亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

pre-implemented

  • This tutorial explains how the SDRAM chip on ltera’s DE2 Development and Education board can be used

    This tutorial explains how the SDRAM chip on ltera’s DE2 Development and Education board can be used with a Nios II system implemented by using the Altera SOPC Builder.

    標簽: Development Education tutorial explains

    上傳時間: 2017-06-15

    上傳用戶:hanli8870

  • Text mining tries to solve the crisis of information overload by combining techniques from data mini

    Text mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth examination of core text mining and link detection algorithms and operations, this book examines advanced pre-processing techniques, knowledge representation considerations, and visualization approaches. Finally, it explores current real-world, mission-critical applications of text mining and link detection in such varied fields as M&A business intelligence, genomics research and counter-terrorism activities.

    標簽: information techniques combining overload

    上傳時間: 2014-01-02

    上傳用戶:Late_Li

  • A user-space device driver can do many of the things that kernel drivers can t, such as perform a lo

    A user-space device driver can do many of the things that kernel drivers can t, such as perform a long-running computation, block while waiting for an event, or read files from the file system. Unlike kernel drivers, a user-space device driver can use other device drivers--that is, access the network, talk to a serial port, get interactive input from the user, pop up GUI windows, or read from disks. User-space drivers implemented using FUSD can be much easier to debug it is impossible for them to crash the machine, are easily traceable using tools such as gdb, and can be killed and restarted without rebooting even if they become corrupted. FUSD drivers don t have to be in C--Perl, Python, or any other language that knows how to read from and write to a file descriptor can work with FUSD. User-space drivers can be swapped out, whereas kernel drivers lock physical memory.

    標簽: user-space can drivers perform

    上傳時間: 2014-01-01

    上傳用戶:saharawalker

  • VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in li

    VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.

    標簽: implementation twofish cipher VHDL

    上傳時間: 2017-06-25

    上傳用戶:王小奇

  • The Hilbert Transform is an important component in communication systems, e.g. for single sideband m

    The Hilbert Transform is an important component in communication systems, e.g. for single sideband modulation/demodulation, amplitude and phase detection, etc. It can be formulated as filtering operation which makes it possible to approximate the Hilbert Transform with a digital filter. Due to the non-causal and infinite impulse response of that filter, it is not that easy to get a good approximation with low hardware resource usage. Therefore, different filters with different complexities have been implemented. The detailed discussion can be found in "Digital Hilbert Transformers or FPGA-based Phase-Locked Loops" (http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4629940). The design is fully pipelined for maximum throughput.

    標簽: e.g. communication Transform important

    上傳時間: 2017-06-25

    上傳用戶:gxf2016

  • This control is another extension to the now standard and widely used ListView control. I have inclu

    This control is another extension to the now standard and widely used ListView control. I have included some of the more common features: shaded columns, column sorting (with data type), but the real addition is the FILTERBAR features of the header. This implementation eliminates all of the work of dealing with the filter messages and item filtering by incorporating it into the control. This could have been implemented as delegates, but we create controls to do the work for us, don t we? I would like to thank Carlos H. Perez since a lot of the implementation came from examples he set with his ListViewEx control.

    標簽: control extension ListView standard

    上傳時間: 2013-12-05

    上傳用戶:royzhangsz

  • Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and n

    Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and network administration tasks. This section explains how to enable and disable the perl scripting service, and how to use Cisco E-DI Perl API for daily tasks. When a perl script is implemented by an administrator or a user, the script automatically inherits the user s security privileges and the user s operational context (either server or network). Each invocation of a

    標簽: automates scripting the supports

    上傳時間: 2017-07-06

    上傳用戶:a673761058

  • function [r_path, r_cost] = dijkstra(pathS, pathE, transmat) The Dijkstra s algorithm, Implemente

    function [r_path, r_cost] = dijkstra(pathS, pathE, transmat) The Dijkstra s algorithm, Implemented by Yi Wang, 2005 This version support detecting _cyclic-paths_

    標簽: Implemente algorithm function dijkstra

    上傳時間: 2017-07-16

    上傳用戶:zyt

  • this introduce infinite impulse response (IIR) filters. The filters are designed in MATLAB using th

    this introduce infinite impulse response (IIR) filters. The filters are designed in MATLAB using the fdatool. They are then implemented in VisualDSP++.

    標簽: filters introduce infinite designed

    上傳時間: 2017-07-23

    上傳用戶:BIBI

  • In this work an implementation of a geometric nonlinear controller for chaos synchronization in a Fi

    In this work an implementation of a geometric nonlinear controller for chaos synchronization in a Field Programmable Gate Array (FPGA) is presented. The Lorenz chaotic system is used to show the implementation of chaos synchronization via nonlinear controller implemented in a Xilinx FPGA Virtex-II 2v2000ft896-4. The main idea is to design a nonlinear geometric controller which synchronizes a slave Lorenz system to a master system and then implement them into the FPGA.

    標簽: synchronization implementation controller geometric

    上傳時間: 2013-12-17

    上傳用戶:3到15

主站蜘蛛池模板: 响水县| 朝阳市| 林周县| 平遥县| 固镇县| 安岳县| 上饶县| 郸城县| 刚察县| 鹤庆县| 麻阳| 淮安市| 兖州市| 凭祥市| 繁昌县| 万盛区| 长汀县| 肃北| 正定县| 宜川县| 云龙县| 弥勒县| 黄陵县| 宁武县| 舟曲县| 沙洋县| 水富县| 周口市| 门头沟区| 应城市| 新晃| 齐齐哈尔市| 米易县| 甘谷县| 衡阳市| 宁国市| 崇信县| 淮滨县| 诸城市| 土默特左旗| 新绛县|