虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Top-Level

  • The use of hardware description languages (HDLs) is becoming increasingly common for designing and

    The use of hardware description languages (HDLs) is becoming increasingly common for designing and verifying FPGA designs. Behavior level description not only increases design productivity, but also provides unique advantages for design verification. The most dominant HDLs today are Verilog and VHDL. This application note illustrates the use of Verilog in the design and verification of a digital UART (Universal Asynchronous Receiver & Transmitter).

    标签: increasingly description designing languages

    上传时间: 2014-01-08

    上传用户:小草123

  • This document specifies a subset of the C programming language which is intended to be suitable for

    This document specifies a subset of the C programming language which is intended to be suitable for embedded automotive systems up to and including safety integrity level 3 (as defined in the MISRA Guidelines). It contains a list of rules concerning the use of the C programming language together with justifications and examples.

    标签: programming specifies document language

    上传时间: 2013-12-11

    上传用户:cursor

  • Basic function to locate and measure the positive peaks in a noisy data sets. Detects peaks by loo

    Basic function to locate and measure the positive peaks in a noisy data sets. Detects peaks by looking for downward zero-crossings in the smoothed third derivative that exceed SlopeThreshold and peak amplitudes that exceed AmpThreshold. Determines, position, height, and approximate width of each peak by least-squares curve-fitting the log of top part of the peak with a parabola.

    标签: peaks function positive Detects

    上传时间: 2017-04-26

    上传用户:彭玖华

  • The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for firmwa

    The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for firmware updating. The instruction set of the W78E58B is fully compatible with the standard 8052. The W78E58B contains a 32K bytes of main ROM and a 4K bytes of auxiliary ROM which allows the contents of the 32KB main ROM to be updated by the loader program located at the 4KB auxiliary ROM 512 bytes of on-chip RAM four 8-bit bi-directional and bit-addressable I/O ports an additional 4- bit port P4 three 16-bit timer/counters a serial port. These peripherals are supported by a eight sources two-level interrupt capability. To facilitate programming and verification, the ROM inside the W78E58B allows the program memory to be programmed and read electronically. Once the code is confirmed, the user can protect the code for security

    标签: microcontroller programmable in-system W78E58B

    上传时间: 2017-04-27

    上传用户:yiwen213

  • Program for : 1) ZOOMING , 2) SHRINKING &

    Program for : 1) ZOOMING , 2) SHRINKING & 3) GRAY LEVEL RESOLUTION

    标签: SHRINKING Program ZOOMING for

    上传时间: 2013-12-18

    上传用户:zhangyi99104144

  • 本文研究了SMBus 规范

    本文研究了SMBus 规范,介绍了典型的基于片上系统(SoC)设计的知识产权核(IP)实现,采用自顶向下 (Top-down)的集成电路设计方法完成了设计,并架构了基于总线功能模型(BFM)的验证平台 完成功能仿真,顺利完成了逻辑综合和时序仿真。FPGA 验证和投片后测试均表明设计具有 良好的性能。

    标签: SMBus

    上传时间: 2013-11-28

    上传用户:xuanchangri

  • Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2

    Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair Playfair Key Matrix 1.a 5X5 matrix of letters based on a keyword 2.fill in letters of keyword (sans duplicates) 3.fill rest of matrix with other letters Encrypting and Decrypting -plaintext is encrypted two letters at a time 1. if a pair is a repeated letter, insert filler like X’ 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end) 3. if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) 4. otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair

    标签: monoalphabetic Playfair provides security

    上传时间: 2017-05-25

    上传用户:变形金刚

  • Heapsort 1.A heap is a binary tree satisfying the followingconditions: -This tree is completely ba

    Heapsort 1.A heap is a binary tree satisfying the followingconditions: -This tree is completely balanced. -If the height of this binary tree is h, then leaves can be at level h or level h-1. -All leaves at level h are as far to the left as possible. -The data associated with all descendants of a node are smaller than the datum associated with this node. Implementation 1.using a linear array not a binary tree. -The sons of A(h) are A(2h) and A(2h+1). 2.time complexity: O(n log n)

    标签: followingconditions tree completely satisfying

    上传时间: 2017-05-25

    上传用户:2467478207

  • this version is only interesting for people that want to generate their own levels (need JDK to comp

    this version is only interesting for people that want to generate their own levels (need JDK to compile new level).

    标签: interesting generate version levels

    上传时间: 2017-06-02

    上传用户:tb_6877751

  • Novell.Press.Linux.Kernel.Development linux内核开发的经典书籍之一 The Linux kernel is one of the most interes

    Novell.Press.Linux.Kernel.Development linux内核开发的经典书籍之一 The Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. That is why Sams is excited to bring you the latest Linux kernel development information from a Novell insider in the second edition of Linux Kernel Development. This authoritative, practical guide will help you better understand the Linux kernel through updated coverage of all the major subsystems, new features associated with Linux 2.6 kernel and insider information on not-yet-released developments. You ll be able to take an in-depth look at Linux kernel from both a theoretical and an applied perspective as you cover a wide range of topics, including algorithms, system call interface, paging strategies and kernel synchronization. Get the top information right from the source in Linux Kernel Development

    标签: Linux Development interes Novell

    上传时间: 2017-06-06

    上传用户:songyue1991