本文檔介紹了如何使用各種內嵌工具,函數和其他一些小技巧來加強使用matlab的速度和效率,是廣大愛好者必讀的文檔。具體內容請參閱文檔。
Learn how to use the Profiler tool, vectorized functions, and other tricks to writing efficient MATLAB code. This article includes how to convert any array into a column vector, bounding a value without if statements, and repeating/tiling a vector without repmat.
contents:
* The Profiler
* Array Preallocation
* JIT Acceleration
* Vectorization
* Inlining Simple Functions
* Referencing Operations
* Numerical Integration
* Signal Processing
* Miscellaneous Tricks
高級C語言源程序范例
Source Code from Que publications
"Advanced C" Techniques and Aplications
ISBN 0-88022-162-3 Advanced C Techniques and Applications QUE
Unpack into a directory with the following structure
root - contents of this arc.
root/bgs contents of BGS.arc
root/uis contents of UIS.arc
root/grfuser contents og grfuser.arc
WiiFuse is a FUSE filesystem module for Linux and Mac OS X. It will let you mount a Wii disc ISO and browse its contents, and it contains a server which may be run on the Wii so you can browse the contents of the Wii s internal filesystem.
This GUI is an updated and enhanced version of the “StructBrowser” utility submitted to MatLab Central in May 2003. It comes with new interface and an enhanced display. It uses Microsoft TreeView control to display and explore any kind of MatLab structures. The CRC ExploreStruct was designed to expose the contents of the array struct to any depth and plot any of the components. This tool is very useful for programmers using structures in their code
SCSI Multimedia Commands 鈥?3 (MMC-3)
T10/1363-D
5.16 READ CAPACITY Command
The READ CAPACITY command (Table 144) provides a means for the Initiator to request information
regarding the capacity of the Logical Unit. This command shall not report the correct capacity of the
recorded data for CD-R, CD-RW and DVD-R/-RW media that does not have a Lead-out in the last
Session or last Border-out. For CD-ROM, the returned logical block address is modified to allow returning
a possibly inexact value (but one with a known error bound) based on the Table of contents data
Alicebot and AIML Software Implementations
The AI Foundation and our community has three open source free software "products"
1. The specification of the AIML language itself.
2. Various free software interpreters that implement (1).
3. The contents of the ALICE brain written in AIML (and other free AIML sets that exist).
The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for
firmware updating. The instruction set of the W78E58B is fully compatible with the standard 8052. The
W78E58B contains a 32K bytes of main ROM and a 4K bytes of auxiliary ROM which allows the
contents of the 32KB main ROM to be updated by the loader program located at the 4KB auxiliary
ROM 512 bytes of on-chip RAM four 8-bit bi-directional and bit-addressable I/O ports an additional 4-
bit port P4 three 16-bit timer/counters a serial port. These peripherals are supported by a eight
sources two-level interrupt capability. To facilitate programming and verification, the ROM inside the
W78E58B allows the program memory to be programmed and read electronically. Once the code is
confirmed, the user can protect the code for security
This book introduces embedded systems to C and C++ programmers. Topics include testing memory devices, writing and erasing Flash memory, verifying nonvolatile memory contents, controlling on-chip peripherals, device driver design and implementation, optimizing embedded code for size and speed, and making the most of C++ without a performance penalty.
Compression using lempel-ziv
-for a dictionary size of 2k
-provide dictionary
Lempel ziv algorithm is a dictionary based algorithm that addresses byte sequences from former contents instead of the original data. This algorithm consists of a rule for parsing strings of symbols from a finite alphabet into substrings, whose lengths do not exceed a prescribed integer and a coding scheme which maps these substrings sequentially into uniquely decipherable code words of fixed length. The strings are selected so that they have nearly equal probability of occurrence. Frequently-occurring symbols are grouped into longer strings while occasional symbols appear in short strings.