虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

contaIns

  • web_based.rar

    Web based binary image upload for ARM LPC2366 controller. Toolchain is Keil Realview MDK ARM ver 3.2 with RL ARM Real time Lib 3.40. RAR file contaIns webiap2.cgi file and HTTP_cgi file. HTTP_cgi file is modified in cgi_process_data to upload binary image of application using HTTP protcol. File upload is using HTML syntax method=\"post\" ENCTYPE=\"multipart/form-data\

    标签: web_based

    上传时间: 2013-12-17

    上传用户:ukuk

  • Two scripts are included here. 1. convsys.m - combines the state space representation of two syst

    Two scripts are included here. 1. convsys.m - combines the state space representation of two systems connected in series. [Ao,Bo,Co,Do]=convsys(A1,B1,C1,D1,A2,B2,C2,D2) This algorithm gives the convolution of two state space representations | A1 B1 | | A2 B2 | u ==> | | ==> | | ==> y | C1 D1 | | C2 D2 | The algorithm also accepts state space objects as inputs and gives out a state space object as output. 2. sysfeedbk.m [Ao,Bo,Co,Do]=convsys(A1,B1,C1,D1,A2,B2,C2,D2) Gives the closed loop state space representation for two systems connected with negative feedback in the following manner. | A1 B1 | u ==> | | ==> y + o | C1 D1 | | - | | | | A2 B2 | | |= | |= | | C2 D2 | The zip file also contaIns checkcompatibility.m , which checks the compatibility of matrix dimensions in the system and cleanss.m which can be used to clean a state space representation.

    标签: representation included combines scripts

    上传时间: 2017-07-25

    上传用户:semi1981

  • This m file hide an image jpeg,png in another jpeg,png image. The height and width of the secr

    This m file hide an image jpeg,png in another jpeg,png image. The height and width of the secret image is in LSB of 1st 32 pixels of 1st row of the cover image.This helps in the recovery of secret image. The secret image must be smaller than cover image.A message box will appear with a number ,that number is the maximum product of width and height of secret image that can be successfully embedded in the cover image. The final png image will appear in workspace with random name.This image contaIns the secret image.One such png image is in the zip file with name 4447.png it contaIns an image of res 100x122.

    标签: image jpeg png another

    上传时间: 2017-07-25

    上传用户:gououo

  • Because WDM networks are circuit switched loss networks blocking may occur because of lack of resour

    Because WDM networks are circuit switched loss networks blocking may occur because of lack of resources. Also in circuit switched networks many paths use the same links. This toolbox answers the question how different paths with different loads influence on each other and what is the blocking on each of the defined path. Toolbox is capable of computing blocking for three different WDM network types: with no wavelength conversion, with full wavelength conversion and with limited range wavelength conversion. It is worth noting that case for full conversion can be usefull for any circuit switched network without additional constraints (i.e. wavelength continuity constraint in WDM), for example telephone network. Toolbox contaIns also scripts for defining network structures (random networks, user defined networks) and traffic matrixes. Three graph algorithms for shortest path computation are also in this toolbox (they are used for traffic matrix creation).

    标签: networks blocking switched Because

    上传时间: 2017-07-28

    上传用户:zhangzhenyu

  • PATTERNS FOR TIME-TRIGGERED EMBEDDED SYSTEMS by Michael J. Pont [Pearson Education, 2001 ISBN: 0-

    PATTERNS FOR TIME-TRIGGERED EMBEDDED SYSTEMS by Michael J. Pont [Pearson Education, 2001 ISBN: 0-201-33138-1]. This code is copyright (c) 2001 by Michael J. Pont. See book for copyright details and other information. ---------- This directory contaIns the files from Chapter 12. The sub-directories are as follows: 12\WDog1232 contaIns the project associated with Listing 12-1 to Listing 12-2. 12\WDog8953 contaIns the project associated with Listing 12-3 to Listing 12-7.

    标签: J. TIME-TRIGGERED Education PATTERNS

    上传时间: 2013-12-19

    上传用户:极客

  • wireless tools: used to manipulate the Wireless Extensions. The Wireless Extensions is an interface

    wireless tools: used to manipulate the Wireless Extensions. The Wireless Extensions is an interface allowing you to set Wireless LAN specific parameters and get the specific stats. It also contaIns the IfRename package, used for advance renaming of network interfaces. We have cross compile to arm linux. and fixed some bug (eg:sometime the essid will be rename to a long name, or sometime it will disaply the essid twice)

    标签: Extensions Wireless manipulate interface

    上传时间: 2014-11-26

    上传用户:wlcaption

  • The uIP implementation is designed to have only the absolute minimal set of features needed for a fu

    The uIP implementation is designed to have only the absolute minimal set of features needed for a full TCP/IP stack. It can only handle a single network interface and contaIns only a rudimentary UDP implementation, but focuses on the IP, ICMP and TCP protocols. uIP is written in the C programming language.

    标签: implementation designed absolute features

    上传时间: 2017-08-08

    上传用户:xinzhch

  • VC MATLAB 混编示例 ppWizard has created this matlab调用 application for you. This application not only

    VC MATLAB 混编示例 ppWizard has created this matlab调用 application for you. This application not only demonstrates the basics of using the Microsoft Foundation classes but is also a starting point for writing your application. This file contaIns a summary of what you will find in each of the files that make up your matlab调用 application.

    标签: application ppWizard created MATLAB

    上传时间: 2014-01-10

    上传用户:小码农lz

  • Implementation of Edmonds Karp algorithm that calculates maxFlow of graph. Input: For each test c

    Implementation of Edmonds Karp algorithm that calculates maxFlow of graph. Input: For each test case, the first line contaIns the number of vertices (n) and the number of arcs (m). Then, there exist m lines, one for each arc (source vertex, ending vertex and arc weight, separated by a space). The nodes are numbered from 1 to n. The node 1 and node n should be in different sets. There are no more than 30 arcs and 15 nodes. The arc weights vary between 1 and 1 000 000. Output: The output is a single line for each case, with the corresponding minimum size cut. Example: Input: 7 11 1 2 3 1 4 3 2 3 4 3 1 3 3 4 1 3 5 2 4 6 6 4 5 2 5 2 1 5 7 1 6 7 9 Output: 5

    标签: Implementation calculates algorithm Edmonds

    上传时间: 2014-01-04

    上传用户:kiklkook

  • RANSAC (RANdom SAmple Consensus) is an iterative method to estimate parameters of a mathematical mod

    RANSAC (RANdom SAmple Consensus) is an iterative method to estimate parameters of a mathematical model from a set of observed data which contaIns outliers. Source code is in Document

    标签: mathematical parameters Consensus iterative

    上传时间: 2017-09-09

    上传用户:a6697238