亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

detectiOn

  • The Inter IC bus or I2C bus is a simple bidirectional two wire bus designed primarily for general co

    The Inter IC bus or I2C bus is a simple bidirectional two wire bus designed primarily for general control and data transfer communication between ICs. Some of the features of the I2C bus are: • Two signal lines, a serial data line (SDA) and a serial clock line (SCL), and ground are required. A 12V supply line (500mA max.) for powering the peripherals often may be present. • Each device connected to the bus is software addressable by a unique address and simple master/ slave relationships exist at all times masters can operate as master-transmitters or as master-receivers. • The I2C bus is a true multi-master bus including collision detectiOn and arbitration to prevent data corruption if two or more masters simultaneously initiate data transfer systems. • Serial, 8-bit oriented, bidirectional data transfers can be made at up to 100 KBit/s in the standard mode or up to 400 KBit/s in the fast mode.

    標(biāo)簽: bus bidirectional primarily designed

    上傳時間: 2013-12-11

    上傳用戶:jeffery

  • The System Management BIOS Reference Specification addresses how motherboard and system vendors pres

    The System Management BIOS Reference Specification addresses how motherboard and system vendors present management information about their products in a standard format by extending the BIOS interface on Intel architecture systems. The information is intended to allow generic instrumentation to deliver this data to management applications that use CIM (the WBEM data model) or direct access and eliminates the need for error prone operations like probing system hardware for presence detectiOn.

    標(biāo)簽: Specification motherboard Management Reference

    上傳時間: 2013-12-10

    上傳用戶:鳳臨西北

  • 一個自然語言處理的Java開源工具包。LingPipe目前已有很豐富的功能

    一個自然語言處理的Java開源工具包。LingPipe目前已有很豐富的功能,包括主題分類(Top Classification)、命名實體識別(Named Entity Recognition)、詞性標(biāo)注(Part-of Speech Tagging)、句題檢測(Sentence detectiOn)、查詢拼寫檢查(Query Spell Checking)、興趣短語檢測(Interseting Phrase detectiOn)、聚類(Clustering)、字符語言建模(Character Language Modeling)、醫(yī)學(xué)文獻下載/解析/索引(MEDLINE Download, Parsing and Indexing)、數(shù)據(jù)庫文本挖掘(Database Text Mining)、中文分詞(Chinese Word Segmentation)、情感分析(Sentiment Analysis)、語言辨別(Language Identification)等API。

    標(biāo)簽: LingPipe Java 自然語言處理 開源

    上傳時間: 2013-12-04

    上傳用戶:15071087253

  • 97 law to enhance the classic procedure Ridge wavelet extraction Modulus maximum for the wavelet

    97 law to enhance the classic procedure Ridge wavelet extraction Modulus maximum for the wavelet edge detectiOn Small spectral analysis method mallat classic procedure

    標(biāo)簽: wavelet extraction the procedure

    上傳時間: 2014-01-09

    上傳用戶:xg262122

  • Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been

    Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been of considerable interest in communications and radar applications demanding low probability of intercept and detectiOn (LPI/D), multipath immunity, high data throughput, precision ranging and localization.

    標(biāo)簽: penetrating technology well-known wideband

    上傳時間: 2014-01-22

    上傳用戶:edisonfather

  • It has been suggested1 that an appropriate figure of merit for a low probability of intercept and d

    It has been suggested1 that an appropriate figure of merit for a low probability of intercept and detectiOn (LPI/D) waveform is the quantity “Range x Bandwidth / Joule”. That is, the further the range, the wider the bandwidth and the less amount of energy used to achieve these values, the more covert is the resultant communications system.

    標(biāo)簽: appropriate probability suggested1 intercept

    上傳時間: 2017-01-03

    上傳用戶:kr770906

  • Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been

    Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been of considerable interest in communications and radar applications demanding low probability of intercept and detectiOn (LPI/D), multipath immunity, high data throughput, precision ranging and localization.

    標(biāo)簽: penetrating technology well-known wideband

    上傳時間: 2013-12-11

    上傳用戶:aysyzxzm

  • In this paper, we describe the development of a rapidly reconfigurable system in which the users’ ta

    In this paper, we describe the development of a rapidly reconfigurable system in which the users’ tacit knowledge and requirements are elicited via a process of Interactive Evolution, finding the image processing parameters to achieve the required goals without any need for specialised knowledge of the machine vision system. We show that the resulting segmentation can be quickly and easily evolved from scratch, and achieves detectiOn rates comparable to those of a hand-tuned system on a hot-rolled steel defect recognition problem.

    標(biāo)簽: reconfigurable development the describe

    上傳時間: 2014-01-05

    上傳用戶:hopy

  • 1.an fpga implementation of the image space reconstruction algorithm for hyperspectral imaging analy

    1.an fpga implementation of the image space reconstruction algorithm for hyperspectral imaging analysis 2. fpga implemention of a median filter 3. fpga implementation of digital filters 4.hardware acceleration of edge detectiOn algorithm on fpgas 5.implementation and evaluation of image processing algorithms on reconfigurable architecture using C-based hardware descriptive languages 6. implementing 2D median filter in fpgas 7.視頻圖像處理與分析的網(wǎng)絡(luò)資源

    標(biāo)簽: implementation reconstruction hyperspectral algorithm

    上傳時間: 2014-01-10

    上傳用戶:894898248

  • 在網(wǎng)絡(luò)安全中經(jīng)常會遇到rootkit

    在網(wǎng)絡(luò)安全中經(jīng)常會遇到rootkit,NSA安全和入侵檢測術(shù)語字典( NSA Glossary of Terms Used in Security and Intrusion detectiOn)對rootkit的定義如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.

    標(biāo)簽: rootkit 網(wǎng)絡(luò)安全

    上傳時間: 2017-04-04

    上傳用戶:xaijhqx

主站蜘蛛池模板: 凌云县| 全南县| 山阳县| 楚雄市| 大余县| 定结县| 图们市| 威信县| 侯马市| 莫力| 龙口市| 方正县| 衡水市| 黄冈市| 同德县| 六枝特区| 平潭县| 阳曲县| 吉木乃县| 黄大仙区| 封开县| 镇康县| 四子王旗| 延安市| 福州市| 岳阳县| 都匀市| 连平县| 钦州市| 聂拉木县| 汾阳市| 九龙县| 永济市| 集安市| 滕州市| 波密县| 巴林左旗| 康平县| 玉山县| 义乌市| 巴楚县|