虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

an-<b>IntroductIOn</b>-to-rfid-technolog

  • METAmorphoses is a system for flexible and easy-to-use generation of RDF metadata directly from a re

    METAmorphoses is a system for flexible and easy-to-use generation of RDF metadata directly from a relational database. Metadata are genereated according to a mapping from an existing database schema to a particular ontology.

    标签: METAmorphoses easy-to-use generation flexible

    上传时间: 2014-01-03

    上传用户:nanxia

  • // // Histogram Sample // This sample shows how to use the Sample Grabber filter for video image p

    // // Histogram Sample // This sample shows how to use the Sample Grabber filter for video image processing. // Conceptual background: // A histogram is just a frequency count of every pixel value in the image. // There are various well-known mathematical operations that you can perform on an image // using histograms, to enhance the image, etc. // Histogram stretch (aka automatic gain control): // Stretches the image histogram to fill the entire range of values. This is a "point operation," // meaning each pixel is scaled to a new value, without examining the neighboring pixels. The // histogram stretch does not actually require you to calculate the full histogram. The scaling factor // is calculated from the minimum and maximum values in the image.

    标签: Sample Histogram Grabber sample

    上传时间: 2013-12-15

    上传用户:ryb

  • 本实训是有关线性表的顺序存储结构的应用

    本实训是有关线性表的顺序存储结构的应用,在本实训的实例程序中,通过C语言中提供的数组来存储两个已知的线性表,然后利用数组元素的下标来对线性表进行比较。通过对本实训的学习,可以理解线性表在顺序存储结构下的操作方法。 在实训中,我们设A=(a1,a2,…,an)和B=(b1,b2,…,bm)是两个线性表,其数据元素的类型是整型。若n=m,且ai=bi,则称A=B 若ai=bi,而aj<bj,则称A<B;除此以外,均称A>B。设计一比较大小的程序。

    标签: 线性 顺序存储

    上传时间: 2014-01-14

    上传用户:www240697738

  • Jvm 规范说明。The Java Virtual Machine was designed to support the Java programming language. Some concep

    Jvm 规范说明。The Java Virtual Machine was designed to support the Java programming language. Some concepts and vocabulary from the Java language are thus necessary to understand the virtual machine. This chapter gives enough of an overview of Java to support the discussion of the Java Virtual Machine to follow. Its material has been condensed from The Java Language Specification, by James Gosling, Bill Joy, and Guy Steele. For a complete discussion of the Java language, or for details and examples of the material in this chapter, refer to that book. Readers familiar with that book may wish to skip this chapter. Readers familiar with Java, but not with The Java Language Specification, should at least skim this chapter for the terminology it introduces.

    标签: Java programming designed language

    上传时间: 2013-12-19

    上传用户:wangyi39

  • What I am trying to introduce here is a full fledged Java Instant messenger, which has all the featu

    What I am trying to introduce here is a full fledged Java Instant messenger, which has all the features supplied by commercial messengers like Yahoo or MSN. Although it cannot compared to be in par with those messengers, it is an attempt by me to learn Advanced Java and JNI concepts. The challenges I faced here were often overcome by referring to numerous sites, which nearly zeroes in or completely solved the issues I faced at that point of time. It improved my learning curve and also believe would do the same to you too. Ofcourse, there are some bugs and glitches, which I hope you would excuse. Thanks to anyone who takes the pain to report them or even suggest better way of doing things to me.

    标签: introduce messenger Instant fledged

    上传时间: 2014-12-05

    上传用户:电子世界

  • This program requires the DSP2833x header files. // // This program requires an external I2C RT

    This program requires the DSP2833x header files. // // This program requires an external I2C RTC connected to // the I2C bus at address 0x6f. // // As supplied, this project is configured for "boot to SARAM" // operation. The 2833x Boot Mode table is shown below. // For information on configuring the boot mode of an eZdsp, // please refer to the documentation included with the eZdsp,

    标签: requires program This external

    上传时间: 2017-07-12

    上传用户:dianxin61

  • fft analysis

          Use the fast Fourier transform function fft to analyse following signal. Plot the original signal, and the magnitude of its spectrum linearly and logarithmically. Apply Hamming window to reduce the leakage.   .   The hamming window can be coded in Matlab as   for n=1:N hamming(n)=0.54+0.46*cos((2*n-N+1)*pi/N); end;   where N is the data length in the FFT.

    标签: matlab fft

    上传时间: 2015-11-23

    上传用户:石灰岩123

  • fft analysis

    Use fft to analyse signal by plotting the original signal and its spectrum.  

    标签: matlab fft

    上传时间: 2015-11-23

    上传用户:石灰岩123

  • Broadband Access Networks Technologies

    At present, there is a strong worldwide push toward bringing fiber closer to indi- vidual homes and businesses. Fiber-to-the-Home/Business (FTTH/B) or close to it networks are poised to become the next major success story for optical fiber com- munications. In fact, FTTH connections are currently experiencing double-digit or even higher growth rates, e.g., in the United States the annual growth rate was 112% between September 2006 and September 2007, and their presence can add value of U.S. $4,000–15,000 to the selling price of a home.

    标签: Technologies Broadband Networks Access

    上传时间: 2020-05-26

    上传用户:shancjb

  • RFID+Systems

    RFID networks are currently recognized as one a research area of priority. Research activities related to RFID technology have been booming recently. A number of ongoing projects are being funded in Europe, Asia, and North America. According to leading market analysts, the development of the RFID market is projected to increase from approximately $3 billion in 2005 to $25 billion in 2015. Several countries have dedicated innovation programs to support and develop RFID systems and related technologies: the RFID initiative in Taiwan, Ubiquitous Japan and the NSF SBIR program in the USA. The EU has recently advertised its Strategic Research Roadmap concerning the Internet of Things, which first of all refers to the RFID technology before being extended to commu- nicating devices as in M2M (Machine to Machine). In this roadmap, several application domains have been identified:

    标签: Systems RFID

    上传时间: 2020-06-08

    上传用户:shancjb