搜索资源列表
Letting--LK
- Modelling and simulation of a DFIG wind generation system with storage and PV power injection on the dc-bus ppt
10_Wind_Turbine_Generators
- Modelling and simulation of a DFIG wind generation system with storage and PV power injection on the dc-bus wind tutrbine generators ppt
SpringJDBC
- springjdbc演示,spring持久层知识,包括注入数据源,jdbcTemplate操作数据库,jdbcTemplate以对象方式操作数据库-springjdbc demo, spring persistence of knowledge, including the injection of a data source, jdbcTemplate operation of the database, jdbcTemplate to manipulate database objects
Android-security
- 安卓安全机制,so注入和加壳技术简介,dex注入和加壳技术简介-Android security mechanisms, so injection and packers technical brief, dex injection and packers Technology Overview
06842614
- This asset originates from the tunneling injection being free of the subthreshold slope limit that fundamentally blocks the MOSFET [3]. Moreover, the limit of low ION in TFETs is wearing off, as drive currents around 100 ìA/ìm have been repor
BPT99
- Power flow regulation by use of UPFC’s injection model
ASPSQL
- ASP防SQL注入攻击程序 -ASP SQL injection attack prevention program
Havij-1.15-Pro-Advanced-SQL-Injection
- hacking tool that would check wesite vulnnerability
spring
- Android是一种基于Linux的自由及开放源代码的操作系统,主要使用于移动设备,如智能手机和平板电脑,由Google公司和开放手机联盟领导及开发。尚未有统一中文名称,中国大陆地区较多人使用“安卓”或“安致”。Android操作系统最初由Andy Rubin开发,主要支持手机。2005年8月由Google收购注资。2007年11月,Google与84家硬件制造商、软件开发商及电信营运商组建开放手机联盟共同研发改良Android系统。随后Google以Apache开源许可证的授权方式,发布了An
WaterFilling_alg
- 注水算法是根据某种准则,并根据信道状况对发送功率进行自适应分配,通常是信道状况好的时刻, 多分配功率,信道差的时候,少分配功率,从而最大化传输速率。实现功率的“注水分配,发送端必须知道CSI-To allocate power, channel is poor, less power distribution, so as to maximize the transmission rate. Implementation power of the water injection alloc
zhuru
- 易语言输入法一键注入程序源码 附带输入法模块 -Easy language input a key source injection procedure included with input module
threephaseinverterTHISPWM
- Threephaseinverter using Third Harmonic Injection
783278786476sql_zhuruwendang
- 介绍SQL注入的多个网络地址,很适合SQL初学者参考-Introduce multiple network addresses, SQL injection is very suitable for beginners reference SQL!!!!!
web-malware
- Vulnerability detection tools are frequently considered the silver-bullet for detecting vulnerabilities in web services. However, research shows that the effectiveness of most of those tools is very low and that using the wrong tool may lead
Matlab44
- Analysis and Modelling of Static Synchronous Compensator (STATCOM): A comparison of Power Injection and Current Injection Models in Power Flow Study
Documento_completo-
- Analysis and Modelling of Static Synchronous Compensator (STATCOM): A comparison of Power Injection and Current Injection Models in Power Flow Study
Online-transformer-mornitoring
- Online transformer condition monitoring techniques based on transfer function methods, such as transmission-line diagnostics and swept frequency-response analysis, require the injection of a known test signal into the transformer
Document
- Against Double Fault Attacks: Injection Effort Model, Space and Time Randomization Based Countermeasures for Reconfigurable Array Architecture
fake_msxfs-master
- fake mx xfs library for injection
khnizrou-larbi-2016
- fergtigation injection direcy