exsys covid: EXSYS, the EXSYS logo, CORVID, the CORVID logo, Exsys RuleBook, the Exsys RuleBook logos are either registered trademarks or trademarks of EXSYS Inc in the United States and /or other countries.
資源簡介:exsys covid: EXSYS, the EXSYS logo, CORVID, the CORVID logo, Exsys RuleBook, the Exsys RuleBook logos are either registered trademarks or trademarks of EXSYS Inc in the United States and /or other countries.
上傳時間: 2014-11-27
上傳用戶:924484786
資源簡介:Enter Two Numbers:26 35 the sum is 61 Enter Two Numbers:26 35 the sum is 61
上傳時間: 2014-01-13
上傳用戶:1159797854
資源簡介:the book presents the entire Java programming language and essential parts of the class libraries: the collection classes and the input-output classes.
上傳時間: 2015-03-02
上傳用戶:yulg
資源簡介:the practice of enterprise application development has benefited from the emergence of many new enabling technologies. Multi-tiered object-oriented platforms, such as Java and .NET, have become commonplace.
上傳時間: 2015-03-11
上傳用戶:aig85
資源簡介:A simple C program to strobe the LEDsvia Port D. the strobe rate is to be set by adjusting the voltage drop over a potentiometer that is sampled by an ADC.
上傳時間: 2014-01-09
上傳用戶:lifangyuan12
資源簡介:An assembly to strobe the LEDsvia Port D. the strobe rate is to be set by adjusting the voltage drop over a potentiometer that is sampled by an ADC
上傳時間: 2015-03-21
上傳用戶:13681659100
資源簡介:This sample demonstrates the handling of DIF_ calls during device installation and the insertion of a property page into the install wizard and into the device properties.
上傳時間: 2014-01-25
上傳用戶:yy541071797
資源簡介:This code implements the basic functions for an I2C slave device using the SSP module. All I2C functions are handled in an ISR. Bytes written to the slave are stored in a buffer. After a number of bytes have been written, the master device ...
上傳時間: 2015-04-02
上傳用戶:邶刖
資源簡介:the purpose of this computer program is to allow the user to construct, train and test differenttypes of artificial neural networks. By implementing the concepts of templates, inheritance andderived classes from C++ object oriented programm...
上傳時間: 2013-12-06
上傳用戶:13517191407
資源簡介:this code is a simulator to simulate the paging system such as first come first service. the comment in this code can help you to run it.
上傳時間: 2014-01-03
上傳用戶:Late_Li
資源簡介:the goal of this lab is (1) to under the defects of software timers, (2) to write a periodic program without timers, (3) to write a periodic program using timer Hardware:Host computer PC Software: GNU GCC
上傳時間: 2014-08-13
上傳用戶:古谷仁美
資源簡介:This code ports the uC/OS operating system by Jean LaBrosse to the TI TMS320C2xx family of DSP s.
上傳時間: 2014-11-27
上傳用戶:朗朗乾坤
資源簡介:the INTRODUCE ABOUT JAVA ,WHICH CAN MAKE YOU KOOW the BASIC ABOUT IT
上傳時間: 2014-11-23
上傳用戶:nanxia
資源簡介:the file is substitution cipher assistant.It Will display the ciphertext underneath the guessed plaintext.
上傳時間: 2014-11-29
上傳用戶:從此走出陰霾
資源簡介:the "JTAG-GDB server" is a program for integrating the ARM-Embedded ICE logic with the GNU-Debugger GDB.
上傳時間: 2014-01-25
上傳用戶:LouieWu
資源簡介:the intention is to show you how to incorporate the AWGN/Rayleigh fading models in the basic decoding program.
上傳時間: 2014-01-04
上傳用戶:ANRAN
資源簡介:/* This program generates the DApkg.vhd file that is used to define * the DA filter core and gives its parameters and the contents of the * Distributed Arithmetic Look-up-table "DALUT" according to the DA algorithm
上傳時間: 2015-07-07
上傳用戶:wangchong
資源簡介:the DSP Design Flow workshop provides an introduction to the advanced tools you need to design and implement DSP algorithms targeting FPGAs. This intermediate workshop in implementing DSP functions focuses on learning how to use System Gene...
上傳時間: 2014-12-06
上傳用戶:sammi
資源簡介:This the first cellphone worm with source code available in the world ! Do you can modify, rename, delete, insert any code...
上傳時間: 2015-08-03
上傳用戶:xiaohuanhuan
資源簡介:Lighthouse within the software developer heart- 《 the myth of month of person 》 , this is the edition of PDF, very convenient
上傳時間: 2015-08-14
上傳用戶:kristycreasy
資源簡介:Lighthouse within the software developer heart- 《 the myth of month of person 》 , this is the edition of PDF, very convenient
上傳時間: 2014-01-16
上傳用戶:xg262122
資源簡介:This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. ...
上傳時間: 2013-12-28
上傳用戶:離殤
資源簡介:the standard optimum Kalman filter demands complete knowledge of the system parameters, the input forcing functions, and the noise statistics. Several adaptive methods have already been devised to obtain the unknown information using the...
上傳時間: 2013-12-17
上傳用戶:541657925
資源簡介:A general technique for the recovery of signicant image features is presented. the technique is based on the mean shift algorithm, a simple nonparametric pro- cedure for estimating density gradients. Drawbacks of the current methods (i...
上傳時間: 2015-10-14
上傳用戶:410805624
資源簡介:HDOJ ACM input:the input consists of T test cases. the number of test cases ) (T is given in the first line of the input. Each test case begins with a line containing an integer N , 1<=N<=200 , that represents the number of tables to move....
上傳時間: 2015-10-18
上傳用戶:三人用菜
資源簡介:This book is the definitive guide to EJB 3.0 persistence technology. the authors provide unparalleled insight and expertise on this topic, fully examining and explaining EJB 3.0B
上傳時間: 2014-11-28
上傳用戶:wfeel
資源簡介:the purpose of this application note is to describe the main elements of an RS-422 and RS-485 system. This application note attempts to cover enough technical details so that the system designer will have considered all the important asp...
上傳時間: 2013-12-29
上傳用戶:sxdtlqqjl
資源簡介:Most of the developers of the AVR binutils and gcc ports in addition to the devleopers of avr-libc subscribe to the list,
上傳時間: 2013-12-29
上傳用戶:上善若水
資源簡介:ICP fit points in data to the points in model. Fit with respect to minimize the sum of square errors with the closest model points and data points. Ordinary usage: [R, T] = icp(model,data) INPUT: model - matrix with model points...
上傳時間: 2014-01-02
上傳用戶:gyq
資源簡介:the Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based Encryption from the Weil Pairing", CRYPTO 2001.) there are a few modifications and addition...
上傳時間: 2013-12-20
上傳用戶:yan2267246