亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

V-by-One

  • LINEINTRGAL Line Integral in a 2D Vector Field. LINEINTRGAL(X,Y,U,V,C) computes the line integral a

    LINEINTRGAL Line Integral in a 2D Vector Field. LINEINTRGAL(X,Y,U,V,C) computes the line integral along the lines given in cell array C. X and Y define the coordinates of a rectangular grid over which U and V are defined. X and Y must be monotonic and 2D plaid as % produced by MESHGRID. X, Y, U, and V must all be the same size.

    標簽: LINEINTRGAL Integral computes integral

    上傳時間: 2014-01-13

    上傳用戶:hwl453472107

  • Securing Apache 2: Step-by-Step When choosing a web server, Apache very often wins against its co

    Securing Apache 2: Step-by-Step When choosing a web server, Apache very often wins against its competitors because of stability, performance, that fact that it s open source, and many other advantages. But when deciding on which version of Apache to use, the choice is not always so simple. On the one hand there is a very popular, stable version used by millions of users, version 1.3, and on the other hand, there is an enhanced and re-designed version 2.0.

    標簽: Apache Step-by-Step Securing choosing

    上傳時間: 2015-09-06

    上傳用戶:gundamwzc

  • performs one of the matrix-vector operations y := alpha*A*x + beta*y, or y := alpha*A *x + beta*y, w

    performs one of the matrix-vector operations y := alpha*A*x + beta*y, or y := alpha*A *x + beta*y, where alpha and beta are scalars, x and y are vectors and A is an m by n matrix

    標簽: alpha beta matrix-vector operations

    上傳時間: 2014-08-17

    上傳用戶:qlpqlq

  • data array sdword 2 dup(?) str1 byte "Please input one 32-bit sign number :",0dh,0ah,0 str2 by

    data array sdword 2 dup(?) str1 byte "Please input one 32-bit sign number :",0dh,0ah,0 str2 byte "The result is : ",0 align 4 jia1gao sdword 0 jia1 sdword 0 .code main proc call clrscr mov esi,offset array mov ecx,lengthof array mov edx,offset str1 push esi putin: call writestring

    標簽: Please sdword number array

    上傳時間: 2014-01-13

    上傳用戶:xiaoyunyun

  • %DEFINEV Scaling vector and derivative % % [v,dv]= DEFINEV(g,x,l,u) returns v, distances to the %

    %DEFINEV Scaling vector and derivative % % [v,dv]= DEFINEV(g,x,l,u) returns v, distances to the % bounds corresponding to the sign of the gradient g, where % l is the vector of lower bounds, u is the vector of upper % bounds. Vector dv is 0-1 sign vector (See ?? for more detail.) % % Copyright (c) 1990-98 by The MathWorks, Inc. % $Revision: 1.2 $ $Date: 1998/03/21 16:29:10 $

    標簽: DEFINEV derivative distances Scaling

    上傳時間: 2013-12-24

    上傳用戶:sz_hjbf

  • UCOS/II for ICCAVR - The version of UCOS/II is 2.04 - the original port was done by Ole Saether

    UCOS/II for ICCAVR - The version of UCOS/II is 2.04 - the original port was done by Ole Saether for the IAR compiler. Jens E. Holtegaard ported one version using ICCAVR. Joerg Meyer did another port (using Jens port as a start?). This is basically Joerg s port plus a little bit of changes and documentation by me. - YOU MUST DOWNLOAD THE MAIN PART OF THE UCOS/II FROM THE UCOS/II WEBSITE http://www.ucos-ii.com . The supplied project file assumes the portable source is in the ..\source directory. - Joerg has written couple document showing the stack frames etc. but it is in German :-) They are included in this directory. - The Timer2 overflow interrupt is used for Timer Tick. If you want to change that, modify os_cpu_c.c and os_cpu_a.s - I have tested this using ATMega103 with and without external RAM using AVR Studio simulator. See test1.c test program. Both Code Compressed (PRO) and STD versions have been tested.

    標簽: UCOS original Saether version

    上傳時間: 2015-11-14

    上傳用戶:ippler8

  • What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the poss

    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)

    標簽: Sometimes the contents desire

    上傳時間: 2013-12-25

    上傳用戶:playboys0

  • This example streams input from a ADC source to a DAC. An analog signal is acquired block-by-block

    This example streams input from a ADC source to a DAC. An analog signal is acquired block-by-block into SDRAM from the ADC (an AD9244 in this example). The frames are then output with a one-frame delay to the DAC (an AD9744 in this example). In this example, no processing is done on the frames. They are passed unaltered.

    標簽: block-by-block acquired example streams

    上傳時間: 2015-12-29

    上傳用戶:bjgaofei

  • TFIND searches for one or more strings (boolean AND) in a text file. TFIND reports all lines whe

    TFIND searches for one or more strings (boolean AND) in a text file. TFIND reports all lines where the string(s) were found (or NOT found by option). The search can be limited to a field in a fixed field (i.e. column oriented) list. An extended search mode is available, where only letters and digits are relevant. Other options: case sensitive search, alternative errorlevel with number of hits, header line with file name, LFN, custom prefix

    標簽: TFIND searches boolean reports

    上傳時間: 2016-01-24

    上傳用戶:lindor

  • TinyLogin is a suite of tiny Unix utilities for handling logging into, being authenticated by, chan

    TinyLogin is a suite of tiny Unix utilities for handling logging into, being authenticated by, changing one s password for, and otherwise maintaining users and groups on an embedded system. It also provides shadow password support to enhance system security. TinyLogin is, as the name implies, very small, and makes an excellent complement to BusyBox on an embedded System. It can be used without BusyBox, of course, but I envision them being used together most of the time.

    標簽: authenticated TinyLogin utilities handling

    上傳時間: 2016-01-30

    上傳用戶:253189838

主站蜘蛛池模板: 金昌市| 乐都县| 平南县| 杭锦后旗| 澄城县| 太保市| 金平| 涿州市| 襄汾县| 稻城县| 甘泉县| 沐川县| 寿阳县| 温泉县| 拉孜县| 裕民县| 乌兰察布市| 湄潭县| 东乡| 焦作市| 徐水县| 永清县| 武城县| 百色市| 宣武区| 三台县| 绵阳市| 田林县| 江北区| 池州市| 香港| 新干县| 黄梅县| 宜丰县| 永登县| 南通市| 阿坝县| 甘孜县| 麻栗坡县| 韶山市| 阜南县|