虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

V-by-ONE

  • LINEINTRGAL Line Integral in a 2D Vector Field. LINEINTRGAL(X,Y,U,V,C) computes the line integral a

    LINEINTRGAL Line Integral in a 2D Vector Field. LINEINTRGAL(X,Y,U,V,C) computes the line integral along the lines given in cell array C. X and Y define the coordinates of a rectangular grid over which U and V are defined. X and Y must be monotonic and 2D plaid as % produced by MESHGRID. X, Y, U, and V must all be the same size.

    标签: LINEINTRGAL Integral computes integral

    上传时间: 2014-01-13

    上传用户:hwl453472107

  • Securing Apache 2: Step-by-Step When choosing a web server, Apache very often wins against its co

    Securing Apache 2: Step-by-Step When choosing a web server, Apache very often wins against its competitors because of stability, performance, that fact that it s open source, and many other advantages. But when deciding on which version of Apache to use, the choice is not always so simple. On the one hand there is a very popular, stable version used by millions of users, version 1.3, and on the other hand, there is an enhanced and re-designed version 2.0.

    标签: Apache Step-by-Step Securing choosing

    上传时间: 2015-09-06

    上传用户:gundamwzc

  • performs one of the matrix-vector operations y := alpha*A*x + beta*y, or y := alpha*A *x + beta*y, w

    performs one of the matrix-vector operations y := alpha*A*x + beta*y, or y := alpha*A *x + beta*y, where alpha and beta are scalars, x and y are vectors and A is an m by n matrix

    标签: alpha beta matrix-vector operations

    上传时间: 2014-08-17

    上传用户:qlpqlq

  • data array sdword 2 dup(?) str1 byte "Please input one 32-bit sign number :",0dh,0ah,0 str2 by

    data array sdword 2 dup(?) str1 byte "Please input one 32-bit sign number :",0dh,0ah,0 str2 byte "The result is : ",0 align 4 jia1gao sdword 0 jia1 sdword 0 .code main proc call clrscr mov esi,offset array mov ecx,lengthof array mov edx,offset str1 push esi putin: call writestring

    标签: Please sdword number array

    上传时间: 2014-01-13

    上传用户:xiaoyunyun

  • %DEFINEV Scaling vector and derivative % % [v,dv]= DEFINEV(g,x,l,u) returns v, distances to the %

    %DEFINEV Scaling vector and derivative % % [v,dv]= DEFINEV(g,x,l,u) returns v, distances to the % bounds corresponding to the sign of the gradient g, where % l is the vector of lower bounds, u is the vector of upper % bounds. Vector dv is 0-1 sign vector (See ?? for more detail.) % % Copyright (c) 1990-98 by The MathWorks, Inc. % $Revision: 1.2 $ $Date: 1998/03/21 16:29:10 $

    标签: DEFINEV derivative distances Scaling

    上传时间: 2013-12-24

    上传用户:sz_hjbf

  • UCOS/II for ICCAVR - The version of UCOS/II is 2.04 - the original port was done by Ole Saether

    UCOS/II for ICCAVR - The version of UCOS/II is 2.04 - the original port was done by Ole Saether for the IAR compiler. Jens E. Holtegaard ported one version using ICCAVR. Joerg Meyer did another port (using Jens port as a start?). This is basically Joerg s port plus a little bit of changes and documentation by me. - YOU MUST DOWNLOAD THE MAIN PART OF THE UCOS/II FROM THE UCOS/II WEBSITE http://www.ucos-ii.com . The supplied project file assumes the portable source is in the ..\source directory. - Joerg has written couple document showing the stack frames etc. but it is in German :-) They are included in this directory. - The Timer2 overflow interrupt is used for Timer Tick. If you want to change that, modify os_cpu_c.c and os_cpu_a.s - I have tested this using ATMega103 with and without external RAM using AVR Studio simulator. See test1.c test program. Both Code Compressed (PRO) and STD versions have been tested.

    标签: UCOS original Saether version

    上传时间: 2015-11-14

    上传用户:ippler8

  • What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the poss

    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)

    标签: Sometimes the contents desire

    上传时间: 2013-12-25

    上传用户:playboys0

  • This example streams input from a ADC source to a DAC. An analog signal is acquired block-by-block

    This example streams input from a ADC source to a DAC. An analog signal is acquired block-by-block into SDRAM from the ADC (an AD9244 in this example). The frames are then output with a one-frame delay to the DAC (an AD9744 in this example). In this example, no processing is done on the frames. They are passed unaltered.

    标签: block-by-block acquired example streams

    上传时间: 2015-12-29

    上传用户:bjgaofei

  • TFIND searches for one or more strings (boolean AND) in a text file. TFIND reports all lines whe

    TFIND searches for one or more strings (boolean AND) in a text file. TFIND reports all lines where the string(s) were found (or NOT found by option). The search can be limited to a field in a fixed field (i.e. column oriented) list. An extended search mode is available, where only letters and digits are relevant. Other options: case sensitive search, alternative errorlevel with number of hits, header line with file name, LFN, custom prefix

    标签: TFIND searches boolean reports

    上传时间: 2016-01-24

    上传用户:lindor

  • TinyLogin is a suite of tiny Unix utilities for handling logging into, being authenticated by, chan

    TinyLogin is a suite of tiny Unix utilities for handling logging into, being authenticated by, changing one s password for, and otherwise maintaining users and groups on an embedded system. It also provides shadow password support to enhance system security. TinyLogin is, as the name implies, very small, and makes an excellent complement to BusyBox on an embedded System. It can be used without BusyBox, of course, but I envision them being used together most of the time.

    标签: authenticated TinyLogin utilities handling

    上传时间: 2016-01-30

    上传用户:253189838