The CSS Cookbook cuts straight through the theory to provide hundreds of useful examples and CSS code recipes you can use immediately to format your web pages. Reflecting CSS2 and including topics that range from basic web typography and page layout to techniques for formatting lists, forms, and tab ...
cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used to calculate a whole range of scientific functions including sin, cos, tan, arctan, arcsin, arccos, sinh, cosh, tanh, arctanh, log, exp, square root and even multiply and divide.
the method dates ba ...
Modern, large scale, display systems are
migrating from traditional technologies such as
incandescent, fluorescent and mechanical to
sophisticated products based on LEDs. LED
displays offer power savings and a superior
visual experience in a range of products from
programmable signage to large-scale ...
Enhanced version of the Serial Peripheral Interface available on Motorola s MC68HC11 family of CPUs.Enhancements include a wider supported operating frequency range, 4deep read and write fifos, and programmable transfer count dependent interrupt generation.
As with the SPI found in MC68HC11 processo ...
Creating barcodes in Microsoft庐 Office has never been easier.
With BarCodeWiz Toolbar you can add barcodes to Microsoft庐 Office applications with a click of a button. In Microsoft庐 Word, create single barcodes, pages of labels, or mail merge documents. In Microsoft庐 Excel庐, select a range of ce ...
DESCRIPTION
The DCP0105 family is a series of high efficiency, 5V
input isolated DC/DC converters. In addition to 1W
nominal galvanically isolated output power capability,
the range of DC/DCs are also fully synchronizable.
The devices feature thermal shutdown, and overload
protection is implemented ...
在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor in ...
The LM35 of National Semiconductors that is used in this project is a precision centigrade temperature sensor, which has an analog output voltage. It has a range of -55潞C to +150潞C and a accuracy of 卤0.5潞C . The output voltage is 10mV/潞C . The output voltage is converted by the AD convertor of ...
OTSU Gray-level image segmentation using Otsu s method.
Iseg = OTSU(I,n) computes a segmented image (Iseg) containing n classes
by means of Otsu s n-thresholding method (Otsu N, A Threshold Selection
Method from Gray-Level Histograms, IEEE Trans. Syst. Man Cybern.
9:62-66 1979). Thre ...
Generate Possion Dis.
step1:Generate a random number between [0,1]
step2:Let u=F(x)=1-[(1/e)x]
step3:Slove x=1/F(u)
step4:Repeat Step1~Step3 by using different u,you can get x1,x2,x3,...,xn
step5:If the first packet was generated at time [0], than the
second packet will be generated at time ...