As mentioned, most computers include a serial port. The only hardware setup required is connecting the serial cable to the serial port on the PC and the serial port on the instrument. The serial instrument may include some hardware drivers or software utilities for communication, and should include documentation on the baud rate, packet size, stop bits, and parity bits that the instrument will use. Additionally, check the National Instruments Instrument Driver Network to see if LabVIEW drivers already exist for yout instrument, as
標簽: connecting mentioned computers hardware
上傳時間: 2016-05-27
上傳用戶:gououo
第一只感染flash的病毒源代碼。采用匯編語言編寫。 SWF/LFM-926 Virus: ------------------ Description: WinNT/XP Virus dropper for Flash .SWF files! Masm Version 6.11: ML.EXE SWF.ASM Virus Size: 926 bytes Infection Size: 3247 bytes. Last Edit: 01/08/2002
標簽: Virus Description flash WinNT
上傳時間: 2016-06-02
上傳用戶:miaochun888
C/C++ implementation of the Levenberg-Marquardt non-linear least squares algorithm. levmar includes double and single precision LM versions, both with analytic and finite difference approximated jacobians
標簽: Levenberg-Marquardt implementation non-linear algorithm
上傳時間: 2013-12-28
上傳用戶:gxf2016
Design and test a category called Rectangle rectangular, rectangular attribute to the lower left corner of the upper-right corner and the coordinates of two points, to calculate the size of rectangular
標簽: rectangular Rectangle attribute category
上傳時間: 2013-12-09
上傳用戶:sssl
編寫一個C程序,用char *malloc(unsigned size)函數向系統申請一次內存空間(如size=1000,單位為字節),用循環首次適應法 addr = (char *)lmalloc(unsigned size) 和 lfree(unsigned size,char * addr)模擬可變分區內存管理,實現對該內存區的分配和釋放管理。
上傳時間: 2016-06-18
上傳用戶:fredguo
中南賽區ACM競賽題 Description Given a two-dimensional array of positive and negative integers, a sub-rectangle is any contiguous sub-array of size 1*1 or greater located within the whole array. The sum of a rectangle is the sum of all the elements in that rectangle. In this problem the sub-rectangle with the largest sum is referred to as the maximal sub-rectangle.
標簽: two-dimensional Description negative integers
上傳時間: 2013-12-22
上傳用戶:lijianyu172
Make Text-Overflow work on both IE and Firefox If the text inside each line exceed the width of each line, then you will see "..." (ellipsis) shows up at the end of each line. Try to resize the window or change the font size to see if "..." (ellipsis) will show up or disappear. Demo - Listing
標簽: Text-Overflow the Firefox inside
上傳時間: 2013-12-18
上傳用戶:lgnf
This is the source for a C compiler that generates 386 or m68K code. Code generation is fairly good although the optimizer is a little naive... the code itself should be highly portable although there are some issues involved with porting from MSDOS that have to be resolved for example the size of LONG on unix machines is so big some of the code generated gets messed up. Code generation requires TASM to assemble the compiler output you can use the borland TLINK to produce executables, or the Watcom WLINK can also be used. PMODE systems written by TRAN are used for the DPMI interface.
標簽: generation generates compiler fairly
上傳時間: 2016-08-01
上傳用戶:sxdtlqqjl
NIST Net – A Linux-based Network Emulation Tool, It is a raw IP packet filter with many controllable channel parameters such as packet loss ratio, jitter, bandwidth variation, delay, and network buffer size. To simulate different network environments
標簽: controllable Linux-based Emulation Network
上傳時間: 2014-01-26
上傳用戶:xauthu
D169 Demo - DMA0 Repeated Burst to-from RAM, Software Trigger Description A 32 byte block from 220h-240h is transfered to 240h-260h using DMA0 in a burst block using software DMAREQ trigger. After each transfer, source, destination and DMA size are reset to inital software setting because DMA transfer mode 5 is used. P1.0 is toggled durring DMA transfer only for demonstration purposes. ** RAM location 0x220 - 0x260 used - always make sure no compiler conflict ** ACLK= n/a, MCLK= SMCLK= default DCO ~ 800k
標簽: Description Repeated Software to-from
上傳時間: 2014-01-09
上傳用戶:thinode