, PDAs, laptops, workstations, servers and supercomputers — to communicate

JXTA&#8482 is a set of open, generalized peer-to-peer (P2P) protocols that allow any networked devi

JXTA&#8482 is a set of open, generalized peer-to-peer (P2P) protocols that allow any networked device — sensors, cell phones, PDAs, laptops, workstations, servers and supercomputers — to communicate

How To - Set up Bluetooth PC connectivity.

How To - Set up Bluetooth PC connectivity.

This is full set of procedures used to communicate with any GSM module for SMS sending/receiving (

This is full set of procedures used to communicate with any GSM module for SMS sending/receiving (it uses standard AT commands). Original code is for ATMega162 microcontroller, but code is gener

在J2ME中实现虚拟代理

在J2ME中实现虚拟代理,然后过滤user-agent ,用于突破广东移动等的cmwap限制使用方法,启动后将相应软件(如Opera)的代理设成localhost 8080,即可-J2ME virtual agents, then filter user-agent, Guangdong Mobile breakthrough for the restrictions on the use of

< content="Hello,sik" Dim oFCKeditor Set oFCKeditor = New FCKeditor oFCKeditor.BasePath

< content="Hello,sik" Dim oFCKeditor Set oFCKeditor = New FCKeditor oFCKeditor.BasePath = "../fckeditor/" oFCKeditor.ToolbarSet = "Default" oFCKeditor.Width = "550" oFCKeditor.Heigh

This file is distributed in the hope that it will be useful, but WITHOUT WARRANTY OF ANY KIND.

This file is distributed in the hope that it will be useful, but WITHOUT WARRANTY OF ANY KIND. Author(s): Ole Saether DESCRIPTION: This example should be used together with ex2a

This project concentrates on the deterministic approach. This guarantees the full coverage in mobile

This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only,

This project concentrates on the deterministic approach. This guarantees the full coverage in mobile

This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only,

This project concentrates on the deterministic approach. This guarantees the full coverage in mobile

This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only,

Uses the level set method with reinitialization to compute the movement of fronts under a given velo

Uses the level set method with reinitialization to compute the movement of fronts under a given velocity field.

This program incorporates the FV method for solving the Navier-Stokes equations using 2D, Cartesian

This program incorporates the FV method for solving the Navier-Stokes equations using 2D, Cartesian grids and the staggered arrangement of variables. Variables are stored as 2D arrays. SIMPLE method i

sti710x cpu instruction set

sti710x cpu instruction set