-
美國tern公司開發的嵌入式開發平臺586E,配合paradigm c/c++集成開發環境,是x86嵌入式開發的典型的程序,對從事嵌入式開發具有重要的參考價值。
標簽:
tern
586E
美國
嵌入式
上傳時間:
2014-01-18
上傳用戶:朗朗乾坤
-
MATLAB Adventures in Bifurcations & Chaos - (ABC++) is a GUI application, which runs in a MATLAB environment and has been designed for the For the exploration of bifurcations and chaos within the Chua Circuit paradigm
標簽:
MATLAB
Bifurcations
application
Adventures
上傳時間:
2014-01-24
上傳用戶:youth25
-
我們編寫的程序由兩個主要方面組成
1 算法的集合就是將指令組織成程序來解決某個特定的問題
2 數據的集合算法在這些數據上操作以提供問題的解決方案
縱觀短暫的計算機發展史這兩個主要方面算法和數據一直保持不變發展演化的
是它們之間的關系就是所謂的程序設計方法programming paradigm
在過程化程序設計方法procedural programming 中一個問題可直接由一組算法來建
立模型例如公共圖書館的資料借閱/登記check out/check in 系統是由一系列過程表現
出來的其中兩個主要的過程是資料的借閱和登記這些數據被獨立存儲起來我們既可以
在某個全局位置上訪問這些數據或者把數據傳遞給過程以便它能夠訪問這些數據Fortran
C 和 Pascal 是三種著名的過程語言C++也支持過程化程序設計單獨的過程如check_in()
check_out() over_due() fine()等等都被稱為函數第三篇將集中討論C++對過程化程序
設計方法的支持尤其將重點討論函數函數模板和通用算法
在20 世紀70 年代程序設計的焦點從過程化程序設計方法轉移到了抽象數據類型
abstract data type 簡寫為ADT 的程序設計上現在通常稱之為基于對象(object based
的程序設計在基于對象的程序設計方法中我們通過一組數據抽象來建立問題的模型在
C++中我們把這些抽象稱為類class 例如在這種方法下圖書館資料借閱登記系統就
由類的對象實例比如書借閱者還書時間罰款等之間的相互作用表現出來以此表
示出圖書館的抽象概念與每個類相關的算法被稱為該類的公有接口public interface 數
據以私有形式被存儲在每個對象中對數據的訪問應與一般的程序代碼隔離開來CLU Ada
和Modula-2 是三種支持抽象數據類型的程序設計語言第四篇將說明和討論C++對抽象數據
類型程序設計方法的支持
面向對象的程序設計方法通過繼承inheritance 機制和動態綁定dynamic binding 機
制擴展了抽象數據類型繼承機制是對現有實現代碼的重用動態綁定是指對現有的公有接
口的重用以前獨立的類型現在有了類型/子類型的特定關系一本書一盒錄像帶一段錄
音甚至孩子的寵物盡管它們有各自的借閱/登記方式但都可以成為圖書館的收藏資料
共享的公有接口和私有的數據都放在一個抽象類圖書館資料LibraryMaterial 中每個特
殊的圖書館資料類都從LibraryMaterial 抽象類繼承共享的行為它們只需要提供與自身行為相
關的算法和數據Simula Smalltalk 和Java 是三種支持面向對象程序設計方法的著名語言
第五篇將集中討論C++對面向對象程序設計方法的支持
C++是一種支持多種程序設計方法的語言雖然我們主要把它當作面向對象的語言但
實際上它也提供對過程化的和基于對象的程序設計方法的支持這樣做的好處是對每個問題
都能夠提供最合適的解決方案事實上沒有一種程序設計方法能夠
標簽:
c++從入門到精通.pdf電子書 第二版
上傳時間:
2019-01-30
上傳用戶:jizhi111
-
The idea of writing this book entitled “Cognitive Networked Sensing and Big Data”
started with the plan to write a briefing book on wireless distributed computing
and cognitive sensing. During our research on large-scale cognitive radio network
(and its experimental testbed), we realized that big data played a central role. As a
result, the book project reflects this paradigm shift. In the context, sensing roughly
is equivalent to “measurement.”
