motorola 1.4" CSTN LCD test program. Drive IC: SSD17
标签: motorola program Drive CSTN
上传时间: 2015-06-23
上传用户:ryb
This just a test src.
上传时间: 2014-02-28
上传用户:wangdean1101
这篇文章主要介绍ARM JTAG调试的基本原理。基本的内容包括了TAP (TEST ACCESS PORT) 和BOUNDARY-SCAN ARCHITECTURE的介绍,在此基础上,结合ARM7TDMI详细介绍了的JTAG调试原理。
标签: BOUNDARY-SCAN ARCHITECTURE ACCESS JTAG
上传时间: 2014-12-20
上传用户:上善若水
Creating JButtons.And test it
标签: Creating JButtons test And
上传时间: 2015-07-03
上传用户:宋桃子
The firmware test code for s3c2440
标签: firmware s3c2440 code test
上传时间: 2015-07-03
上传用户:jqy_china
- XCS for Dynamic Environments + Continuous versions of XCS + Test problem: real multiplexer + Experiments: XCS is explored in dynamic environments with different magnitudes of change to the underlying concepts. +Reference papers: H.H. Dam, H.A. Abbass, C.J. Lokan, Evolutionary Online Data Mining – an Investigation in a Dynamic Environment. 2005, accepted for a book chapter in Springer Series on Studies in Computational Intelligence H.H. Dam, H.A. Abbass, C.J. Lokan, Be Real! XCS with Continuous-Valued Inputs. IWLCS 2005, (International Workshop on Learning Classifier Systems). Washington DC, June 2005.
标签: Environments multiplexer Continuous XCS
上传时间: 2015-07-04
上传用户:Avoid98
AVL Tree implementation: I also included a test function to compare the AVL Tree performance with STL Set and Map. Compile the source mavltree.cpp and run it to see the result!
标签: Tree implementation performance AVL
上传时间: 2013-12-19
上传用户:3到15
文章主要介绍ARM JTAG调试的基本原理。基本的内容包括了TAP (TEST ACCESS PORT) 和BOUNDARY-SCAN ARCHITECTURE的介绍,在此基础上,结合ARM7TDMI详细介绍了的JTAG调试原理。
标签: BOUNDARY-SCAN ARCHITECTURE ACCESS JTAG
上传时间: 2014-10-26
上传用户:yxgi5
加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]
标签: Cryptographic Primitives generate Library
上传时间: 2015-07-16
上传用户:wqxstar
CPU Fan Test 适合很多机型
上传时间: 2015-07-17
上传用户:hjshhyy