亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

three-Phase

  • In term project, we will take the baseline JPEG codec in ARM-based platform system as an example to

    In term project, we will take the baseline JPEG codec in ARM-based platform system as an example to practice the design flow in SoC. We divide the project into three parts, and the goal of each part is described as follow. Part I: Design a baseline JPEG software codec in C/C++ and port it to ARM core,(ARM7TDMI, ARM720T, or ARM922T.) Part II: Make use of virtual prototype to integrate/verify the hardware and software. Part III: Verify your soft IP in target environment.

    標簽: ARM-based baseline platform project

    上傳時間: 2017-02-15

    上傳用戶:363186

  • cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used

    cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used to calculate a whole range of scientific functions including sin, cos, tan, arctan, arcsin, arccos, sinh, cosh, tanh, arctanh, log, exp, square root and even multiply and divide. the method dates back to volder [1959], and due to its versatility and compactness, it made possible the microcoding of the hp35 pocket scientific calculator in 1972. here is some code to illustrate the techniques. ive split the methods into three parts linear, circular and hyperbolic. in the hp35 microcode these would be unified into one function (for space reasons). because the linear mode can perform multiply and divide, you only need add/subtract and shift to complete the implementation. you can select in the code whether to do the multiples and divides also by cordic means. other multiplies and divides are all powers of 2 (these dont count). to eliminate these too, would involve ieee hackery.

    標簽: essentially algorithm describe suitably

    上傳時間: 2017-03-02

    上傳用戶:litianchu

  • This package is a free collection of Matlab routines for computing wave atom transforms in one, two

    This package is a free collection of Matlab routines for computing wave atom transforms in one, two and three dimensions.

    標簽: collection transforms computing routines

    上傳時間: 2017-03-05

    上傳用戶:1583060504

  • This is GPS Acquisition..by Matlab, this file performs cold start acquisition on the collected "data

    This is GPS Acquisition..by Matlab, this file performs cold start acquisition on the collected "data". It searches for GPS signals of all satellites, which are listed in field "acqSatelliteList" in the settings structure. Function saves code phase and frequency of the detected signals in the "acqResults" structure.

    標簽: Acquisition acquisition collected performs

    上傳時間: 2013-12-28

    上傳用戶:wxhwjf

  • This is GPS Matlab acquisition code. Function performs cold start acquisition on the collected "data

    This is GPS Matlab acquisition code. Function performs cold start acquisition on the collected "data". It searches for GPS signals of all satellites, which are listed in field "acqSatelliteList" in the settings structure. Function saves code phase and frequency of the detected signals in the "acqResults" structure.

    標簽: acquisition collected Function performs

    上傳時間: 2014-08-07

    上傳用戶:xjz632

  • Enhanced version of the Serial Peripheral Interface available on Motorola s MC68HC11 family of CPUs.

    Enhanced version of the Serial Peripheral Interface available on Motorola s MC68HC11 family of CPUs.Enhancements include a wider supported operating frequency range, 4deep read and write fifos, and programmable transfer count dependent interrupt generation. As with the SPI found in MC68HC11 processors the core features programmable clock phase [CPHA] and clock polarity [CPOL]. The core features an 8bit wishbone interface. Very simple, very small.

    標簽: Peripheral Interface available Enhanced

    上傳時間: 2014-12-06

    上傳用戶:invtnewer

  • We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f

    We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.

    標簽: effectiveness analytically numerically cloaking

    上傳時間: 2017-03-30

    上傳用戶:zxc23456789

  • In the bank all the activities are being done manually .As the bank widens its services & it finds d

    In the bank all the activities are being done manually .As the bank widens its services & it finds difficult to manage its operations manually and hence this leads to the automation of some of its operations. Banking Information system is a windows based applications. This project mainly deals with managing there types of account such as Saving Account, Current Account and Recurring Deposits . In this project bank is seeking to manage these account through computer based system. Tasks involved in this project are opening the user accounts , recording the account holders transactions , modify, the user records and generating the reports . This project is having three module: ] 1. Bank Master Module 2. Transaction Module 3. Reports module

    標簽: the bank activities manually

    上傳時間: 2013-12-13

    上傳用戶:LouieWu

  • This book is for systems architects who are interested in building security into their application

    This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues for architecture review, and as a catalog of designs to look for within a security product.

    標簽: application architects interested building

    上傳時間: 2014-01-24

    上傳用戶:xwd2010

  • The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for firmwa

    The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for firmware updating. The instruction set of the W78E58B is fully compatible with the standard 8052. The W78E58B contains a 32K bytes of main ROM and a 4K bytes of auxiliary ROM which allows the contents of the 32KB main ROM to be updated by the loader program located at the 4KB auxiliary ROM 512 bytes of on-chip RAM four 8-bit bi-directional and bit-addressable I/O ports an additional 4- bit port P4 three 16-bit timer/counters a serial port. These peripherals are supported by a eight sources two-level interrupt capability. To facilitate programming and verification, the ROM inside the W78E58B allows the program memory to be programmed and read electronically. Once the code is confirmed, the user can protect the code for security

    標簽: microcontroller programmable in-system W78E58B

    上傳時間: 2017-04-27

    上傳用戶:yiwen213

主站蜘蛛池模板: 安义县| 吴桥县| 沙坪坝区| 会宁县| 钟祥市| 六枝特区| 通化县| 思茅市| 英德市| 桂阳县| 潞西市| 临沭县| 贵溪市| 油尖旺区| 龙里县| 昆明市| 乐清市| 德惠市| 尚义县| 都昌县| 许昌市| 遵义市| 吉林省| 弥勒县| 伊宁县| 义乌市| 双柏县| 定结县| 县级市| 云南省| 江口县| 正宁县| 方城县| 疏勒县| 河东区| 巴中市| 浠水县| 桓仁| 萝北县| 宁陕县| 肃宁县|