亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Detection

  • The Inter IC bus or I2C bus is a simple bidirectional two wire bus designed primarily for general co

    The Inter IC bus or I2C bus is a simple bidirectional two wire bus designed primarily for general control and data transfer communication between ICs. Some of the features of the I2C bus are: • Two signal lines, a serial data line (SDA) and a serial clock line (SCL), and ground are required. A 12V supply line (500mA max.) for powering the peripherals often may be present. • Each device connected to the bus is software addressable by a unique address and simple master/ slave relationships exist at all times masters can operate as master-transmitters or as master-receivers. • The I2C bus is a true multi-master bus including collision Detection and arbitration to prevent data corruption if two or more masters simultaneously initiate data transfer systems. • Serial, 8-bit oriented, bidirectional data transfers can be made at up to 100 KBit/s in the standard mode or up to 400 KBit/s in the fast mode.

    標簽: bus bidirectional primarily designed

    上傳時間: 2013-12-11

    上傳用戶:jeffery

  • The System Management BIOS Reference Specification addresses how motherboard and system vendors pres

    The System Management BIOS Reference Specification addresses how motherboard and system vendors present management information about their products in a standard format by extending the BIOS interface on Intel architecture systems. The information is intended to allow generic instrumentation to deliver this data to management applications that use CIM (the WBEM data model) or direct access and eliminates the need for error prone operations like probing system hardware for presence Detection.

    標簽: Specification motherboard Management Reference

    上傳時間: 2013-12-10

    上傳用戶:鳳臨西北

  • 一個自然語言處理的Java開源工具包。LingPipe目前已有很豐富的功能

    一個自然語言處理的Java開源工具包。LingPipe目前已有很豐富的功能,包括主題分類(Top Classification)、命名實體識別(Named Entity Recognition)、詞性標注(Part-of Speech Tagging)、句題檢測(Sentence Detection)、查詢拼寫檢查(Query Spell Checking)、興趣短語檢測(Interseting Phrase Detection)、聚類(Clustering)、字符語言建模(Character Language Modeling)、醫學文獻下載/解析/索引(MEDLINE Download, Parsing and Indexing)、數據庫文本挖掘(Database Text Mining)、中文分詞(Chinese Word Segmentation)、情感分析(Sentiment Analysis)、語言辨別(Language Identification)等API。

    標簽: LingPipe Java 自然語言處理 開源

    上傳時間: 2013-12-04

    上傳用戶:15071087253

  • 97 law to enhance the classic procedure Ridge wavelet extraction Modulus maximum for the wavelet

    97 law to enhance the classic procedure Ridge wavelet extraction Modulus maximum for the wavelet edge Detection Small spectral analysis method mallat classic procedure

    標簽: wavelet extraction the procedure

    上傳時間: 2014-01-09

    上傳用戶:xg262122

  • Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been

    Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been of considerable interest in communications and radar applications demanding low probability of intercept and Detection (LPI/D), multipath immunity, high data throughput, precision ranging and localization.

    標簽: penetrating technology well-known wideband

    上傳時間: 2014-01-22

    上傳用戶:edisonfather

  • It has been suggested1 that an appropriate figure of merit for a low probability of intercept and d

    It has been suggested1 that an appropriate figure of merit for a low probability of intercept and Detection (LPI/D) waveform is the quantity “Range x Bandwidth / Joule”. That is, the further the range, the wider the bandwidth and the less amount of energy used to achieve these values, the more covert is the resultant communications system.

    標簽: appropriate probability suggested1 intercept

    上傳時間: 2017-01-03

    上傳用戶:kr770906

  • Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been

    Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been of considerable interest in communications and radar applications demanding low probability of intercept and Detection (LPI/D), multipath immunity, high data throughput, precision ranging and localization.

    標簽: penetrating technology well-known wideband

    上傳時間: 2013-12-11

    上傳用戶:aysyzxzm

  • In this paper, we describe the development of a rapidly reconfigurable system in which the users’ ta

    In this paper, we describe the development of a rapidly reconfigurable system in which the users’ tacit knowledge and requirements are elicited via a process of Interactive Evolution, finding the image processing parameters to achieve the required goals without any need for specialised knowledge of the machine vision system. We show that the resulting segmentation can be quickly and easily evolved from scratch, and achieves Detection rates comparable to those of a hand-tuned system on a hot-rolled steel defect recognition problem.

    標簽: reconfigurable development the describe

    上傳時間: 2014-01-05

    上傳用戶:hopy

  • 1.an fpga implementation of the image space reconstruction algorithm for hyperspectral imaging analy

    1.an fpga implementation of the image space reconstruction algorithm for hyperspectral imaging analysis 2. fpga implemention of a median filter 3. fpga implementation of digital filters 4.hardware acceleration of edge Detection algorithm on fpgas 5.implementation and evaluation of image processing algorithms on reconfigurable architecture using C-based hardware descriptive languages 6. implementing 2D median filter in fpgas 7.視頻圖像處理與分析的網絡資源

    標簽: implementation reconstruction hyperspectral algorithm

    上傳時間: 2014-01-10

    上傳用戶:894898248

  • 在網絡安全中經常會遇到rootkit

    在網絡安全中經常會遇到rootkit,NSA安全和入侵檢測術語字典( NSA Glossary of Terms Used in Security and Intrusion Detection)對rootkit的定義如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.

    標簽: rootkit 網絡安全

    上傳時間: 2017-04-04

    上傳用戶:xaijhqx

主站蜘蛛池模板: 龙岩市| 遂溪县| 汤原县| 宜兰市| 航空| 巫山县| 合肥市| 正安县| 将乐县| 石狮市| 昌吉市| 河东区| 瑞丽市| 宜宾市| 清流县| 常德市| 同心县| 阆中市| 班戈县| 静乐县| 长乐市| 焉耆| 霍州市| 拜城县| 精河县| 开原市| 扬中市| 太白县| 葵青区| 云阳县| 黄冈市| 廉江市| 芜湖市| 巩留县| 和龙市| 江城| 进贤县| 天等县| 磐安县| 紫金县| 镶黄旗|