亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊(cè)

repeated

  • D169 Demo - DMA0 repeated Burst to-from RAM, Software Trigger Description A 32 byte block from 22

    D169 Demo - DMA0 repeated Burst to-from RAM, Software Trigger Description A 32 byte block from 220h-240h is transfered to 240h-260h using DMA0 in a burst block using software DMAREQ trigger. After each transfer, source, destination and DMA size are reset to inital software setting because DMA transfer mode 5 is used. P1.0 is toggled durring DMA transfer only for demonstration purposes. ** RAM location 0x220 - 0x260 used - always make sure no compiler conflict ** ACLK= n/a, MCLK= SMCLK= default DCO ~ 800k

    標(biāo)簽: Description repeated Software to-from

    上傳時(shí)間: 2014-01-09

    上傳用戶:thinode

  • This example shows how to perform a repeated sequence of conversions using // "repeat sequence-of-c

    This example shows how to perform a repeated sequence of conversions using // "repeat sequence-of-channels" mode.

    標(biāo)簽: sequence-of-c conversions repeated sequence

    上傳時(shí)間: 2016-09-04

    上傳用戶:gxmm

  • 無人機(jī)高速遙測(cè)信道中OFDM峰均比抑制性能研究

    OFDM是無人機(jī)高速遙測(cè)信道中的主要傳輸技術(shù)之一,但是OFDM系統(tǒng)的主要缺陷之一是具有較高的峰均比。文中研究了一種信道糾錯(cuò)編碼與迭代限幅濾波算法(repeated Clipping and Filtering,RCF)相結(jié)合的峰均比抑制方案。仿真結(jié)果表明,RCF算法能夠?qū)崿F(xiàn)峰均比的有效抑制,卷積編碼和Turbo編碼能夠有效抑制RCF算法產(chǎn)生的限幅噪聲,降低系統(tǒng)誤碼率。

    標(biāo)簽: OFDM 無人機(jī) 信道 峰均比

    上傳時(shí)間: 2013-10-09

    上傳用戶:sunshie

  • PID calculations for the _pid structure *a. This function uses the positional form of the pid equati

    PID calculations for the _pid structure *a. This function uses the positional form of the pid equation, and incorporates an integral windup prevention algorithim. Rectangular integration is used, so this function must be repeated on a consistent time basis for accurate control.

    標(biāo)簽: the calculations positional pid

    上傳時(shí)間: 2014-01-16

    上傳用戶:moerwang

  • Ink Blotting One method for escaping from a maze is via ‘ink-blotting’. In this method your startin

    Ink Blotting One method for escaping from a maze is via ‘ink-blotting’. In this method your starting square is marked with the number ‘1’. All free, valid squares north, south, east and west around the number ‘1‘ are marked with a number ‘2’. In the next step, all free, valid squares around the two are marked with a ‘3’ and the process is repeated iteratively until :  The exit is found (a free square other than the starting position is reached on the very edge of the maze), or,  No more free squares are available, and hence no exit is possible.

    標(biāo)簽: method ink-blotting Blotting escaping

    上傳時(shí)間: 2014-12-03

    上傳用戶:123啊

  • Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2

    Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair Playfair Key Matrix 1.a 5X5 matrix of letters based on a keyword 2.fill in letters of keyword (sans duplicates) 3.fill rest of matrix with other letters Encrypting and Decrypting -plaintext is encrypted two letters at a time 1. if a pair is a repeated letter, insert filler like X’ 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end) 3. if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) 4. otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair

    標(biāo)簽: monoalphabetic Playfair provides security

    上傳時(shí)間: 2017-05-25

    上傳用戶:變形金剛

  • Cooperation in Wireless Networks

    Cooperation has been the subject of intensive study in the social and biological sciences, as well as in mathematics and artificial intelligence. The fundamental finding is that even egoists can sustain cooperation provided the structure of their environment allows for repeated interactions (Axelrod 1984).

    標(biāo)簽: Cooperation Wireless Networks in

    上傳時(shí)間: 2020-05-27

    上傳用戶:shancjb

  • System Requirements Analysis

    The serious study of the practice of how to determine the appropriate content of a specification is a seldom-appreciated pastime. Those who have the responsibility to design a product would prefer a greater degree of freedom than permitted by the con- tent of a specification. Many of those who would manage those who would design a product would prefer to allocate all of the project funding and schedule to what they consider more productive labor. These are the attitudes, of course, that doom a project to defeat but they are hard to counter no matter how many times repeated by design engineers and managers. A system engineer who has survived a few of these experiences over a long career may retire and forget the past but we have an endur- ing obligation to work toward changing these attitudes while trying to offer younger system engineers a pathway toward a more sure success in requirements analysis and specification publishing.

    標(biāo)簽: Requirements Analysis System

    上傳時(shí)間: 2020-06-01

    上傳用戶:shancjb

  • Auto-Machine-Learning-Methods-Systems-Challenges

    The past decade has seen an explosion of machine learning research and appli- cations; especially, deep learning methods have enabled key advances in many applicationdomains,suchas computervision,speechprocessing,andgameplaying. However, the performance of many machine learning methods is very sensitive to a plethora of design decisions, which constitutes a considerable barrier for new users. This is particularly true in the booming field of deep learning, where human engineers need to select the right neural architectures, training procedures, regularization methods, and hyperparameters of all of these components in order to make their networks do what they are supposed to do with sufficient performance. This process has to be repeated for every application. Even experts are often left with tedious episodes of trial and error until they identify a good set of choices for a particular dataset.

    標(biāo)簽: Auto-Machine-Learning-Methods-Sys tems-Challenges

    上傳時(shí)間: 2020-06-10

    上傳用戶:shancjb

主站蜘蛛池模板: 溧阳市| 南雄市| 收藏| 成都市| 久治县| 句容市| 茶陵县| 兴业县| 江孜县| 雷山县| 峨边| 永平县| 晴隆县| 那坡县| 克拉玛依市| 哈尔滨市| 义乌市| 郎溪县| 白银市| 广宁县| 大化| 连江县| 休宁县| 青州市| 会泽县| 三明市| 健康| 特克斯县| 新民市| 射阳县| 乌苏市| 汉寿县| 治县。| 佛山市| 阳泉市| 高密市| 永平县| 琼结县| 阿鲁科尔沁旗| 新沂市| 亳州市|