虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

THIRD

  • This document provides guidelines and describes how to easily port S60 2nd Edition C++ application

    This document provides guidelines and describes how to easily port S60 2nd Edition C++ applications to S60 3rd Edition. The document has been written based on experiences of porting regular S60 2nd Edition applications, such as the S60 Platform: POP/IMAP Example [4] that can be downloaded from Forum Nokia. Code snippets from the example are shown in Chapter 8, “Application build changes,” and in Appendix A, “Code example." In addition, Appendix B, "Commonly used functions that require capabilities," and Appendix C, "Commonly used interfaces that have been changed or removed," provide useful information on some frequently used functions and interfaces in THIRD-party applications.

    标签: application guidelines describes document

    上传时间: 2017-01-29

    上传用户:wang5829

  • China ancient times the official system was China ancient times in a political history science, this

    China ancient times the official system was China ancient times in a political history science, this book divided three parts: The first part of all previous dynasties government system outline, the second part of introduction ancient times the government official control system, THIRD part of all previous dynasties government system noun Jan released.

    标签: ancient China times political

    上传时间: 2017-02-15

    上传用户:1109003457

  • Three keys control three musics.S1 controls the first music.S2 controls the second music S3 control

    Three keys control three musics.S1 controls the first music.S2 controls the second music S3 control the THIRD music.

    标签: controls control music the

    上传时间: 2013-12-28

    上传用户:杜莹12345

  • .安装好Proteus 6.9 SP4,需要用Keil for ARM的或IAR的同样需要安装好。 2.安装Proteus VSM Simulator驱动 可以在官方网站上下载到)。Keil装Vdm

    .安装好Proteus 6.9 SP4,需要用Keil for ARM的或IAR的同样需要安装好。 2.安装Proteus VSM Simulator驱动 可以在官方网站上下载到)。Keil装Vdmagdi.exe,IAR装Vdmcspy.exe 3.将附件中的Prospice.dll和Licence.dll文件Copy到..\bin目录下,MCS8051.dll和ARM7TDMI.dll文件拷贝到..\MODELS目录下。分别替换原有的文件。 4.打开原理图模型和程序。记得要在ISIS中选"Use Remote Debug Monitor"。在Keil for ARM中选择"Proteus VSM Simulator"。IAR中选择Debugger-->Setup-->Drver-->THIRD-Party Driver,然后在THIRD-Party Driver中指向Vdmcspy.dll文件。 5.在IDE中点击Debug进入仿真模式。一个精彩的Proteus for ARM时代来临。 6.Enjoy! 附件中有两个例程:一个是IAR的例程。一个是Keil for ARM例程,是利用ADS1.2编译实现的。也就是说所有ADS的工程也可以转到Keil for ARM上来运行,方便联机调试,只需要修改很小的部分。 因为ADS不能和Proteus联调,目录下的那个*.mcp文件即是原有的ADS工程文件)

    标签: Proteus Keil Simulator 6.9

    上传时间: 2017-03-08

    上传用户:wys0120

  • This paper shows the development of a 1024-point radix-4 FFT VHDL core for applications in hardware

    This paper shows the development of a 1024-point radix-4 FFT VHDL core for applications in hardware signal processing, targeting low-cost FPGA technologies. The developed core is targeted into a Xilinx庐 Spartan鈩?3 XC3S200 FPGA with the inclusion of a VGA display interface and an external 16-bit data acquisition system for performance evaluation purposes. Several tests were performed in order to verify FFT core functionality, besides the time performance analysis highlights the core advantages over commercially available DSPs and Pentium-based PCs. The core is compared with similar THIRD party IP cores targeting resourceful FPGA technologies. The novelty of this work is to provide a lowcost, resource efficient core for spectrum analysis applications.

    标签: applications development hardware paper

    上传时间: 2013-12-21

    上传用户:jichenxi0730

  • Basic function to locate and measure the positive peaks in a noisy data sets. Detects peaks by loo

    Basic function to locate and measure the positive peaks in a noisy data sets. Detects peaks by looking for downward zero-crossings in the smoothed THIRD derivative that exceed SlopeThreshold and peak amplitudes that exceed AmpThreshold. Determines, position, height, and approximate width of each peak by least-squares curve-fitting the log of top part of the peak with a parabola.

    标签: peaks function positive Detects

    上传时间: 2017-04-26

    上传用户:彭玖华

  • A paper that I presented on Supervisory Control and Data Acquisition (SCADA) won the second prize at

    A paper that I presented on Supervisory Control and Data Acquisition (SCADA) won the second prize at the symposium conducted by the Electrical and Electronics Engineering department of the SRM University. Other topics on which I presented papers were Performance enhancement of wireless sensor networks using directional antennas, Smart card application and wireless communication. Also my research idea titled “Wavelet Based Image Compression Using SPIHT Algorithm “secured THIRD prize in a technical festival.

    标签: Supervisory Acquisition presented Control

    上传时间: 2014-01-12

    上传用户:zhouli

  • Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/

    Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/e)x] step3:Slove x=1/F(u) step4:Repeat Step1~Step3 by using different u,you can get x1,x2,x3,...,xn step5:If the first packet was generated at time [0], than the second packet will be generated at time [0+x1],The THIRD packet will be generated at time [0+x1+x2], and so on …. Random-number generation 1.static method random from class Math -Returns doubles in the range 0.0 <= x < 1.0 2.class Random from package java.util -Can produce pseudorandom boolean, byte, float, double, int, long and Gaussian values -Is seeded with the current time of day to generate different sequences of numbers each time the program executes

    标签: Generate Possion between random

    上传时间: 2017-05-25

    上传用户:bibirnovis

  • The book consists of three sections. The first, foundations, provides a tutorial overview of the pri

    The book consists of three sections. The first, foundations, provides a tutorial overview of the principles underlying data mining algorithms and their application. The presentation emphasizes intuition rather than rigor. The second section, data mining algorithms, shows how algorithms are constructed to solve specific problems in a principled manner. The algorithms covered include trees and rules for classification and regression, association rules, belief networks, classical statistical models, nonlinear models such as neural networks, and local memory-based models. The THIRD section shows how all of the preceding analysis fits together when applied to real-world data mining problems. Topics include the role of metadata, how to handle missing data, and data preprocessing.

    标签: foundations The consists sections

    上传时间: 2017-06-22

    上传用户:lps11188

  • Wishbone to LPC (Low-Pin Count) Bridge, includes master and slave modules. Supports 8-bit I/O Read a

    Wishbone to LPC (Low-Pin Count) Bridge, includes master and slave modules. Supports 8-bit I/O Read and Write cycles, 8-bit Memory Read/Write cycles, DMA cycles, and up to 32-bit Firmware memory read/write cycles. Serial IRQ support is also provided. None of this has been tested (yet) with a THIRD-party LPC Peripheral or Host.

    标签: Wishbone Supports includes Low-Pin

    上传时间: 2014-12-20

    上传用户:古谷仁美