虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

tr<b>an</b>smitter-to-receiver

  • See Appendix B for a description of the programs included on this companion disk. RESOURCE.WRI iden

    See Appendix B for a description of the programs included on this companion disk. RESOURCE.WRI identifies other books and resources for Internet programming. WEBHELP.HLP contains an introduction to the World Wide Web. TCPMAN.HLP provides detailed instructions to help you use the Trumpet Winsock included on this disk. Use the Program Manager s File menu Run option to execute the SETUP.EXE program found on this disk. SETUP.EXE will install the programs on your hard drive and create an Internet Programming group window. Internet编程技术 [配套程序] [涉及平台] VC [作者] void [文件大小] 1032K

    标签: description companion Appendix RESOURCE

    上传时间: 2013-12-04

    上传用户:asasasas

  • Rotating shafts experience a an elliptical motion called whirl. It is important to decompose this mo

    Rotating shafts experience a an elliptical motion called whirl. It is important to decompose this motion into a forward and backward whil orbits. The current function makes use of two sensors to generate a bi-directional spectrogram. The method can be extended to any time-frequency distribution % % compute the forward/backward Campbell/specgtrogram % % INPUT: % y (n x 2) each column is measured from a different sensor % /////// % __ % |s1| y(:,1) % |__| % __ % / \ ________|/ % | | | s2 |/ y(:,2) % \____/ --------|/ % % Fs Sampling frequnecy % % OUTPUT: % B spectrogram/Campbel diagram % x x-axis coordinate vector (time or Speed) % y y-axis coordinate vector (frequency [Hz])

    标签: experience elliptical decompose important

    上传时间: 2015-06-23

    上传用户:372825274

  • 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an

    加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]

    标签: Cryptographic Primitives generate Library

    上传时间: 2015-07-16

    上传用户:wqxstar

  • b to b 模式 电子商务系统

    b to b 模式 电子商务系统 ,c# 开发 , B/S结构

    标签: to 模式 电子商务系统

    上传时间: 2014-01-20

    上传用户:hanli8870

  • Bing is a point-to-point bandwidth measurement tool (hence the b ), based on ping. Bing determines t

    Bing is a point-to-point bandwidth measurement tool (hence the b ), based on ping. Bing determines the real (raw, as opposed to available or average) throughput on a link by measuring ICMP echo requests roundtrip times for different packet sizes for each end of the link

    标签: Bing point-to-point measurement determines

    上传时间: 2015-09-15

    上传用户:lgnf

  • If we have two individually sorted vectors "a" and "b" but they are not sorted with respect to each

    If we have two individually sorted vectors "a" and "b" but they are not sorted with respect to each other and we want to merge them into vector "c" such that "c" is also a sorted vector. Then c=mergesorted(a,b) can be used.

    标签: sorted individually respect vectors

    上传时间: 2015-09-23

    上传用户:comua

  • Distributed Median,Alice has an array A, and Bob has an array B. All elements in A and B are distinc

    Distributed Median,Alice has an array A, and Bob has an array B. All elements in A and B are distinct. Alice and Bob are interested in finding the median element of their combined arrays.

    标签: array B. Distributed has

    上传时间: 2013-12-25

    上传用户:洛木卓

  • Verilog HDL: Magnitude For a vector (a,b), the magnitude representation is the following: A c

    Verilog HDL: Magnitude For a vector (a,b), the magnitude representation is the following: A common approach to implementing these arithmetic functions is to use the Coordinate Rotation Digital Computer (CORDIC) algorithm. The CORDIC algorithm calculates the trigonometric functions of sine, cosine, magnitude, and phase using an iterative process. It is made up of a series of micro-rotations of the vector by a set of predetermined constants, which are powers of two. Using binary arithmetic, this algorithm essentially replaces multipliers with shift and add operations. In a Stratix™ device, it is possible to calculate some of these arithmetic functions directly, without having to implement the CORDIC algorithm.

    标签: representation Magnitude the magnitude

    上传时间: 2013-12-24

    上传用户:金宜

  • About: hamsterdb is a database engine written in ANSI C. It supports a B+Tree index structure, uses

    About: hamsterdb is a database engine written in ANSI C. It supports a B+Tree index structure, uses memory mapped I/O (if available), supports cursors, and can create in-memory databases. Release focus: Major feature enhancements Changes: This release comes with many changes and new features. It can manage multiple databases in one file. A new flag (HAM_LOCK_EXCLUSIVE) places an exclusive lock on the file. hamsterdb was ported to Windows CE, and the Solution file for Visual Studio 2005 now supports builds for x64. Several minor bugs were fixed, performance was improved, and small API changes occurred. Pre-built libraries for Windows (32-bit and 64-bit) are available for download. Author: cruppstahl

    标签: C. hamsterdb structure database

    上传时间: 2013-12-11

    上传用户:LouieWu

  • convert numbers from h to d or b to h

    convert numbers from h to d or b to h

    标签: convert numbers from to

    上传时间: 2014-11-17

    上传用户:refent