Summary Many control applications require converting some analog input to a digital format. The ADCINC12 User Module is a general-purpose, 12-bit analog to digital converter (ADC) that does just that. This Application Note is meant to be a simple introduction into its operation. The steps required to define, place, and write software are presented. Examples are developed in both assembly and C.
标签: applications converting Summary control
上传时间: 2013-12-01
上传用户:WMC_geophy
This book reflects the efforts of a number of experienced Linux professionals to prepare for the LPIC-2 beta-exam. It is -- and always will be -- a work in progress.
标签: professionals experienced the reflects
上传时间: 2014-01-10
上传用户:拔丝土豆
Application (fix point) for playing MP3 data on embedded systems. mp3play is designed to be able to play mp3 data files within the local filesystem (which can be a network filesystem), or fetch files to play via http over a network. For the http case the address can specify a streaming MP3 server.
标签: Application embedded designed playing
上传时间: 2016-07-10
上传用户:520
Whenever there is an application to write, breaking it up to small pieces is a great idea. The smallest piece of any application would probably be a data object, or a simple Bean in Java. Java Beans are simple Java classes that have a distinctive look and behavior. Their simplest purpose is to contain data and they accomplish this by having properties. Each property is actually a data-member containing/referencing the actual data and a couple of methods, a getter method and a setter method. Thus, the simplest data-bean describing a person could be expressed as such:
标签: small application Whenever breaking
上传时间: 2016-11-07
上传用户:lingzhichao
The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.
标签: cryptography literature has Secrecy
上传时间: 2016-12-08
上传用户:fxf126@126.com
Custom Visual Basic Packager and Installer for Visual Basic Developers. This is a group of standard exe projects 1. Packager 2. Setup1 The packager works like Visual basic Application deployment Wizard. And the setup1 project is used for the installation of the package. This project demonstrates how to compile visual basic project without launching the Vb6 kit and retrieving the dependency Files of any Visual basic project (although roughly done without any specific algorithm), Somebody can help me with this. I don’ t have time for the project, so I don’ t want any comment on the code indentation or arrangement and variable scoping. Comments are in the code therefore it would not be a problem to understand the code. If anyone wants to vote, I will like it Oh! I found some of the setup1 code and modify it with new features, so i have no or less credit for the setup1 project I felt like sharing code with PSCites. Thats why I made it
标签: Visual Basic Developers Installer
上传时间: 2017-02-26
上传用户:FreeSky
Introduction Sometimes you may collide with the following problem: a third-party binary component or control embedded into your application displays windows (usually message boxes) that hang your code until they are closed. If you do not have the source code of this binary and one does not have a good API to change one’s bad behaviour programmatically, it can be a real headache using the one. A famous example of such a binary is the WebBrowser control in .NET.
标签: Introduction third-party Sometimes following
上传时间: 2013-12-31
上传用户:pinksun9
This book has been written to support a practically oriented course in programming language translation for senior undergraduates in Computer Science. More specifically, it is aimed at students who are probably quite competent in the art of imperative programming (for example, in C++, Pascal, or Modula-2), but whose mathematics may be a little weak students who require only a solid introduction to the subject, so as to provide them with insight into areas of language design and implementation, rather than a deluge of theory which they will probably never use again students who will enjoy fairly extensive case studies of translators for the sorts of languages with which they are most familiar students who need to be made aware of compiler writing tools, and to come to appreciate and know how to use them. It will hopefully also appeal to a certain class of hobbyist who wishes to know more about how translators work.
标签: practically programming oriented language
上传时间: 2013-12-10
上传用户:我干你啊
Abstract - A fl exible multiscale and directional representation for images is proposed. The scheme combines directional fi lter banks with the Laplacian pyramid to provides a sparse representation for two- dimensional piecewise smooth signals resembling images. The underlying expansion is a frame and can be designed to be a tight frame. Pyramidal directional fi lter banks provide an effective method to implement the digital curvelet transform. The regularity issue of the iterated fi lters in the directional fi lter bank is examined.
标签: representation directional multiscale Abstract
上传时间: 2013-12-15
上传用户:zxc23456789
A flasher for old nokia phones.you need to use a special interface for that not ptovided here in doc.But is proved to be a good source info for thouse who want to start comunicate with a gsm phone
标签: for interface ptovided flasher
上传时间: 2017-08-21
上传用户:xinzhch