亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

do-while

  • I often need a simple function generator. Just to generate a certain frequency. After all the years

    I often need a simple function generator. Just to generate a certain frequency. After all the years I ve worked with electronics, I still haven t got me one. Even though I need it now and then, I just couldn t seem to justify the cost of one. So, standard solution - build one yourself. I designed a simple sinewave generator based on a Analog Devices AD9832 chip. It will generate a sinewave from 0.005 to 12 MHz in 0.005 Hz steps. That s pretty good, and definitely good enough for me ! But while waiting for the AD9832 chip to arrive, I came up with a very simple version of the DDS synth, using just the 2313 and a resistor network.

    標簽: frequency generator function generate

    上傳時間: 2013-12-17

    上傳用戶:thesk123

  • fwknop stands for "Firewall Knock Operator" and is an upcoming piece of software that will be releas

    fwknop stands for "Firewall Knock Operator" and is an upcoming piece of software that will be released at the DEFCON 12 conference in July, 2004 in Las Vegas. fwknop implements network access controls (via iptables) based on a flexible port knocking mini-language, but with a twist it combines port knocking and passive operating system fingerprinting to make it possible to do things like only allow, say, Linux-2.4/2.6 systems to connect to your SSH daemon. fwknop supports shared, multi-protocol port knock sequences along with both relative and absolute timeouts, and coded port knock sequences encrypted with the Rijndael block cipher.

    標簽: Firewall Operator software upcoming

    上傳時間: 2016-12-04

    上傳用戶:牛津鞋

  • The TMS320LF240xA and TMS320LC240xA devices, new members of the TMS320C24x generation of dig

    The TMS320LF240xA and TMS320LC240xA devices, new members of the TMS320C24x generation of digital signal processor (DSP) controllers, are part of the TMS320C2000 platform of fixed-point DSPs. The 240xA devices offer the enhanced TMS320 DSP architectural design of the C2xx core CPU for low-cost, low-power, and high-performance processing capabilities. Several advanced peripherals, optimized for digital motor and motion control applications, have been integrated to provide a true single-chip DSP controller. While code-compatible with the existing C24x DSP controller devices, the 240xA offers increased processing performance (40 MIPS) and a higher level of peripheral integration. See the TMS320x240xA Device Summary section for device-specific features.

    標簽: TMS 320 generation 240

    上傳時間: 2013-12-16

    上傳用戶:GavinNeko

  • * Lightweight backpropagation neural network. * This a lightweight library implementating a neura

    * Lightweight backpropagation neural network. * This a lightweight library implementating a neural network for use * in C and C++ programs. It is intended for use in applications that * just happen to need a simply neural network and do not want to use * needlessly complex neural network libraries. It features multilayer * feedforward perceptron neural networks, sigmoidal activation function * with bias, backpropagation training with settable learning rate and * momentum, and backpropagation training in batches.

    標簽: backpropagation implementating Lightweight lightweight

    上傳時間: 2013-12-27

    上傳用戶:清風冷雨

  • MyTask、YouTask和ThreeTask 。在主函數中創建任務MyTask。而YouTask和ThreeTask由任務MyTaskTask創建

    MyTask、YouTask和ThreeTask 。在主函數中創建任務MyTask。而YouTask和ThreeTask由任務MyTaskTask創建,其優先級分別為2、4、6。這三個任務都要占用資源s,任務YouTask訪問時間短一些,在任務MyTask和任務ThreeTask利用while(OSTime<T) {}增加訪問時間,T值分別為300,500。MyTask、YouTask和ThreeTask采用OSTimeDly(K)延時等待,K值均為200。這樣出現任務優先級反轉。為了解決優先級反轉,設計何種信號量既解決此問題。請先指出任務優先級反轉出現在哪里? 后顯示克服過程

    標簽: ThreeTask YouTask MyTask MyTaskTask

    上傳時間: 2016-12-23

    上傳用戶:tb_6877751

  • Batch version of the back-propagation algorithm. % Given a set of corresponding input-output pairs

    Batch version of the back-propagation algorithm. % Given a set of corresponding input-output pairs and an initial network % [W1,W2,critvec,iter]=batbp(NetDef,W1,W2,PHI,Y,trparms) trains the % network with backpropagation. % % The activation functions must be either linear or tanh. The network % architecture is defined by the matrix NetDef consisting of two % rows. The first row specifies the hidden layer while the second % specifies the output layer. %

    標簽: back-propagation corresponding input-output algorithm

    上傳時間: 2016-12-27

    上傳用戶:exxxds

  • Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Ne

    Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Newton"). Also pruned (i.e., not fully % connected) networks can be trained. % % The activation functions can either be linear or tanh. The network % architecture is defined by the matrix NetDef , which has of two % rows. The first row specifies the hidden layer while the second % specifies the output layer.

    標簽: recursive prediction algorithm Gauss-Ne

    上傳時間: 2016-12-27

    上傳用戶:ljt101007

  • [解決方法] 對上述程序改動如下: 發送端: MMM SendBag ZeroMemory(&SendBag,sizeof(SendBag)) .............

    [解決方法] 對上述程序改動如下: 發送端: MMM SendBag ZeroMemory(&SendBag,sizeof(SendBag)) ............. int send = 0 while(send<sizeof(MMM)) { int nCharSend=send(m_hSocket,(char*)(&SendBag+send),sizeof(MMM)-send,0) send+=nCharSend } 接收端: MMM RecvBag ZeroMemory(&RecvBag,sizeof(RecvBag)) recv寫法同上while... 此方法適合傳送結構體的實現. 趕快試試看.

    標簽: SendBag ZeroMemory sizeof MMM

    上傳時間: 2013-12-03

    上傳用戶:三人用菜

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    標簽: vulnerabilities Introduction discovered undeniably

    上傳時間: 2014-01-05

    上傳用戶:yph853211

  • The worm will produce Arod.exe and " get to C: WINDOWS catalogue . After starting the machine again

    The worm will produce Arod.exe and " get to C: \WINDOWS catalogue . After starting the machine again , will put worm shelf Arod.exe into C: \, C:\WINDOWS,In zip file under WINDOWS \system32 , these three catalogues ,. As the user opens Outlook Express, the worm will search Outlook Express and accept a mail while inserting , and falsely use the person who sends one name and send the addressee for this mail of worm s mail automatically.

    標簽: catalogue starting produce WINDOWS

    上傳時間: 2013-12-18

    上傳用戶:wang5829

主站蜘蛛池模板: 连平县| 赣榆县| 犍为县| 阳江市| 宜章县| 左权县| 舒城县| 新化县| 汶川县| 彭水| 万源市| 本溪市| 赤峰市| 祥云县| 札达县| 大丰市| 通化市| 青冈县| 银川市| 盐源县| 西充县| 奎屯市| 瓮安县| 阿克陶县| 珲春市| 南昌县| 新丰县| 崇义县| 信阳市| 昌邑市| 柯坪县| 息烽县| 会泽县| 唐山市| 宣武区| 台州市| 和政县| 仁寿县| 浦江县| 石棉县| 申扎县|