The revolution of automation on factory floors is a key driver for the seemingly insatiable demand for higher productivity, lower total cost of ownership,and high safety. As a result, industrial applications drive an insatiable demand of higher data bandwidth and higher system-level performance.
This white paper describes the trends and challenges seen by designers and how FPGAs enable solutions to meet their stringent design goals.
The code assumes a two-dimensional computational domain with TMz polarization (i.e., non-zero field Ez, Hx, and Hy). The program is currently written so that the incident field always strikes the lower-left corner of the total-field region first. (If you want a different corner, that should be a fairly simple tweak to the code, but for now you ll have to make that tweak yourself.) I have attempted to provide copious comments in the code and hope that a knowledgeable C programmer can quickly map the approach as described in the paper to what is in the program.
The goal with this project was to make it possible for almost any mobile-phone to use ICQ and be able to communicate with other users!
One other goal with this project was to lower the GPRS-traffic in the phone and make the ICQ-ing cheaper.
A third goal was to make this service as easy to log-in to as possible. Anyone tried to fill a log-in screen with a WAP-browser should know what I mean.
With Wapmess all you have to do is to write your login-url ONCE and then bookmark it in your phone, to make it available fast. :)
The tar file contains the following files:
ptfsf.c: heart of the perfect TFSF code
ptfsf.h: header file for same
ptfsf-demo.c: FDTD code which demonstrates use of perfect TFSF code. Essentially this program used to generate results shown in the paper
ptfsf-file-maker.c: code to generate an incident-field file using the "perfect" incident fields
ptfsf-demo-file.c: FDTD code which uses the perfect incident fields stored in a file
fdtdgen.h: defines macros used in much of my code
Makefile: simple make-file to compile programs
Also include are some simple script files to run the programs with reasonable values.
The code assumes a two-dimensional computational domain with TMz polarization (i.e., non-zero field Ez, Hx, and Hy). The program is currently written so that the incident field always strikes the lower-left corner of the total-field region first. (If you want a different corner, that should be a fairly simple tweak to the code, but for now you ll have to make that tweak yourself.)
* DEFINITION
* This is the header file for a library module used to calculate the median
* of a list of values. It finds the value that would be in the center if
* the list were sorted. If the list contains an even number of values, the
* lower of the two center values is reported. The values themselves are not
* sorted or modified in any way. This algorithm can be used as a filtering
* tool for rejecting noisy data.
Listed below are the typographical conventions used in this guide.
– Example C++ code and commands to be typed by the user are in non-bold characters in typewriter
font.
– Items where the user has to supply a name or number are given in lower-case italic characters in
typewriter font.
– Sections marked with a ‡ describe features that are also available in ANSI C.
The MATLAB coding style, project options and synthesis directives can have a significant effect on the final results. Knowledge about how a particular algorithm should be implemented in hardware can be reflected in the MATLAB code to improve the results. In doing so, the MATLAB loses a bit of its abstraction but the lower-level MATLAB will infer the desired architecture into the device.
Here s the code! Too many people ask for this
Using this code you can save an image item as a jpeg image, specifying the quality of it. Jpeg quality is the same as compression so the lower the quality, the smaller the file size. It s simple to use
%CHECKBOUNDS Move the initial point within the (valid) bounds.
% [X,LB,UB,X,FLAG] = CHECKBOUNDS(X0,LB,UB,nvars)
% checks that the upper and lower
% bounds are valid (LB <= UB) and the same length as X (pad with -inf/inf
% if necessary) warn if too long. Also make LB and UB vectors if not
% already.
% Finally, inf in LB or -inf in UB throws an error.
%DEFINEV Scaling vector and derivative
%
% [v,dv]= DEFINEV(g,x,l,u) returns v, distances to the
% bounds corresponding to the sign of the gradient g, where
% l is the vector of lower bounds, u is the vector of upper
% bounds. Vector dv is 0-1 sign vector (See ?? for more detail.)
%
% Copyright (c) 1990-98 by The MathWorks, Inc.
% $Revision: 1.2 $ $Date: 1998/03/21 16:29:10 $