这是I2c网关Id独立烧写程序, 烧写的ID必须要求是:“0~9”、“a~z”、“A~Z”的16为字符才能烧写成功。 其中当是输入的小写字母时,自动转换为大些烧入。 如: 1) # ./burnID 0123456789abcdef 烧入的是:0123456789ABCDEF 2] # ./burnID 0123456789@ cdef 烧入不成功,因为有其他字符 3) # ./burnID 0123456789abcdefDfs 烧入也不成,因为超过16个字符 built-in analog anti-aliasing filters, four 10bit Analog-to-Digital converters, and proprietary digital gain/clamp controller, high quality Y/C separator to reduce cross-noise and high performance free scaler. Four built-in motion,
上传时间: 2017-03-20
上传用户:playboys0
MPEG-4 标准文档 access to visual objects in natural and synthetic moving pictures and associated natural or synthetic sound for various applications such as digital storage media, internet, various forms of wired or wireless communication etc. The use of ISO/IEC 14496 means that motion video can be manipulated as a form of computer data and can be stored on various storage media, transmitted and received over existing and future networks and distributed on existing and future broadcast channels.
标签: associated and synthetic pictures
上传时间: 2017-04-15
上传用户:TRIFCT
This software allows users to see how a serial async com port can be used to comunicate with a sync device (SPI). In this case, the software reads a low cost digital temperature sensor IC.
标签: comunicate software allows serial
上传时间: 2014-01-16
上传用户:huangld
C Algorithms for Real-Time DSP Chapters 1 and 2 cover the basic principles of digital signal processing and C programming. Readers familiar with these topics may wish to skip one or both chapters.
标签: Algorithms principles Real-Time Chapters
上传时间: 2017-06-01
上传用户:AbuGe
Objectives The purpose of this notebook is to give you a brief introduction to the DiscreteWavelets Toolbox and show you how to use it to load images. Some basic image manipulation is illustrated as well. You will also learn how to use measures and tools such as cumulative energy, entropy, PSNR, and Huffman coding. Help on the DiscreteWavelets Toolbox Help for the toolbox is available by clicking on Help and then Product Help (or press F1) and then clicking on the DiscreteWavelets Toolbox. Several demos and examples are available as well by clicking on the Demos tab on the Help menu. Image Basics The DiscreteWavelets Toolbox comes with 18 grayscale images and 9 color images for you to use. There are three functions available to tell you more about these images. The first function is called |ImageList|. This function can tell you the names and sizes of the digital images in the Toolbox.
标签: introduction DiscreteWav Objectives notebook
上传时间: 2017-06-30
上传用户:康郎
P3.20. Consider an analog signal xa (t) = sin (2πt), 0 ≤t≤ 1. It is sampled at Ts = 0.01, 0.05, and 0.1 sec intervals to obtain x(n). b) Reconstruct the analog signal ya (t) from the samples x(n) using the sinc interpolation (use ∆ t = 0.001) and determine the frequency in ya (t) from your plot. (Ignore the end effects.) C) Reconstruct the analog signal ya (t) from the samples x (n) using the cubic spline interpolation and determine the frequency in ya (t) from your plot. (Ignore the end effects.)
标签: Consider sampled analog signal
上传时间: 2017-07-12
上传用户:咔乐坞
Digital Modulation Techniques are those echniques through which we convert digital signals into analog signal which can be transmitted through transmission medium...this program demostrate some of the basics techniques
标签: Modulation Techniques echniques Digital
上传时间: 2013-12-23
上传用户:wyc199288
This Simulink model simulates as an example the transmission and reception of random digital data modulated with GMSK. The purpose of this model is to illustrate how part of the GSM transmission and reception works. It also measures the BER, affected by an AWGN channel.
标签: transmission simulates reception Simulink
上传时间: 2017-07-28
上传用户:litianchu
Most e-book publishers do not warn their customers about the possible implications of the digital rights management tied to their products. Generally they claim that digital rights management is meant to prevent copying of the e-book. However in many cases it is also possible that digital rights management will result in the complete denial of access by the purchaser to the e-book.[citation needed] With some formats of DRM, the e-book is tied to a specific computer or device
标签: implications publishers customers the
上传时间: 2013-12-11
上传用户:xg262122
A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certificate status information. PKI users select one or more certificate issuers as trust anchors, and establish security services based on certificates that may be validated using one of their trust anchors.
标签: Infrastructure cryptographic entities physical
上传时间: 2017-07-31
上传用户:561596