simple ATM [Automatic Teller Machine] system the basic functions Login including write-offs, inquiries, deposits, withdrawals and alter the code. Simulation of ATM terminal users logged in, their account numbers and passwords through the ATM network to transmit to the server, ATM database server based on the information to confirm the account number and password is correct, the results back to the ATM terminal. If the correct account number and password, the ATM into the next terminal interface Otherwise prompt mistakes. Cancellation notice for the operation of the server ATM transactions concluded inquiries, deposits, withdrawals and alter the code operations are first sent an order to ATM servers, ATM by the database server implementation of the corresponding operation and operating res
標簽: write-offs Automatic functions including
上傳時間: 2014-01-20
上傳用戶:semi1981
This code takes data received from a bearing and converts it from the time domain to the frequency domain in order to determine bearing defect size.
標簽: from frequency the converts
上傳時間: 2017-03-11
上傳用戶:sunjet
合同與報價系統 PB8開發,sysbase sql anywhere7 默認密碼:user:admin password:admin ODBC設置為 Database=HxFirm UserId=tt ServerName=order LogId=tt
上傳時間: 2017-03-17
上傳用戶:龍飛艇
FIR Filter Design This chapter treats the design of linear-phase FIR filters. The assignments are divided in two parts, the first part focuses on the design of FIR filters using the window design method while the second part focuses on design
標簽: linear-phase assignments FIR chapter
上傳時間: 2017-03-20
上傳用戶:yoleeson
this program is insertion_sort that writted with c++. this program get an array and sort it in order n^2.
標簽: program this insertion_sort writted
上傳時間: 2014-11-09
上傳用戶:rocketrevenge
This paper shows the development of a 1024-point radix-4 FFT VHDL core for applications in hardware signal processing, targeting low-cost FPGA technologies. The developed core is targeted into a Xilinx廬 Spartan鈩?3 XC3S200 FPGA with the inclusion of a VGA display interface and an external 16-bit data acquisition system for performance evaluation purposes. Several tests were performed in order to verify FFT core functionality, besides the time performance analysis highlights the core advantages over commercially available DSPs and Pentium-based PCs. The core is compared with similar third party IP cores targeting resourceful FPGA technologies. The novelty of this work is to provide a lowcost, resource efficient core for spectrum analysis applications.
標簽: applications development hardware paper
上傳時間: 2013-12-21
上傳用戶:jichenxi0730
It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon. 1, p. 224) have however simplified material parameters in order to facilitate easier realization as well as to avoid infinities in optical constants. Here we show that the cylindrical cloaks with simplified material parameters inherently allow the zeroth-order cylindrical wave to pass through the cloak as if the cloak is made of a homogeneous isotropic medium, and thus visible. To all high-order cylindrical waves, our numerical simulation suggests that the simplified cloak inherits some properties of the ideal cloak, but finite scatterings exist.
標簽: invisibility constructed proposed electrom
上傳時間: 2013-12-18
上傳用戶:13215175592
A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak with the ideal material parameters is a perfect invisibility cloak by systematically studying the change of the scattering coefficients from the near-ideal case to the ideal one. However, due to the slow convergence of the zeroth order scattering coefficients, a tiny perturbation on the cloak would induce a noticeable field scattering and penetration.
標簽: cylindrical scattering expansion developed
上傳時間: 2017-03-30
上傳用戶:lhc9102
In an electromagnetic cloak based on a transformation approach, reduced sets of material properties are generally favored due to their easier implementation in reality, although a seemingly inevitable drawback of undesired reflection exists in such cloaks. Here we suggest using high-order transformations to create smooth moduli at the outer boundary of the cloak, therefore completely eliminating the detrimental scattering within the limit of geometric optics. We apply this scheme to a non-magnetic cylindrical cloak and demonstrate that the scattered field is reduced substantially in a cloak with optimal quadratic transformation as compared to its linear counterpart.
標簽: electromagnetic transformation properties approach
上傳時間: 2017-03-30
上傳用戶:pkkkkp
In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessary in order to be able to compare or integrate the data obtained from different measurements. Image registration is the process of transforming the different sets of data into one coordinate system. To be precise it involves finding transformations that relate spatial information conveyed in one image to that in another or in physical space. Image registration is performed on a series of at least two images, where one of these images is the reference image to which all the others will be registered. The other images are referred to as target images.
標簽: different computer acquired sampling
上傳時間: 2013-12-28
上傳用戶:來茴