虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

diffusion-limited-aggregation

  • This project features a complete JPEG Hardware Compressor (standard Baseline DCT, JFIF header) with

    This project features a complete JPEG Hardware Compressor (standard Baseline DCT, JFIF header) with 2:1:1 subsampling, able to compress at a rate of up to 24 images per second (on XC2V1000-4 @ 40 MHz with resolution 352x288). Image resolution is not limited. It takes an RGB input (row-wise) and outputs to a memory the compressed JPEG image. Its quality is comparable to software solutions.

    标签: Compressor Hardware Baseline features

    上传时间: 2017-04-21

    上传用户:wyc199288

  • Learning Wireless Java is for Java developers who want to create applications for the Micro Editio

    Learning Wireless Java is for Java developers who want to create applications for the Micro Edition audience using the Connected, Limited Device Configuration and the Mobile Information Device Profile (MIDP). These APIs specifically for devices such as mobile phones and pagers, allowing programmers to create MIDlet applications. This book offers a solid introduction to J2ME and MIDP, including the javax.microedition classes, as well as classes surrounding the features of the various platforms that the J2ME supports.

    标签: Java applications developers for

    上传时间: 2014-10-25

    上传用户:liuchee

  • StarShip Battle 2004 game The Developing Mobile Phone Applications With J2ME Technology course provi

    StarShip Battle 2004 game The Developing Mobile Phone Applications With J2ME Technology course provides students with hands-on experience with developing mobile applications on the Java 2 Platform, Micro Edition (J2ME platform) using Connected, Limited Device Configuration (CLDC) and the Mobile Interface Device Profile (MIDP). The course provides information about MIDP 1.0 and MIDP 2.0 specifications, concepts, and capabilities.

    标签: Applications Developing Technology StarShip

    上传时间: 2014-01-21

    上传用户:yyyyyyyyyy

  • Imagine that you are a web developer (which is probably not a stretch if you are reading this book)

    Imagine that you are a web developer (which is probably not a stretch if you are reading this book) and you are being encouraged to add some Ajax features to a site you’re working on. Maybe the originator of this request is your boss or your boss’s boss, who is not even sure what Ajax is, let alone what kinds of features might be useful.And maybe you’re not sure yourself. Imagine that your prior experience has mostly been on the server-side, developing in Java or some other server-side technology, and your experience with HTML and JavaScript has been fairly limited.This is the scenario we will explore over the next several chapters as you are introduced to the Dojo Toolkit.

    标签: are developer you probably

    上传时间: 2013-11-27

    上传用户:凤临西北

  • This software is developed to provide ease with controller design. For PID control, options are give

    This software is developed to provide ease with controller design. For PID control, options are given to design and analyse the compensated and uncompensated system. You are free to choice among Proportional PI, PD and PID mode of control. Both frequency and time domain characteristics can be observed. Special Menus are given to observe time and frequency response plots. For Statefeedback controller similar options are given. But this is limited to second order system only.

    标签: controller developed software control

    上传时间: 2017-07-25

    上传用户:aysyzxzm

  • Because WDM networks are circuit switched loss networks blocking may occur because of lack of resour

    Because WDM networks are circuit switched loss networks blocking may occur because of lack of resources. Also in circuit switched networks many paths use the same links. This toolbox answers the question how different paths with different loads influence on each other and what is the blocking on each of the defined path. Toolbox is capable of computing blocking for three different WDM network types: with no wavelength conversion, with full wavelength conversion and with limited range wavelength conversion. It is worth noting that case for full conversion can be usefull for any circuit switched network without additional constraints (i.e. wavelength continuity constraint in WDM), for example telephone network. Toolbox contains also scripts for defining network structures (random networks, user defined networks) and traffic matrixes. Three graph algorithms for shortest path computation are also in this toolbox (they are used for traffic matrix creation).

    标签: networks blocking switched Because

    上传时间: 2017-07-28

    上传用户:zhangzhenyu

  • Wireless range extenders or wireless repeaters can extend the range of an existing wireless network.

    Wireless range extenders or wireless repeaters can extend the range of an existing wireless network. Range extenders can be strategically placed to elongate a signal area or allow for the signal area to reach around barriers such as those created in L-shaped corridors. Wireless devices connected through repeaters will suffer from an increased latency for each hop. Additionally, a wireless device connected to any of the repeaters in the chain will have a throughput that is limited by the weakest link between the two nodes in the chain from which the connection originates to where the connection ends

    标签: wireless range extenders repeaters

    上传时间: 2014-01-02

    上传用户:zhangyigenius

  • A certification path is an ordered list of certificates starting with a certificate issued by the re

    A certification path is an ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509 and further defined in Internet Engineering Task Force (IETF) Request for Comments (RFC) 3280. Certification path processing verifies the binding between the subject distinguished name and/or subject alternative name and the subject public key defined in the target certificate. The binding is limited by constraints, which are specified in the certificates that comprise the path, and inputs that are specified by the relying party. To ensure secure interoperation of PKI-enabled applications, the path validation must be done in accordance with the X.509 and RFC 3280 specifications. This document provides the test assertions and the test cases for testing path validation software against these specifications.

    标签: certification certificates certificate starting

    上传时间: 2017-07-31

    上传用户:清风冷雨

  • A basic Fourier transform identity coupled with an iterative convergence algorithm provides a powerf

    A basic Fourier transform identity coupled with an iterative convergence algorithm provides a powerful method to align band-limited signals.

    标签: convergence algorithm transform iterative

    上传时间: 2017-08-03

    上传用户:hphh

  • 在本教程中

    在本教程中,我们将基于 CLDC(连接有限设备配置,Connected Limited Device Configuration)和 MIDP(移动信息设备概要,Mobile Information Device Profile)API 构建一个名为 UniStocks 的典型 Java 2 Platform, Micro Edition(J2ME)应用程序。

    标签: 教程

    上传时间: 2013-12-10

    上传用户:jqy_china