/*SPI规范:Data is always clocked into the device on the rising edge of SCK a-*/ /* nd clocked out of the device on the falling edge of SCK.All instruction-*/ /* s,addresses and data are transferred with the most significant bit(MSB) */ /* first.
资源简介:/*SPI规范:Data is always clocked into the device on the rising edge of SCK a-*/ /* nd clocked out of the device on the falling edge of SCK.All instruction-*/ /* s,addresses and data are transferred with the most significant bit(MSB) */...
上传时间: 2016-02-19
上传用户:远远ssad
资源简介:The main file in this list of programs is "vblast.m". Type "help vblast" on the command line for details.Study the coding by stepping through the program. These programs require around 5000 packets for reasonable plotting accuracy.This has...
上传时间: 2016-08-24
上传用户:wcl168881111111
资源简介:The file is used to show the number on the led
上传时间: 2016-10-25
上传用户:han_zh
资源简介:this is used to get the alarm on the mobile you watch
上传时间: 2017-04-18
上传用户:咔乐坞
资源简介:this code gives out put as whether a particular car is family car or not depending on the input variables such as engine power and price(it is run scilab(both in linux and windows)
上传时间: 2013-12-25
上传用户:wendy15
资源简介:Tug of War(A tug of war is to be arranged at the local office picnic. For the tug of war, the picnickers must be divided into two teams. Each person must be on one team or the other the number of people on the two teams must not differ by m...
上传时间: 2014-01-07
上传用户:离殇
资源简介:This article describes a sniffer for Windows. WinSniff is an application for capturing packets on the network. It displays all the packets that are transmitted on the local network and gives detailed information about each header in the pac...
上传时间: 2016-01-22
上传用户:lijianyu172
资源简介:Artistic Style is a reindenter and reformatter of C, C++, C# and Java source code. When indenting source code, we as programmers have a tendency to use both spaces and tab characters to create the wanted indentation. Moreover, some edit...
上传时间: 2013-12-20
上传用户:康郎
资源简介:Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. An a...
上传时间: 2017-07-29
上传用户:kjl
资源简介:data are often used interchangeably, they are actually very different. Data is a set of unrelated information, and as such is of no use until it is properly evaluated. Upon evaluation, once there is some significant relation between data, a...
上传时间: 2017-09-26
上传用户:cxl274287265