looks
共 16 篇文章
looks 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 16 篇文章,持续更新中。
光纤陀螺第二版 The Fiber-Optic Gyroscope
<p>The Fiber-Optic Gyroscope,光纤陀螺第二版,2014年新出的,比第一版改变了很多,对做光纤陀螺器件和做惯性导航等有很大参考价值。</p><p>Two decades after the first edition of this book in the early nineties, it has seemed timely to prepare a revised
Wireless Communications 2nd Edition
n the first part of this book, we give an introduction to the basic applications of wireless com-<br />
munications, as well as the technical problems inherent in this communication paradigm. After a<
CDMA HUAWEI new looks, easy to use
CDMA HUAWEI
new looks,
easy to use
A class--the basic building block of an object-oriented language such as Java--is a template that de
A class--the basic building block of an object-oriented language such as Java--is a template that describes the data and behavior associated with instances of that class. When you instantiate a class
After an introduction to the history of mobile communications, this guide considers the basics of mo
After an introduction to the history of mobile communications, this guide considers the basics of mobile radio, the design of cellular and private radio systems, and issues of interworking with the fi
This book is intended for embedded system programmers, consultants and students interested in real-t
This book is intended for embedded system programmers, consultants and students interested in real-time operating
systems. μC/OS-II is a high performance, deterministic real-time kernel and can be em
IIR Filter Coefficient Quantization Example % written by DRB on 6-Dec-2004 for ECE3703 % % Looks
IIR Filter Coefficient Quantization Example
% written by DRB on 6-Dec-2004 for ECE3703
%
% Looks at unquantized filter (ideal), direct form, and cascaded second
% order section (SOS).
This code detects memory leaks in embedded VC++ almost the same way crtdbg does in VC++. At the end
This code detects memory leaks in embedded VC++ almost the same way crtdbg does in VC++. At the end of program execution it will display in the debug window if there were any memory leaks and how the
转载一个程序。 This zip file contains a example of using C++ language COM in a Visual C++ program (named
转载一个程序。
This zip file contains a example of using C++ language COM in a Visual C++ program (named example.zip), and a COM component built by comtool of Matlab and used in a Visual C++ program(named
两种解决方案 Richard just finished building his new house. Now the only thing the house misses is a cute l
两种解决方案 Richard just finished building his new house. Now the only thing the house misses is a cute little wooden fence. He had no idea how to make a wooden fence, so he decided to order one. Somehow h
Besides enhanced looks and advanced features, one of the best things about Swing is its pluggable lo
Besides enhanced looks and advanced features, one of the best things about Swing is its pluggable look and feel (PLAF). PLAF architecture allows seamless changes in the appearance of an application an
Knowledge of the process noise covariance matrix is essential for the application of Kalman filteri
Knowledge of the process noise covariance matrix
is essential for the application of Kalman filtering. However,
it is usually a difficult task to obtain an explicit expression of
for large time var
Windows NT 4.0 had WIPCfg32.exe, and Windows 95/98/ME had WinIPCfg.exe. For some reason, this utilit
Windows NT 4.0 had WIPCfg32.exe, and Windows 95/98/ME had WinIPCfg.exe. For some reason, this utility was removed from Windows 2000/XP. This program is a clone of WinIPCfg.exe, written for Windows XP.
This a GBA(Game Boy Advance) animation sample code. It continue and reverse display 45 BMPs on GBA s
This a GBA(Game Boy Advance) animation sample code. It continue and reverse display 45 BMPs on GBA screen let it looks like an animation.
项目描述: Env_audit is a program that ferrets out everything it can about the environment. It looks for
项目描述: Env_audit is a program that ferrets out everything it can about the environment. It looks for process IDs, UID, GID, signal masks, umask, priority, file descriptors, and environmental variables.
工业系统安全问题和解决办法
<div>
Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at