this file Viterbi_Hard_decision.rar has corder,decorder,noise,have all chinese explain you can easy understand function
標簽: Viterbi_Hard_decision decorder chinese explain
上傳時間: 2014-01-09
上傳用戶:yoleeson
AVR USART串口使用的一個范例 編譯器:GCC 工具: C && ASM 芯片:ATMEL的ATMEGA系列
上傳時間: 2015-09-03
上傳用戶:hustfanenze
This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 譯作:《黑客入侵的藝術》,也是從朋友的寶箱中搜來的,以前層大致瀏覽過,是難得一件的好資料。
標簽: introduces the hacking science
上傳時間: 2013-12-28
上傳用戶:離殤
這個PH10有雙接口的ASM程序,P3。0是第二個時鐘,先接在多余的245腳上,然后引到板上就能顯示完整的字了
上傳時間: 2013-12-10
上傳用戶:wys0120
JDiff is a Javadoc doclet which generates an HTML report of all the packages, classes, constructors, methods, and fields which have been removed, added or changed in any way, including their documentation, when two APIs are compared. This is very useful for describing exactly what has changed between two releases of a product. Only the API (Application Programming Interface) of each version is compared. It does not compare what the source code does when executed.
標簽: constructors generates packages Javadoc
上傳時間: 2015-09-06
上傳用戶:lijianyu172
2005 Center for Biological & Computational Learning at MIT and MIT All rights reserved. Permission to copy and modify this data, software, and its documentation only for internal research use in your organization is hereby granted, provided that this notice is retained thereon and on all copies. This data and software should not be distributed to anyone outside of your organization without explicit written authorization by the author(s) and MIT.
標簽: Computational Biological MIT Permissio
上傳時間: 2014-01-27
上傳用戶:gaome
此是本人調試成功的用ASm匯編寫的 IIC EEPROM 的程序,不會的可以借鑒一下。
上傳時間: 2013-12-10
上傳用戶:yd19890720
運行于80C196上的浮點運算程序asm
上傳時間: 2014-01-15
上傳用戶:kernaling
rINTCON=0x5 //Non-vectored,IRQ enable,FIQ disable rINTMOD=0x0 //All=IRQ mode
標簽: Non-vectored IRQ rINTCON disable
上傳時間: 2013-12-17
上傳用戶:thuyenvinh
Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incoming and outgoing network traffic – for each packet: – Analyze 4-tuple and protocol – Examine contents
標簽: Intrusion Detection Host-based Network
上傳時間: 2014-01-11
上傳用戶:ikemada