虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Tried

  • This application can make a comparative analysis of two images using different methods: Logical

    This application can make a comparative analysis of two images using different methods: Logical Operators and singular value decomposition (SVD). In conclusion, with this work we have Tried to collect a few methods for differentiating textures.

    标签: application comparative different analysis

    上传时间: 2017-07-16

    上传用户:虫虫虫虫虫虫

  • The 6.0 release of Visual C++ shows Microsoft s continued focus on Internet technologies and COM, wh

    The 6.0 release of Visual C++ shows Microsoft s continued focus on Internet technologies and COM, which are key components of the new Windows Distributed interNet Application Architecture (DNA). In addition to supporting these platform initiatives, Visual C++ 6.0 also adds an amazing number of productivity-boosting features such as Edit And Continue, IntelliSense, AutoComplete, and code tips. These features take Visual C++ to a new level. We have Tried to make sure that this book keeps you up to speed on the latest technologies being introduced into Visual C++.

    标签: technologies Microsoft continued Internet

    上传时间: 2017-09-07

    上传用户:wsf950131

  • This approach, we feel, came very close to obtaining an image from the camera OV7620. Before we trie

    This approach, we feel, came very close to obtaining an image from the camera OV7620. Before we Tried to capture a camera signal, we successfully transferred a test image from the FPGA s onboard RAM modules through RS232 to the PC program. This file do it.

    标签: obtaining approach Before camera

    上传时间: 2017-09-11

    上传用户:youmo81

  • This book describes numerous situations that graduate students will commonly encounter as they work

    This book describes numerous situations that graduate students will commonly encounter as they work towards the goal of earning their PhD. Starting from your very first day in the lab, to the beginning stages of your post-PhD job search, to writing your dissertation,we’ve Tried to offer you sage advice on how to handle particular situations as they arise.

    标签: situations describes encounter commonly

    上传时间: 2013-12-16

    上传用户:225588

  • stm32 usb example

    it is an example for stm32 usb. i had Tried it.  it deid not work on my board. buy it might be right for you.

    标签: stm32 usb example

    上传时间: 2015-03-26

    上传用户:sjxelle

  • LTE-Advanced+Relay+Technology

    LTE-Advanced becomes a truly global standard for 4G cellular communications. Relay, as one of the key technologies of LTE-Advanced, can significantly extend the coverage, and improve the system throughput. LTE-A standards and tech- nologies were described in several recent books where the limited pages for relay feature prevent the detailed explanations of the technology. In this book, we Tried to provide an in-depth description of LTE-A relay development. More specifically, significant portions are spent on relay channel modeling and potential technologies during the study item phase of the development, although some of those tech- nologies, such as Type 2 cooperative relay, multi-hop relay, relay with backhaul of carrier aggregation, were not standardized in Release 10 LTE.

    标签: LTE-Advanced Technology Relay

    上传时间: 2020-05-27

    上传用户:shancjb

  • Physical Layer Security in Wireless Communications

    The ever-increasing demand for private and sensitive data transmission over wireless net- works has made security a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, computer scientists and engineers have Tried hard to continuously come up with improved crypto- graphic algorithms. But typically we do not need to wait too long to find an efficient way to crack these algorithms. With the rapid progress of computational devices, the current cryptographic methods are already becoming more unreliable. In recent years, wireless re- searchers have sought a new security paradigm termed physical layer security. Unlike the traditional cryptographic approach which ignores the effect of the wireless medium, physi- cal layer security exploits the important characteristics of wireless channel, such as fading, interference, and noise, for improving the communication security against eavesdropping attacks. This new security paradigm is expected to complement and significantly increase the overall communication security of future wireless networks.

    标签: Communications Physical Security Wireless Layer in

    上传时间: 2020-05-31

    上传用户:shancjb

  • Intelligence_-A-Modern-Approach

    Artificial Intelligence (AI) is a big field, and this is a big book. We have Tried to explore the full breadth of the field, which encompasses logic, probability, and continuous mathematics; perception, reasoning, learning, and action; and everything from microelectronic devices to robotic planetary explorers. The book is also big because we go into some depth. The subtitle of this book is “A Modern Approach.” The intended meaning of this rather empty phrase is that we have Tried to synthesize what is now known into a common frame- work, rather than trying to explain each subfield of AI in its own historical context. We apologize to those whose subfields are, as a result, less recognizable.

    标签: A-Modern-Approach Intelligence

    上传时间: 2020-06-10

    上传用户:shancjb