CORDIC (Coordinate Rotation Digital Computer) is a method for computing elementary functions using minimal hardware such as shifts, adds/subs and compares. CORDIC works by rotating the coordinate system through constant angles until the angle is reduces to zero. The angle offsets are selected such that the operations on X and Y are only shifts and adds.
標簽: Coordinate elementary computing functions
上傳時間: 2015-11-08
上傳用戶:saharawalker
To develop functional modules to process grayscale image intensity data. And perform Point and spatial operations. Uses Prewitt, Sobel, and Laplacian of Guassian Methods. And calculates their histograms.
標簽: functional grayscale intensity develop
上傳時間: 2015-11-09
上傳用戶:源弋弋
In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadline violations. Priority inheritance protocol is one of the approaches to reduce priority inversion. Unfortunately, RTOS like uC/OS can’t support priority inheritance protocol since it does not allow kernel to have multiple tasks at the same priority. Although it has different ways to avoid priority inversion such as priority ceiling protocol, developers still have some difficulties in programming real time applications with it. In this paper, we redesign the uC/OS kernel to provide the ability to support round robin scheduling and implement priority inheritance semaphore on the modified kernel. As result, we port new kernel with priority inheritance semaphore to evaluation board, and evaluate the execution time of each of the kernel service as well as verify the operations of our implementation.
標簽: priority preemptive inversion problem
上傳時間: 2015-12-14
上傳用戶:氣溫達上千萬的
This library allows creating, modifying and extracting zip archives in the compatible way with PKZIP (2.5 and higher) and WinZip. Supported are all possible operations on the zip archive: creating, extracting, adding, deleting files from the archive, modifications of the existing archive. There is also the support for creating and extracting multiple disk archives (on non-removable devices as well) and for password encryption and decryption. This module uses compression and decompression functions from zlib library by Jean-loup Gailly and Mark Adler.
標簽: compatible extracting modifying creating
上傳時間: 2014-12-22
上傳用戶:chfanjiang
Matrix TCL Lite 1.12 This matrix C++ template class library is for performing common matrix operations in your C++ program like any other built-in data types. To install the package, just copy MATRIX.H file into the INCLUDE directory of your compiler and include this header file in your program source file.
標簽: matrix performing template library
上傳時間: 2016-01-05
上傳用戶:h886166
Contains source to demonstrate how to copy/delete files and folders with HFS+ APIs. It also demonstrates a technique to rename an object if an object of the same name exists in the destination. This sample shows how to perform these operations in an MP-safe way.
標簽: demonstrate Contains demonstr folders
上傳時間: 2016-01-14
上傳用戶:我們的船長
CCISP考試指南與導(dǎo)讀 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2 DOMAIN 2 – ACCESS CONTROL SYSTEMS 7 DOMAIN 3 – TELECOM AND NETWORK SECURITY 13 DOMAIN 4 – CRYPTOGRAPHY 34 DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46 DOMAIN 6 – operations SECURITY 56 DOMAIN 7 – APPLICATIONS AND SYSTEM DEVELOPMENT 63 DOMAIN 8 – BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING 70 DOMAIN 9 – LAW, INVESTIGATION AND ETHICS 78 DOMAIN 10 – PHYSICAL SECURITY 87
標簽: CISSP MANAGEMENT PRACTICES SECURITY
上傳時間: 2014-02-13
上傳用戶:sy_jiadeyi
This code implements min binomial heaps and min leftist trees.Plus, measure and compare the relative performance of these two implementations under the assumption that the only permissible operations are insert and delete-min.
標簽: implements and min binomial
上傳時間: 2014-11-27
上傳用戶:2467478207
The first task at hand is to set up the endpoints appropriately for this example. The following code switches the CPU clock speed to 48 MHz (since at power-on default it is 12 MHz), and sets up EP2 as a Bulk OUT endpoint, 4x buffered of size 512, and EP6 as a Bulk IN endpoint, also 4x buffered of size 512. This set-up utilizes the maximum allotted 4-KB FIFO space. It also sets up the FIFOs for manual mode, word-wide operation, and goes through a FIFO reset and arming sequence to ensure that they are ready for data operations
標簽: appropriately The endpoints following
上傳時間: 2013-12-02
上傳用戶:dianxin61
This program is a series of 51 single-chip microcomputer simulation IIC bus, the memory of the 24 operations
標簽: microcomputer single-chip simulation the
上傳時間: 2013-12-18
上傳用戶:yan2267246
蟲蟲下載站版權(quán)所有 京ICP備2021023401號-1