虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

low-level

  • // chebysheve outlier detection // this function is used to detect the abnormal value among a set o

    // chebysheve outlier detection // this function is used to detect the abnormal value among a set of data // input: // delta: a set of data // flag: discribe which data is already known as outlier // p: restrict level // output: // double[] door : byyond which the data may be considered as a outlier // door[0]: the upperdoor // door[1]: the lowerdoor

    标签: chebysheve detection abnormal function

    上传时间: 2013-11-30

    上传用户:13517191407

  • MICROSOFT FOUNDATION CLASS LIBRARY : 学生管理系统 =======================================================

    MICROSOFT FOUNDATION CLASS LIBRARY : 学生管理系统 ======================================================================== AppWizard has created this 学生管理系统 application for you. This application not only demonstrates the basics of using the Microsoft Foundation classes but is also a starting point for writing your application. This file contains a summary of what you will find in each of the files that make up your 学生管理系统 application. 学生管理系统.dsp This file (the project file) contains information at the project level and is used to build a single project or subproject. Other users can share the project (.dsp) file, but they should export the makefiles locally.

    标签: FOUNDATION MICROSOFT LIBRARY CLASS

    上传时间: 2013-12-16

    上传用户:天涯

  • 文件说明java模式

    文件说明java模式,The CustomerFacade class offers a higher level business service in the form of the saveCustomerData method. Instead of interacting with each of the subsystem components directly, the client AccountManager can make use of the higher level, more simplified interface offered by the CustomerFacade object to validate and save the input customer data.

    标签: java 模式

    上传时间: 2016-12-10

    上传用户:kernaling

  • The FM24C256/C256L/C256LZ devices are 256 Kbits CMOS nonvolatile electrically erasable memory. Thes

    The FM24C256/C256L/C256LZ devices are 256 Kbits CMOS nonvolatile electrically erasable memory. These devices offer the designer different low voltage and low power options. They conform to all requirements in the Extended IIC 2-wire protocol. Furthermore, they are designed to minimize device pin count and simplify PC board layout requirements.

    标签: 256 electrically nonvolatile erasable

    上传时间: 2016-12-11

    上传用户:lps11188

  • ISO/IEC13239,Information technology-Telecommunications and information exchange between systems-High

    ISO/IEC13239,Information technology-Telecommunications and information exchange between systems-High level data link control(HDLC) procedures

    标签: technology-Telecommunications systems-High Information information

    上传时间: 2013-12-28

    上传用户:zhaiyanzhong

  • The SL74HC573 is identical in pinout to the LS/ALS573. The device inputs are compatible with standa

    The SL74HC573 is identical in pinout to the LS/ALS573. The device inputs are compatible with standard CMOS outputs with pullup resistors, they are compatible with LS/ALSTTL outputs. These latches appear transparent to data (i.e., the outputs change asynchronously) when Latch Enable is high. When Latch Enable goes low, data meeting the setup and hold time becomes latched.

    标签: compatible The 573 identical

    上传时间: 2016-12-29

    上传用户:变形金刚

  • Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been

    Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been of considerable interest in communications and radar applications demanding low probability of intercept and detection (LPI/D), multipath immunity, high data throughput, precision ranging and localization.

    标签: penetrating technology well-known wideband

    上传时间: 2014-01-22

    上传用户:edisonfather

  • Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been

    Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been of considerable interest in communications and radar applications demanding low probability of intercept and detection (LPI/D), multipath immunity, high data throughput, precision ranging and localization.

    标签: penetrating technology well-known wideband

    上传时间: 2013-12-11

    上传用户:aysyzxzm

  • A novel met hod t o p artially compensate sigma2delta shap ed noise is p rop osed. By injecting t he

    A novel met hod t o p artially compensate sigma2delta shap ed noise is p rop osed. By injecting t he comp en2 sation cur rent int o t he p assive loop f ilte r during t he delay time of t he p hase f requency detect or ( PFD) , a maximum reduction of t he p hase noise by about 16dB can be achieved. Comp a red t o ot he r compensation met hods , t he tech2 nique p rop osed he re is relatively simple and easy t o implement . Key building blocks f or realizing t he noise cancel2 lation , including t he delay va riable PFD and comp ensation cur rent source , a re sp ecially designed. Bot h t he behavior level and circuit level simulation results a re p resented.

    标签: sigma2delta compensate injecting artially

    上传时间: 2013-12-18

    上传用户:qlpqlq

  • Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provi

    Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provides the practical solutions developers need to design powerful and portable Web-based applications. Featuring step-by-step examples, this book focuses on harnessing the power of Java(TM) and XML together to streamline the development process. XML and Java(TM), Second Edition provides new coverage of emerging areas such as document management, databases, messaging, servlets, JDBC, data binding, security, and more. It begins with an overview of XML programming techniques, standard APIs, and tools. Building upon this foundation, the book goes on to cover the latest technologies, including DOM Level 2, SAX2, XSLT, SOAP, WSDL, and UDDI. It explores the role of these major middleware technologies in XML and Java-based Web application development, as well as the limitations and potential pitfalls.

    标签: technologies and standards Edition

    上传时间: 2014-01-05

    上传用户:hj_18