motorola 1.4" CSTN LCD test program. Drive IC: SSD17
標簽: motorola program Drive CSTN
上傳時間: 2015-06-23
上傳用戶:ryb
This just a test src.
上傳時間: 2014-02-28
上傳用戶:wangdean1101
這篇文章主要介紹ARM JTAG調試的基本原理。基本的內容包括了TAP (TEST ACCESS PORT) 和BOUNDARY-SCAN ARCHITECTURE的介紹,在此基礎上,結合ARM7TDMI詳細介紹了的JTAG調試原理。
標簽: BOUNDARY-SCAN ARCHITECTURE ACCESS JTAG
上傳時間: 2014-12-20
上傳用戶:上善若水
Creating JButtons.And test it
標簽: Creating JButtons test And
上傳時間: 2015-07-03
上傳用戶:宋桃子
The firmware test code for s3c2440
標簽: firmware s3c2440 code test
上傳時間: 2015-07-03
上傳用戶:jqy_china
- XCS for Dynamic Environments + Continuous versions of XCS + Test problem: real multiplexer + Experiments: XCS is explored in dynamic environments with different magnitudes of change to the underlying concepts. +Reference papers: H.H. Dam, H.A. Abbass, C.J. Lokan, Evolutionary Online Data Mining – an Investigation in a Dynamic Environment. 2005, accepted for a book chapter in Springer Series on Studies in Computational Intelligence H.H. Dam, H.A. Abbass, C.J. Lokan, Be Real! XCS with Continuous-Valued Inputs. IWLCS 2005, (International Workshop on Learning Classifier Systems). Washington DC, June 2005.
標簽: Environments multiplexer Continuous XCS
上傳時間: 2015-07-04
上傳用戶:Avoid98
AVL Tree implementation: I also included a test function to compare the AVL Tree performance with STL Set and Map. Compile the source mavltree.cpp and run it to see the result!
標簽: Tree implementation performance AVL
上傳時間: 2013-12-19
上傳用戶:3到15
文章主要介紹ARM JTAG調試的基本原理。基本的內容包括了TAP (TEST ACCESS PORT) 和BOUNDARY-SCAN ARCHITECTURE的介紹,在此基礎上,結合ARM7TDMI詳細介紹了的JTAG調試原理。
標簽: BOUNDARY-SCAN ARCHITECTURE ACCESS JTAG
上傳時間: 2014-10-26
上傳用戶:yxgi5
加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]
標簽: Cryptographic Primitives generate Library
上傳時間: 2015-07-16
上傳用戶:wqxstar
CPU Fan Test 適合很多機型
上傳時間: 2015-07-17
上傳用戶:hjshhyy