Top module name : SHIFTER (File name : SHIFTER.v) 2. Input pins: SHIFT [3:0], IN [15:0], SIGN, RIGHT. 3. Output pins: OUT [15:0]. 4. Input signals generated from test pattern are latched in one cycle and are synchronized at clock rising edge. 5. The SHIFT signal describes the shift number. The shift range is 0 to 15. 6. When the signal RIGHT is high, it shifts input data to right. On the other hand, it shifts input data to left. 7. When the signal SIGN is high, the input data is a signed number and it shifts with sign extension. However, the input data is an unsigned number if the signal SIGN is low. 8. You can only use following gates in Table I and need to include the delay information (Tplh, Tphl) in your design.
上傳時間: 2014-01-20
上傳用戶:三人用菜
The inverse of the gradient function. I ve provided versions that work on 1-d vectors, or 2-d or 3-d arrays. In the 1-d case I offer 5 different methods, from cumtrapz, and an integrated cubic spline, plus several finite difference methods. In higher dimensions, only a finite difference/linear algebra solution is provided, but it is fully vectorized and fully sparse in its approach. In 2-d and 3-d, if the gradients are inconsistent, then a least squares solution is generated
標簽: gradient function provided versions
上傳時間: 2016-11-07
上傳用戶:秦莞爾w
ST32 基于(英蓓特)STM32V100的EXTI程序 This example shows how to configure an external interrupt line. In this example, the EXTI line 9 is configured to generate an interrupt on each falling edge. In the interrupt routine a led connected to PC.06 is toggled. This led will be toggled due to the softawre interrupt generated on EXTI Line9 then at each falling edge.
標簽: configure interrupt external example
上傳時間: 2016-11-17
上傳用戶:GavinNeko
If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction disallowing scripts to run in files opened on your local machine. When you first try to run the examples, you will most likely get a message saying, "To help protect your security, Internet Explorer has restricted this file from showing active content that could access your computer." To see the example, you must click on the message and select "Allow Blocked Content". JavaScript高級程序設計 里面自代源碼
標簽: restriction Explorer Internet security
上傳時間: 2016-11-18
上傳用戶:源弋弋
rc5的decryption,同樣帶state machine,同樣有四個狀態
標簽: decryption rc5
上傳時間: 2016-11-22
上傳用戶:llandlu
These instances, whenmapped to an N-dimensional space, represent a core set that can be used to construct an approximation to theminimumenclosing ball. Solving the SVMlearning problem on these core sets can produce a good approximation solution in very fast speed. For example, the core-vector machine [81] thus produced can learn an SVM for millions of data in seconds.
標簽: N-dimensional whenmapped instances represent
上傳時間: 2016-11-23
上傳用戶:lixinxiang
Many of the pattern fi nding algorithms such as decision tree, classifi cation rules and clustering techniques that are frequently used in data mining have been developed in machine learning research community. Frequent pattern and association rule mining is one of the few excep- tions to this tradition. The introduction of this technique boosted data mining research and its impact is tremendous. The algorithm is quite simple and easy to implement. Experimenting with Apriori-like algorithm is the fi rst thing that data miners try to do.
標簽: 64257 algorithms decision pattern
上傳時間: 2014-01-12
上傳用戶:wangdean1101
Semantic analysis of multimedia content is an on going research area that has gained a lot of attention over the last few years. Additionally, machine learning techniques are widely used for multimedia analysis with great success. This work presents a combined approach to semantic adaptation of neural network classifiers in multimedia framework. It is based on a fuzzy reasoning engine which is able to evaluate the outputs and the confidence levels of the neural network classifier, using a knowledge base. Improved image segmentation results are obtained, which are used for adaptation of the network classifier, further increasing its ability to provide accurate classification of the specific content.
標簽: multimedia Semantic analysis research
上傳時間: 2016-11-24
上傳用戶:蟲蟲蟲蟲蟲蟲
We propose a technique that allows a person to design a new photograph with substantially less effort. This paper presents a method that generates a composite image when a user types in nouns, such as “boat” and “sand.” The artist can optionally design an intended image by specifying other constraints. Our algorithm formulates the constraints as queries to search an automatically annotated image database. The desired photograph, not a collage, is then synthesized using graph-cut optimization, optionally allowing for further user interaction to edit or choose among alternative generated photos. An implementation of our approach, shown in the associated video, demonstrates our contributions of (1) a method for creating specific images with minimal human effort, and (2) a combined algorithm for automatically building an image library with semantic annotations from any photo collection.
標簽: substantially photograph technique propose
上傳時間: 2016-11-24
上傳用戶:三人用菜
The DHRY program performs the dhrystone benchmarks on the 8051. Dhrystone is a general-performance benchmark test originally developed by Reinhold Weicker in 1984. This benchmark is used to measure and compare the performance of different computers or, in this case, the efficiency of the code generated for the same computer by different compilers. The test reports general performance in dhrystones per second. Like most benchmark programs, dhrystone consists of standard code and concentrates on string handling. It uses no floating-point operations. It is heavily influenced by hardware and software design, compiler and linker options, code optimizing, cache memory, wait states, and integer data types. The DHRY program is available in different targets: Simulator: Large Model: DHRY example in LARGE model for Simulation Philips 80C51MX: DHRY example in LARGE model for the Philips 80C51MC
標簽: general-performanc benchmarks Dhrystone dhrystone
上傳時間: 2016-11-30
上傳用戶:hphh