亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

ONE-on-One

  • CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data o

    CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data on a CAN network, and how to move information to and from CAN RAM message objects. Each C8051F040-TB CAN node is configured to send a message when it s P3.7 button is depressed/released, with a 0x11 to indicate the button is pushed, and 0x00 when released. Each node also has a message object configured to receive messages. The C8051 tests the received data and will turn on/off the target board s LED. When one target is loaded with CAN2.c and the other is loaded with CAN1.c, one target board s push-button will control the other target board s LED, establishing a simple control link via the CAN bus and can be observed directly on the target boards.

    標簽: CAN configuring and transmit

    上傳時間: 2013-12-11

    上傳用戶:weiwolkt

  • The combinatorial core of the OVSF code assignment problem that arises in UMTS is to assign some no

    The combinatorial core of the OVSF code assignment problem that arises in UMTS is to assign some nodes of a complete binary tree of height h (the code tree) to n simultaneous connections, such that no two assigned nodes (codes) are on the same root-to-leaf path. Each connection requires a code on a specified level. The code can change over time as long as it is still on the same level. We consider the one-step code assignment problem: Given an assignment, move the minimum number of codes to serve a new request. Minn and Siu proposed the so-called DCAalgorithm to solve the problem optimally. We show that DCA does not always return an optimal solution, and that the problem is NP-hard. We give an exact nO(h)-time algorithm, and a polynomial time greedy algorithm that achieves approximation ratio Θ(h). Finally, we consider the online code assignment problem for which we derive several results

    標簽: combinatorial assignment problem arises

    上傳時間: 2014-01-19

    上傳用戶:BIBI

  • 游戲開發數據結構Data Structures for Game Programmers The Goodies Directory contains all sorts of stuff. For

    游戲開發數據結構Data Structures for Game Programmers The Goodies Directory contains all sorts of stuff. For example, there are the four 3rd-Party libraries used in the book, SDL, SDL_TTF, FreeType (which SDL_TTF uses), and STLPort, which is one implementation of the Standard Template Library. Also, there are four articles on trees and SDL in the articles directory. These supplement the material in the book.

    標簽: Programmers Structures Directory contains

    上傳時間: 2017-02-12

    上傳用戶:qoovoop

  • This book uses the Python language to teach pro - gramming concepts and problem -solving skills,

    This book uses the Python language to teach pro - gramming concepts and problem -solving skills, without assuming any previous program- ming experience. With easy-to-understand examples, pseudocode, flowcharts, and other tools, the student learns how to design the logic of programs and then implement those programs using Python. This book is ideal for an introductory programming course or a programming logic and design course using Python as the language. As with all the boolts in the Starting Out With series, the hallmark of this text is its clear, friendly, and easy -to-understand writing. In addition, it is rich in example programs that are concise and practical. The programs in this book include short examples that highlight specific programming topics, as well as more involved examples that focus on problem solving. Each chapter provides one or more case studies that provide step -by-step analysis of a specific problem and shows the student how to solve it.

    標簽: language gramming concepts problem

    上傳時間: 2014-01-12

    上傳用戶:獨孤求源

  • A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di

    A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak with the ideal material parameters is a perfect invisibility cloak by systematically studying the change of the scattering coefficients from the near-ideal case to the ideal one. However, due to the slow convergence of the zeroth order scattering coefficients, a tiny perturbation on the cloak would induce a noticeable field scattering and penetration.

    標簽: cylindrical scattering expansion developed

    上傳時間: 2017-03-30

    上傳用戶:lhc9102

  • In computer vision, sets of data acquired by sampling the same scene or object at different times, o

    In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessary in order to be able to compare or integrate the data obtained from different measurements. Image registration is the process of transforming the different sets of data into one coordinate system. To be precise it involves finding transformations that relate spatial information conveyed in one image to that in another or in physical space. Image registration is performed on a series of at least two images, where one of these images is the reference image to which all the others will be registered. The other images are referred to as target images.

    標簽: different computer acquired sampling

    上傳時間: 2013-12-28

    上傳用戶:來茴

  • This book brings together indispensable knowledge for building efficient, high-value, Linux-based em

    This book brings together indispensable knowledge for building efficient, high-value, Linux-based embedded products: information that has never been assembled in one place before. Drawing on years of experience as an embedded Linux consultant and field application engineer, Christopher Hallinan offers solutions for the specific technical issues you re most likely to face, demonstrates how to build an effective embedded Linux environment, and shows how to use it as productively as possible.

    標簽: indispensable Linux-based high-value efficient

    上傳時間: 2014-01-24

    上傳用戶:ANRAN

  • SCSI Multimedia Commands 鈥?3 (MMC-3) T10/1363-D 5.16 READ CAPACITY Command The READ CAPACITY comm

    SCSI Multimedia Commands 鈥?3 (MMC-3) T10/1363-D 5.16 READ CAPACITY Command The READ CAPACITY command (Table 144) provides a means for the Initiator to request information regarding the capacity of the Logical Unit. This command shall not report the correct capacity of the recorded data for CD-R, CD-RW and DVD-R/-RW media that does not have a Lead-out in the last Session or last Border-out. For CD-ROM, the returned logical block address is modified to allow returning a possibly inexact value (but one with a known error bound) based on the Table of Contents data

    標簽: CAPACITY READ Multimedia Commands

    上傳時間: 2017-04-17

    上傳用戶:liuchee

  • pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr

    pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.

    標簽: perceptual implementation algorithms fingerpr

    上傳時間: 2013-12-08

    上傳用戶:星仔

  • I ll probably write up a short article next week outlining how the ActionScript works, so people can

    I ll probably write up a short article next week outlining how the ActionScript works, so people can modify it, and work with it more easily in Flex. You can download the component and source code here. There are some instructions in the FLA on how to use it. Note that this is not a compiled component, so it won t show up in the components panel. You will have to copy the component, and the source file into your project. If anyone really wants a compiled version, let me know and I can provide one. As always, I d love to hear how people use it, and would appreciate it if you would post back to the comments if you make any significant modifications so that other people can benefit from them.

    標簽: ActionScript outlining probably article

    上傳時間: 2017-04-20

    上傳用戶:c12228

主站蜘蛛池模板: 南宫市| 饶阳县| 阜平县| 桂平市| 衢州市| 丽水市| 九龙坡区| 都匀市| 丰台区| 万载县| 宜黄县| 金阳县| 秦皇岛市| 理塘县| 宜宾县| 神农架林区| 清水河县| 建阳市| 马尔康县| 绥中县| 合山市| 宣化县| 外汇| 阜宁县| 贵港市| 偃师市| 江口县| 钟祥市| 汉沽区| 宁河县| 博客| 湘潭县| 武清区| 原阳县| 田东县| 北宁市| 清原| 双流县| 泽普县| 通山县| 康平县|