-
-
liaozhigan0873.rar
// CDC::FillSolidRect is faster, but it does not handle 8-bit color depth
VERIFY(brush.CreateSolidBrush(
RGB(r+rStep*iOnBand, g + gStep*iOnBand, b + bStep * iOnBand)))
pDC->FillRect(&rectFill,&brush)
VERIFY(brush.DeleteObject()) ...
-
-
CRC_8.zip
Keil C51 上51系列单片机优化的CRC-8 算法。可以自己改其他算式的,包含字节查表,半字节查表,bit计算。很难得的哦。
-
2.rar
... encoding
Motion Compensated Prediction (MCP)
Long-term memory MCP
Optimize MCP parameters for real-time cardiac MRI studies
Determine acceptable PSNR for diagnosis
Identify compression technique which yields lowest bit-rate at determined PSNR
-
SPFD54126_SPEC.rar
... in resolution which can be achieved by the designated RAM for graphic data. The 528-channel source
driver has true 6-bit resolution, which generates 64 Gamma-corrected values by an internal D/A converter. The source driver of
SPFD54126A adopts OP-AMP ...
-
39VF160_program_code.rar
... Alter data in 2048 word sector
Program_One_Block Alter data in 32K word block
Check_Toggle_Ready End of internal program or erase detection using
Toggle bit
Check_Data_Polling End of internal program or erase detection using
Data# polling
-
G721-G723.rar
... and 40 kbit/s. G.726 also introduced a new 16 kbit/s rate. The four bit rates associated with G.726 are often referred to by the bit size of a sample, which are 2-bits, 3-bits, 4-bits, and 5-bits respectively.
-
G728(LD-CELP).rar
... and 40 kbit/s. G.726 also introduced a new 16 kbit/s rate. The four bit rates associated with G.726 are often referred to by the bit size of a sample, which are 2-bits, 3-bits, 4-bits, and 5-bits respectively.
-
G729(CS-ACELP).rar
... and 40 kbit/s. G.726 also introduced a new 16 kbit/s rate. The four bit rates associated with G.726 are often referred to by the bit size of a sample, which are 2-bits, 3-bits, 4-bits, and 5-bits respectively.
-
MD5.rar
MD5 (Message-Digest algorithm 5) is a widely used, partially insecure[1] cryptographic hash function with a 128-bit hash value. As an Internet standard (RFC 1321), MD5 has been employed in a wide variety of security applications, and is also commonly used ...
-