- UraPIV 用matlab编写的关于流场测速的一个Demo
- A3 Function files in MATLAB for engineering constants for a lamina with a given arbitrary fiber orientation and given values of material data in the principal material directions.
- POJ1007 PKU ONLINEJUDGE 1007
- rjgc 软件工程设计报告及其设计要求方法 软件工程设计报告及其设计要求方法
- JXC 前些年写的一个残酷管理软件的PB代码
- hjndvinew IDL编写
资源列表
Graduation-design-_-papers
- 宿舍管理系统的毕业设计论文,给有需求的人-Graduation design _ papers
segmentfault
- 自己总结段错误的原因,并对段错误进行详细的分析。-Own summary of the wrong reasons, and paragraph errors detailed analysis.
Freescale
- 本文以第六届飞思卡尔杯智能汽车竞赛为背景详细介绍了智能车系统的软硬件结构和开 发流程。采用1:10 的仿真车模,以飞思卡尔半导体公司生产的16 位单片机MC9S12XS128 为核心控制器,在CodeWarrior IDE 开发环境中进行软件开发,使赛车在跑道上沿着黑线以最快的速度行驶-Freescale Cup Intelligent car race of the sixth as the background details of intelligent vehicle systems
lmn4op.ZIP
- 广播电视系统IC卡管理系统设计与应用Radio and television system IC card management system design and Application-Radio and television system IC card management system design and Application
Traditional-Software-to-SaaS
- 传统软件向SaaS软件转型方案的研究12321321-Research of Solution on Transforming Traditional Software to SaaS
EUROCon09
- this paper is about fusion data in cognitive radio networks. we utilize the neyman pearson for this perpose.
253
- this paper is about fusion data in cognitive radio networks. we utilize the neyman pearson for this perpose.
CS_Detecting_a_Vector
- 压缩传感理论中探测向量的检测任务,是一次更容易,更简单,比估计和支持复苏的任务不同。-Compressed sensing theory to detect vector detection task is a more easy, easier than the estimate, and support recovery tasks.
T-REC-P.83-199303-S!!PDF-E
- ITU-T P.83 document SUBJECTIVE PERFORMANCE ASSESSMENT OF TELEPHONE-BAND AND WIDEBAND DIGITAL CODECS -ITU-T P.83 document SUBJECTIVE PERFORMANCE ASSESSMENT OF TELEPHONE-BAND AND WIDEBAND DIGITAL CODECS
ws-wn513n2-b_v3
- rtl8192+rtl8196的无线路由原理图,目前市面上很流行的解决方案哦。-schematic of wifi ap/repeater
Tanenbaum---Operating-Systems-Design-and-Implemen
- tanenbaum operating system
faking-web-address
- This my thought of implimating or introduce a new way of hacking. This comes a result that now may people are now aware of the very intelligence hacking system which is fishing so here I introduced a new way of fishing which is not easily identified
