this code introduces the simple MIMO capacity
资源简介:this code introduces the simple MIMO capacity
上传时间: 2017-09-01
上传用户:hustfanenze
资源简介:This code implements the shortest path algorithm via the simple scheme and fibonacci heap data structure. It has 3 kinds of testing data input method : random input by computer, reading from the file, reading from the key board.
上传时间: 2013-12-23
上传用户:ynzfm
资源简介:This code implements the basic functions for an I2C slave device using the SSP module. All I2C functions are handled in an ISR. Bytes written to the slave are stored in a buffer. After a number of bytes have been written, the master device ...
上传时间: 2015-04-02
上传用户:邶刖
资源简介:This code ports the uC/OS operating system by Jean LaBrosse to the TI TMS320C2xx family of DSP s.
上传时间: 2014-11-27
上传用户:朗朗乾坤
资源简介:This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. ...
上传时间: 2013-12-28
上传用户:离殇
资源简介:Learning Kernel Classifiers: Theory and Algorithms, Introduction This chapter introduces the general problem of machine learning and how it relates to statistical inference. 1.1 The Learning Problem and (Statistical) Inference It was only a...
上传时间: 2015-10-20
上传用户:aeiouetla
资源简介:This preface introduces the Advanced Microcontroller Bus Architecture (AMBA) specification. It contains the following sections: • About this document on page iv • Feedback on page vii.
上传时间: 2016-06-29
上传用户:frank1234
资源简介:This code supplements the tutorial in Finite State Machines
上传时间: 2014-06-07
上传用户:gut1234567
资源简介:This note introduces the two main user adjustments of a video monitor, BRIGHTNESS and CONTRAST . I explain the effect that these controls have on picture reproduction, and I explain how to set them. This note applies to computer monit...
上传时间: 2016-11-13
上传用户:xyipie
资源简介:This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. ...
上传时间: 2014-08-14
上传用户:Breathe0125