搜索资源列表
SiRF_Binary_Protocol
- SiRF protocol manual for you to communicate with GPS module
HPL-2001-246GreatComplexityreduction
- Simplified Soft-Output Demapper for Binary Interleaved COFDM with Application to HIPERLAN/2
100000
- 数制转换,将十进制整数N转换为d进制,其转换步骤是重复以下两步,知道N等于0-Number system conversion, the d decimal integer N is converted to binary, its conversion step is to repeat the following two steps, know that N is equal to 0
pipeilvboqi
- 通过采用神经网络中的Clipping方法和MonteCarlo修改学习算法,对用于光学模式识别的纯相位二值化匹配滤波器进行了优化设计。计算机模拟结果表明,和传统的纯相位匹配滤波器的相关输出结果相比,其识别输出的信噪比和信号相关峰值得到了明显的提高,从而为今后的光学实现奠定了良好的基础。-Through the use of neural network methods and MonteCarlo modify Clipping learning algorithm for optical pa
file1
- this code converts a deciman number to binary in c
Viterb
- viterb算法是卷积码中重要的一种译码算法,程序中用MATLAB实现了VITERB的译码算法,并且写了信道编码程序和二进制码通过以p概率错误的信道程序-viterb algorithm is important as a convolutional code decoding algorithm, the program using MATLAB to achieve a VITERB the decoding algorithm, and wrote letters Road, binary
txt2BinttQ
- text to binary converter
folding_encoding_scheme
- Efficient way of coding FI-ADC. Output of FI_ADC is in gray code format. Gray to binary coding of FI-ADC
ftpput
- 一个linux下perl写的ftpput脚本,看源码,注意binary方式,修改一下.-Under a linux perl scr ipt written by ftpput to see source code, pay attention to binary mode, change it.
8421BCD
- 8421bcd 编码 把十进制数字转换为8421bcd型二进制序列,例如11=00010001-8421bcd coded decimal numbers into 8421bcd the type of binary sequences, such as 11 = 00010001
vi
- 本VI,是在labview环境开发。16进制到二进制原码、反码、补码计算-Hexadecimal to binary of the original code, anti-code complement calculation
From-ADS-to-MDK
- 很多嵌入式系统开发工程师对ARM的老版本开发工具ADS1.2非常熟悉,而RVMDK与ADS相比较,从外观、仿真流程以及内部二进制编译链接工具上都有了不少改进,用法稍有不同。本文的主旨是介绍通用的流程,以及一些注意事项,帮助ADS1.2用户将老的,遗留的ADS1.2工程转化成在RVMDK上进行开发调试的工程。-Many embedded systems development engineer ADS1.2 old version of the ARM development tools are
binary
- 面向源程序(Source Code)漏洞挖掘的研究历史已经相当悠久并取得显著进 展。然而,出于商业利益、知识产权保护等原因,大部分软件厂商不对外提供源 程序;有些厂商虽然提供了源程序,但源程序和实际系统之间的对应关系无从验 证。另外,源程序级的漏洞分析也无法发现编译、链接过程引入的漏洞。因此直 接面向二进制程序的安全漏洞挖掘研究具有重要的意义。-Mining history-oriented source code (Source Code) vulnerability has
num_util
- float to binary conversion using matlab
optimal-binary-tree
- 这个程序通过dp来构建最优的二叉树,使得效率更好,将高概率的结点放在高处。通过o(n^2)实现。-To build this program by dp optimal binary tree, making better efficiency, the high probability of the node on the height. O (n ^ 2).
DES
- The Data Encryption Standard (DES) shall consist of the following Data Encryption Algorithm (DE S) and Triple Data Encryption Algorithm ( TDEA, as described in ANSI X9.52). These devices shall be designed in such a way that they may be used in
Binary-conversion
- 设计算法把一个十进制数转换为二至九进制之间的任一进制数输出-Design algorithm to convert a decimal number to any output of a decimal number between two to nine decimal
a
- vb编写的进制转换程序源码,可以实现十六进制转换为二进制、二进制转化为十六进制、十六进制转化为十进制、八进制转化为十进制、二进制转化为十进制、十进制转化为十六进制、十进制转化为八进制、十进制转化为二-vb prepared by the hex conversion program source code, can be achieved hex conversion to binary, binary into hexadecimal, converted to hex decimal, oc
Binary-Patch-Comparison
- 针对软件二进制补丁分析过程,提出一种指令归一化算法,用于判别补丁前后的相应基本块内指令是否发生重排序-Aiming at the analyzing process of software binary patch, this paper proposes an instruction normalization algorithm to distinguish whether the corresponding basic blocks are reordered
dsp1
- matlab实现十进制转为二进制的小程序,并且含有一篇定点数除法的论文-matlab decimal to binary program, and contains a fixed number of points of division papers