虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Key-Value

  • A six people s rushing replies an implement, use some s switches in toggle switch K0 ~ K5 is that ON

    A six people s rushing replies an implement, use some s switches in toggle switch K0 ~ K5 is that ON accomplishes when rushing to reply button , nobody rush to answer, 6 numerical code circulation takes turns at demonstrating 1 ~ 6 (horse races) , who rushes to reply the numerical code stops having a ride on a horse , first, whose serial number, has simultaneous light of 6 numerical codes again afterwards the key presses down. System denies responding to, until this place is OFF batch , the wheel restoring 1 ~ 6 horse races starting time as soon as rushes to answer.

    标签: implement switches rushing replies

    上传时间: 2013-12-27

    上传用户:l254587896

  • This is the machine-generated representation of a Handle Graphics object and its children. Note that

    This is the machine-generated representation of a Handle Graphics object and its children. Note that handle values may change when these objects are re-created. This may cause problems with any callbacks written to depend on the value of the handle at the time the object was saved.

    标签: machine-generated representation Graphics children

    上传时间: 2013-12-18

    上传用户:miaochun888

  • 压缩包里包含有JX44B0教学实验系统用户手册及该系统的全套试验例程

    压缩包里包含有JX44B0教学实验系统用户手册及该系统的全套试验例程,用c编写,在ADT环境下编译后下载到 实验板即可执行,是学习arm开发的有用例程 源文件说明 Leddemo LED显示实验 Led LED 显示实验 Serial 串口实验 Interrupt 外部中断实验 Dma DMA实验 Pwm PWM实验 Rtc 实时时钟实验 Watchdog 看门狗实验 Ad AD 采样实验 Stepper 步进电机驱动实验实验 Key 键盘驱动实验 Dispchar 汉字字符显示实验 Dispgraph 图形显示实验 Iic IIC 总线实验 Tftp TFTP 文件传输实验 Usb USB 数据传输实验 Iis 立体声录放音实验 Touch 触摸屏驱动实验 cf CF卡实验 ide IDE硬盘接口驱动实验 parallel 并行打印机接口通讯实验 Ucos-ii UCOS-II实验:Eg1, Eg2, Eg3, Eg4 gprs GPRS相关实验(主叫实验,被叫实验,收短信实验和发短信实验) gps GPS实验

    标签: 44B JX 44 B0

    上传时间: 2013-12-05

    上传用户:han_zh

  • 英文版,pdf格式。 详细说明: Title: STL Tutorial and Reference Guide: C++ Programming with the Standard Templa

    英文版,pdf格式。 详细说明: Title: STL Tutorial and Reference Guide: C++ Programming with the Standard Template Library (2nd Edition) URL: http://www.amazon.com/exec/obidos/tg/detail/-/0201379236/ ISBN: 0201379236 Author: David R. Musser / Gillmer J. Derge / Atul Saini / Gilmer J. Derge Publisher: Addison-Wesley Page: 560 Edition: 2nd edition (March 27, 2001) Catalog: C++ Format: PDF Size: 3.8M Supplier: December Summary: The Standard Template Library was created as the first library of genetic algorithms and data structures, with four ideas in mind: generic programming, abstractness without loss of efficiency, the Von Neumann computation model, and value semantics. This guide provides a tutorial, a description of each element of the library, and sample applications. The expanded second edition includes new code examples and demonstrations of the use of STL in real-world C++ software development it reflects changes made to STL for the final ANSI/ISO C++ language standard.

    标签: Programming Reference Standard Tutorial

    上传时间: 2015-09-02

    上传用户:Breathe0125

  • 利用Hash技术统计单词的频度。扫描一个C源程序

    利用Hash技术统计单词的频度。扫描一个C源程序,用Hash表存储该程序中出现的关键字,并统计该程序中的关键字出现的频度。用线性探测法解决Hash冲突。设Hash函数为:Hash(Key)=[(Key的首字母序号)*100+(Key的尾字母序号)] Mod 41

    标签: Hash 源程序

    上传时间: 2015-09-02

    上传用户:haohaoxuexi

  • Secure Programming Cookbook for C and C++ is an important new resource for developers serious about

    Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

    标签: Programming developers for important

    上传时间: 2015-09-03

    上传用户:gundan

  • * CONSTRAINTS * This module does not handle data which is considered out of range by the * appli

    * CONSTRAINTS * This module does not handle data which is considered out of range by the * application(i.e. fixed constants which represent error condition) * * Maximum weight value must be limited to 128 to prevent an overflow * condition during the calculation. * * The internal data type must be large enough to handle the calculations. * The maximum possible internal value * = Max Input Value * (weight - 1) + Max Input Value * If a maximum weight of 128 is used, the internal data type should be 2 * times the size of the input data type.

    标签: CONSTRAINTS considered module handle

    上传时间: 2015-09-07

    上传用户:qunquan

  • * DEFINITION * This is the header file for a library module used to calculate the median * of a

    * DEFINITION * This is the header file for a library module used to calculate the median * of a list of values. It finds the value that would be in the center if * the list were sorted. If the list contains an even number of values, the * lower of the two center values is reported. The values themselves are not * sorted or modified in any way. This algorithm can be used as a filtering * tool for rejecting noisy data.

    标签: DEFINITION calculate the library

    上传时间: 2015-09-07

    上传用户:refent

  • AES decoder aes_dec.vhdl AES encoder aes_enc.vhdl Package used by rest of design aes_pkg.vhdl

    AES decoder aes_dec.vhdl AES encoder aes_enc.vhdl Package used by rest of design aes_pkg.vhdl Key Expansion component for AES encoder and decoder key_expansion.vhdl

    标签: vhdl AES decoder aes_dec

    上传时间: 2015-09-07

    上传用户:许小华

  • Hard-decision decoding scheme Codeword length (n) : 31 symbols. Message length (k) : 19 symbols.

    Hard-decision decoding scheme Codeword length (n) : 31 symbols. Message length (k) : 19 symbols. Error correction capability (t) : 6 symbols One symbol represents 5 bit. Uses GF(2^5) with primitive polynomial p(x) = X^5 X^2 + 1 Generator polynomial, g(x) = a^15 a^21*X + a^6*X^2 + a^15*X^3 + a^25*X^4 + a^17*X^5 + a^18*X^6 + a^30*X^7 + a^20*X^8 + a^23*X^9 + a^27*X^10 + a^24*X^11 + X^12. Note: a = alpha, primitive element in GF(2^5) and a^i is root of g(x) for i = 19, 20, ..., 30. Uses Verilog description with synthesizable RTL modelling. Consists of 5 main blocks: SC (Syndrome Computation), KES (Key Equation Solver), CSEE (Chien Search and Error Evaluator), Controller and FIFO Register.

    标签: symbols length Hard-decision Codeword

    上传时间: 2014-07-08

    上传用户:曹云鹏