Recovering 3-D structure from motion in noisy 2-D images is a problem addressed by many vision system researchers. By consistently tracking feature points of interest across multiple images using a methodology first Described by Lucas-Kanade, a 3-D shape of the scene can be reconstructed using these features points using the factorization method developed by Tomasi-Kanade.
This is IR (Infra-Red) learn module for home automation system. It can learn IR codes from different IR remotes, and then execute any assigned actions controlled by learned IR remote.
This project was developed using Keil 8051 compiler.
Processor - Atmel AT89C51
Frequency - 22.1184 Mhz (Described as OSC_FREQ in "timer.h")
Timer 0 - system timer (used for timeouts and delays)
Also, look in folder /doc for additional information about IR codes formats and codes from different manufacturers.
Software-defined radios (SDRs) have been around for more than a decade. The
first complete Global Positioning System (GPS) implementation was Described
by Dennis Akos in 1997. Since then several research groups have presented their
contributions.We therefore find it timely to publish an up-to-date text on the subject
and at the same time include Galileo, the forthcoming European satellitebased
navigation system. Both GPS and Galileo belong to the category of Global
Navigation Satellite Systems (GNSS).
ZEUS is a family of Eulerian (grid based) Magneto-Hydrodynamic codes
(MHD) for use in astrophysics, Described in a series of papers by Stone
and Norman (1, 2, 3).
It may be used in Cartesian (XYZ),
cylindrical (ZRP), and spherical (RTP) coordinates.
I upload Suffix Array Pdf file. This is a really good tutorial for guys who are curious about suffix array. It Described the meaning of suffix array and also how to built it. Hope this really help guys improving skills about string searching, string matching, etc
This book is written for all developers writing code for the ARM. It assumes that you
are an experienced software developer, and that you are familiar with the ARM
development tools as Described in ADS Getting Started.
The emphasis of this book is on real-time application of Synopsys tools, used
to combat various problems seen at VDSM geometries. Readers will be
exposed to an effective design methodology for handling complex, submicron
ASIC designs. Significance is placed on HDL coding styles,
synthesis and optimization, dynamic simulation, formal verification, DFT
scan insertion, links to layout, physical synthesis, and static timing analysis.
At each step, problems related to each phase of the design flow are identified,
with solutions and work-around Described in detail. In addition, crucial issues
related to layout, which includes clock tree synthesis and back-end
integration (links to layout) are also discussed at length. Furthermore, the
book contains in-depth discussions on the basics of Synopsys technology
libraries and HDL coding styles, targeted towards optimal synthesis solution.
This paper describes a bus mastering implementation of the PCI Express protocol using a Xilinx FPGA. While the theoretical peak performance of PCI Express is quite high, attaining that performance is a complex endeavor on top of an already complex protocol. The implementation is Described and its performance is analyzed. Source code is offered for free download via the web.
this is a document about radio frequency identification RFID, this was a project ,i have done last year ,actually this technology is a very inpotrtant one due to its relation with newest technologies , like GPS , or the miniturization of integrated circuits ,and that is Described in chapter 3 . chapter 1 gives an introduction of the technology RFID , chapter 2 gives a discussion of a library using RFID , and chapter 3 is about the future of RFID , and finally the conclusion .
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are Described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic
aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.