搜索结果
找到约 54 项符合
considered 的查询结果
按分类筛选
- 全部分类
- 书籍 (11)
- 单片机编程 (3)
- 软件设计/软件工程 (3)
- matlab例程 (3)
- 论文 (3)
- 技术资料 (3)
- 系统设计方案 (2)
- 文件格式 (2)
- 金融证券系统 (2)
- 通讯编程文档 (2)
- 其他书籍 (2)
- PCB相关 (1)
- 传感与控制 (1)
- 开关电源 (1)
- 可编程逻辑 (1)
- 微处理器开发 (1)
- 通讯/手机编程 (1)
- Linux/Unix编程 (1)
- 单片机开发 (1)
- Java书籍 (1)
- 驱动编程 (1)
- VC书籍 (1)
- 行业发展研究 (1)
- 其他 (1)
- RFID编程 (1)
- 数值算法/人工智能 (1)
- 其他行业 (1)
- 汇编语言 (1)
- 书籍源码 (1)
微处理器开发 This document can be considered as a supplement to the already existing Application note AN10302 “U
This document can be considered as a supplement to the already existing Application
note AN10302 “Using the Philips LPC2000 Flash Utility”, which is provided in the same
zip file. The Application note covers the following topics:
单片机开发 * CONSTRAINTS * This module does not handle data which is considered out of range by the * appli
* CONSTRAINTS
* This module does not handle data which is considered out of range by the
* application(i.e. fixed constants which represent error condition)
*
* Maximum weight value must be limited to 128 to prevent an overflow
* condition during the calculation.
*
* The internal data type mu ...
matlab例程 The main features of the considered identification problem are that there is no an a priori separati
The main features of the considered identification problem are that there is no an a priori separation of the variables into inputs and outputs and the approximation criterion, called misfit, does not depend on the model representation. The misfit is defined as the minimum of the l2-norm between the ...
RFID编程 RFID is an area of automatic identifi cation that is gaining momentum and is considered by som
RFID is an area of automatic identi&#64257 cation that is gaining
momentum and is considered by some to emerge as one of
the most pervasive computing technologies in history. In its
simplest form, RFID is a similar concept to bar coding. It is
seen as a means of enhancing data processes and is compl ...
金融证券系统 An example case is considered to price an option at a maturity of T years - prices are simulated for
An example case is considered to price an option at a maturity of T years - prices are simulated for Geometric brownian motion process at 2*T maturity, and Brownian Bridge is used to obtain prices at T maturity. Finally option prices are compared to Black Scholes values to verify results
通讯编程文档 Some thesis studies about wireless sensor network algorithms. Algorithms are considered and some pse
Some thesis studies about wireless sensor network algorithms. Algorithms are considered and some pseudo codes are shown.
其他书籍 C++ is considered the most widely used and powerful object-oriented programming language in industry
C++ is considered the most widely used and powerful object-oriented programming language in industry today. This book is for who are interested in learning and exploring C++ programming where programs are developed to interface with real world devices. Learning C++ for interact with various hardware ...
书籍源码 Parallel robotic manipulators can be considered a well-established option for many different applic
Parallel robotic manipulators can be considered a well-established option
for many different applications of manipulation, machining, guiding,
testing, control, tracking, haptic force feed-back, etc. A typical parallel robotic
manipulator (PM) consists of a mobile platform connected to the
base (fix ...
PCB相关 计算FR4上的差分阻抗(PDF)
Calculation of the Differential Impedance of Tracks on FR4 substrates
There is a discrepancy between calculated and measured values of impedance for differential transmission lineson FR4. This is especially noticeable in the case of surface microstrip configurations. The anomaly is shown tobe due to ...
单片机编程 基于AVR的新型防汽车追尾安全装置设计
针对目前汽车追尾事件频发问题,提出一种防汽车车前和车后追尾的安全装置设计。该设计以高性能、低功耗的8位AVR微处理器ATmega8L为核心,结合霍尔式车速传感器、激光雷达测距装置和MMA7260QT加速度传感器,能够兼顾车前和车后,摒弃以往设计中只考虑车前或车后单一性缺点,尤其适用于高速、夜晚或新手行车。
Abstract:
& ...