- viscoPLAST_CFEM dj owen 塑性有限元的随书源代码
- BL_SIG_SEP matlab code for blinde signal separation
- 06291539ffmpeg(vc) ffmpeg提取的h264解码代码
- Demo3 public static String dbDriver="org.gjt.mm.mysql.Driver" public static String url="jdbc:mysql://localhost:3306/Amy" public static String user="root"
- Lidar lidar点云滤波的算法实现
- dfig Sensor
资源列表
can-bus
- 此文档是详细介绍了关于Can bus的有关内容,包括Can总线的信息帧格式,传输方式等等,使得读者可以尽快的熟悉Can总线的有关知识。-This document is described in detail on the Can bus related content, including information on Can-bus frame format, transmission, etc., making the reader familiar with Can-bus as soo
linuxKernelDriverDesign
- linux内核以及驱动程序设计指导资料,是linux学习,开发的很好资料.-linux kernel and driver design guide data is linux learning, the development of good information.
c
- 关于用实验法和C语言编程法排列典型Gray码的文章-On the experimental method and C language programming method typical of Gray code ordered the article
QAMTHESIS
- In this age of IT revolution, connectivity has become a serious need for information transfer with Internet and intranet requiring exceptionally high bandwidths. A serious aspect of connectivity is the wide area network. For these applications we hav
RFIDLF128KHZDESIGN
- In this age of IT revolution, connectivity has become a serious need for information transfer with Internet and intranet requiring exceptionally high bandwidths. A serious aspect of connectivity is the wide area network. For these applications we hav
modbus
- modbus协议介绍,含相关效验方法介绍-modbus protocol introduced method of descr iption with the relevant efficacy
PEG.tar
- to generate progressive edge growth algorithm
runmen_JavaScript
- 一本非常经典的js入门文档 power point-a document about js
2005_ISCAS_DigitalVLSIOFDMTransceiver
- Digital VLSI OFDM Transceiver
036
- dsp implementation of multiuser detection
Article_PBM.pdf
- this article "Modelo de Ciclo de Vida de las Políticas para la Gestión de Redes de Telecomunicaciones" describes the policy life cycle for creating policies in the management of telecommunications networks.Autors:Adriana Gustin, Oscar Calderon and Ca
CloneDetection-ICDCS2008
- In this paper, we propose a novel scheme for detecting clone attacks in sensor networks, which computes for each sensor a social fingerprint by extracting the neighborhood characteristics, and verifies the legitimacy of the originator for eac