虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

On-the-Go

  • A system simulation environment in Matlab/Simulink of RFID is constructed in this paper. Special at

    A system simulation environment in Matlab/Simulink of RFID is constructed in this paper. Special attention is emphasized on the analog/RF circuit.Negative effects are concerned in the system model,such as phase noise of the local oscillator,TX-RX coupling,reflection of the environment, AWGN noise,DC offset,I/Q mismatch,etc.Performance of the whole system can be evaluated by changing the coding method,parameters of building blocks,and operation distance.Finally,some simulation results are presented in this paper.

    标签: environment constructed simulation Simulink

    上传时间: 2014-01-09

    上传用户:zhangliming420

  • About: hamsterdb is a database engine written in ANSI C. It supports a B+Tree index structure, uses

    About: hamsterdb is a database engine written in ANSI C. It supports a B+Tree index structure, uses memory mapped I/O (if available), supports cursors, and can create in-memory databases. Release focus: Major feature enhancements Changes: This release comes with many changes and new features. It can manage multiple databases in one file. A new flag (HAM_LOCK_EXCLUSIVE) places an exclusive lock on the file. hamsterdb was ported to Windows CE, and the Solution file for Visual Studio 2005 now supports builds for x64. Several minor bugs were fixed, performance was improved, and small API changes occurred. Pre-built libraries for Windows (32-bit and 64-bit) are available for download. Author: cruppstahl

    标签: C. hamsterdb structure database

    上传时间: 2013-12-11

    上传用户:LouieWu

  • xl2tpd a Layer 2 Tunneling Protocol (L2TP) daemon. It supports IPsec SA reference tracking, which en

    xl2tpd a Layer 2 Tunneling Protocol (L2TP) daemon. It supports IPsec SA reference tracking, which enables the IPsec stacks to support multiple l2tp clients behind the same NAT router and multiple l2tp clients on the same internal IP address. It is a fork of "l2tpd". Release focus: Minor feature enhancements Changes: Support for passwordfd, a workaround for some Cisco routers, and extended logging.

    标签: Tunneling reference Protocol supports

    上传时间: 2014-01-20

    上传用户:541657925

  • FLASH文件系统的源码

    FLASH文件系统的源码,Flash memory is a nonvolatile memory, which allows the user to electrically program (write) and erase information. The exponential growth of flash memory has made this technology an indispensable part of hundreds of millions of electronic devices. Flash memory has several significant differences with volatile (RAM) memory and hard drive technologies which requires unique software drivers and file systems. This paper provides an overview of file systems for flash memory and focuses on the unique software requirements of flash memory devices.

    标签: FLASH 文件系统 源码

    上传时间: 2015-11-29

    上传用户:问题问题

  • A fairly conventional 3D matrix object that can transform sets of 3D points and perform a variety

    A fairly conventional 3D matrix object that can transform sets of 3D points and perform a variety of manipulations on the transform

    标签: conventional transform perform variety

    上传时间: 2015-12-04

    上传用户:thesk123

  • SQL Server Security Distilled, Second Edition by Morris Lewis ISBN:1590592190 Apress © 2004

    SQL Server Security Distilled, Second Edition by Morris Lewis ISBN:1590592190 Apress © 2004 (352 pages) This book takes an in-depth look at what you can do to secure data in SQL Server, shows how to authenticate access to data on the server, and authorizes what users can and can t do with that data, in versions 6.5, 7.0, and 2000.

    标签: 1590592190 Distilled Security Edition

    上传时间: 2015-12-25

    上传用户:hj_18

  • This example streams input from a ADC source to a DAC. An analog signal is acquired block-by-block

    This example streams input from a ADC source to a DAC. An analog signal is acquired block-by-block into SDRAM from the ADC (an AD9244 in this example). The frames are then output with a one-frame delay to the DAC (an AD9744 in this example). In this example, no processing is done on the frames. They are passed unaltered.

    标签: block-by-block acquired example streams

    上传时间: 2015-12-29

    上传用户:bjgaofei

  • VC6.0核心编程。主要涉及到windows消息

    VC6.0核心编程。主要涉及到windows消息,框架,mfc库以及相关编程,com,activex技术,数据库技术,网络编程技术。为英文版本。 The 6.0 release of Visual C++ shows Microsoft s continued focus on Internet technologies and COM, which are key components of the new Windows Distributed interNet Application Architecture (DNA). In addition to supporting these platform initiatives, Visual C++ 6.0 also adds an amazing number of productivity-boosting features such as Edit And Continue, IntelliSense, AutoComplete, and code tips. These features take Visual C++ to a new level. We have tried to make sure that this book keeps you up to speed on the latest technologies being introduced into Visual C++.

    标签: windows 6.0 VC 核心

    上传时间: 2016-01-02

    上传用户:lmeeworm

  • 《为Windows Vista编写安全的代码》

    《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars

    标签: Windows Vista 编写 代码

    上传时间: 2016-01-07

    上传用户:zxc23456789

  • We have a group of N items (represented by integers from 1 to N), and we know that there is some tot

    We have a group of N items (represented by integers from 1 to N), and we know that there is some total order defined for these items. You may assume that no two elements will be equal (for all a, b: a<b or b<a). However, it is expensive to compare two items. Your task is to make a number of comparisons, and then output the sorted order. The cost of determining if a < b is given by the bth integer of element a of costs (space delimited), which is the same as the ath integer of element b. Naturally, you will be judged on the total cost of the comparisons you make before outputting the sorted order. If your order is incorrect, you will receive a 0. Otherwise, your score will be opt/cost, where opt is the best cost anyone has achieved and cost is the total cost of the comparisons you make (so your score for a test case will be between 0 and 1). Your score for the problem will simply be the sum of your scores for the individual test cases.

    标签: represented integers group items

    上传时间: 2016-01-17

    上传用户:jeffery