this file Viterbi_Hard_decision.rar has corder,decorder,noise,have all chinese explain you can easy understand function
标签: Viterbi_Hard_decision decorder chinese explain
上传时间: 2014-01-09
上传用户:yoleeson
AVR USART串口使用的一个范例 编译器:GCC 工具: C && ASM 芯片:ATMEL的ATMEGA系列
上传时间: 2015-09-03
上传用户:hustfanenze
This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 译作:《黑客入侵的艺术》,也是从朋友的宝箱中搜来的,以前层大致浏览过,是难得一件的好资料。
标签: introduces the hacking science
上传时间: 2013-12-28
上传用户:离殇
这个PH10有双接口的ASM程序,P3。0是第二个时钟,先接在多余的245脚上,然后引到板上就能显示完整的字了
上传时间: 2013-12-10
上传用户:wys0120
JDiff is a Javadoc doclet which generates an HTML report of all the packages, classes, constructors, methods, and fields which have been removed, added or changed in any way, including their documentation, when two APIs are compared. This is very useful for describing exactly what has changed between two releases of a product. Only the API (Application Programming Interface) of each version is compared. It does not compare what the source code does when executed.
标签: constructors generates packages Javadoc
上传时间: 2015-09-06
上传用户:lijianyu172
2005 Center for Biological & Computational Learning at MIT and MIT All rights reserved. Permission to copy and modify this data, software, and its documentation only for internal research use in your organization is hereby granted, provided that this notice is retained thereon and on all copies. This data and software should not be distributed to anyone outside of your organization without explicit written authorization by the author(s) and MIT.
标签: Computational Biological MIT Permissio
上传时间: 2014-01-27
上传用户:gaome
此是本人调试成功的用ASm汇编写的 IIC EEPROM 的程序,不会的可以借鉴一下。
上传时间: 2013-12-10
上传用户:yd19890720
运行于80C196上的浮点运算程序asm
上传时间: 2014-01-15
上传用户:kernaling
rINTCON=0x5 //Non-vectored,IRQ enable,FIQ disable rINTMOD=0x0 //All=IRQ mode
标签: Non-vectored IRQ rINTCON disable
上传时间: 2013-12-17
上传用户:thuyenvinh
Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incoming and outgoing network traffic – for each packet: – Analyze 4-tuple and protocol – Examine contents
标签: Intrusion Detection Host-based Network
上传时间: 2014-01-11
上传用户:ikemada