-
An optimal neuron evolution algorithm for the restoration
of linearly distorted images is presented in this paper. The proposed
algorithm is motivated by the symmetric positive-definite quadratic programming
structure inherent in restoration. Theoretical analysis and experimental
results show that the algorithm not only significantly increases
the convergence rate of processing, hut also produces good restoration
results. In addition, the algorithm provides a genuine parallel processing
structure which ensures computationally feasible spatial domain image
restoration
標簽:
restoration
evolution
algorithm
distorted
上傳時間:
2013-12-21
上傳用戶:yy541071797
-
Writing Robust Java Code
The AmbySoft Inc. Coding Standards for Java
v17.01d
Scott W. Ambler
Software Process Mentor
This Version: January 15, 2000
Copyright 1998-1999 AmbySoft Inc.Purpose of this White Paper
This white paper describes a collection of standards, conventio
code. They are based on sound, proven software engineering p
understand, to maintain, and to enhance. Furthermore, by foll
productivity as a Java developer should increase remarkably ¨C
write high-quality code right from the start you will have a much
development process. Finally, following a common set of codi
making teams of developers significantly more productive.
標簽:
W.
Java
Standards
AmbySoft
上傳時間:
2013-12-22
上傳用戶:mhp0114
-
The purpose of Software Project Tracking and Oversight is to provide adequate visibility into actual progress so that management can take effective actions when the project s performance deviates significantly from the plans.
標簽:
visibility
Oversight
Software
Tracking
上傳時間:
2017-02-27
上傳用戶:三人用菜
-
We analyze, both analytically and numerically, the effectiveness
of cloaking an infinite cylinder from observations by electromagnetic
waves in three dimensions. We show that, as truncated approximations
of the ideal permittivity and permeability tensors tend towards
the singular ideal cloaking fields, so that the anisotropy ratio tends to
infinity, the D and B fields blow up near the cloaking surface. Since
the metamaterials used to implement cloaking are based on effective
medium theory, the resulting large variation in D and B will pose a
challenge to the suitability of the field averaged characterization of "
and 碌. We also consider cloaking with and without the SHS (softand-
hard surface) lining, shown in [6] to be theoretically necessary
for cloaking in the cylindrical geometry. We demonstrate numerically
that cloaking is significantly improved by the SHS lining, with both
the far field of the scattered wave significantly reduced and the blow
up of D and B prevented.
標簽:
effectiveness
analytically
numerically
cloaking
上傳時間:
2017-03-30
上傳用戶:zxc23456789
-
Behavioral models are used in games and computer graphics for
realistic simulation of massive crowds. In this paper, we present a
GPU based implementation of Reynolds [1987] algorithm for simulating
flocks of birds and propose an extension to consider environment
self occlusion. We performed several experiments and
the results showed that the proposed approach runs up to three
times faster than the original algorithm when simulating high density
crowds, without compromising significantly the original crowd
behavior.
標簽:
Behavioral
simulation
realistic
computer
上傳時間:
2017-09-08
上傳用戶:hanli8870
-
The TJA1040 is an advanced high speed CAN transceiver for use in
automotive and general industrial applications. It supports the differential
bus signal representation described in the international standard for
in-vehicle high speed CAN applications (ISO11898). CAN (Controller Area
Network) is the standard protocol for serial in-vehicle bus communication,
particularly for Engine Management and Body Multiplexing.
The TJA1040 provides a Standby mode, as known from its functional
predecessors PCA82C250 and PCA82C251, but with significantly
reduced power consumption. Besides the excellent low-power behavior
the TJA1040 offers several valuable system improvements. Highlights are
the absolute passive bus behavior if the device is unpowered as well as
the excellent EMC performance.
標簽:
CAN
上傳時間:
2015-03-23
上傳用戶:Yuan Lo
-
From the transition of analog to digital communication along with seamless mobility and
high computing power of small handheld devices, the wireless communications industry has
seen tremendous changes leading to the integration of several telecommunication networks,
devices and services over last 30 years. The rate of this progress and growth has increased
particularly in the past decade because people no longer use their devices and networks for
voice only, but demand bundle contents such as data download/streaming, HDTV, HD video ,
3D video conferencing with higher efficiency, seamless connectivity, intelligence, reliability
and better user experience. Although the challenges facing service providers and
telecommunication companies differ by product, region, market size, and their areas of
concentration but time to market, efficient utilization of their assets and revenue expansion,
have impacted significantly how to manage and conduct their business while maintaining
sufficient margin.
標簽:
Convergence
Networks
Beyond
4G
of
上傳時間:
2020-05-26
上傳用戶:shancjb
-
LTE-Advanced becomes a truly global standard for 4G cellular communications.
Relay, as one of the key technologies of LTE-Advanced, can significantly extend
the coverage, and improve the system throughput. LTE-A standards and tech-
nologies were described in several recent books where the limited pages for relay
feature prevent the detailed explanations of the technology. In this book, we tried
to provide an in-depth description of LTE-A relay development. More specifically,
significant portions are spent on relay channel modeling and potential technologies
during the study item phase of the development, although some of those tech-
nologies, such as Type 2 cooperative relay, multi-hop relay, relay with backhaul of
carrier aggregation, were not standardized in Release 10 LTE.
標簽:
LTE-Advanced
Technology
Relay
上傳時間:
2020-05-27
上傳用戶:shancjb
-
In recent years, the research and developments in the area of RF and microwave
technologies have progressed significantly due to the growing demand for applica-
bility in wireless communication technologies. Starting from 1992, wireless com-
munication technologies have become quite mature. In the modern era of electronic
developments, design of wireless handsets is an example of integration of many di-
verse skill sets. Classical books in the areas of microwave technology provide us
with an in-depth knowledge of electromagnetic fundamentals.
標簽:
Front-Ends
Receiver
Modern
上傳時間:
2020-05-31
上傳用戶:shancjb
-
The ever-increasing demand for private and sensitive data transmission over wireless net-
works has made security a crucial concern in the current and future large-scale, dynamic,
and heterogeneous wireless communication systems. To address this challenge, computer
scientists and engineers have tried hard to continuously come up with improved crypto-
graphic algorithms. But typically we do not need to wait too long to find an efficient way
to crack these algorithms. With the rapid progress of computational devices, the current
cryptographic methods are already becoming more unreliable. In recent years, wireless re-
searchers have sought a new security paradigm termed physical layer security. Unlike the
traditional cryptographic approach which ignores the effect of the wireless medium, physi-
cal layer security exploits the important characteristics of wireless channel, such as fading,
interference, and noise, for improving the communication security against eavesdropping
attacks. This new security paradigm is expected to complement and significantly increase
the overall communication security of future wireless networks.
標簽:
Communications
Physical
Security
Wireless
Layer
in
上傳時間:
2020-05-31
上傳用戶:shancjb