虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Second

  • Those who are working on power system optimisatio, for them here is all the load flow programs from

    Those who are working on power system optimisatio, for them here is all the load flow programs from book hadi sadat. It i the 1st part. Second part is also uploaded in this site by me

    标签: optimisatio programs working system

    上传时间: 2017-07-30

    上传用户:xymbian

  • When trying to extract information from SAR images, we need to distinguish two types of image prope

    When trying to extract information from SAR images, we need to distinguish two types of image property. The more important is where properties of the scene (e.g., its dielectric constant, its geometry, its motion, etc.) produce effects in the image measurements or examination of the image then can provide information about the scene. The Second is generated purely by the system and the signal processing.

    标签: distinguish information extract trying

    上传时间: 2014-01-09

    上传用户:huyiming139

  • simple clock display clock Dimensions,Draw the circle and numbers,Formats the date ,Font for number

    simple clock display clock Dimensions,Draw the circle and numbers,Formats the date ,Font for number ,Color of main hands and dial,Color of Second hand and numbers

    标签: clock Dimensions the Formats

    上传时间: 2014-11-24

    上传用户:wanqunsheng

  • The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at

    The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.

    标签: cryptographic applications attractive for

    上传时间: 2013-12-07

    上传用户:zhuimenghuadie

  • 本书是英文版

    本书是英文版,但内容非常不错,本书目录如下: Table of Contents SIP—Understanding the Session Initiation Protocol, Second Edition Foreword to the First Edition Preface to - the Second Edition Preface to - the First Edition Chapter 1 - SIP and the Internet Chapter 2 - Introduction to SIP Chapter 3 - SIP Clients and Servers Chapter 4 - SIP Request Messages Chapter 5 - SIP Response Messages Chapter 6 - SIP Header Fields Chapter 7 - Related Protocols Chapter 8 - Comparison to H.323 Chapter 9 - Wireless and 3GPP Chapter 10 - Call Flow Examples Chapter 11 - Future Directions Appendix A - Changes in the SIP Specification from RFC 2543 to RFC 3261

    标签: 英文

    上传时间: 2014-01-06

    上传用户:爺的气质

  • These codes require an ASCII input file interp.dat of the following form: N: Number of Polynomia

    These codes require an ASCII input file interp.dat of the following form: N: Number of Polynomial Interpolation Points (Small) First Sample (x1,y1) Second Sample (x2,y2) ... Nth Sample (xN,yN) N1: Number of Error Evaluation Points (Large) First Sample (x1,y1) Second Sample (x2,y2) ... N1th Sample (xN1,yN1)

    标签: Polynomia following require Number

    上传时间: 2017-09-21

    上传用户:许小华

  • A large body of computer-aided techniques has been developed in recent years to assist in the proce

    A large body of computer-aided techniques has been developed in recent years to assist in the process of modeling, analyzing, and designing communication systems . These computer-aided techniques fall into two categories: formula-based approaches, where the computer is used to evaluate complex formulas, and simulation-based approaches, where the computer is used to simulate the waveforms or signals that flow through the system. The Second approach, which involves “waveform”-level simulation (and often incorporates analytical techniques), is the subject of this book. Since performance evaluation and trade off studies are the central issues in the analysis and design of communication systems, we will focus on the use of simulation for evaluating the performance of analog and digital communication systems with the emphasis on digitalcommunication systems.

    标签: computer-aided techniques developed assist

    上传时间: 2014-01-01

    上传用户:541657925

  • three proceses , one proces read some mesages entered from the keyboard until read s EXIT, the the s

    three proceses , one proces read some mesages entered from the keyboard until read s EXIT, the the Second process kill his son, than kill himself.

    标签: the read proceses keyboard

    上传时间: 2014-01-17

    上传用户:firstbyte

  • SystemC_tutorial

    This tutorial will focus on the strong connection between C++ and SystemC by making the analogy between Hardware modeling and Object-Oriented modeling. The first section will look at the creation of Hardware components in C++. The Second section will highlight the benefits of a SystemC implementation. Lastly, a worked example will allow you to gain experience with the steps involved in the creation, and simulation, of a SystemC design. 

    标签: systemc

    上传时间: 2015-06-25

    上传用户:ycc‘eeworm

  • 多线程游戏

    /**  * 用于在逻辑和界面间传输数据的bean  * @version 1.0  */ public class DataBean {     private int first = -1;     private int Second = -1;     public int getFirst() {         return first;     }     public int getSecond() {         return Second;     }     public void setFirst(int firt) {         this.first = firt;     }     public void setSecond(int Second) {         this.Second = Second;     }     /**      * 将1,2次均置为初始状态

    标签: 多线程小游戏 翻牌小游戏

    上传时间: 2015-11-07

    上传用户:dddhhhwww