亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

information-technology

  • 同步DMX512 簡介和控制器的設計 在燈具調光和控制中

    同步DMX512 簡介和控制器的設計 在燈具調光和控制中,人們大量采用了DMX512 的控制協議,它是由美國劇 場技術協會(United State Institute for Theatre Technology,Inc)于1986 年8 月提出的一個能在一對線上傳送512 路可控硅調光亮度信息的標準. DMX512 通信方式是采用了異步通信格式,每個調光點由11 位組成,其中一個 是起始位,8 位調光數據,兩個停止位.每一次傳輸能512 個調光點.

    標簽: DMX 512 控制器 控制

    上傳時間: 2014-01-20

    上傳用戶:gonuiln

  • Programming the USB2DMX by Jan Menzel 3rd January 2002 Abstract This document describes how the

    Programming the USB2DMX by Jan Menzel 3rd January 2002 Abstract This document describes how the USB2DMX DMX512 interface for the USB-port by Lighting- Solutions1 has to be programmed. It includes all information the software engineer has to supply to the operating systems USB-stack to talk to the USB2DMX

    標簽: Programming the describes Abstract

    上傳時間: 2016-10-31

    上傳用戶:SimonQQ

  • Top module name : SHIFTER (File name : SHIFTER.v) 2. Input pins: SHIFT [3:0], IN [15:0], SIGN, RIGH

    Top module name : SHIFTER (File name : SHIFTER.v) 2. Input pins: SHIFT [3:0], IN [15:0], SIGN, RIGHT. 3. Output pins: OUT [15:0]. 4. Input signals generated from test pattern are latched in one cycle and are synchronized at clock rising edge. 5. The SHIFT signal describes the shift number. The shift range is 0 to 15. 6. When the signal RIGHT is high, it shifts input data to right. On the other hand, it shifts input data to left. 7. When the signal SIGN is high, the input data is a signed number and it shifts with sign extension. However, the input data is an unsigned number if the signal SIGN is low. 8. You can only use following gates in Table I and need to include the delay information (Tplh, Tphl) in your design.

    標簽: SHIFTER name module Input

    上傳時間: 2013-12-13

    上傳用戶:himbly

  • Top module name : SHIFTER (File name : SHIFTER.v) 2. Input pins: SHIFT [3:0], IN [15:0], SIGN, RIGH

    Top module name : SHIFTER (File name : SHIFTER.v) 2. Input pins: SHIFT [3:0], IN [15:0], SIGN, RIGHT. 3. Output pins: OUT [15:0]. 4. Input signals generated from test pattern are latched in one cycle and are synchronized at clock rising edge. 5. The SHIFT signal describes the shift number. The shift range is 0 to 15. 6. When the signal RIGHT is high, it shifts input data to right. On the other hand, it shifts input data to left. 7. When the signal SIGN is high, the input data is a signed number and it shifts with sign extension. However, the input data is an unsigned number if the signal SIGN is low. 8. You can only use following gates in Table I and need to include the delay information (Tplh, Tphl) in your design.

    標簽: SHIFTER name module Input

    上傳時間: 2014-01-20

    上傳用戶:三人用菜

  • You may have heard the Latest Brief web service on CodeProject.com. It provides several methods for

    You may have heard the Latest Brief web service on CodeProject.com. It provides several methods for web client programs to retrieve information about CodeProject.com, such as the latest article updates, the latest comments, and the latest lounge posts, etc. Some very popular articles on the CodeProject site make use of this service. In this article, I am going to present a java client program that uses soap message to call the methods of this web service. My program is not a general java soap client, which means you cannot use it to call other web services directly. However, you can easily modify it for other web services. The program uses only basic Java, it does not depend on any other external class library.

    標簽: CodeProject provides service methods

    上傳時間: 2014-01-25

    上傳用戶:baiom

  • The MIPS32® 4KEm™ core from MIPS® Technologies is a member of the MIPS32 4KE™ proc

    The MIPS32® 4KEm™ core from MIPS® Technologies is a member of the MIPS32 4KE™ processor core family. It is a high-performance, low-power, 32-bit MIPS RISC core designed for custom system-on-silicon applications. The core is designed for semiconductor manufacturing companies, ASIC developers, and system OEMs who want to rapidly integrate their own custom logic and peripherals with a high-performance RISC processor. It is highly portable across processes, and can be easily integrated into full system-on-silicon designs, allowing developers to focus their attention on end-user products. The 4KEm core is ideally positioned to support new products for emerging segments of the digital consumer, network, systems, and information management markets, enabling new tailored solutions for embedded applications.

    標簽: MIPS 8482 Technologies 174

    上傳時間: 2014-12-22

    上傳用戶:semi1981

  • the text file QMLE contains the quasi maximum likelyhood estimating procedure and performing Infor

    the text file QMLE contains the quasi maximum likelyhood estimating procedure and performing Information Matrix test for a univariate GARCH(1,1) model

    標簽: estimating likelyhood performing the

    上傳時間: 2014-11-22

    上傳用戶:zhenyushaw

  • This approach addresses two difficulties simultaneously: 1) the range limitation of mobile robot se

    This approach addresses two difficulties simultaneously: 1) the range limitation of mobile robot sensors and 2) the difficulty of detecting buildings in monocular aerial images. With the suggested method building outlines can be detected faster than the mobile robot can explore the area by itself, giving the robot an ability to “see” around corners. At the same time, the approach can compensate for the absence of elevation data in segmentation of aerial images. Our experiments demonstrate that ground-level semantic information (wall estimates) allows to focus the segmentation of the aerial image to find buildings and produce a ground-level semantic map that covers a larger area than can be built using the onboard sensors.

    標簽: simultaneously difficulties limitation addresses

    上傳時間: 2014-06-11

    上傳用戶:waitingfy

  • This book is designed to teach you the best practices in developing Windows DNA applications. We ha

    This book is designed to teach you the best practices in developing Windows DNA applications. We have avoided making this book a primer on every technology associated with Windows DNA. If we had followed this course, this would be an encyclopedia set. Everyone has their favorite authors and books on the various technical subject areas. The market is full of books to teach you the basics, the how, this book tries to be different in that we pull out the important points to teach you about the why. If you need training in a particular technology covered in this book, Sams has a number of 24-hour and 21-day books that cover a wide range of topics.

    標簽: applications developing practices designed

    上傳時間: 2016-11-27

    上傳用戶:yyq123456789

  • PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A componen

    PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A components) those variables that do not carry any relevant information to model Y. The criterion used to trace the un-informative variables is the reliability of the regression coefficients: c_j=mean(b_j)/std(b_j), obtained by jackknifing. The cutoff level, below which c_j is considered to be too small, indicating that the variable j should be removed, is estimated using a matrix of random variables.The predictive power of PLS models built on the retained variables only is evaluated over all 1-a dimensions =(yielding RMSECVnew).

    標簽: from eliminates PRINCIPLE algorithm

    上傳時間: 2016-11-27

    上傳用戶:凌云御清風

主站蜘蛛池模板: 井冈山市| 富顺县| 鲜城| 禄丰县| 九台市| 长寿区| 牙克石市| 子长县| 六安市| 澜沧| 镇康县| 南昌县| 禄丰县| 淮北市| 和静县| 长治市| 出国| 陵水| 恩平市| 凤翔县| 永德县| 沙洋县| 怀仁县| 屏南县| 朝阳区| 东海县| 威海市| 株洲市| 邵阳市| 乳山市| 西丰县| 上饶县| 木里| 韩城市| 临潭县| 青阳县| 沁阳市| 年辖:市辖区| 五峰| 田阳县| 江油市|