适合参加智能车竞赛的参赛人员用于学习
2025/2/23 3:55:58 55.72MB 智能车 智能车竞赛 飞思卡尔
1
该版本支持校验方法有:CRC-8正序、CRC-8逆序、CRC-16(0xA001,Ox8005,Modbus,Sick)、CRC-CCITT(XModem)、CRC_CCITT(0xFFFF)、CRC-CCITT(0x1D0F)、CRC-CCITT(Kermil)、CRC-DNP、IntelHex、BCC、LRD、CRC32,十五种校验方法。
2025/2/21 2:53:51 1.93MB CRC8\CRC16 CCITT BCC LRC
1
1-ENVI基础知识2-影像预处理基础3-自定义坐标系4-MODIS几何校正5-地形图的几何校正6-几何校正(RapidEye几何校正)7-TM图像与SPOT图像配准8-TM图像校正(矢量上选点)9-图像融合10-图像镶嵌11-图像裁剪12-图像增强13-监督分类(样本选择)14-监督分类(分类)15-监督分类(分类后处理)16-监督分类(精度验证)17-非监督分类18-快速制图19-三维可视20-基于GLT的几何校正(风云三号气象卫星为例)21-正射校正22-正射校正(选择控制点QB校正)23-RapidEye正射校正24-构建RPC正射校正(BuildRPC)25-图像自动配准26-基于专家知识决策树分类27-决策树自动阈值分类28-面向对象图像分类(城市信息提取)29-面向对象耕地信息提取30-基于立体像对的DEM提取31-DEM分析与应用32-遥感动态监测33-林冠状态遥感变化监测34-森林砍伐监测35-耕地信息变化监测36-雷达图像基本处理37-高光谱基础38-传感器定标和大气校正39-快速大气校正40-波谱库浏览与建立41-植被识别42-矿物识别43-基于波谱沙漏工具的矿物识别44-植被指数计算和分析45-波段运算(bandmath)46-ENVI的二次开发47-IDL简介48-遥感与GIS一体化
2025/2/19 18:06:16 251KB ENVI IDL 视频 培训
1
15套微场景HTML5前端源码,有需要的可以下载下来学习,不错的源码
2025/2/19 16:23:05 33.31MB HTML5 CSS3 微场景
1
本人学习的国嵌笔记。
操作详细!第一季精通嵌入式 4一. 安装tftp服务器 4二. Samba服务器安装 4三. NFS服务器 5四. 安装vsftpdFTP服务器 5第2季-裸奔吧-ARM 6一. 安装交叉编译器 6二. 安装驱动 6三. 查看执行文件属性 6四. 编译工具用法 6五. Makefile基本规则 7六. 链接脚本 8七. Eclipse在线调试工具包为ARM-Tools.tar.gz 8八. ARM工作模式 10九. 寻址方式 10十. 汇编框架 10十一. Bootloader设计 111.2440板子 112.异常向量表 123.设置svc模式 124.时钟设置 125.sdram内存初始化 126.Steppingstone搬移代码到内存: 137.C语言环境初始化 13一、栈: 13栈作用: 14二、C语言和汇编混合编程 14第2季-裸奔吧-ARM\下学期 15一、MMU初始化 15二、中断 16三、NANDFALSH 17四、uart控制器 18五、MDA控制器 18六、液晶显示器 18七、触摸屏(采用TS中断) 18八、网卡驱动设计 19九、TFTP设计 19十、bootm设计 19第三季 20一、GDB调试使用方法 20二、coredump调试 20三、linux应用程序地址布局 21四、函数库使用方法 21五、系统调用之文件描述符 22六、库函数文件编程 22七、时间编程 22
2025/2/19 5:30:51 6.81MB 2014 国嵌笔记
1
基于(ISC)2CISSPCommonBodyofKnowledge,可以辅助allinone加深对8个域知识点了解,最新的知识点已经在2018年4月15日CISSP考试中广泛体现。
本学习指南重点突出知识点概念并伴有相应测试题,结合allinone8后面测试题、光盘题和《CISSPOfficial(ISC)2PracticeTests2018年第二版》英文版&官方练习题及解题详解(1300题左右),备考题库已足够了解所有知识点本书含21章节,各域对应的章节如下:1-4章对应Domain1SecurityandRiskMgmt第5章对应Domain2Assetsecurity资产安全第6,7,8,9,10章对应Domain3安全架构与工程第11,12章,通讯与网络安全第13,14章,身份与访问管理IAM第15章对应域安全评估与测试第16,17,18,19章对应域7安全运维第20,21章软件开发安全DevelopmentEditor:KellyTalbotTechnicalEditors:JeffParker,BobSipes,andDavidSeidlCopyEditor:KimWimpsettEditorialManager:PeteGaughanProductionManager:KathleenwisorExecutiveeditor:imminatelProofreader:AmyschneiderIndexer:JohnnaVanHoosedinseProjectCoordinator,Cover:brentSavageCoverDesigner:wileyCoverImage:@JeremyWoodhouse/GettyImages,Inc.CopyrightC2018byJohnWileySons,InC,Indianapolis,IndianaPublishedsimultaneouslyinCanadaISBN:978-1-119-47593-4ISBN:978-1-119-47595-8(ebk)ISBN:978-1-119-47587-3(ebk)ManufacturedintheUnitedStatesofamericaNopartofthispublicationmaybereproduced,storedinaretrievalsystemortransmittedianyformorbyanymeans,electronic,mechanical,photocopying,recording,scanningorotherwise,exceptaspermittedunderSections107or108ofthe1976UnitedStatesCopyrightAct,withouteitherthepriorwrittenpermissionofthePublisher,orauthorizationthroughpaymentoftheappropriateper-copyfeetotheCopyrightClearanceCenter,222RosewoodDrive,Danvers,MAO1923,(978)750-8400,fax(978)646-8600RequeststothePublisherforpermissionshouldbeaddressedtothepermissionsDepartment,JohnWileysons,Inc.111RiverStreet,Hoboken,NJo7030,(201)748-6011,fax(201)748-6008,oronlineathttp://www.wiley.com/go/permissionsLimitofliability/DisclaimerofWarranty:Thepublisherandtheauthormakenorepresentationsorwarrantieswithrespecttotheaccuracyorcompletenessofthecontentsofthisworkandspecificallydisclaimallwarranties,includingwithoutlimitationwarrantiesoffitnessforaparticularpurpose.Nowarrantymaybecreatedorextendedbysalesorpromotionalmaterials.Theadviceandstrategiescontainedhereinmaynotbesuitableforeverysituation.Thisworkissoldwiththeunderstandingthatthepublisherisnotengagedinrenderinglegal,accounting,orotherprofessionalservices.Ifprofessionalassistanceisrequiredtheservicesofacompetentprofessionalpersonshouldbesought.Neitherthepublishernortheauthorshallbeliablefordamagesarisingherefrom.ThefactthatanorganizationorWebsiteisreferredtointhisworkasacitationand/orapotentialsourceoffurtherinformationdoesnotmeanthattheauthororthepublisherendorsestheinformationtheorganizationorWebsitemayprovideorrecommendationsitmaymakeFurtherreadersshouldbeawarethatInternetWebsiteslistedinthisworkmayhavechangedordisappearedbetweenwhenthisworkwaswrittenandwhenitisreadForgeneralinformationonourotherproductsandservicesortoobtaintechnicalsupportpleasecontactourCustomerCareDepartmentwithintheU.S.at(877)762-2974,outsidetheUS.at(317)5723993orfax(317)572-4002Wileypublishesinavarietyofprintandelectronicformatsandbyprint-on-demand.Somematerialincludedwithstandardprintversionsofthisbookmaynotbeincludedine-booksorinprint-On-demand.IfthisbookreferstomediasuchasaCDorDVdthatisnotincludedintheversionyoupurchasedyoumaydownloadthismaterialathttp://booksupport.wilev.comFormoreinformationaboutwileyproductsvisitwww.wiley.comLibraryofCongressControlNumber:2018933561TRADEMARKS:Wiley,theWileylogo,andtheSybexlogoaretrademarksorregisteredtrademarksofJohnWileySons,Incand/oritsaffiliates,intheUnitedStatesandothercountries,andmaynotbeusedwithoutwrittenpermission.CISSPisaregisteredtrademarkof(ISC)2,Inc.AllothertrademarksarethepropertyoftheirrespectiveownersJohnWileySons,Incisnotassociatedwithanyproductorvendormentionedinthisbook.ToDewittLatimer,mymentor,friend,andcolleague.Imissyoudearly.MikeChappleToCathy,yourperspectiveontheworldandlifeoftensurprisesme,challengesme,andmakesmeloveyouevenmoreJamesmichaelstewartToNimfa,thanksforsharingyourlifewithmeforthepast26yearsandlettingmeshareminewithyouDarrilgibsonDearFuture(ISC)2MemberCongratulationsonstartingyourjourneytoCISSPRcertificationEarningyourCISSPisanexcitingandrewardingmilestoneinyourcybersecuritycareer.Notonlydoesitdemonstrateyourabilitytodevelopandmanagenearlyallaspectsofanorganizationscybersecurityoperations,butyoualsosignaltoemployersyourcommitmenttolife-longlearningandtakinganactiveroleinfulfillingthe(isc)2visionofinspiringasafeandsecurecyberworldThematerialinthisstudyguideisbaseduponthe(isc)2cisspCommonBodyofKnowledge.ItwillhelpyoupreparefortheexamthatwillassessyourcompetencyinthefollowingeightdomainsaSecurityandriskmanagement■AssetsecuritySecurityArchitectureandengineeringaCommunicationandNetworksecurityaIdentityandAccessManagement(IAM)SecurityAssessmentandTesting■SecurityOperationsSoftwareDevelopmentSecurityWhilethisstudyguidewillhelpyouprepare,passingthecisspexamdependsonyourmasteryofthedomainscombinedwithyourabilitytoapplythoseconceptsusingyourreal-worldexperienceiwishyouthebestofluckasyoucontinueonyourpathtobecomeaCISSPandcertifiedmemberof(Isc)2Sincerely,Davidshearer.CISSPCEO(ISC)2Ackn。
w|edgmentsWe'dliketoexpressourthankstoSybexforcontinuingtosupportthisproject.Extrathankstotheeightheditiondevelopmentaleditor,kellyTalbot,andtechnicaleditors,JeffParker,BobSipes,andDavidSeidlwhoperformedamazingfeatsinguidingustoimprovethisbookThanksaswelltoouragent,CaroleJelen,forcontinuingtoassistinnailingdowntheseprojectsMikejames.anddarrilSpecialthanksgototheinformationsecurityteamattheUniversityofNotreDame,whoprovidedhoursofinterestingconversationanddebateonsecurityissuesthatinspiredandinformedmuchofthematerialinthisbookIwouldliketothanktheteamatwileywhoprovidedinvaluableassistancethroughoutthebookdevelopmentprocess.ialsooweadebtofgratitudetomyliteraryagent,CaroleJelenofWatersideProductions.Mycoauthors,JamesMichaelStewartanddarrilGibsonweregreatcollaborators.JeffParker,BobSipes,andDavidSeidl,ourdiligentandknowledgeabletechnicaleditors,providedvaluableinsightaswebroughtthiseditiontopressIdalsoliketothankthemanypeoplewhoparticipatedintheproductionofthisbookbutwhomIneverhadthechancetomeet:thegraphicsteam,theproductionstaff,andallofthoseinvolvedinbringingthisbooktopress-MikeChappleThankstoMikeChappleandDarrilGibsonforcontinuingtocontributetothisprojectThanksalsotoallmycisspcoursestudentswhohaveprovidedtheirinsightandinputtoimprovemytrainingcoursewareandultimatelythistome.Tomyadoringwife,CathyBuildingalifeandafamilytogetherhasbeenmorewonderfulthanIcouldhaveeverimagined.ToSlaydeandremi:youaregrowingupsofastandlearningatanoutstandingpace,andyoucontinuetodelightandimpressmedaily.YouarebothgrowingintoamazingindividualsTomymom,Johnnie:ItiswonderfultohaveyouclosebyToMarkNomatterhowmuchtimehaspassedorhowlittleweseeeachother,Ihavebeenandalwayswillbeyourfriend.andfinally,asalways,toElvis:Youwerewayaheadofthecurrentbaconobsessionwithyourpeanutbutter/banana/baconsandwich;ithinkthat'sproofyoutraveledthroughtimeJamesmichaelStewartThankstoJimMinatelandCaroleJelenforhelpinggetthisupdateinplacebefore(IsC)2releasedtheobjectives.Thishelpedusgetaheadstartonthisnewedition,andweappreciateyourefforts.It'sbeenapleasureworkingwithtalentedpeoplelikeJamesMichaelStewartandMikeChappleThankstobothofyouforallyourworkandcollaborativeeffortsonthisproject.Thetechnicaleditors,JeffParkerBobSipes,andDavidSeidl,provideduswithsomeoutstandingfeedback,andthisbookisbetterbecauseoftheireffortsThankstotheteamatSybex(includingprojectmanagers,editors,andgraphicsartists)foralltheworkyoudidhelpingusgetthisbooktoprint.Last,thankstomywife,Nimfa,forputtingupwithmyoddhoursasIworkedonthisbookDarrilgibsonAbouttheauthorsMikeChapple,CISSP,PhD,Security+,CISA,CySA+,isanassociateteachingprofessorofIT,analytics,andoperationsattheUniversityofNotreDame.InthepasthewaschiefinformationofficerofBrandInstituteandaninformationsecurityresearcherwiththenationalSecurityagencyandtheu.s.airForcehisprimaryareasofexpertiseincludenetworkintrusiondetectionandaccesscontrols.mikeisafrequentcontributortoTechTarget'sSearchSecuritysiteandtheauthorofmorethan25booksincludingthecompanionbooktothisstudyguide:CISSPOfficial(ISC)2PracticeTests,theCompTIACSA+StudyGuide,andCyberwarfare:InformationOperationsinaConnectedWorld.MikeoffersstudygroupsfortheCISSP,SSCP,Security+,andcSa+certificationsonhiswebsiteatwww.certmike.comJamesMichaelStewart,CISSP,CEH,ECSA,CHFI,Security+Network+,hasbeenwritingandtrainingformorethan20years,withacurrentfocusonsecurity.hehasbeenteachingCiSsPtrainingcoursessince2002,nottomentionothercoursesonInternetsecurityandethicalhacking/penetrationtestingHeistheauthorofandcontributortomorethan75booksandnumerouscoursewaresetsonsecuritycertification,Microsofttopics,andnetworkadministrationincludingtheSecurity+(SY0-501)Reviewguide.Moreinformationaboutmichaelcanbefoundathiswebsiteatwww.impactonline.comDarrilGibson,CISSP,Security+,CASP,istheCeoofYODa(shortforYouCanDoAnything),andhehasauthoredorcoauthoredmorethan40books.Darrilregularlywrites,consults,andteachesonawidevarietyoftechnicalandsecuritytopicsandholdsseveralcertificationsHeregularlypostsblogarticlesathttp://blogs.getcertifiedgetahead.com/aboutcertificationtopicsandusesthatsitetohelppeoplestayabreastofchangesincertificationexams.Heloveshearingfromreaders,especiallywhentheypassanexamafterusingoneofhisbooks,andyoucancontacthimthroughthelebloggingsite.
