This m-file displays the time waveform for the Gaussian pulse function and the first and second derivatives of the Gaussian pulse function for a 0.5 nanosecond pulse width. Other values of pulse widths may be used by changing fs,t,t1. The program uses the actual first and second derivative equations for the Gaussian pulse waveforms. The first derivative is considered to be the monocycle or monopulse as discussed in most papers. The second derivative is the waveform generated from a dipole antenna used in a UWB system. Other information is contained in the file.
上传时间: 2015-05-08
上传用户:leixinzhuo
ICTCLAS的JNI调用接口文件: Title:ICTCLAS Caller * <p>Description:do chinese word segmentation.don t change the pakage and CLASS name, orelse you can t use it. * 请不要改变包名、类名以及native的方法名,否则调用将失效。 * 由于ICTCLAS本身存在很多鲁棒性问题,调用segSentence时,string参数请保证不要过长或带有乱码。调用次数过多(如处理几十G的数据)会有可能造成内存溢出。 * 故基本只能用于较小规模数据(相对几十G来说)。 * 请运行时设置jvm足够的堆栈空间。
标签: ICTCLAS segmentation Description chinese
上传时间: 2014-01-25
上传用户:it男一枚
This book is about using Python to get jobs done on Windows.This intended to be a practical book focused on tasks. It doesn t aim to teach Python programming, although we do provide a brief tutorial. Instead, it aims to cover:How Python works on Windows The key integration technologies supported by Python on Windows, such as the Win32 extensions, which let you call the Windows API, and the support for COM Examples in many topic areas showing what Python can do and how to put it to work.
标签: This book practical intended
上传时间: 2015-05-10
上传用户:ddddddos
RapidForm add-in template for Visual C++. Using this template project, a user can create RapidForm template conveniently
标签: RapidForm template project add-in
上传时间: 2015-05-10
上传用户:15071087253
VHDL 关于2DFFT设计程序 u scinode1 ∼ scinode9.vhd: Every SCI node RTL vhdl code. The details can be seen in the following section. u 2dfft.vhd: The top module includes these scinodes and form a 3x3 SCI Torus network, and it support these sub-modules scinode1∼ scinode9 reset and clk and global_cnt signals to synchronous the sub-modules to simplify the overall design. u proj2.wfc: VSS simulation result that is the same as the ModelSim simulation result. u Pro2_2.wfc: VSS simulation result of another test pattern can’t cause overflow situation.
标签: scinode1 scinode details 2DFFT
上传时间: 2014-12-02
上传用户:15071087253
检测windows下rootkit对文件的隐藏。some usermode overwrites first few bytes of ZwQueryDirectoryFile and that trick will fail then :( So, you will probably need a small database of the correct indexes for all Windows versions
标签: ZwQueryDirectoryFile overwrites usermode windows
上传时间: 2014-12-08
上传用户:lps11188
C-C法重构相空间文件夹说明1.CC_Method_main.m - 程序主文件 2、LorenzData.dll - 产生Lorenz离散数据 3、normalize_1.m - 信号归一化 4、ccFunction.dll - 计算S(m,N,r,t)
标签: CC_Method_main LorenzData normalize Lorenz
上传时间: 2013-12-21
上传用户:15071087253
I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. II. Screenshots $ ./kill-bill.pl . kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007) by Solar Eclipse <solareclipse@phreedom.org> Usage: kill-bill -p <port> -s <service> host Services: iis IIS HTTP server (port 80) iis-ssl IIS HTTP server with SSL (port 443) exchange Microsoft Exchange SMTP server (port 25) smb-nbt SMB over NetBIOS (port 139) smb SMB (port 445) If a service is running on its default port you don t have to specify both the service and the port. Examples: kill-bill -s iis 192.168.0.1 kill-bill -p 80 192.168.0.1 kill-bill -p 1234 -s smb 192.168.0.1
标签: I. vulnerability Introduction undisclosed
上传时间: 2015-05-15
上传用户:xhz1993
Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to work in the random access memory(RAM). Some of them do provide some mechanism for dumping the whole tree into a file and loading it back to the memory in order to make data in that tree persistent. It serves well when there s just small amount of data. When the tree is somewhat bigger, the dumping/loading process could take a lengthy time and makes your mission-critical program less efficient. How about an AVL tree that can directly use the disk for data storage ? If there s something like that, we won t need to read through the whole tree in order to pick up just a little bit imformation(a node), but read only the sectors that are neccssary for locating a certain node and the sectors in which that node lies. This is my initial motivation for writing a storage-media independent AVL Tree. However, as you step forth, you would find that it not only works fine with disks but also fine with memorys, too.
标签: available libraries Although nearly
上传时间: 2014-01-22
上传用户:zhoujunzhen
解决时钟问题,acm竞赛题 A weird clock marked from 0 to 59 has only a minute hand. It won t move until a special coin is thrown into its box. There are different kinds of coins as your options. However once you make your choice, you cannot use any other kind. There are infinite number of coins of each kind, each marked with a number d ( 0 <= 1000 ), meaning that this coin will make the minute hand move d times clockwise the current time. For example, if the current time is 45, and d = 2. Then the minute hand will move clockwise 90 minutes and will be pointing to 15. Now you are given the initial time s ( 0 <= s <= 59 ) and the coin s type d. Write a program to find the minimum number of d-coins needed to turn the minute hand back to 0.
标签: 时钟
上传时间: 2015-05-21
上传用户:rishian