虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

constructed

  • Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The origina

    Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The original Tiger Hash code was taken from Tiger.Net which is written in Visual Basic. NET. Tiger Tree Hash算法的C#实现!

    标签: Tiger Hash Tree constructed

    上传时间: 2015-10-09

    上传用户:vodssv

  • A system simulation environment in Matlab/Simulink of RFID is constructed in this paper. Special at

    A system simulation environment in Matlab/Simulink of RFID is constructed in this paper. Special attention is emphasized on the analog/RF circuit.Negative effects are concerned in the system model,such as phase noise of the local oscillator,TX-RX coupling,reflection of the environment, AWGN noise,DC offset,I/Q mismatch,etc.Performance of the whole system can be evaluated by changing the coding method,parameters of building blocks,and operation distance.Finally,some simulation results are presented in this paper.

    标签: environment constructed simulation Simulink

    上传时间: 2014-01-09

    上传用户:zhangliming420

  • A very well constructed C# programming book that will allow even non programmers to get a quick gras

    A very well constructed C# programming book that will allow even non programmers to get a quick grasp on C# basics.

    标签: constructed programming programmers allow

    上传时间: 2017-03-22

    上传用户:hewenzhi

  • It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom

    It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon. 1, p. 224) have however simplified material parameters in order to facilitate easier realization as well as to avoid infinities in optical constants. Here we show that the cylindrical cloaks with simplified material parameters inherently allow the zeroth-order cylindrical wave to pass through the cloak as if the cloak is made of a homogeneous isotropic medium, and thus visible. To all high-order cylindrical waves, our numerical simulation suggests that the simplified cloak inherits some properties of the ideal cloak, but finite scatterings exist.

    标签: invisibility constructed proposed electrom

    上传时间: 2013-12-18

    上传用户:13215175592

  • Convex constructed uisng Matlab

    Convex constructed uisng Matlab

    标签: constructed Convex Matlab uisng

    上传时间: 2014-09-10

    上传用户:waizhang

  • 基于8086 CPU 的单芯片计算机系统的设计

    本文依据集成电路设计方法学,探讨了一种基于标准Intel 8086 微处理器的单芯片计算机平台的架构。研究了其与SDRAM,8255 并行接口等外围IP 的集成,并在对AMBA协议和8086 CPU分析的基础上,采用遵从AMBA传输协议的系统总线代替传统的8086 CPU三总线结构,搭建了基于8086 IP 软核的单芯片计算机系统,并实现了FPGA 功能演示。关键词:微处理器; SoC;单芯片计算机;AMBA 协议 Design of 8086 CPU Based Computer-on-a-chip System(School of Electrical Engineering and Automation, Heifei University of Technology, Hefei, 230009,China)Abstract: According to the IC design methodology, this paper discusses the design of one kind of Computer-on-a-chip system architecture, which is based on the standard Intel8086 microprocessor,investigates how to integrate the 8086 CPU and peripheral IP such as, SDRAM controller, 8255 PPI etc. Based on the analysis of the standard Intel8086 microprocessor and AMBA Specification,the Computer-on-a-chip system based on 8086 CPU which uses AMBA bus instead of traditional three-bus structure of 8086 CPU is constructed, and the FPGA hardware emulation is fulfilled.Key words: Microprocessor; SoC; Computer-on-a-chip; AMBA Specification

    标签: 8086 CPU 单芯片 计算机系统

    上传时间: 2013-12-27

    上传用户:kernor

  • 基于ZigBee技术的无线智能家用燃气报警系统

    在研究传统家用燃气报警器的基础上,以ZigBee协议为平台,构建mesh网状网络实现网络化的智能语音报警系统。由于传感器本身的温度和实际环境温度的影响,传感器标定后采用软件补偿方法。为了减少系统费用,前端节点采用半功能节点设备,路由器和协调器采用全功能节点设备,构建mesh网络所形成的家庭内部报警系统,通过通用的电话接口连接到外部的公用电话网络,启动语音模块进行报警。实验结果表明,在2.4 GHz频率下传输,有墙等障碍物的情况下,节点的传输距离大约为35 m,能够满足家庭需要,且系统工作稳定,但在功耗方面仍需进一步改善。 Abstract:  On the basis of studying traditional household gas alarm system, this paper proposed the platform for the ZigBee protocol,and constructed mesh network to achieve network-based intelligent voice alarm system. Because of the sensor temperature and the actual environment temperature, this system design used software compensation after calibrating sensor. In order to reduce system cost, semi-functional node devices were used as front-end node, however, full-function devices were used as routers and coordinator,constructed alarm system within the family by building mesh network,connected to the external public telephone network through the common telephone interface, started the voice alarm module. The results indicate that nodes transmit about 35m in the distance in case of walls and other obstacles by 2.4GHz frequency transmission, this is able to meet family needs and work steadily, but still needs further improvement in power consumption.

    标签: ZigBee 无线智能 报警系统

    上传时间: 2013-10-30

    上传用户:swaylong

  • This m file analyzes a coherent binary phase shift keyed(BPSK) and a amplitude shift keyed(ASK) comm

    This m file analyzes a coherent binary phase shift keyed(BPSK) and a amplitude shift keyed(ASK) communication system. The receiver uses a correlator(mixer-integrator[LPF]) configuration with BER measurements comparing measured and theoretical results. The bandpass and low pass used in the receiver are constructed using z transforms.

    标签: keyed shift amplitude analyzes

    上传时间: 2015-09-26

    上传用户:liuchee

  • The book consists of three sections. The first, foundations, provides a tutorial overview of the pri

    The book consists of three sections. The first, foundations, provides a tutorial overview of the principles underlying data mining algorithms and their application. The presentation emphasizes intuition rather than rigor. The second section, data mining algorithms, shows how algorithms are constructed to solve specific problems in a principled manner. The algorithms covered include trees and rules for classification and regression, association rules, belief networks, classical statistical models, nonlinear models such as neural networks, and local memory-based models. The third section shows how all of the preceding analysis fits together when applied to real-world data mining problems. Topics include the role of metadata, how to handle missing data, and data preprocessing.

    标签: foundations The consists sections

    上传时间: 2017-06-22

    上传用户:lps11188

  • RS_latch using vhdl, When using static gates as building blocks, the most fundamental latch is the

    RS_latch using vhdl, When using static gates as building blocks, the most fundamental latch is the simple SR latch, where S and R stand for set and reset. It can be constructed from a pair of cross-coupled NOR (Not OR) logic gates. The stored bit is present on the output marked Q. Normally, in storage mode, the S and R inputs are both low, and feedback maintains the Q and Q outputs in a constant state, with Q the complement of Q. If S (Set) is pulsed high while R is held low, then the Q output is forced high, and stays high when S returns to low similarly, if R (Reset) is pulsed high while S is held low, then the Q output is forced low, and stays low when R returns to low.

    标签: using fundamental the RS_latch

    上传时间: 2017-07-30

    上传用户:努力努力再努力