虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

do-while

  • I often need a simple function generator. Just to generate a certain frequency. After all the years

    I often need a simple function generator. Just to generate a certain frequency. After all the years I ve worked with electronics, I still haven t got me one. Even though I need it now and then, I just couldn t seem to justify the cost of one. So, standard solution - build one yourself. I designed a simple sinewave generator based on a Analog Devices AD9832 chip. It will generate a sinewave from 0.005 to 12 MHz in 0.005 Hz steps. That s pretty good, and definitely good enough for me ! But while waiting for the AD9832 chip to arrive, I came up with a very simple version of the DDS synth, using just the 2313 and a resistor network.

    标签: frequency generator function generate

    上传时间: 2013-12-17

    上传用户:thesk123

  • fwknop stands for "Firewall Knock Operator" and is an upcoming piece of software that will be releas

    fwknop stands for "Firewall Knock Operator" and is an upcoming piece of software that will be released at the DEFCON 12 conference in July, 2004 in Las Vegas. fwknop implements network access controls (via iptables) based on a flexible port knocking mini-language, but with a twist it combines port knocking and passive operating system fingerprinting to make it possible to do things like only allow, say, Linux-2.4/2.6 systems to connect to your SSH daemon. fwknop supports shared, multi-protocol port knock sequences along with both relative and absolute timeouts, and coded port knock sequences encrypted with the Rijndael block cipher.

    标签: Firewall Operator software upcoming

    上传时间: 2016-12-04

    上传用户:牛津鞋

  • The TMS320LF240xA and TMS320LC240xA devices, new members of the TMS320C24x generation of dig

    The TMS320LF240xA and TMS320LC240xA devices, new members of the TMS320C24x generation of digital signal processor (DSP) controllers, are part of the TMS320C2000 platform of fixed-point DSPs. The 240xA devices offer the enhanced TMS320 DSP architectural design of the C2xx core CPU for low-cost, low-power, and high-performance processing capabilities. Several advanced peripherals, optimized for digital motor and motion control applications, have been integrated to provide a true single-chip DSP controller. While code-compatible with the existing C24x DSP controller devices, the 240xA offers increased processing performance (40 MIPS) and a higher level of peripheral integration. See the TMS320x240xA Device Summary section for device-specific features.

    标签: TMS 320 generation 240

    上传时间: 2013-12-16

    上传用户:GavinNeko

  • * Lightweight backpropagation neural network. * This a lightweight library implementating a neura

    * Lightweight backpropagation neural network. * This a lightweight library implementating a neural network for use * in C and C++ programs. It is intended for use in applications that * just happen to need a simply neural network and do not want to use * needlessly complex neural network libraries. It features multilayer * feedforward perceptron neural networks, sigmoidal activation function * with bias, backpropagation training with settable learning rate and * momentum, and backpropagation training in batches.

    标签: backpropagation implementating Lightweight lightweight

    上传时间: 2013-12-27

    上传用户:清风冷雨

  • MyTask、YouTask和ThreeTask 。在主函数中创建任务MyTask。而YouTask和ThreeTask由任务MyTaskTask创建

    MyTask、YouTask和ThreeTask 。在主函数中创建任务MyTask。而YouTask和ThreeTask由任务MyTaskTask创建,其优先级分别为2、4、6。这三个任务都要占用资源s,任务YouTask访问时间短一些,在任务MyTask和任务ThreeTask利用while(OSTime<T) {}增加访问时间,T值分别为300,500。MyTask、YouTask和ThreeTask采用OSTimeDly(K)延时等待,K值均为200。这样出现任务优先级反转。为了解决优先级反转,设计何种信号量既解决此问题。请先指出任务优先级反转出现在哪里? 后显示克服过程

    标签: ThreeTask YouTask MyTask MyTaskTask

    上传时间: 2016-12-23

    上传用户:tb_6877751

  • Batch version of the back-propagation algorithm. % Given a set of corresponding input-output pairs

    Batch version of the back-propagation algorithm. % Given a set of corresponding input-output pairs and an initial network % [W1,W2,critvec,iter]=batbp(NetDef,W1,W2,PHI,Y,trparms) trains the % network with backpropagation. % % The activation functions must be either linear or tanh. The network % architecture is defined by the matrix NetDef consisting of two % rows. The first row specifies the hidden layer while the second % specifies the output layer. %

    标签: back-propagation corresponding input-output algorithm

    上传时间: 2016-12-27

    上传用户:exxxds

  • Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Ne

    Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Newton"). Also pruned (i.e., not fully % connected) networks can be trained. % % The activation functions can either be linear or tanh. The network % architecture is defined by the matrix NetDef , which has of two % rows. The first row specifies the hidden layer while the second % specifies the output layer.

    标签: recursive prediction algorithm Gauss-Ne

    上传时间: 2016-12-27

    上传用户:ljt101007

  • [解决方法] 对上述程序改动如下: 发送端: MMM SendBag ZeroMemory(&SendBag,sizeof(SendBag)) .............

    [解决方法] 对上述程序改动如下: 发送端: MMM SendBag ZeroMemory(&SendBag,sizeof(SendBag)) ............. int send = 0 while(send<sizeof(MMM)) { int nCharSend=send(m_hSocket,(char*)(&SendBag+send),sizeof(MMM)-send,0) send+=nCharSend } 接收端: MMM RecvBag ZeroMemory(&RecvBag,sizeof(RecvBag)) recv写法同上while... 此方法适合传送结构体的实现. 赶快试试看.

    标签: SendBag ZeroMemory sizeof MMM

    上传时间: 2013-12-03

    上传用户:三人用菜

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    标签: vulnerabilities Introduction discovered undeniably

    上传时间: 2014-01-05

    上传用户:yph853211

  • The worm will produce Arod.exe and " get to C: WINDOWS catalogue . After starting the machine again

    The worm will produce Arod.exe and " get to C: \WINDOWS catalogue . After starting the machine again , will put worm shelf Arod.exe into C: \, C:\WINDOWS,In zip file under WINDOWS \system32 , these three catalogues ,. As the user opens Outlook Express, the worm will search Outlook Express and accept a mail while inserting , and falsely use the person who sends one name and send the addressee for this mail of worm s mail automatically.

    标签: catalogue starting produce WINDOWS

    上传时间: 2013-12-18

    上传用户:wang5829