The MAX481E, MAX483E, MAX485E, MAX487E–MAX491E,
and MAX1487E are low-power transceivers for RS-485 and
RS-422 communications in harsh environments. Each driver
output and receiver input is protected against ±15kV electrostatic
discharge (ESD) shocks, without latchup. These parts
contain one driver ...
GPS 接收程序 DEMO。
HsGpsDll Library 1.1
A GPS Control/Component for C/C++
HsGpsDll is a Windows Dynamic Link Library which provides access to any NMEA-183 compliant GPS receiver via a serial communications port. HsGpsDll is designed for use from Visual C, Visual Basic or other languages, capable o ...
Introduction
Computer security is undeniably important, and as new vulnerabilities are discovered and
exploited, the perceived need for new security solutions grows. "Trusted computing"
initiatives propose to solve some of today s security problems through hardware changes
to the personal computer. ...
A website for keeping track of wishes for your character in WoW Users are able to make a user account, register their in-game characters, make wishes that represent their in-game goals, and match them against other players.
A Perl-based statistics management system designed for academic competition tournaments. These tournaments, which are called "College Bowl," "quiz bowl," and a variety of other names, involve teams playing against each other in either timed or untime
The latest file releases
driver program which uses the above two modules. I have also made available the data set pollute.dat of mortality rates against socio-economic, meteorological and pollution variables for 60 statistical areas in the USA.
Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the
amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. An appropriate
information-theoretic model for steganography has ...
A certification path is an ordered list of certificates starting with a certificate issued by the relying
party s trust root, and ending with the target certificate that needs to be validated. Certification
path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509
...
What you always wanted to know about networking but were afraid to ask!
* How networks and the Internet work
* How to build coherent, cost-effective network infrastructures
* How to design networks for maximum reliability and availability
* What you need to know about data center and application ne ...