Set
共 829 篇文章
Set 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 829 篇文章,持续更新中。
A complete implementation of neural network with different example of training set generation. http
A complete implementation of neural network with different example of training set generation.
http://takinginitiative.wordpress.com/2008/04/23/basic-neural-network-tutorial-c-implementation-and-sour
The objective is to set up SPI communication between VTI Technologies digital pressure sensor comp
The objective is to set up SPI communication between VTI Technologies digital pressure sensor
component and an MCU of an application device ATMEGA16L. In this code example:
?The MCU is configured
TMS320C54x DSP Reference Set Volume 2: Mnemonic Instruction Set
TMS320C54x DSP
Reference Set
Volume 2: Mnemonic Instruction Set
form = new_form(fields) scale_form(form, &rows, &cols) win = newwin(rows+3, cols+4, 3, 20)
form = new_form(fields)
scale_form(form, &rows, &cols)
win = newwin(rows+3, cols+4, 3, 20)
subwin = derwin(win, rows, cols, 1, 2)
set_form_sub(form, subwin)
box(win, 0, 0)
ke
要读懂linux 内核
要读懂linux 内核 ,还有比这再好的资料么,什么都不说了,赶快下吧。
目 录
进程
信号
sched.c
进程信号队列
SMP
内核线程页目录的借用
代码分析
线程
进程描述符
init进程从内核态切换到用户态
SET_LINKS
REMOVE_LINKS
this is the documentation for intel processors, first volume. it contains detailed specification and
this is the documentation for intel processors, first volume. it contains detailed specification and instrucion set - for hardcore programers on assembly
This contribution provides functions for finding an optimum parameter set using the evolutionary alg
This contribution provides functions for finding an optimum parameter set using the evolutionary algorithm of Differential Evolution. Simply speaking: If you have some complicated function of which yo
JXTA™ is a set of open, generalized peer-to-peer (P2P) protocols that allow any networked devi
JXTA™ is a set of open, generalized peer-to-peer (P2P) protocols that allow any networked device — sensors, cell phones, PDAs, laptops, workstations, servers and supercomputers — to communicate
JXTA™ is a set of open, generalized peer-to-peer (P2P) protocols that allow any networked devi
JXTA™ is a set of open, generalized peer-to-peer (P2P) protocols that allow any networked device — sensors, cell phones, PDAs, laptops, workstations, servers and supercomputers — to communicate
How To - Set up Bluetooth PC connectivity.
How To - Set up Bluetooth PC connectivity.
This is full set of procedures used to communicate with any GSM module for SMS sending/receiving (
This is full set of procedures used to communicate with
any GSM module for SMS sending/receiving (it uses standard AT commands).
Original code is for ATMega162 microcontroller, but code is gener
在J2ME中实现虚拟代理
在J2ME中实现虚拟代理,然后过滤user-agent ,用于突破广东移动等的cmwap限制使用方法,启动后将相应软件(如Opera)的代理设成localhost 8080,即可-J2ME virtual agents, then filter user-agent, Guangdong Mobile breakthrough for the restrictions on the use of
< content="Hello,sik" Dim oFCKeditor Set oFCKeditor = New FCKeditor oFCKeditor.BasePath
<
content="Hello,sik"
Dim oFCKeditor
Set oFCKeditor = New FCKeditor
oFCKeditor.BasePath = "../fckeditor/"
oFCKeditor.ToolbarSet = "Default"
oFCKeditor.Width = "550"
oFCKeditor.Heigh
This file is distributed in the hope that it will be useful, but WITHOUT WARRANTY OF ANY KIND.
This file is distributed in the hope that it will be useful, but WITHOUT
WARRANTY OF ANY KIND.
Author(s): Ole Saether
DESCRIPTION:
This example should be used together with ex2a
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only,
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only,
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only,
Uses the level set method with reinitialization to compute the movement of fronts under a given velo
Uses the level set method with reinitialization to compute the movement of fronts under a given velocity field.
This program incorporates the FV method for solving the Navier-Stokes equations using 2D, Cartesian
This program incorporates the FV method for solving the Navier-Stokes equations using 2D, Cartesian grids and the staggered arrangement of variables. Variables are stored as 2D arrays. SIMPLE method i
sti710x cpu instruction set
sti710x cpu instruction set