-
This book is an in-depth exploration into eVB s inherent features, and how to use them to solve likely mobile application programming tasks. After reading the book the reader will be able to write applications tackling a wide array of business problems for Windows CE-powered devices, both customized and for PocketPC and Handheld PC products. This book will help ease the transition into the language, and provide a reference for even more experienced developers.
標簽:
exploration
in-depth
features
inherent
上傳時間:
2013-12-12
上傳用戶:aa54
-
Once relegated to the hinterlands of low cost indicatorlights, the LED is again in the spotlight of the lightingworld. LED lighting is now ubiquitous, from car headlightsto USB-powered lava lamps. Car headlights exemplifyapplications that capitalize on the LED’s clear advantages—unwavering high quality light output, tough-assteelrobustness, inherent high effi ciency—while a USBlava lamp exemplifi es applications where only LEDs work.Despite these clear advantages, their requirement forregulated voltage and current make LED driver circuitsmore complex than the venerable light bulb, but some newdevices are closing the gap. For instance, the LTM®8040μModule™ LED driver integrates all the driver circuitryinto a single package, allowing designers to refocus theirtime and effort on the details of lighting design criticalto a product’s success.
標簽:
445
LED
DN
微型模塊
上傳時間:
2013-10-16
上傳用戶:togetsomething
-
water temperature control system uses the Single Chip Microcomputer to carry on temperature real-time gathering and controling. DS18B20, digitized temperature sensor, provides the temperature signal by "a main line". In -10~+85℃ the scope, DS18B20’s inherent measuring accuracy is 0.5 ℃. The water temperature real-time control system uses the electricity nichrome wire carring on temperature increiseament and operates the electric fan to realize the temperature decrease control. The system has the higher measuring accuracy and the control precision, it also can complete the elevation of temperature and the temperature decrease control.
標簽:
temperature
Microcomputer
real-tim
control
上傳時間:
2015-12-10
上傳用戶:nairui21
-
C++, although a marvelous language, isn t perfect. Matthew Wilson has been working with it for over a decade, and during that time he has found inherent limitations that require skillful workarounds. In this book, he doesn t just tell you what s wrong with C++, but offers practical techniques and tools for writing code that s more robust, flexible, efficient, and maintainable. He shows you how to tame C++ s complexity, cut through its vast array of paradigms, take back control over your code--and get far better results
標簽:
marvelous
although
language
Matthew
上傳時間:
2014-01-22
上傳用戶:妄想演繹師
-
計算電磁學的3維矢量有限元程序
EMAP-3 is a vector (edge element) code. Vector codes are generally not affected by spurious modes and have other inherent advantages. The code is written in the C programming language and can be compiled and run on PCs, workstations, or mainframes.
標簽:
generally
affected
element
Vector
上傳時間:
2016-04-03
上傳用戶:1583060504
-
Abstract-The effect of the companding process on QAM signals
has been under investigation for the past several years. The
compander, included in the PCM telephone network to improve
voice performance, has an unusual affect on digital QAM data
signals which are transmitted over the same channel. The quantization
noise, generated by the companding process which is multiplicative
(and asymmetric), degrades the detectability performance
of the outermost points of the QAM constellation more
than that of the inner points.
The combined effect of the companding noise and the inherent
white gaussian noise of the system, leads us to a re-examination of
signal constellation design.
In this paper we investigate the detectability performance of a
number of candidates for signal constellations including, a typical
rectangular QAM constellation, the same constellation with the
addition of a smear-desmear operation, and two new improved
QAM constellation designs with two-dimensional warpi
標簽:
investigation
Abstract-The
companding
the
上傳時間:
2013-12-20
上傳用戶:英雄
-
An optimal neuron evolution algorithm for the restoration
of linearly distorted images is presented in this paper. The proposed
algorithm is motivated by the symmetric positive-definite quadratic programming
structure inherent in restoration. Theoretical analysis and experimental
results show that the algorithm not only significantly increases
the convergence rate of processing, hut also produces good restoration
results. In addition, the algorithm provides a genuine parallel processing
structure which ensures computationally feasible spatial domain image
restoration
標簽:
restoration
evolution
algorithm
distorted
上傳時間:
2013-12-21
上傳用戶:yy541071797
-
EZW Embedded Zero-tree Wavelets Encoding,video codecs from the EZW family which use a 3D version of EZW or SPIHT algorithms showed better performance than the MPEG-2 compression algorithm. These algorithms have many advantages inherent for wavelet based schemes and EZW-like coders. Their most important advantages are good compression performance and scalability.
標簽:
EZW
Zero-tree
Embedded
Wavelets
上傳時間:
2013-12-20
上傳用戶:wsf950131
-
Imperfect C++ Practical Solutions for Real-Life Programming
C++, although a marvelous language, isn t perfect. Matthew Wilson has been working with it for over a decade, and during that time he has found inherent limitations that require skillful workarounds. In this book, he doesn t just tell you what s wrong with C++, but offers practical techniques and tools for writing code that s more robust, flexible, efficient, and maintainable. He shows you how to tame C++ s complexity, cut through its vast array of paradigms, take back control over your code--and get far better results.
標簽:
Programming
Imperfect
Practical
Solutions
上傳時間:
2014-03-02
上傳用戶:songrui
-
An Introduction To Cryptography
Chapter 1, “The Basics of Cryptography,” provides an overview of the
terminology and concepts you will encounter as you use PGP products.
Chapter 2, “Phil Zimmermann on PGP,” written by PGP’s creator, contains
discussions of security, privacy, and the vulnerabilities inherent in any
security system, even PGP.
標簽:
Cryptography
Introduction
provides
overview
上傳時間:
2017-06-12
上傳用戶:cylnpy