TC35i模塊有40個引腳,通過一個ZIF(Zero Insertion Force,零阻力插座)連接器引出。這40個引腳可以劃分為5類,即電源、數據輸入/輸出、SIM卡、音頻接口和控制。
上傳時間: 2017-04-23
上傳用戶:dave520l
OTSU Gray-level image segmentation using Otsu s method. Iseg = OTSU(I,n) computes a segmented image (Iseg) containing n classes by means of Otsu s n-thresholding method (Otsu N, A Threshold Selection Method from Gray-Level Histograms, IEEE Trans. Syst. Man Cybern. 9:62-66 1979). Thresholds are computed to maximize a separability criterion of the resultant classes in gray levels. OTSU(I) is equivalent to OTSU(I,2). By default, n=2 and the corresponding Iseg is therefore a binary image. The pixel values for Iseg are [0 1] if n=2, [0 0.5 1] if n=3, [0 0.333 0.666 1] if n=4, ... [Iseg,sep] = OTSU(I,n) returns the value (sep) of the separability criterion within the range [0 1]. Zero is obtained only with images having less than n gray level, whereas one (optimal value) is obtained only with n-valued images.
標簽: OTSU segmentation Gray-level segmented
上傳時間: 2017-04-24
上傳用戶:yuzsu
Basic function to locate and measure the positive peaks in a noisy data sets. Detects peaks by looking for downward zero-crossings in the smoothed third derivative that exceed SlopeThreshold and peak amplitudes that exceed AmpThreshold. Determines, position, height, and approximate width of each peak by least-squares curve-fitting the log of top part of the peak with a parabola.
標簽: peaks function positive Detects
上傳時間: 2017-04-26
上傳用戶:彭玖華
Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two main problems seriously darken the future of this technology though. Firstly, the large number of attacks and weaknesses which appear as fast as new algorithms are proposed, emphasizes the limits of this technology and in particu-lar the fact that it may not match users expectations. Secondly, the requirements, tools and methodologies to assess the current technologies are almost non-existent. The lack of benchmarking of current algorithms is bla-tant. This confuses rights holders as well as software and hardware manufacturers and prevents them from using the solution appropriate to their needs. Indeed basing long-lived protection schemes on badly tested watermarking technology does not make sense.
標簽: Watermarking watermarking evaluation presented
上傳時間: 2013-12-04
上傳用戶:thinode
oracle中常用函數說明. SQL中的單記錄函數 1.ASCII 返回與指定的字符對應的十進制數 SQL> select ascii( A ) A,ascii( a ) a,ascii( 0 ) zero,ascii( ) space from dual A A ZERO SPACE --------- --------- --------- --------- 65 97 48 32 2.CHR 給出整數,返回對應的字符 SQL> select chr(54740) zhao,chr(65) chr65 from dual ZH C -- - 趙 A 3.CONCAT 連接兩個字符串 SQL> select concat( 010- , 88888888 )|| 轉23 高乾競電話 from dual 高乾競電話 ---------------- 010-88888888轉23
上傳時間: 2014-11-23
上傳用戶:zhangyigenius
The aip file contains few Matlab routines for 1D line scan analysis, 1D scaling, 2D scaling, image brightness or contrast variation routine and rouitne for finding area between zero cossings of 1D times series.
標簽: scaling contains analysis routines
上傳時間: 2014-01-19
上傳用戶:xmsmh
This is a code of Pseudo-Arc Length Continuation Method , the method can be used for solving the nonlinear equations, the principle can re found in some text books. In the code,I prove the agreement of the code with other methods
標簽: Continuation Pseudo-Arc the solving
上傳時間: 2013-12-03
上傳用戶:xzt
This program take a two sequences with differents lengths and transform in two sequences with same length with use zero padding method.
標簽: sequences with differents two
上傳時間: 2017-05-27
上傳用戶:kikye
4 16 64 QAM plots for simulated and theoretical results for OFDM system with addition of Cyclic prefix and a zero-Forcing equalizer.
標簽: theoretical for simulated addition
上傳時間: 2017-06-02
上傳用戶:hgy9473
1. Consider the FIR system described by H(z) = 1/16(-1 + 9z--2 + 16z-3 + 9z--4 - z-6), and plot the pole-zero locations in the z-plane.
標簽: the described Consider system
上傳時間: 2014-07-10
上傳用戶:himbly