-
The files adi_ssl_init.h and adi_ssl_init.c are used to define the functions
adi_ssl_Init() and 慳di_ssl_Terminate()?which initialize and terminate all the
Blackfin System Services in the appropriate order, for a particular EZ-Kit, depending
on the Blackfin processor used.
標簽:
adi_ssl_init
adi_ssl_Init
functions
define
上傳時間:
2014-01-21
上傳用戶:sammi
-
C280x C/C++ Header Files and Peripheral Examples
The DSP28xx C/C++ peripheral header files and example projects files facilitate writing C/C++ Code for the TI鈥檚 28xx MCUs. The code can be used as a learning tool or as the basis for a development platform depending on the current needs of the user. We suggest that you immediately download these header files in order for an easier transition to understanding the 28xx peripherals.
標簽:
Peripheral
peripheral
and
Examples
上傳時間:
2014-01-24
上傳用戶:fandeshun
-
Besides enhanced looks and advanced features, one of the best things about Swing is its pluggable look and feel (PLAF). PLAF architecture allows seamless changes in the appearance of an application and the way an application interacts with the user. However, designing and developing a PLAF is much more exhaustive and complex. On the other hand, themes provide a simple alternative to change look and feel of the swing application. Themes are easier to implement and they enhance the visual appeal of the application UI using the default Java look and feel.
Theme mechanism allows a developer to easily specify the default colors, fonts and icons used by the look and feel (L&F). It allows developers to write their own themes giving them a choice to show their application GUI the way they want it, rather than depending on the defaults provided by the system.
標簽:
pluggable
enhanced
advanced
features
上傳時間:
2014-01-23
上傳用戶:253189838
-
Introduction
? ?
The ARM Cortex -A8 microprocessor is the first applications microprocessor in ARM!ˉs
new Cortex family. With high performance and power efficiency, it targets a wide
variety of mobile and consumer applications including mobile phones, set-top boxes,
gaming consoles and automotive navigation/entertainment systems. The Cortex-A8
processor spans a range of performance points depending on the implementation,
delivering over to 2000 Dhrystone MIPS (DMIPS) of performance for demanding
consumer applications and consuming less than 300mW for low-power mobile devices.
This translates into a large increase in processing capability while staying with the
power levels of previous generations of mobile devices. Consumer applications will
benefit from the reduced heat dissipation and resulting lower packaging and integration
costs.
標簽:
microprocessor
Introduction
applications
Cortex
上傳時間:
2013-12-09
上傳用戶:xzt
-
The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of classified examples a decision tree is induced, biased by the information gain measure, which heuristically leads to small trees. The examples are given in attribute-value representation. The set of possible classes is finite. Only tests, that split the set of instances of the underlying example languages depending on the value of a single attribute are supported.
標簽:
algorithm
induction
decision
top-down
上傳時間:
2017-08-20
上傳用戶:hzy5825468
-
In this paper we present a classifier called bi-density twin support vector machines (BDTWSVMs) for data classification. In the training stage, BDTWSVMs first compute the relative density degrees for all training points using the intra-class graph whose weights are determined by a local scaling heuristic strategy, then optimize a pair of nonparallel hyperplanes through two smaller sized support vector machine (SVM)-typed problems. In the prediction stage, BDTWSVMs assign to the class label depending
on the kernel density degree-based distances from each test point to the two hyperplanes. BDTWSVMs not only inherit good properties from twin support vector machines (TWSVMs) but also give good description for data points. The experimental results on toy as well as publicly available datasets
indicate that BDTWSVMs compare favorably with classical SVMs and TWSVMs in terms of generalization
標簽:
recognition
Bi-density
machines
support
pattern
vector
twin
for
上傳時間:
2019-06-09
上傳用戶:lyaiqing
-
obot control, a subject aimed at making robots behave as desired, has been
extensively developed for more than two decades. Among many books being
published on this subject, a common feature is to treat a robot as a single
system that is to be controlled by a variety of control algorithms depending on
different scenarios and control objectives. However, when a robot becomes more
complex and its degrees of freedom of motion increase substantially, the needed
control computation can easily go beyond the scope a modern computer can
handle within a pre-specified sampling period. A solution is to base the control
on subsystem dynamics.
標簽:
decomposition
virtual
control
上傳時間:
2019-09-04
上傳用戶:txb96
-
During the past decade, many wireless communication techniques have been
developedto achievevariousgoals suchas higherdata rate,morerobustlink quality,
and higher number of users in a given bandwidth. For wireless communication
systems, depending on the availability of a feedback link, two approaches can be
considered: namely open and closed loop. Open loop communication system that
does not exploit the channel knowledge at the transmitter is now well understood
from both a theoretical and practical point of view.
標簽:
Communication
Strategies
Feedback
Wireless
for
上傳時間:
2020-05-27
上傳用戶:shancjb
-
A wireless communication network can be viewed as a collection of nodes, located in some domain, which
can in turn be transmitters or receivers (depending on the network considered, nodes may be mobile users,
base stations in a cellular network, access points of a WiFi mesh etc.). At a given time, several nodes
transmit simultaneously, each toward its own receiver. Each transmitter–receiver pair requires its own
wireless link. The signal received from the link transmitter may be jammed by the signals received from
the other transmitters. Even in the simplest model where the signal power radiated from a point decays in
an isotropic way with Euclidean distance, the geometry of the locations of the nodes plays a key role since
it determines the signal to interference and noise ratio (SINR) at each receiver and hence the possibility of
establishing simultaneously this collection of links at a given bit rate. The interference seen by a receiver is
the sum of the signal powers received from all transmitters, except its own transmitter.
標簽:
Stochastic
Geometry
Networks
Wireless
Volume
and
II
上傳時間:
2020-06-01
上傳用戶:shancjb
-
The field of cyber security, or information security, or information
assurance, depending on your preference, is an interdisciplinary one.
It is part computer science, part statistics, part psychology, part law,
and a part of many other fields. Moreover, any cyber security practi-
tioner needs to know what he or she is protecting and where to pri-
oritize. Just as someone should not spend $100 to protect something
worth $10, one cannot be blind to the other disciplines.
標簽:
Security
Smart
Grid
上傳時間:
2020-06-07
上傳用戶:shancjb