亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Detection

  • The Inter IC bus or I2C bus is a simple bidirectional two wire bus designed primarily for general co

    The Inter IC bus or I2C bus is a simple bidirectional two wire bus designed primarily for general control and data transfer communication between ICs. Some of the features of the I2C bus are: • Two signal lines, a serial data line (SDA) and a serial clock line (SCL), and ground are required. A 12V supply line (500mA max.) for powering the peripherals often may be present. • Each device connected to the bus is software addressable by a unique address and simple master/ slave relationships exist at all times masters can operate as master-transmitters or as master-receivers. • The I2C bus is a true multi-master bus including collision Detection and arbitration to prevent data corruption if two or more masters simultaneously initiate data transfer systems. • Serial, 8-bit oriented, bidirectional data transfers can be made at up to 100 KBit/s in the standard mode or up to 400 KBit/s in the fast mode.

    標簽: bus bidirectional primarily designed

    上傳時間: 2013-12-11

    上傳用戶:jeffery

  • The System Management BIOS Reference Specification addresses how motherboard and system vendors pres

    The System Management BIOS Reference Specification addresses how motherboard and system vendors present management information about their products in a standard format by extending the BIOS interface on Intel architecture systems. The information is intended to allow generic instrumentation to deliver this data to management applications that use CIM (the WBEM data model) or direct access and eliminates the need for error prone operations like probing system hardware for presence Detection.

    標簽: Specification motherboard Management Reference

    上傳時間: 2013-12-10

    上傳用戶:鳳臨西北

  • 一個自然語言處理的Java開源工具包。LingPipe目前已有很豐富的功能

    一個自然語言處理的Java開源工具包。LingPipe目前已有很豐富的功能,包括主題分類(Top Classification)、命名實體識別(Named Entity Recognition)、詞性標注(Part-of Speech Tagging)、句題檢測(Sentence Detection)、查詢拼寫檢查(Query Spell Checking)、興趣短語檢測(Interseting Phrase Detection)、聚類(Clustering)、字符語言建模(Character Language Modeling)、醫學文獻下載/解析/索引(MEDLINE Download, Parsing and Indexing)、數據庫文本挖掘(Database Text Mining)、中文分詞(Chinese Word Segmentation)、情感分析(Sentiment Analysis)、語言辨別(Language Identification)等API。

    標簽: LingPipe Java 自然語言處理 開源

    上傳時間: 2013-12-04

    上傳用戶:15071087253

  • 97 law to enhance the classic procedure Ridge wavelet extraction Modulus maximum for the wavelet

    97 law to enhance the classic procedure Ridge wavelet extraction Modulus maximum for the wavelet edge Detection Small spectral analysis method mallat classic procedure

    標簽: wavelet extraction the procedure

    上傳時間: 2014-01-09

    上傳用戶:xg262122

  • Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been

    Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been of considerable interest in communications and radar applications demanding low probability of intercept and Detection (LPI/D), multipath immunity, high data throughput, precision ranging and localization.

    標簽: penetrating technology well-known wideband

    上傳時間: 2014-01-22

    上傳用戶:edisonfather

  • It has been suggested1 that an appropriate figure of merit for a low probability of intercept and d

    It has been suggested1 that an appropriate figure of merit for a low probability of intercept and Detection (LPI/D) waveform is the quantity “Range x Bandwidth / Joule”. That is, the further the range, the wider the bandwidth and the less amount of energy used to achieve these values, the more covert is the resultant communications system.

    標簽: appropriate probability suggested1 intercept

    上傳時間: 2017-01-03

    上傳用戶:kr770906

  • Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been

    Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been of considerable interest in communications and radar applications demanding low probability of intercept and Detection (LPI/D), multipath immunity, high data throughput, precision ranging and localization.

    標簽: penetrating technology well-known wideband

    上傳時間: 2013-12-11

    上傳用戶:aysyzxzm

  • In this paper, we describe the development of a rapidly reconfigurable system in which the users’ ta

    In this paper, we describe the development of a rapidly reconfigurable system in which the users’ tacit knowledge and requirements are elicited via a process of Interactive Evolution, finding the image processing parameters to achieve the required goals without any need for specialised knowledge of the machine vision system. We show that the resulting segmentation can be quickly and easily evolved from scratch, and achieves Detection rates comparable to those of a hand-tuned system on a hot-rolled steel defect recognition problem.

    標簽: reconfigurable development the describe

    上傳時間: 2014-01-05

    上傳用戶:hopy

  • 1.an fpga implementation of the image space reconstruction algorithm for hyperspectral imaging analy

    1.an fpga implementation of the image space reconstruction algorithm for hyperspectral imaging analysis 2. fpga implemention of a median filter 3. fpga implementation of digital filters 4.hardware acceleration of edge Detection algorithm on fpgas 5.implementation and evaluation of image processing algorithms on reconfigurable architecture using C-based hardware descriptive languages 6. implementing 2D median filter in fpgas 7.視頻圖像處理與分析的網絡資源

    標簽: implementation reconstruction hyperspectral algorithm

    上傳時間: 2014-01-10

    上傳用戶:894898248

  • 在網絡安全中經常會遇到rootkit

    在網絡安全中經常會遇到rootkit,NSA安全和入侵檢測術語字典( NSA Glossary of Terms Used in Security and Intrusion Detection)對rootkit的定義如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.

    標簽: rootkit 網絡安全

    上傳時間: 2017-04-04

    上傳用戶:xaijhqx

主站蜘蛛池模板: 嘉义县| 正蓝旗| 娄烦县| 永川市| 南投市| 莆田市| 富锦市| 乐至县| 田东县| 嘉黎县| 鄢陵县| 肥乡县| 岳西县| 珲春市| 海伦市| 陕西省| 呈贡县| 眉山市| 云龙县| 柳河县| 清苑县| 兴安盟| 昭苏县| 昭平县| 台山市| 盱眙县| 无为县| 兰坪| 滨海县| 吉木乃县| 青神县| 金山区| 同仁县| 乐陵市| 年辖:市辖区| 连江县| 永善县| 定兴县| 天门市| 宁化县| 滦南县|