-
Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The original Tiger Hash code was taken from Tiger.Net which is written in Visual Basic. NET.
Tiger Tree Hash算法的C#實現(xiàn)!
標簽:
Tiger
Hash
Tree
constructed
上傳時間:
2015-10-09
上傳用戶:vodssv
-
A system simulation environment in Matlab/Simulink of RFID is constructed in this paper.
Special attention is emphasized on the analog/RF circuit.Negative effects are concerned in the system
model,such as phase noise of the local oscillator,TX-RX coupling,reflection of the environment,
AWGN noise,DC offset,I/Q mismatch,etc.Performance of the whole system can be evaluated by
changing the coding method,parameters of building blocks,and operation distance.Finally,some
simulation results are presented in this paper.
標簽:
environment
constructed
simulation
Simulink
上傳時間:
2014-01-09
上傳用戶:zhangliming420
-
A very well constructed C# programming book that will allow even non programmers to get a quick grasp on C# basics.
標簽:
constructed
programming
programmers
allow
上傳時間:
2017-03-22
上傳用戶:hewenzhi
-
It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic
illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally
demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon.
1, p. 224) have however simplified material parameters in order to facilitate easier realization
as well as to avoid infinities in optical constants. Here we show that the cylindrical cloaks with
simplified material parameters inherently allow the zeroth-order cylindrical wave to pass through
the cloak as if the cloak is made of a homogeneous isotropic medium, and thus visible. To all
high-order cylindrical waves, our numerical simulation suggests that the simplified cloak inherits
some properties of the ideal cloak, but finite scatterings exist.
標簽:
invisibility
constructed
proposed
electrom
上傳時間:
2013-12-18
上傳用戶:13215175592
-
Convex constructed uisng Matlab
標簽:
constructed
Convex
Matlab
uisng
上傳時間:
2014-09-10
上傳用戶:waizhang
-
本文依據(jù)集成電路設(shè)計方法學(xué),探討了一種基于標準Intel 8086 微處理器的單芯片計算機平臺的架構(gòu)。研究了其與SDRAM,8255 并行接口等外圍IP 的集成,并在對AMBA協(xié)議和8086 CPU分析的基礎(chǔ)上,采用遵從AMBA傳輸協(xié)議的系統(tǒng)總線代替?zhèn)鹘y(tǒng)的8086 CPU三總線結(jié)構(gòu),搭建了基于8086 IP 軟核的單芯片計算機系統(tǒng),并實現(xiàn)了FPGA 功能演示。關(guān)鍵詞:微處理器; SoC;單芯片計算機;AMBA 協(xié)議
Design of 8086 CPU Based Computer-on-a-chip System(School of Electrical Engineering and Automation, Heifei University of Technology, Hefei, 230009,China)Abstract: According to the IC design methodology, this paper discusses the design of one kind of Computer-on-a-chip system architecture, which is based on the standard Intel8086 microprocessor,investigates how to integrate the 8086 CPU and peripheral IP such as, SDRAM controller, 8255 PPI etc. Based on the analysis of the standard Intel8086 microprocessor and AMBA Specification,the Computer-on-a-chip system based on 8086 CPU which uses AMBA bus instead of traditional three-bus structure of 8086 CPU is constructed, and the FPGA hardware emulation is fulfilled.Key words: Microprocessor; SoC; Computer-on-a-chip; AMBA Specification
標簽:
8086
CPU
單芯片
計算機系統(tǒng)
上傳時間:
2013-12-27
上傳用戶:kernor
-
在研究傳統(tǒng)家用燃氣報警器的基礎(chǔ)上,以ZigBee協(xié)議為平臺,構(gòu)建mesh網(wǎng)狀網(wǎng)絡(luò)實現(xiàn)網(wǎng)絡(luò)化的智能語音報警系統(tǒng)。由于傳感器本身的溫度和實際環(huán)境溫度的影響,傳感器標定后采用軟件補償方法。為了減少系統(tǒng)費用,前端節(jié)點采用半功能節(jié)點設(shè)備,路由器和協(xié)調(diào)器采用全功能節(jié)點設(shè)備,構(gòu)建mesh網(wǎng)絡(luò)所形成的家庭內(nèi)部報警系統(tǒng),通過通用的電話接口連接到外部的公用電話網(wǎng)絡(luò),啟動語音模塊進行報警。實驗結(jié)果表明,在2.4 GHz頻率下傳輸,有墻等障礙物的情況下,節(jié)點的傳輸距離大約為35 m,能夠滿足家庭需要,且系統(tǒng)工作穩(wěn)定,但在功耗方面仍需進一步改善。
Abstract:
On the basis of studying traditional household gas alarm system, this paper proposed the platform for the ZigBee protocol,and constructed mesh network to achieve network-based intelligent voice alarm system. Because of the sensor temperature and the actual environment temperature, this system design used software compensation after calibrating sensor. In order to reduce system cost, semi-functional node devices were used as front-end node, however, full-function devices were used as routers and coordinator,constructed alarm system within the family by building mesh network,connected to the external public telephone network through the common telephone interface, started the voice alarm module. The results indicate that nodes transmit about 35m in the distance in case of walls and other obstacles by 2.4GHz frequency transmission, this is able to meet family needs and work steadily, but still needs further improvement in power consumption.
標簽:
ZigBee
無線智能
家
報警系統(tǒng)
上傳時間:
2013-10-30
上傳用戶:swaylong
-
This m file analyzes a coherent binary phase shift keyed(BPSK) and a amplitude shift keyed(ASK) communication system. The receiver uses a correlator(mixer-integrator[LPF]) configuration with BER measurements comparing measured and theoretical results. The bandpass and low pass used in the receiver are constructed using z transforms.
標簽:
keyed
shift
amplitude
analyzes
上傳時間:
2015-09-26
上傳用戶:liuchee
-
The book consists of three sections. The first, foundations, provides a tutorial overview of the principles underlying data mining algorithms and their application. The presentation emphasizes intuition rather than rigor. The second section, data mining algorithms, shows how algorithms are constructed to solve specific problems in a principled manner. The algorithms covered include trees and rules for classification and regression, association rules, belief networks, classical statistical models, nonlinear models such as neural networks, and local memory-based models. The third section shows how all of the preceding analysis fits together when applied to real-world data mining problems. Topics include the role of metadata, how to handle missing data, and data preprocessing.
標簽:
foundations
The
consists
sections
上傳時間:
2017-06-22
上傳用戶:lps11188
-
RS_latch using vhdl,
When using static gates as building blocks, the most fundamental latch is the simple SR latch, where S and R stand for set and reset. It can be constructed from a pair of cross-coupled NOR (Not OR) logic gates. The stored bit is present on the output marked Q.
Normally, in storage mode, the S and R inputs are both low, and feedback maintains the Q and Q outputs in a constant state, with Q the complement of Q. If S (Set) is pulsed high while R is held low, then the Q output is forced high, and stays high when S returns to low similarly, if R (Reset) is pulsed high while S is held low, then the Q output is forced low, and stays low when R returns to low.
標簽:
using
fundamental
the
RS_latch
上傳時間:
2017-07-30
上傳用戶:努力努力再努力