虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

BINARY

二进制(BINARY),是在数学和数字电路中以2为基数的记数系统,是以2为基数代表系统的二进位制。这一系统中,通常用两个不同的符号0(代表零)和1(代表一)来表示[1]。发现者是莱布尼茨。数字电子电路中,逻辑门的实现直接应用了二进制,现代的计算机和依赖计算机的设备里都使用二进制。每个数字称为一个比特(Bit,BINARYdigit的缩写)[2]。
  • Verilog HDL: Magnitude For a vector (a,b), the magnitude representation is the following: A c

    Verilog HDL: Magnitude For a vector (a,b), the magnitude representation is the following: A common approach to implementing these arithmetic functions is to use the Coordinate Rotation Digital Computer (CORDIC) algorithm. The CORDIC algorithm calculates the trigonometric functions of sine, cosine, magnitude, and phase using an iterative process. It is made up of a series of micro-rotations of the vector by a set of predetermined constants, which are powers of two. Using BINARY arithmetic, this algorithm essentially replaces multipliers with shift and add operations. In a Stratix™ device, it is possible to calculate some of these arithmetic functions directly, without having to implement the CORDIC algorithm.

    标签: representation Magnitude the magnitude

    上传时间: 2013-12-24

    上传用户:金宜

  • Given an positive integer A (1 <= A <= 109), output the lowest bit of A. For example, given A

    Given an positive integer A (1 <= A <= 109), output the lowest bit of A. For example, given A = 26, we can write A in BINARY form as 11010, so the lowest bit of A is 10, so the output should be 2. Another example goes like this: given A = 88, we can write A in BINARY form as 1011000, so the lowest bit of A is 1000, so the output should be 8.

    标签: A. positive integer example

    上传时间: 2014-01-22

    上传用户:rocketrevenge

  • What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the poss

    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for BINARY Access Read(Say Source File) * Open a temparory file where encrypted data is stored for BINARY Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)

    标签: Sometimes the contents desire

    上传时间: 2013-12-25

    上传用户:playboys0

  • This C++ code example provides a method for transferring objects or chunks of data from one device

    This C++ code example provides a method for transferring objects or chunks of data from one device to another via the Bluetooth OBEX protocol. These chunks are typically files or other blocks of BINARY data. This example demonstrates how to run OBEX on top of the Bluetooth RFCOMM protocol, but OBEX can also be used with other transport media, such as IrDA and USB.

    标签: transferring provides example objects

    上传时间: 2015-12-02

    上传用户:13160677563

  • The Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG are finalising a new standard for the cod

    The Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG are finalising a new standard for the coding (compression) of natural video images. The new standard [1] will be known as H.264 and also MPEG-4 Part 10, “Advanced Video Coding”. The standard specifies two types of entropy coding: Context-based Adaptive BINARY Arithmetic Coding (CABAC) and Variable-Length Coding (VLC). This document provides a short introduction to CABAC. Familiarity with the concept of Arithmetic Coding is assumed.

    标签: finalising standard Joint ITU-T

    上传时间: 2015-12-08

    上传用户:561596

  • The Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG are finalising a new standard for the cod

    The Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG are finalising a new standard for the coding (compression) of natural video images. The new standard [1] will be known as H.264 and also MPEG-4 Part 10, “Advanced Video Coding”. The standard specifies two types of entropy coding: Context-based Adaptive BINARY Arithmetic Coding (CABAC) and Variable-Length Coding (VLC). The Variable-Length Coding scheme, part of the Baseline Profile of H.264, is described in this document.

    标签: finalising standard Joint ITU-T

    上传时间: 2013-12-21

    上传用户:yuzsu

  • Notepad++ is a generic source code editor (it tries to be anyway) and Notepad replacement written in

    Notepad++ is a generic source code editor (it tries to be anyway) and Notepad replacement written in C++ with the win32 API. The aim of Notepad++ is to offer a slim and efficient BINARY with a totally customizable GUI.

    标签:

    上传时间: 2015-12-28

    上传用户:sjyy1001

  • Developing internationalized products is a continuous balancing act. Developers and their managers o

    Developing internationalized products is a continuous balancing act. Developers and their managers often grossly underestimate the level of effort and attention to detail required to create either a world-ready, single-BINARY application ready for use in many different markets, or high-quality, foreign-language editions of a product. If you are a developer, make sure your management understands what is involved.

    标签: internationalized Developing Developers continuous

    上传时间: 2014-12-05

    上传用户:TRIFCT

  • AutoBoot is a generic boot loader that automatically locates, loads, and executes object files from

    AutoBoot is a generic boot loader that automatically locates, loads, and executes object files from multiple types of media. AutoBoot provides a simple, fast, and functional means of loading an OS image while maintaining a small Flash memory footprint. This BINARY release contains a stand-alone version of AutoBoot for the DbAu1200 development board, designed to replace the YAMON boot loader.

    标签: automatically AutoBoot executes generic

    上传时间: 2014-01-14

    上传用户:海陆空653

  • The UCL common multimedia library implements a number of algorithms and protocols needed by a number

    The UCL common multimedia library implements a number of algorithms and protocols needed by a number of our applications. It compiles standalone on a range of Unix systems (Solaris, Linux, Irix, FreeBSD, MacOSX) and on Windows 95/98/NT/XP. The following protocols/algorithms are included in the library: Base64 encoding/decoding BINARY tree Random number HMAC authentication MD5 DES RTP MBus SAP

    标签: number algorithms multimedia implements

    上传时间: 2014-11-16

    上传用户:hoperingcong