虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

current

  • The concept of the Altera Nios II embedded processor implementation inside Field Programmable Gate A

    The concept of the Altera Nios II embedded processor implementation inside Field Programmable Gate Array [FPGA] of the CCD camera for the “Pi of the Sky” experiment is presented. The digital board of the CCD camera, its most important components, current implementation of firmware [VHDL] inside the FPGA and the role of external 8051 microcontroller is briefly described. The main goal of the presented work is to get rid of the external microcontroller and to design new system with Nios II processor built inside FPGA chip. Constraints for implementing the design into the existing camera boards are discussed. New possibilities offered by a larger FPGA for next generation of cameras are considered.

    标签: implementation Programmable processor embedded

    上传时间: 2014-01-02

    上传用户:dyctj

  • Managing Humans is a selection of the best essays from Michael Lopps web site, Rands In Repose. Draw

    Managing Humans is a selection of the best essays from Michael Lopps web site, Rands In Repose. Drawing on Lopp s management experiences at Apple, Netscape, Symantec, and Borland, this book is full of stories based on companies in the Silicon Valley where people have been known to yell at each other. It is a place full of dysfunctional bright people who are in an incredible hurry to find the next big thing so they can strike it rich and then do it all over again. Among these people are managers, a strange breed of people who through a mystical organizational ritual have been given power over your future and your bank account. Whether you re an aspiring manager, a current manager, or just wondering what the heck a manager does all day, there is a story in this book that will speak to you. You will learn: * What to do when people start yelling at each other * How to perform a diving save when the best engineer insists on resigning * How to say "No" to the person who signs your paycheck

    标签: selection Managing Michael Humans

    上传时间: 2014-11-28

    上传用户:1427796291

  • In the bank all the activities are being done manually .As the bank widens its services & it finds d

    In the bank all the activities are being done manually .As the bank widens its services & it finds difficult to manage its operations manually and hence this leads to the automation of some of its operations. Banking Information system is a windows based applications. This project mainly deals with managing there types of account such as Saving Account, current Account and Recurring Deposits . In this project bank is seeking to manage these account through computer based system. Tasks involved in this project are opening the user accounts , recording the account holders transactions , modify, the user records and generating the reports . This project is having three module: ] 1. Bank Master Module 2. Transaction Module 3. Reports module

    标签: the bank activities manually

    上传时间: 2013-12-13

    上传用户:LouieWu

  • The file contains a demo of how tabbed content is organized in a web page.Its highly useful as curre

    The file contains a demo of how tabbed content is organized in a web page.Its highly useful as current day websites the information is organized in to sets of data.Each information can be grouped under each tab

    标签: organized contains content highly

    上传时间: 2017-04-14

    上传用户:xsnjzljj

  • C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and exam

    C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and example projects files facilitate writing C/C++ Code for the TI鈥檚 28xx MCUs. The code can be used as a learning tool or as the basis for a development platform depending on the current needs of the user. We suggest that you immediately download these header files in order for an easier transition to understanding the 28xx peripherals.

    标签: Peripheral peripheral and Examples

    上传时间: 2014-01-24

    上传用户:fandeshun

  • A Design and Implementation of The Online Shopping System Abstract: Along with the development

    A Design and Implementation of The Online Shopping System Abstract: Along with the development of the computer ,the database technique is widespread in the application of Internet, more and more , providing more thoughtful and humanized service for the large network customer. Characteristic services have already become gradually the current as the application of Wed nowadays. This text studied a method of project which composed of characteristic page and dynamic state of technical customer according to the data connection rule, compared with some projects that adopt already on present nets, this project have the advantage of providing customers more simple ,reflective obvious meticulous use and so on..

    标签: Implementation development Abstract Shopping

    上传时间: 2014-12-04

    上传用户:410805624

  • Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to c

    Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two main problems seriously darken the future of this technology though. Firstly, the large number of attacks and weaknesses which appear as fast as new algorithms are proposed, emphasizes the limits of this technology and in particu-lar the fact that it may not match users expectations. Secondly, the requirements, tools and methodologies to assess the current technologies are almost non-existent. The lack of benchmarking of current algorithms is bla-tant. This confuses rights holders as well as software and hardware manufacturers and prevents them from using the solution appropriate to their needs. Indeed basing long-lived protection schemes on badly tested watermarking technology does not make sense.

    标签: Watermarking watermarking evaluation presented

    上传时间: 2013-12-04

    上传用户:thinode

  • Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/

    Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/e)x] step3:Slove x=1/F(u) step4:Repeat Step1~Step3 by using different u,you can get x1,x2,x3,...,xn step5:If the first packet was generated at time [0], than the second packet will be generated at time [0+x1],The third packet will be generated at time [0+x1+x2], and so on …. Random-number generation 1.static method random from class Math -Returns doubles in the range 0.0 <= x < 1.0 2.class Random from package java.util -Can produce pseudorandom boolean, byte, float, double, int, long and Gaussian values -Is seeded with the current time of day to generate different sequences of numbers each time the program executes

    标签: Generate Possion between random

    上传时间: 2017-05-25

    上传用户:bibirnovis

  • Login Manager V3.0(LM3.0) is an authentication system which can integrate with any existing website

    Login Manager V3.0(LM3.0) is an authentication system which can integrate with any existing website that meets the requirements. LM3.0 provides a gatekeeper where user must be authorized before entering the membership secured areas. Features: 1. Flexibility LM3.0 allows administrator to integrate it with the current unprotected website. This is especially useful if major changes are going to be painful. With LM3.0, you re just one step towards getting the security you needed most. 2. Speed LM3.0 uses PHP and MySQL which enables fast data transactions.

    标签: authentication 3.0 integrate existing

    上传时间: 2017-06-06

    上传用户:hullow

  • Text mining tries to solve the crisis of information overload by combining techniques from data mini

    Text mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth examination of core text mining and link detection algorithms and operations, this book examines advanced pre-processing techniques, knowledge representation considerations, and visualization approaches. Finally, it explores current real-world, mission-critical applications of text mining and link detection in such varied fields as M&A business intelligence, genomics research and counter-terrorism activities.

    标签: information techniques combining overload

    上传时间: 2014-01-02

    上传用户:Late_Li