虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Depending

  • The files adi_ssl_init.h and adi_ssl_init.c are used to define the functions adi_ssl_Init()

    The files adi_ssl_init.h and adi_ssl_init.c are used to define the functions adi_ssl_Init() and 慳di_ssl_Terminate()?which initialize and terminate all the Blackfin System Services in the appropriate order, for a particular EZ-Kit, Depending on the Blackfin processor used.

    标签: adi_ssl_init adi_ssl_Init functions define

    上传时间: 2014-01-21

    上传用户:sammi

  • C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and exam

    C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and example projects files facilitate writing C/C++ Code for the TI鈥檚 28xx MCUs. The code can be used as a learning tool or as the basis for a development platform Depending on the current needs of the user. We suggest that you immediately download these header files in order for an easier transition to understanding the 28xx peripherals.

    标签: Peripheral peripheral and Examples

    上传时间: 2014-01-24

    上传用户:fandeshun

  • Besides enhanced looks and advanced features, one of the best things about Swing is its pluggable lo

    Besides enhanced looks and advanced features, one of the best things about Swing is its pluggable look and feel (PLAF). PLAF architecture allows seamless changes in the appearance of an application and the way an application interacts with the user. However, designing and developing a PLAF is much more exhaustive and complex. On the other hand, themes provide a simple alternative to change look and feel of the swing application. Themes are easier to implement and they enhance the visual appeal of the application UI using the default Java look and feel. Theme mechanism allows a developer to easily specify the default colors, fonts and icons used by the look and feel (L&F). It allows developers to write their own themes giving them a choice to show their application GUI the way they want it, rather than Depending on the defaults provided by the system.

    标签: pluggable enhanced advanced features

    上传时间: 2014-01-23

    上传用户:253189838

  • Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in A

    Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in ARM!ˉs new Cortex family. With high performance and power efficiency, it targets a wide variety of mobile and consumer applications including mobile phones, set-top boxes, gaming consoles and automotive navigation/entertainment systems. The Cortex-A8 processor spans a range of performance points Depending on the implementation, delivering over to 2000 Dhrystone MIPS (DMIPS) of performance for demanding consumer applications and consuming less than 300mW for low-power mobile devices. This translates into a large increase in processing capability while staying with the power levels of previous generations of mobile devices. Consumer applications will benefit from the reduced heat dissipation and resulting lower packaging and integration costs.

    标签: microprocessor Introduction applications Cortex

    上传时间: 2013-12-09

    上传用户:xzt

  • The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of cla

    The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of classified examples a decision tree is induced, biased by the information gain measure, which heuristically leads to small trees. The examples are given in attribute-value representation. The set of possible classes is finite. Only tests, that split the set of instances of the underlying example languages Depending on the value of a single attribute are supported.

    标签: algorithm induction decision top-down

    上传时间: 2017-08-20

    上传用户:hzy5825468

  • Bi-density twin support vector machines

    In this paper we present a classifier called bi-density twin support vector machines (BDTWSVMs) for data classification. In the training stage, BDTWSVMs first compute the relative density degrees for all training points using the intra-class graph whose weights are determined by a local scaling heuristic strategy, then optimize a pair of nonparallel hyperplanes through two smaller sized support vector machine (SVM)-typed problems. In the prediction stage, BDTWSVMs assign to the class label Depending on the kernel density degree-based distances from each test point to the two hyperplanes. BDTWSVMs not only inherit good properties from twin support vector machines (TWSVMs) but also give good description for data points. The experimental results on toy as well as publicly available datasets indicate that BDTWSVMs compare favorably with classical SVMs and TWSVMs in terms of generalization

    标签: recognition Bi-density machines support pattern vector twin for

    上传时间: 2019-06-09

    上传用户:lyaiqing

  • virtual decomposition control

    obot control, a subject aimed at making robots behave as desired, has been extensively developed for more than two decades. Among many books being published on this subject, a common feature is to treat a robot as a single system that is to be controlled by a variety of control algorithms Depending on different scenarios and control objectives. However, when a robot becomes more complex and its degrees of freedom of motion increase substantially, the needed control computation can easily go beyond the scope a modern computer can handle within a pre-specified sampling period. A solution is to base the control on subsystem dynamics.

    标签: decomposition virtual control

    上传时间: 2019-09-04

    上传用户:txb96

  • Feedback+Strategies+for+Wireless+Communication

    During the past decade, many wireless communication techniques have been developedto achievevariousgoals suchas higherdata rate,morerobustlink quality, and higher number of users in a given bandwidth. For wireless communication systems, Depending on the availability of a feedback link, two approaches can be considered: namely open and closed loop. Open loop communication system that does not exploit the channel knowledge at the transmitter is now well understood from both a theoretical and practical point of view. 

    标签: Communication Strategies Feedback Wireless for

    上传时间: 2020-05-27

    上传用户:shancjb

  • Stochastic Geometry and Wireless Networks

    A wireless communication network can be viewed as a collection of nodes, located in some domain, which can in turn be transmitters or receivers (Depending on the network considered, nodes may be mobile users, base stations in a cellular network, access points of a WiFi mesh etc.). At a given time, several nodes transmit simultaneously, each toward its own receiver. Each transmitter–receiver pair requires its own wireless link. The signal received from the link transmitter may be jammed by the signals received from the other transmitters. Even in the simplest model where the signal power radiated from a point decays in an isotropic way with Euclidean distance, the geometry of the locations of the nodes plays a key role since it determines the signal to interference and noise ratio (SINR) at each receiver and hence the possibility of establishing simultaneously this collection of links at a given bit rate. The interference seen by a receiver is the sum of the signal powers received from all transmitters, except its own transmitter.

    标签: Stochastic Geometry Networks Wireless Volume and II

    上传时间: 2020-06-01

    上传用户:shancjb

  • Smart Grid Security

    The field of cyber security, or information security, or information assurance, Depending on your preference, is an interdisciplinary one. It is part computer science, part statistics, part psychology, part law, and a part of many other fields. Moreover, any cyber security practi- tioner needs to know what he or she is protecting and where to pri- oritize. Just as someone should not spend $100 to protect something worth $10, one cannot be blind to the other disciplines.

    标签: Security Smart Grid

    上传时间: 2020-06-07

    上传用户:shancjb