This paper will discuss the design of an asynchronous FIFO,Asynchronous FIFOs are widely used in the computer networking industry to receive data at a particular frequency and transmit them at another frequency. An asynchronous FIFO has two different clocks: one for read and one for write.
标签: Asynchronous asynchronous the discuss
上传时间: 2013-12-09
上传用户:Thuan
This document explains how to read the RADARSAT data CD provided with the book "Digital Processing of Synthetic Aperture Data" by Ian Cumming and Frank Wong, Artech House, 2005. On this web site, programs are provided in MATLAB to read the data and parameters from the CD. The structure of the programs is outlined in Figure 1. There are two main programs and one function that are used to extract
标签: Processing the RADARSAT document
上传时间: 2013-12-16
上传用户:561596
Libsvm is a simple, easy-to-use, and efficient software for SVM classification and regression. It solves C-SVM classification, nu-SVM classification, one-class-SVM, epsilon-SVM regression, and nu-SVM regression. It also provides an automatic model selection tool for C-SVM classification. This document explains the use of libsvm.
标签: classification easy-to-use regression and
上传时间: 2017-06-24
上传用户:253189838
Java Extreme Programming Cookbook offers more than just a collection of cut-and-paste code. Each recipe also includes explanations of how and why the approach works, so you can adapt the techniques to similar situations. One of the biggest challenges facing developers today is sorting through the wide variety of tools available form various source and figuring out how to them effectively. The recipes in Java Extreme Programming Cookbook showcase how to use the most important features of these XP tools. Many of these tools are geared towards unit testing, while others are invaluable for continuous integration with these practical examples, you ll be able to choose the most effective tools to accomplish your goals, then implement them in a cohesive development environment quickly.
标签: cut-and-paste Programming collection Cookbook
上传时间: 2017-06-29
上传用户:cmc_68289287
*** HyperString v6.0 *** (c)1996-2000 EFD Systems, All rights reserved efd@mindspring.com *** THIS IS NOT PUBLIC DOMAIN SOFTWARE *** See below for license agreement, disclaimer, installation and use. Introduction --------------------------------------------------------- Welcome to HyperString! One of the most significant new features with Delphi32 is long dynamic strings. However, the built-in functions don t really exploit the full potential of these new strings. HyperString provides over 400 fast, efficient string management routines to help you realize the full power of this highly versatile new data type.
标签: HyperString reserved Systems rights
上传时间: 2017-07-04
上传用户:mhp0114
AJAX Book Reader is a complete AJAX client-server application that may be used with a Web browser to display a sequence of text files one page at a time. The display style is completely controlled by a configuration file. The first application of this is as a book viewer where each chapter resides in a seperate text file. It is also suitable for any case where it is not practical to show all of the text to be displayed at once in the browser window.
标签: AJAX client-server application complete
上传时间: 2014-01-02
上传用户:kikye
In number theory, the Euclidean algorithm (also called Euclid s algorithm) is an algorithm to determine the greatest common divisor (GCD) of two elements of any Euclidean domain (for example, the integers). Its major significance is that it does not require factoring the two integers, and it is also significant in that it is one of the oldest algorithms known, dating back to the ancient Greeks.
标签: algorithm Euclidean Euclid number
上传时间: 2017-07-17
上传用户:恋天使569
A digital filter structure for wideband filtering is proposed. It consists of two allpass filters and a linearphase FIR filter. One major advantage of this structure is that the allpass filters are functions of zM which implies that the maximal sample frequency is M times higher for this structure than for the corresponding conventional structures.
标签: structure filtering consists proposed
上传时间: 2014-01-21
上传用户:weixiao99
This m file hide an image jpeg,png in another jpeg,png image. The height and width of the secret image is in LSB of 1st 32 pixels of 1st row of the cover image.This helps in the recovery of secret image. The secret image must be smaller than cover image.A message box will appear with a number ,that number is the maximum product of width and height of secret image that can be successfully embedded in the cover image. The final png image will appear in workspace with random name.This image contains the secret image.One such png image is in the zip file with name 4447.png it contains an image of res 100x122.
上传时间: 2017-07-25
上传用户:gououo
Exploring C++ uses a series of self–directed lessons to divide C++ into bite–sized chunks that you can digest as rapidly as you can swallow them. The book assumes only a basic understanding of fundamental programming concepts (variables, functions, expressions, statements) and requires no prior knowledge of C or any other particular language. It reduces the usually considerable complexity of C++. The included lessons allow you to learn by doing, as a participant of an interactive education session. You’ll master each step in a one sitting before you proceed to the next. Author Ray Lischner has designed questions to promote learning new material. And by responding to questions throughout the text, youll be engaged every step of the way.
标签: Exploring directed lessons series
上传时间: 2014-11-15
上传用户:caiiicc