Using spectra to calculate strength of reflections and losses in passive cavities.The wavelength, reflection spectrum and transmission spectrum should be in the FIRST 3 columns of an Excel file, which is selected when the cavity.m Matlab file is run.
標簽: reflections wavelength calculate cavities
上傳時間: 2013-12-24
上傳用戶:sz_hjbf
Book: Windows Graphics Programming Win32 GDI and DirectDraw Author: Feng Yuan Publisher: Prentice Hall PTR FIRST Edition December 01, 2000 ISBN: 0-13-086985-6, 1234 pages 從Chinaitlab上下載后不能閱讀,這是重新Compile、整理后的版本
標簽: Programming DirectDraw Publisher Graphics
上傳時間: 2014-01-24
上傳用戶:qunquan
With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the FIRST time, the creator and maintainer of User Mode Linux shows how to put it to work hands-on. Jeff Dike covers everything from getting started through running enterprise-class User Mode Linux servers. You ll find authoritative advice on bootup, compilation, administration, specialized configurations, and much more.
標簽: Linux computer machines virtual
上傳時間: 2013-12-19
上傳用戶:xinzhch
LL(1)文法使用的是確定的自頂向下的分析技術。LL(1)的含義是:第一個L表明自頂向下分析是從左向右掃描輸入串,第2個L表明分析過程中將使用最左推導,1表明只需向右看一個符號便可決定如何推導,即選擇哪個產生式(規則)進行推導。 LL(1)文法的判別需要依次計算FIRST集、FOLLOW集和SELLECT集,然后判斷是否為LL(1)文法,最后再進行句子分析。
上傳時間: 2015-12-26
上傳用戶:kikye
#if !defined(AFX_GAQUEEN_H__C26AE0A3_F9B4_426F_A324_B460CC7946CB__INCLUDED_) #define AFX_GAQUEEN_H__C26AE0A3_F9B4_426F_A324_B460CC7946CB__INCLUDED_ #if _MSC_VER > 1000 #pragma once #endif // _MSC_VER > 1000 class CGAQueen { public: CGAQueen(int nPopulation,int nIteration,float Mutation,int mChBoard) virtual ~CGAQueen() void Clear() // to clear chess board with 0 value void InitialPopulation() // to create the FIRST and initial randompopulation void FillArea(int index) // to fill chess board with desired chromosome int CostFunc(int index) // determine the cost of matrix[index][index] void PopulationSort() // to sort population from the best to the worst void GenerateCrossOverMatrix() // a way to create children from parent is CcrossOver void Mating() // to create children from parents void Ap
標簽: AFX_GAQUEEN_H INCLUDED defined define
上傳時間: 2015-12-27
上傳用戶:wuyuying
We address the problem of blind carrier frequency-offset (CFO) estimation in quadrature amplitude modulation, phase-shift keying, and pulse amplitude modulation communications systems.We study the performance of a standard CFO estimate, which consists of FIRST raising the received signal to the Mth power, where M is an integer depending on the type and size of the symbol constellation, and then applying the nonlinear least squares (NLLS) estimation approach. At low signal-to noise ratio (SNR), the NLLS method fails to provide an accurate CFO estimate because of the presence of outliers. In this letter, we derive an approximate closed-form expression for the outlier probability. This enables us to predict the mean-square error (MSE) on CFO estimation for all SNR values. For a given SNR, the new results also give insight into the minimum number of samples required in the CFO estimation procedure, in order to ensure that the MSE on estimation is not significantly affected by the outliers.
標簽: frequency-offset estimation quadrature amplitude
上傳時間: 2014-01-22
上傳用戶:牛布牛
《為Windows Vista編寫安全的代碼》,2007年出版 Providing developers with FIRST-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars
上傳時間: 2016-01-07
上傳用戶:zxc23456789
This forced me to write about more interesting and comprehensive sorting methods, the result of which is this one. Through this writing I have tried to give in-depth coverage of the entire sort algorithm I hope Peter wouldn t mind reading it. This article assumes that you really don t know about the iterations, looping, and so forth hence, it explains these in detail FIRST.
標簽: comprehensive interesting methods sorting
上傳時間: 2016-01-10
上傳用戶:athjac
ICA介紹課件。There has been a wide discussion about the application of Independence Component Analysis (ICA) in Signal Processing, Neural Computation and Finance, FIRST introduced as a novel tool to separate blind sources in a mixed signal. The Basic idea of ICA is to reconstruct from observation sequences the hypothesized independent original sequences
標簽: Independence application discussion Component
上傳時間: 2016-01-12
上傳用戶:AbuGe
This directory contains the memtest 8051 firmware for the Anchor Chips EZ-USB chip. The purpose of this software is to test the different memory segments in the Ez-Usb chip. This example will output the string "good" on the 7 segment LED if the mem test passes, or it will output the FIRST address where the memtest fails.
標簽: directory the contains firmware
上傳時間: 2013-12-16
上傳用戶:gdgzhym