USB is quick hot-pluggable, ease of use, connect and power, this book isn t too technical but practical, helps to develop I/O devices with examples and prototypes, intended for those who Have programming and electronics skills.
标签: hot-pluggable technical connect practi
上传时间: 2013-12-26
上传用户:it男一枚
Title : Implementation of quadrature modulation and demodulation Design Object : By implementing quadrature modulation and demodulation of analog signals in digital signal processing, students will Have better understanding of sampling and frequency analysis of discrete-time signals. Design Content : Make a MATLAB function which performs quadrature modulation and demodulation for a input signal with anti-aliasing filtering.
标签: Implementation demodulation implementing modulation
上传时间: 2013-12-09
上传用户:蠢蠢66
This book is for someone who wants to quickly master the basics of how to install, run, and maintain Linux on an Intel-based personal computer. All of the tools you need are included. Your computer should Have a monitor, or display, keyboard, mouse, hard drive, floppy drive, and CD-ROM drive. Although you can jump right in and install Linux onto your hard drive, you should Have some technical information about your computer and its hardware on hand before you start.
标签: install someone quickly maintai
上传时间: 2017-08-19
上传用户:zhuoying119
C++ is a programming language. It is a programming language of many different dialects, just like each language that is spoken has many dialects. In C though, they are not because the "speakers" live in the North, South, or grew up in some other place, it is because there are so many compilers. There are about four major ones: Borland C++, Microsoft Visual C++, Watcom C/386, and DJGPP. You can download DJGPP http://www.delorie.com/djgpp/ or you may already Have another compiler. Each of these compilers is a little different. The library functions of one will Have all of the standard C++ functions, but they will also Have other functions or, continuing the analogy, words. At times, this can lead to confusion, as certain programs will only run under certain compilers, though I do not believe this to be the case with the programs in these tutorials.
标签: programming language different dialects
上传时间: 2014-01-17
上传用户:lz4v4
face detection Face detection can be regarded as a more general case of face localization In face localization, the task is to find the locations and sizes of a known number of faces (usually one). In face detection, one does not Have this additional information. Early face-detection algorithms focused on the detection of frontal human faces, whereas newer algorithms attempt to solve the more general and difficult problem of multi-view face detection. That is, the detection of faces that are either rotated along the axis from the face to the observer (in-plane rotation), or rotated along the vertical or left-right axis (out-of-plane rotation),or both.
标签: detection face localization regarded
上传时间: 2014-01-10
上传用户:wfeel
Aniicon, Delphi component that allows show animated icon files in Delphi forms. The animated icons are included in the .EXE file, so you don t Have to distribute separate .ANI files. This component is freeware.
标签: animated Delphi component Aniicon
上传时间: 2017-08-23
上传用户:chenbhdt
This file for experiment of C8051 Microcontroller(SILABS company) with USB interface that use keil programming if you Have some problem for this file, please contact me with sofa24@hotmail.com
标签: Microcontroller experiment interface company
上传时间: 2017-08-24
上传用户:woshini123456
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there Have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.
标签: cryptographic applications attractive for
上传时间: 2013-12-07
上传用户:zhuimenghuadie
卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章,全英文,2003年完成,Probabilistic Noise Identification and Data Cleaning,Real world data is never as perfect as we would like it to be and can often suffer from corruptions that may impact interpretations of the data, models created from the data, and decisions made based on the data. One approach to this problem is to identify and remove records that contain corruptions. Unfortunately, if only certain fields in a record Have been corrupted then usable, uncorrupted data will be lost. In this paper we present LENS, an approach for identifying corrupted fields and using the remaining noncorrupted fields for subsequent modeling and analysis.
上传时间: 2017-08-29
上传用户:thinode
数学公式库--非常不错 The GNU Scientific Library (GSL) is a collection of routines for numerical computing. The routines Have been written from scratch in C, and present a modern Applications Programming Interface (API) for C programmers, allowing wrappers to be written for very high level
标签: Scientific collection computing numerical
上传时间: 2013-12-17
上传用户:yuanyuan123