There has the LNA design, it use more in wireless comunication system.
標簽: comunication wireless design system
上傳時間: 2015-11-28
上傳用戶:wab1981
AI::Categorizer is a framework for automatic text categorization. It consists of a collection of Perl modules that implement common categorization tasks, and a set of defined relationships among those modules
標簽: categorization Categorizer collection framework
上傳時間: 2014-12-05
上傳用戶:笨小孩
pic16f8 based clock, it display the time on the TV display. This include source code and sch
標簽: display the include source
上傳時間: 2015-11-30
上傳用戶:nanfeicui
One program to simulation light passing through a glass sphere. It is interesting and can be used in geometric optics.
標簽: interesting simulation program passing
上傳時間: 2014-12-07
上傳用戶:璇珠官人
This xml test.You can free download it.
上傳時間: 2015-11-30
上傳用戶:wangdean1101
It is used to explain how to use R
上傳時間: 2014-09-01
上傳用戶:tonyshao
This a simple bootloader for AT91SAM7{S,X}{64,128,256} processors. It permits you to download new code to the device over USB. This bootrom is installed at address 0x00000000 in the ARM, which means that it is the first piece of code to execute after reset. At startup, it waits for a few seconds to see if the downloader is trying to connect. If not, then the bootloader gives up control and jumps to your program. If the downloader is trying to connect, then the bootloader receives the new program over USB and writes it into flash.
標簽: bootloader processors download permits
上傳時間: 2015-11-30
上傳用戶:shus521
thank you for using this software,which is fugai method,when you can t catch it,please ask me for my help!
上傳時間: 2014-09-10
上傳用戶:asddsd
Hey. This some pid code for the atmega88 that I once used to control a heater. It s purpose is pretty specific, and I only wrote it to work on the mega88, so the code itself won t be too useful. It is a good place to start if you re trying to use or figure out pid though.
標簽: control purpose atmega heater
上傳時間: 2013-12-19
上傳用戶:天誠24
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)
標簽: Sometimes the contents desire
上傳時間: 2013-12-25
上傳用戶:playboys0