iris localization using integro differential operator. The rar contains 5 files in order to computer the integro differential operator of the normalized contour of the iris and puil boundaries and then add circles to the respective boundaries.
資源簡介:iris localization using integro differential operator. The rar contains 5 files in order to computer the integro differential operator of the normalized contour of the iris and puil boundaries and then add circles to the respective boundari...
上傳時間: 2017-03-23
上傳用戶:希醬大魔王
資源簡介:This program is used to calculating CRC32 checksums of files in order to verify the integrity of files. Written in Visual C# 2005.
上傳時間: 2017-03-11
上傳用戶:ryb
資源簡介:The advantages of automation can be exploited in order to solve or to minimize the needs of manual approach. In order to support the development of survey accurate cadastral system, an automatic programming approach will be adopted. Data...
上傳時間: 2017-04-29
上傳用戶:520
資源簡介:This program accesses a SPI EEPROM using polled mode access. The F12x MCU is configured in 4-wire Single Master Mode, and the EEPROM is the only slave device connected to the SPI bus. The read/write operations are tailored to access a Micro...
上傳時間: 2016-03-29
上傳用戶:gut1234567
資源簡介:// This program accesses a SPI EEPROM using polled mode access. The F06x MCU // is configured in 4-wire Single Master Mode, and the EEPROM is the only // slave device connected to the SPI bus. The read/write operations are // tailored to...
上傳時間: 2014-01-18
上傳用戶:liglechongchong
資源簡介:// This program accesses a SPI EEPROM using polled mode access. The F06x MCU // is configured in 4-wire Single Master Mode, and the EEPROM is the only // slave device connected to the SPI bus. The read/write operations are // tailored to...
上傳時間: 2016-04-12
上傳用戶:qb1993225
資源簡介:Windowed-Burg method is made in order to improve the Clasical Burg method. Previously, I send the PBURGW.m file, but now I include also the ARBURGW.m algorithm and some NOTES-EXAMPLES to explain it and compare with the pburg.m algorithm fro...
上傳時間: 2013-12-22
上傳用戶:familiarsmile
資源簡介:The two C source files in this archive are specific to the TRS-80 Model 4 with high-resolution graphics board. However, the code which performs Huffman enco- ding and decoding is of general interest.
上傳時間: 2014-11-04
上傳用戶:二驅蚊器
資源簡介:The two C source files in this archive are specific to the TRS-80 Model 4 with high-resolution graphics board. However, the code which performs Huffman enco- ding and decoding is of general interest.
上傳時間: 2013-12-18
上傳用戶:417313137
資源簡介:This zip file shows the use ROM Services in order to speed up an application and reduce its code size. It shows how to open services such as ROM Entry, Xmodem and DataFlash and how to simply use their methods. Includes main.html file for he...
上傳時間: 2014-11-02
上傳用戶:66666
資源簡介:This zip file shows the use ROM Services in order to speed up an application and reduce its code size. It shows how to load a method of the Xmodem service and obtain a first level bootloader. Includes main.html file for help.
上傳時間: 2013-12-06
上傳用戶:我們的船長
資源簡介:an external program called from Adam s FitnessFunction class in order to evaluate the fitness of a genome within a distributed grid.
上傳時間: 2015-09-25
上傳用戶:pompey
資源簡介:Is a Application Demo (an example) of how to use the package LCD in order to make an application stand alone that show a scrolling message on display.
上傳時間: 2016-05-29
上傳用戶:tianyi223
資源簡介:USART coded in VHDL. It is writted in 5 files. I am uploading the files in order.
上傳時間: 2013-11-25
上傳用戶:問題問題
資源簡介:USART coded in VHDL. It is writted in 5 files. I am uploading the files in order.
上傳時間: 2014-11-05
上傳用戶:lizhizheng88
資源簡介:USART coded in VHDL. It is writted in 5 files. I am uploading the files in order.
上傳時間: 2013-12-30
上傳用戶:wfeel
資源簡介:USART coded in VHDL. It is writted in 5 files. I am uploading the files in order.
上傳時間: 2014-11-28
上傳用戶:宋桃子
資源簡介:USART coded in VHDL. It is writted in 5 files. I am uploading the files in order.
上傳時間: 2017-03-12
上傳用戶:Andy123456
資源簡介:A sample C program to demonstrate the usage of rtc() function in Linux to read the read time clock.
上傳時間: 2017-04-02
上傳用戶:米卡
資源簡介:synopsys for the students in order to guide them
上傳時間: 2017-08-24
上傳用戶:yangbo69
資源簡介:synopsys for the students in order to guide them
上傳時間: 2017-08-24
上傳用戶:杜瑩12345
資源簡介:SA Encryption and Decryption using Matlab The program set contains thirteen files listed below. errormeg.fig errormsg.m helpmsg.fig helpmsg.m inputmsg.fig inputmsg.m mesgcut.m pro2.fig pro2.m rsacore.m readme.txt screensh...
上傳時間: 2017-04-06
上傳用戶:dreamboy36
資源簡介:Due to the asymmetry between the amount of data traffic in the downlink and uplink direction of nowadays and future wireless networks, a proper design of the transceivers in the broadcast channel is inevitable in order to satisfy the users...
上傳時間: 2020-05-28
上傳用戶:shancjb
資源簡介:Abstract: A sliding mode observer and fractional-order phase-locked loop (FO-PLL) method is proposed for the sensorless speed control of a permanent magnet synchronous motor (PMSM).The saturation function is adopted in order to reduce the c...
上傳時間: 2022-06-18
上傳用戶:
資源簡介:This program is the best program ever used in optimisation using differential evolution. Check it u will found it very useful.
上傳時間: 2014-01-08
上傳用戶:GHF
資源簡介:source code for unrar3.3.4,uppack the .rar files,for multi-os
上傳時間: 2015-03-17
上傳用戶:lanwei
資源簡介:They have been developed using the AZTEC C86 compiler, and are portable to any other standard C environment. I have tested this code with AZTEC CII for the 8080, and with the C compiler on XENIX 286, and they work fine.
上傳時間: 2014-01-05
上傳用戶:lizhen9880
資源簡介:should modify the .rar to .doc :)
上傳時間: 2013-12-13
上傳用戶:洛木卓
資源簡介:Single-layer neural networks can be trained using various learning algorithms. The best-known algorithms are the Adaline, Perceptron and Backpropagation algorithms for supervised learning. The first two are specific to single-layer neural n...
上傳時間: 2015-06-17
上傳用戶:趙云興
資源簡介:What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Pr...
上傳時間: 2013-12-25
上傳用戶:playboys0