標簽:
Cognitive
Networked
Sensing
Data
Big
and
上傳時間:
2020-05-26
上傳用戶:shancjb
-
According to the statistics of the Federal Communications Commission
(FCC), temporal and geographical variations in the utilization of the as-
signed spectrum range from 15% to 85%. The limited available radio spec-
trum and the inefficiency in spectrum usage necessitate a new commu-
nication paradigm to exploit the existing spectrum dynamically.
標簽:
Cognitive
Radio
Networks
上傳時間:
2020-05-26
上傳用戶:shancjb
-
There is a phenomenal burst of research activities in mobile cloud
computing systems, which extends cloud computing functions, ser-
vices, and results to the world of future mobile communications
applications, and the paradigm of cloud computing and virtualization
to mobile networks. Mobile applications demand greater resources
and improved interactivity for better user experience.
標簽:
Mobile Cloud Computing Systems
上傳時間:
2020-05-30
上傳用戶:shancjb
-
The ever-increasing demand for private and sensitive data transmission over wireless net-
works has made security a crucial concern in the current and future large-scale, dynamic,
and heterogeneous wireless communication systems. To address this challenge, computer
scientists and engineers have tried hard to continuously come up with improved crypto-
graphic algorithms. But typically we do not need to wait too long to find an efficient way
to crack these algorithms. With the rapid progress of computational devices, the current
cryptographic methods are already becoming more unreliable. In recent years, wireless re-
searchers have sought a new security paradigm termed physical layer security. Unlike the
traditional cryptographic approach which ignores the effect of the wireless medium, physi-
cal layer security exploits the important characteristics of wireless channel, such as fading,
interference, and noise, for improving the communication security against eavesdropping
attacks. This new security paradigm is expected to complement and significantly increase
the overall communication security of future wireless networks.
標簽:
Communications
Physical
Security
Wireless
Layer
in
上傳時間:
2020-05-31
上傳用戶:shancjb
-
n the first part of this book, we give an introduction to the basic applications of wireless com-
munications, as well as the technical problems inherent in this communication paradigm. After a
brief history of wireless, Chapter 1 describes the different types of wireless services, and works
out their fundamental differences. The subsequent Section 1.3 looks at the same problem from
a different angle: what data rates, ranges, etc., occur in practical systems, and especially, what
combination of performance measures are demanded (e.g., what data rates need to be transmitted
over short distances; what data rates are required over long distances?) Chapter 2 then describes
the technical challenges of communicating without wires, putting special emphasis on fading and
co-channel interference. Chapter 3 describes the most elementary problem of designing a wireless
system, namely to set up a link budget in either a noise-limited or an interference-limited system.
After studying this part of the book, the reader should have an overview of different types of
wireless services, and understand the technical challenges involved in each of them. The solutions
to those challenges are described in the later parts of this book.
標簽:
Communications
Wireless
Edition
2nd
上傳時間:
2020-06-01
上傳用戶:shancjb
-
The large-scale deployment of the smart grid (SG) paradigm could play a strategic role in
supporting the evolution of conventional electrical grids toward active, flexible and self-
healing web energy networks composed of distributed and cooperative energy resources.
From a conceptual point of view, the SG is the convergence of information and
operational technologies applied to the electric grid, providing sustainable options to
customers and improved security. Advances in research on SGs could increase the
efficiency of modern electrical power systems by: (i) supporting the massive penetration
of small-scale distributed and dispersed generators; (ii) facilitating the integration of
pervasive synchronized metering systems; (iii) improving the interaction and cooperation
between the network components; and (iv) allowing the wider deployment of self-healing
and proactive control/protection paradigms.
標簽:
Computational
Intelligence
上傳時間:
2020-06-07
上傳用戶:shancjb
-
Radio frequency identification (RFID) technology is witnessing a recent explosion of
development in both industry and academia. A number of applications include supply
chain management, electronic payments, RFID passports, environmental monitoring
and control, office access control, intelligent labels, target detection and tracking, port
management, food production control, animal identification, and so on. RFID is also
an indispensable foundation to realize the pervasive computing paradigm—“Internet of
things.” It is strongly believed that many more scenarios will be identified when the
principles of RFID are thoroughly understood, cheap components available, and when
RFID security is guaranteed.
標簽:
Architectures
NETWORKS
SENSOR
RFID
AND
上傳時間:
2020-06-08
上傳用戶:shancjb