appear
共 42 篇文章
appear 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 42 篇文章,持续更新中。
Decimal counter which is counting from 256 to 0. After that there will appear logic "1" in out. You
Decimal counter which is counting from 256 to 0. After that there will appear logic "1" in out. You can stop counting by pressing sequence.
I called it detonation clock :]
simulates coin tossing. Let the program toss a coin each time the user chooses the “Toss Coin” menu
simulates coin tossing. Let the program toss a coin each time the user chooses the “Toss Coin” menu option. Count the number of times each side of the coin appears. Display the results. The program sh
=== === === === === === === === === === ==== IBM PC KEYBOARD INFORMATION FOR SOFTWARE DEVELOPERS =
=== === === === === === === === === === ====
IBM PC KEYBOARD INFORMATION FOR SOFTWARE DEVELOPERS
================================================================
Sources:
PORTS.A of Ralf Brown s
无线网卡驱动 固件程序 There are currently 3 "programming generations" of Atheros 802.11 wireless devices (
无线网卡驱动 固件程序
There are currently 3 "programming generations" of Atheros 802.11
wireless devices (some of these have multiple hardware implementations
but otherwise appear identical to users):
5
In this paper, a new family of Cassinian wave-guides is proposed, simulating and calculation are fi
In this paper, a new family of Cassinian wave-guides
is proposed, simulating and calculation are finished with CST
Microwave Studio that based on Finite Integral Technique (FIT),
and some results a
随机性发生器、冒泡分类和混洗一组12张牌的演示程序。 Demonstrates the use of a randomizer, bubble-sort and an array to "shuff
随机性发生器、冒泡分类和混洗一组12张牌的演示程序。
Demonstrates the use of a randomizer, bubble-sort and an array to "shuffle" a deck of 12 cards. I put it here for those of you who are trying to figure out how to shuffle w
Compression using lempel-ziv -for a dictionary size of 2k -provide dictionary
Compression using lempel-ziv
-for a dictionary size of 2k
-provide dictionary
Lempel ziv algorithm is a dictionary based algorithm that addresses byte sequences from former con
Distributed applications, devices, and services appear in many different arrangements in an enterpr
Distributed applications, devices, and services appear in many different arrangements in an
enterprise. At your company, you probably access data from your intranet services, from
computers distribu
use double link list to implenment memory allocation. There won t appear maloc, new, delete, in my c
use double link list to implenment memory allocation. There won t appear maloc, new, delete, in my code. All is using freelist to find a suitable memory space.
The PCI Special Interest Group disclaims all warranties and liability for the use of this document
The PCI Special Interest Group disclaims all warranties and liability for the use of this document
and the information contained herein and assumes no responsibility for any errors that may appear
i
it is a cleaner for windows msconfig when you disable an msconfig item it will still appear on th
it is a cleaner for windows msconfig
when you disable an msconfig item it will still appear on there. This programme let you remove disabled msconfig items
These files contain all of the code listings in Java: The Complete Reference, J2SE 5 Edition
These files contain all of the code listings in
Java: The Complete Reference, J2SE 5 Edition
The source code is organized into files by chapter.
For example, the file Chap7.code contains the
SR-tree is an index structure for high-dimensional nearest neighbor queries
SR-tree is an index structure for high-dimensional nearest neighbor queries,C++ sourcecode. SR-tree outperforms the R*-tree and the SS-tree especially for high-dimensional and non-uniform data which a
Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to c
Watermarking schemes evaluation
Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two ma
These files contain all of the code listings in Java 2: The Complete Reference The source cod
These files contain all of the code listings in
Java 2: The Complete Reference
The source code is organized into files by chapter.
Within each chapter file, the listings are stored
in the sam
运用LT3092电流源以高线性度来实现温度至电流转换
<p>
</p>
<div>
One of the fi rst lessons in a basic electronics coursecovers the symbols for resistors, capacitors, inductors,voltage sources and current sources. Althougheach symbol represent
通用1553B总线的信息监控系统
<p>在航电系统维护过程中,为解决定位故障的效率和降低维修成本等问题,提出了基于ICD(Interface Control Document,接口控制文件)的1553B总线的信息监控系统模型。该系统运用数据采集卡对总线中传输的信号有无失真、偏差等电气特性进行检测,并使用1553B通讯卡通过测控软件LabWindows/CVI编程与ICD数据库的动态链接,实现总线信息的解析和故障的判断。与传统的维护
信号源,调节器和电源电路分析
<p>
</p>
<div>
Occasionally, we are tasked with designing circuitry for aspecific purpose. The request may have customer originsor it may be an in-house requirement. Alternately, a circuitmay
PCI ExpressTM Architecture
<P>PCI ExpressTM Architecture</P>
<P>Add-in Card Compliance Checklist for the PCI Express Base 1.0a Specification<BR>The PCI Special Interest Group disclaims all warranties and liability for the use o
PCI总线的应用
The PCI Special Interest Group disclaims all warranties and liability for the use of this document and the information contained herein and assumes no responsibility for any errors that may appear in