Atheros無線芯片AR-6000系列wince 6驅動源代碼(這東西我也沒用過別問我,我是搜別的wince資源搜到的) AR6K SDIO support. Requires firmware 1.1 on SD13 cards. readme: Atheros Communications AR6001 WLAN Driver for SDIO installation Read Me March 26,2007 (based on k14 fw1.1) Windows CE Embedded CE 6.0 driver installation. 1. Unzip the installation file onto your system (called installation directory below) 2. Create an OS design or open an existing OS design in Platform Builder 6.0. a. The OS must support the SD bus driver and have an SD Host Controller driver (add these from Catalog Items). b. Run image size should be set to allow greater than 32MB. 3. a. From the Project menu select Add Existing Subproject... b. select AR6K_DRV.pbxml c. select open This should create a subproject within your OS Design project for the AR6K_DRV driver. 4. Build the solution. 轉自Tony嵌入式,原文地址:http://www.cevx.com/bbs/dispbbs.asp?boardID=4&ID=11762&page=1
標簽: wince Requires firmware Atheros
上傳時間: 2014-11-11
上傳用戶:bibirnovis
usb bulk 傳輸例程。 * The bulkusb driver is a generic function driver, based on the Windows Driver Model (WDM). * Supports Plug and Play(PnP), Power Management(PM), Windows Management Instrumentation (WMI) and the Selective Suspend (SS) features. * This sample is based off the selSusp DDK sample. Please refer the selSusp sample and the DDK docs to understand the handling of PnP, PM, WMI and SS features and implementations. * The USB device used for this sample is a generic Intel I82930 USB evaluation board programmed with a simple loopback test using a 64 KB circular buffer. None of the code in the sample is specific to this controller chip.
標簽: driver function Windows bulkusb
上傳時間: 2016-04-25
上傳用戶:270189020
Atmel’s AT91SAM7FP105 is a low pincount FingerChip processor based on the 32-bit ARM RISC processor. It features a on-chip biometric engine performing enrollment verification and identification, an internal record cache of up to 25 records and a secure command protocol over USB, SPI, UART. This protocol enables an external host system or processor to control the onchip bioengine functions, manipulate the record cache, and securely export record cache records for external storage. Together with the FingerChip sensor device AT77C104B, it forms an embedded, secured biometric turnkey solution.
標簽: processor FingerChip pincount Atmel
上傳時間: 2013-12-26
上傳用戶:shawvi
本人編寫的incremental 隨機神經元網絡算法,該算法最大的特點是可以保證approximation特性,而且速度快效果不錯,可以作為學術上的比較和分析。目前只適合benchmark的regression問題。 具體效果可參考 G.-B. Huang, L. Chen and C.-K. Siew, “Universal Approximation Using Incremental Constructive Feedforward Networks with Random Hidden Nodes”, IEEE Transactions on Neural Networks, vol. 17, no. 4, pp. 879-892, 2006.
標簽: incremental 編寫 神經元網絡 算法
上傳時間: 2016-09-18
上傳用戶:litianchu
The "GEE! It s Simple" package illustrates Gaussian elimination with partial pivoting, which produces a factorization of P*A into the product L*U where P is a permutation matrix, and L and U are lower and upper triangular, respectively. The functions in this package are accurate, but they are far slower than their MATLAB equivalents (x=A\b, [L,U,p]=lu(A), and so on). They are presented here merely to illustrate and educate. "Real" production code should use backslash and lu, not this package.
標簽: illustrates elimination Gaussian pivoting
上傳時間: 2016-11-09
上傳用戶:wang5829
The "GEE! It s Simple" package illustrates Gaussian elimination with partial pivoting, which produces a factorization of P*A into the product L*U where P is a permutation matrix, and L and U are lower and upper triangular, respectively. The functions in this package are accurate, but they are far slower than their MATLAB equivalents (x=A\b, [L,U,p]=lu(A), and so on). They are presented here merely to illustrate and educate. "Real" production code should use backslash and lu, not this package.
標簽: illustrates elimination Gaussian pivoting
上傳時間: 2014-01-21
上傳用戶:lxm
A stability analysis is presented for staggered schemes for the governing equations of compressible flow. The method is based on Fourier analysis. The approximate nature of pressure-correction solution methods is taken into account. 2001 IMACS. Published by Elsevier Science B.V. All rights reserved
標簽: compressible stability for equations
上傳時間: 2016-12-02
上傳用戶:yph853211
Flex chip implementation File: UP2FLEX JTAG jumper settings: down, down, up, up Input: Reset - FLEX_PB1 Input n - FLEX_SW switches 1 to 8 Output: Countdown - two 7-segment LEDs. Done light - decimal point on Digit1. Operation: Setup the binary input n number. Press the Reset switch. See the countdown from n down to 0 on the 7-segment LEDs. Done light lit when program terminates.
標簽: down implementation settings UP2FLEX
上傳時間: 2014-01-21
上傳用戶:sclyutian
This document provides guidelines and describes how to easily port S60 2nd Edition C++ applications to S60 3rd Edition. The document has been written based on experiences of porting regular S60 2nd Edition applications, such as the S60 Platform: POP/IMAP Example [4] that can be downloaded from Forum Nokia. Code snippets from the example are shown in Chapter 8, “Application build changes,” and in Appendix A, “Code example." In addition, Appendix B, "Commonly used functions that require capabilities," and Appendix C, "Commonly used interfaces that have been changed or removed," provide useful information on some frequently used functions and interfaces in third-party applications.
標簽: application guidelines describes document
上傳時間: 2017-01-29
上傳用戶:wang5829
We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.
標簽: effectiveness analytically numerically cloaking
上傳時間: 2017-03-30
上傳用戶:zxc23456789