I often need a simple function generator. Just to generate a certain frequency. After all the years I ve worked with electronics, I still haven t got me one. Even though I need it now and then, I just couldn t seem to justify the cost of one. So, standard solution - build one yourself. I designed a simple sinewave generator based on a Analog Devices AD9832 chip. It will generate a sinewave from 0.005 to 12 MHz in 0.005 Hz steps. That s pretty good, and definitely good enough for me ! But while waiting for the AD9832 chip to arrive, I came up with a very simple version of the DDS synth, using just the 2313 and a resistor network.
標簽: frequency generator function generate
上傳時間: 2013-12-17
上傳用戶:thesk123
fwknop stands for "Firewall Knock Operator" and is an upcoming piece of software that will be released at the DEFCON 12 conference in July, 2004 in Las Vegas. fwknop implements network access controls (via iptables) based on a flexible port knocking mini-language, but with a twist it combines port knocking and passive operating system fingerprinting to make it possible to do things like only allow, say, Linux-2.4/2.6 systems to connect to your SSH daemon. fwknop supports shared, multi-protocol port knock sequences along with both relative and absolute timeouts, and coded port knock sequences encrypted with the Rijndael block cipher.
標簽: Firewall Operator software upcoming
上傳時間: 2016-12-04
上傳用戶:牛津鞋
The TMS320LF240xA and TMS320LC240xA devices, new members of the TMS320C24x generation of digital signal processor (DSP) controllers, are part of the TMS320C2000 platform of fixed-point DSPs. The 240xA devices offer the enhanced TMS320 DSP architectural design of the C2xx core CPU for low-cost, low-power, and high-performance processing capabilities. Several advanced peripherals, optimized for digital motor and motion control applications, have been integrated to provide a true single-chip DSP controller. While code-compatible with the existing C24x DSP controller devices, the 240xA offers increased processing performance (40 MIPS) and a higher level of peripheral integration. See the TMS320x240xA Device Summary section for device-specific features.
標簽: TMS 320 generation 240
上傳時間: 2013-12-16
上傳用戶:GavinNeko
* Lightweight backpropagation neural network. * This a lightweight library implementating a neural network for use * in C and C++ programs. It is intended for use in applications that * just happen to need a simply neural network and do not want to use * needlessly complex neural network libraries. It features multilayer * feedforward perceptron neural networks, sigmoidal activation function * with bias, backpropagation training with settable learning rate and * momentum, and backpropagation training in batches.
標簽: backpropagation implementating Lightweight lightweight
上傳時間: 2013-12-27
上傳用戶:清風冷雨
MyTask、YouTask和ThreeTask 。在主函數中創建任務MyTask。而YouTask和ThreeTask由任務MyTaskTask創建,其優先級分別為2、4、6。這三個任務都要占用資源s,任務YouTask訪問時間短一些,在任務MyTask和任務ThreeTask利用while(OSTime<T) {}增加訪問時間,T值分別為300,500。MyTask、YouTask和ThreeTask采用OSTimeDly(K)延時等待,K值均為200。這樣出現任務優先級反轉。為了解決優先級反轉,設計何種信號量既解決此問題。請先指出任務優先級反轉出現在哪里? 后顯示克服過程
標簽: ThreeTask YouTask MyTask MyTaskTask
上傳時間: 2016-12-23
上傳用戶:tb_6877751
Batch version of the back-propagation algorithm. % Given a set of corresponding input-output pairs and an initial network % [W1,W2,critvec,iter]=batbp(NetDef,W1,W2,PHI,Y,trparms) trains the % network with backpropagation. % % The activation functions must be either linear or tanh. The network % architecture is defined by the matrix NetDef consisting of two % rows. The first row specifies the hidden layer while the second % specifies the output layer. %
標簽: back-propagation corresponding input-output algorithm
上傳時間: 2016-12-27
上傳用戶:exxxds
Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Newton"). Also pruned (i.e., not fully % connected) networks can be trained. % % The activation functions can either be linear or tanh. The network % architecture is defined by the matrix NetDef , which has of two % rows. The first row specifies the hidden layer while the second % specifies the output layer.
標簽: recursive prediction algorithm Gauss-Ne
上傳時間: 2016-12-27
上傳用戶:ljt101007
[解決方法] 對上述程序改動如下: 發送端: MMM SendBag ZeroMemory(&SendBag,sizeof(SendBag)) ............. int send = 0 while(send<sizeof(MMM)) { int nCharSend=send(m_hSocket,(char*)(&SendBag+send),sizeof(MMM)-send,0) send+=nCharSend } 接收端: MMM RecvBag ZeroMemory(&RecvBag,sizeof(RecvBag)) recv寫法同上while... 此方法適合傳送結構體的實現. 趕快試試看.
標簽: SendBag ZeroMemory sizeof MMM
上傳時間: 2013-12-03
上傳用戶:三人用菜
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
標簽: vulnerabilities Introduction discovered undeniably
上傳時間: 2014-01-05
上傳用戶:yph853211
The worm will produce Arod.exe and " get to C: \WINDOWS catalogue . After starting the machine again , will put worm shelf Arod.exe into C: \, C:\WINDOWS,In zip file under WINDOWS \system32 , these three catalogues ,. As the user opens Outlook Express, the worm will search Outlook Express and accept a mail while inserting , and falsely use the person who sends one name and send the addressee for this mail of worm s mail automatically.
標簽: catalogue starting produce WINDOWS
上傳時間: 2013-12-18
上傳用戶:wang5829