2025/2/15 1:12:56 17.84MB CISSP OSG OSG8 Official
1
使用固态源MBE系统进行锑化镓基量子阱激光器结构的外延生长,通过优化稳定生长条件,结合标准宽条形激光器制备工艺,获得了在15℃工作温度下823mW的连续光输出,注入电流0.5A时,峰值波长为1.98μm。
在1000Hz,5%占空比的脉冲工作模式下,最大脉冲功率达到1.868W。
1
LxBlog多用户博客个人主页系统,一套基于php+mysql数据库平台架构的多用户博客系统,该系统融合了Blog的最新元素,拥有强大的个人主页系统,独立的二级域名功能,灵活的用户模版系统,丰富的朋友圈和个性相册功能。
部分修正改进功能1.改进个人页面的日志列表页的摘要2.改进相册个人后台发表方式3.改进音乐前台列表页为显示歌曲列表,点击试听后弹出播放窗口,取消音乐上传4.改进个人首页中显示所加入朋友圈的更新信息功能 5.改进最新推送的文章在朋友圈的其他圈友中显示功能 6.改进日志同时推送到多个朋友圈的支持功能7.改进朋友圈系统页列表、会员排行列表8.改进朋友圈系统页9.改进圈主推荐文章列表10.改进写朋友圈写文章功能,即在圈子中加入"写文章"功能,转入个人后台编写,写文章后默认推送到该圈子11.改进朋友圈邀请功能12.改进头像大小控制13.改进书签功能部分新增功能:1.增加日志、评论、留言表情2.增加验证问题3.增加在article.php页面中和该文章tag相关的文章4.增加tags广告词锁定5.增加列表页"隐藏日志","好友可见日志" 链接.6.增加心情,天气在发表日志页7.增加"上一篇","下一篇",在文章阅读页8.增加"转移个人分类"功能,在个人后台日志列表页9.增加日志管理的搜索功能10.增加附件批量上传11.增加文件和商品集成格式在日志发布过程中12.增加相册前台图片列表页,单个图片显示页面13.增加相册个人页面单图显示页面功能,增加图片播放器14.增加短消息功能15.增加系统首页博客文章、人数、今日文章数、评论数量的显示16.增加最新博客内容在论坛首页的显示17.增加个人分类在论坛推送到blog的文章18.增加推送设定,即当博客向论坛推送时,管理员可以设置只允许推送至哪个或者哪些版块19.增加随机访问列表20.增加好友日志更新列表,在个人日志页面21.增加可视化风格编辑22.增加论坛文集23.增加找回密码功能24.增加好友分类25.增加摘要分界符26.增加自定义关键字链接27.增加博主回复评论28.增加转载功能
2025/2/14 6:25:37 3.1MB 博客系统
1
目录1.校园网络需求分析及设计原则 11.1需求分析 11.2设计原则 22.校园网络系统整体解决方案及设计 22.1校园网的功能 32.2校园网功能架构 32.3校园网网络设计 42.3.1体系结构 42.3.2校园网网络系统设计 52.3.3校园网的网络技术设计 63.校园网网络拓扑、核心网设计及IP地址分配 83.1校园网网络拓扑 83.1.1核心层 93.1.2汇聚层 93.1.3接入层 93.2校园网网络核心设计 103.2.1双核心的网络设计 103.2.2网络核心硬件的可靠性保障措施 103.3校园网IP规划 103.3.1IP地址的分配原则 103.3.2IP地址的分配方式 113.3.3IP地址的管理方式 114.交换机和路由器的配置 124.1虚拟网的划分 124.1.1VLAN的发展和现状 124.1.2使用VLAN技术的优点 134.1.3VLAN端口的划分 135.校园网网络安全方案 146.结束语 157.参考文献 15
2025/2/8 18:46:56 283KB 校园网络 集成方案 武汉理工
1
基于imx6移植rtl8821csbluetooth部分,串口需要流控,包括Linux4.15蓝牙驱动代码、应用代码、移植过程。
非常详细。
2025/2/8 16:43:36 389KB rtl8821cs bluetooth imx6
1
共 916 条记录 首页 上一页 下一页 尾页
在日常工作中,钉钉打卡成了我生活中不可或缺的一部分。然而,有时候这个看似简单的任务却给我带来了不少烦恼。 每天早晚,我总是得牢记打开钉钉应用,点击"工作台",再找到"考勤打卡"进行签到。有时候因为工作忙碌,会忘记打卡,导致考勤异常,影响当月的工作评价。而且,由于我使用的是苹果手机,有时候系统更新后,钉钉的某些功能会出现异常,使得打卡变得更加麻烦。 另外,我的家人使用的是安卓手机,他们也经常抱怨钉钉打卡的繁琐。尤其是对于那些不太熟悉手机操作的长辈来说,每次打卡都是一次挑战。他们总是担心自己会操作失误,导致打卡失败。 为了解决这些烦恼,我开始思考是否可以通过编写一个全自动化脚本来实现钉钉打卡。经过一段时间的摸索和学习,我终于成功编写出了一个适用于苹果和安卓系统的钉钉打卡脚本。
2024-04-09 15:03 15KB 钉钉 钉钉打卡