资源列表

« 1 2 ... .03 .04 .05 .06 .07 16408.09 .10 .11 .12 .13 ... 16929 »

[编程文档c++API

说明:C++帮助文档,囊括了STL库所有的函数介绍和说明
<qwerty@123456_> 在 2019-08-13 上传 | 大小:115.53kb | 下载:0

[文档资料矢量控制的永磁同步交流伺服电机控制系统

说明:矢量控制的永磁同步交流伺服电机控制系统 本文详细介绍了永磁同步交流电机的矢量控制理论,并根据矢量控制理论运用DSP实现了对永磁同步交流伺服电机的电流、速度和位置的三闭环控制,最后给出实验结果及其分析。 关键词:永磁同步交流伺服电机;矢量控制;SVPWM;TMS320F2812
<17639812656> 在 2019-08-16 上传 | 大小:5.11mb | 下载:0

[软件工程i.MX 8M Dual / 8M

说明:i.MX 8M Dual / 8M QuadLite / 8M Quad Applications Processors Data Sheet for Consumer Products
<ggc_gcc> 在 2019-08-17 上传 | 大小:881.13kb | 下载:0

[编程文档Some docs on ISA bus

说明:16 Bit IO On the ISA - from usenet ISA bus technical summary - TechFest.com Блохин С.М_Шина ISA - russian book
<SergeXY1> 在 2021-06-01 上传 | 大小:352.38kb | 下载:0

[软件工程MS-DOS Programmer's Reference

说明:Contain lot of info for programming in MSDOS: System Calls/Old System Calls Memory Management Process Management Interrupts Device Drivers Control Blocks and Work Areas .Exe File Structure and Loading Symbol Defi
<SergeXY1> 在 2021-06-02 上传 | 大小:144.08kb | 下载:0

[软件工程Linux file format description

说明:Linux file format descr iption on russian
<SergeXY1> 在 2021-06-02 上传 | 大小:426.25kb | 下载:0

[其它文档Mediatek Boot ROM Design Specification

说明:Boot ROM Design Specification v2.0 -Download Procedure -Descr iption -Configuration -Commands
<SergeXY1> 在 2021-06-02 上传 | 大小:91.09kb | 下载:0

[其它文档Datasheet on Imap x210 sOC

说明:DS on Imap x210 sOC, InfoTM Microelectronics
<SergeXY1> 在 2021-06-02 上传 | 大小:7.01mb | 下载:0

[软件工程Cybersecurity Strategy Implementation1

说明:The Attack-Centric Strategy had the highest Cybersecurity Fundamentals Scoring System (CFSS) estimated total score. It earned nearly a perfect score with 95 points out of a possible 100.
<iwc2007008> 在 2022-02-27 上传 | 大小:159.98kb | 下载:0

[软件工程Cybersecurity Strategy Implementation2

说明:The Intrusion Kill Chain fr a mework is based on Lockheed Martin's paper Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
<iwc2007008> 在 2022-02-27 上传 | 大小:162.84kb | 下载:0

[软件工程Cybersecurity Strategy Implementation3

说明:An Intrusion Kill Chain is the stages or phases that can be used in attacks by attackers.
<iwc2007008> 在 2022-02-27 上传 | 大小:143.67kb | 下载:0

[软件工程Cybersecurity Strategy Implementation4

说明:Once attackers have selected their target and have some understanding of where they are on the internet and the technologies they use, then they figure out how they are going to attack the victim. This phase is called
<iwc2007008> 在 2022-02-27 上传 | 大小:143.59kb | 下载:0
« 1 2 ... .03 .04 .05 .06 .07 16408.09 .10 .11 .12 .13 ... 16929 »

源码中国 www.ymcn.org