uses
共 498 篇文章
uses 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 498 篇文章,持续更新中。
The book uses a task-oriented structure that allows you to work through the steps necessary to insta
The book uses a task-oriented structure that allows you to work through the steps necessary to install
MySQL 4.1 on Linux and Windows platforms, create and manage MySQL databases, query and manipulat
This book is about writing TinyOS systems and applications in the nesC language. This chapter gives
This book is about writing TinyOS systems and applications in the nesC language. This chapter gives a
brief overview of TinyOS and its intended uses. TinyOS is an open-source project which a large n
The many variants of the Unix operating system require use of a mode of thought that s significantly
The many variants of the Unix operating system require use of a mode of thought that s significantly different from the one that s required by simpler operating systems. Think Unix introduces readers
RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digit
RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key.
The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of cla
The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of classified examples a decision tree is induced, biased by the information gain measure, which heuristic
Tic tac toe is (exactly what re your thinking) and it s the first game I made. Made it in one whole
Tic tac toe is (exactly what re your thinking) and it s the first game I made. Made it in one whole day in Turbo C. It uses primitive graphics drawing and also demonstrates how to output an image. Wri
You may read code because you have to-to fix it, inspect it, or improve it. You may read code the wa
You may read code because you have to-to fix it, inspect it, or improve it. You may read code the way an engineer examines a machine--to discover what makes it tick. Or you may read code because you a
Computes the length of a line using two (x,y) points. Uses pointers
Computes the length of a line using two (x,y) points. Uses pointers
Rotation tool, totates a single image contained in HANDLE.HANDLE can be a handle to figure, axes, or
Rotation tool, totates a single image contained in HANDLE.HANDLE can be a handle to figure, axes, or image object.
This GUI is a pure imitation of ROTATEGUI from Birju Patel and uses some code from t
driver program which uses the above two modules. I have also made available the data set pollute.dat
driver program which uses the above two modules. I have also made available the data set pollute.dat of mortality rates against socio-economic, meteorological and pollution variables for 60 statistica
This is a computer vision project that uses several cameras for people tracking.
This is a computer vision project that uses several cameras for people tracking.
This is a complete but simple application of Video rental system written in java. It uses GUI and MS
This is a complete but simple application of Video rental system written in java. It uses GUI and MS-Access database to rent and return a video.
Best example for undergraduate students.
GSM (Global System for Mobile communications: originally from Groupe Spécial Mobile) is the most pop
GSM (Global System for Mobile communications: originally from Groupe Spécial Mobile) is the most popular standard for mobile phones in the world. Its promoter, the GSM Association, estimates that 80
C++ implementaion for RSA together with the Wiener attack. It uses NTL library for big numbers
C++ implementaion for RSA together with the Wiener attack.
It uses NTL library for big numbers
Login Manager V3.0(LM3.0) is an authentication system which can integrate with any existing website
Login Manager V3.0(LM3.0) is an authentication system which can integrate with any existing website that meets the requirements. LM3.0 provides a gatekeeper where user must be authorized before enteri
FFTGUI Demonstration of Finite Fourier Transform. FFTGUI(y) plots real(y), imag(y), real(fft(y)
FFTGUI Demonstration of Finite Fourier Transform.
FFTGUI(y) plots real(y), imag(y), real(fft(y)) and imag(fft(y)).
FFTGUI, without any arguments, uses y = zeros(1,32).
When any point is m
This folder contains two simple functions (zerocross and energy) to compute STE and STZCR. The
This folder contains two simple functions (zerocross and energy) to compute STE and STZCR.
The script zcr_ste_so.m uses these two and other functions (included) to compute the STE and STZCR
o
) Compression using huffman code -with a number of bits k per code word -provide huffma
) Compression using huffman code
-with a number of bits k per code word
-provide huffman table
Huffman coding is optimal for a symbol-by-symbol coding with a known input probability di
This is full set of procedures used to communicate with any GSM module for SMS sending/receiving (
This is full set of procedures used to communicate with
any GSM module for SMS sending/receiving (it uses standard AT commands).
Original code is for ATMega162 microcontroller, but code is gener
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only,