* The keyboard is assumed to be a matrix having 4 rows by 6 columns. However, this code works for any * matrix arrangements up to an 8 x 8 matrix. By using from one to three of the column inputs, the driver * can support "SHIFT" keys. These keys are: SHIFT1, SHIFT2 and SHIFT3.
標簽: keyboard However assumed columns
上傳時間: 2016-11-14
上傳用戶:ardager
Error Correcting Code algorithms, for use whit E
標簽: Correcting algorithms Error Code
上傳時間: 2014-06-20
上傳用戶:ljt101007
a XOR b> a,然后a XOR b< b,and both a and b are dependent data
上傳時間: 2014-01-27
上傳用戶:yxgi5
Tiny-C 9.0 You can compile and execute C code everywhere, for example on rescue disks ( about 100KB for x86 TCC executable, including C preprocessor, C compiler, ... http://bellard.org/tcc/
標簽: everywhere compile execute example
上傳時間: 2016-12-13
上傳用戶:佳期如夢
This example code is for TI DSP(TMS320F2808) IQ math study.
上傳時間: 2016-12-18
上傳用戶:czl10052678
4avrOS realtime OS for AVR
上傳時間: 2016-12-28
上傳用戶:王者A
OpenFVM-v1.1 open source cfd code
標簽: OpenFVM-v source open code
上傳時間: 2017-01-11
上傳用戶:龍飛艇
The software is capable to simulate space time code [1] for QPSK modulation using different number of state. Examples of generator matrix up to 256 stetes are provided. Variable signal to noise ratio (SNR) might be applied to produce bit error rate (BER) or frame error rate (FER) curves.
標簽: modulation different software simulate
上傳時間: 2014-01-22
上傳用戶:qq1604324866
Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/
標簽: open-source encryption Features software
上傳時間: 2013-12-20
上傳用戶:123啊
IAR for AVR 環境的相關文檔,包括:IARAVR編譯說明,IAR-AVR C 編譯器簡要說明,EWAVR+4.10中文用戶手冊,另有ewavr511b的注冊機程序。
上傳時間: 2014-06-01
上傳用戶:520