Some of the files at the homepage can be incompatible with newer version of PowerWorld,
标签: incompatible PowerWorld the homepage
上传时间: 2013-12-04
上传用户:as275944189
Commented (pt-br) source code of Joshi, one of the first viruses that infect executable files instead of boot sectors.
标签: executable Commented viruses infect
上传时间: 2014-01-12
上传用户:wanghui2438
asn1c help for use of the asn1c compiler generator code
标签: asn1c generator compiler help
上传时间: 2014-11-22
上传用户:wab1981
Architecture and Implementation ? ? Cortex -A8 of the ARM Microprocessor October 2005 Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in ARM!ˉs new Cortex family. With high performance and power efficiency, it targets a wide variety of mobile and consumer applications including mobile phones, set-top boxes,
标签: Implementation Microprocessor Architecture October
上传时间: 2013-12-15
上传用户:daoxiang126
Architecture and Implementation ? ? Cortex -A8 of the ARM Microprocessor October 2005 Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in ARM!ˉs new Cortex family. With high performance and power efficiency, it targets a wide variety of mobile and consumer applications including mobile phones, set-top boxes,
标签: Implementation Microprocessor Architecture October
上传时间: 2017-07-23
上传用户:lizhizheng88
a simple serial to parallel converter using XILLINX and VHDL (the number of the project represents the binary code used by the converter e.g 23- 10111)
标签: represents converter the parallel
上传时间: 2013-12-12
上传用户:kr770906
The main function of the traffic detection system is to examine the speed, the flow, the vehicle type and the lane occupancy of the motor vehicles. The method based on ARM embedded system in this paper provides a new means for the traffic detection system research.
标签: the detection function examine
上传时间: 2013-12-18
上传用户:busterman
this gives details of the network programming
标签: programming details network gives
上传时间: 2014-01-11
上传用户:as275944189
manual of the program
上传时间: 2013-12-24
上传用户:dianxin61
This m file hide an image jpeg,png in another jpeg,png image. The height and width of the secret image is in LSB of 1st 32 pixels of 1st row of the cover image.This helps in the recovery of secret image. The secret image must be smaller than cover image.A message box will appear with a number ,that number is the maximum product of width and height of secret image that can be successfully embedded in the cover image. The final png image will appear in workspace with random name.This image contains the secret image.One such png image is in the zip file with name 4447.png it contains an image of res 100x122.
上传时间: 2017-07-25
上传用户:gououo