LL1文法 分解左递归 求FIRST FOLLOW集合
上传时间: 2013-12-28
上传用户:lijianyu172
FIFO电路(first in,first out),内部藏有16bit×16word的Dual port RAM,依次读出已经写入的数据。因为不存在Address输入,所以请自行设计内藏的读写指针。由FIFO电路输出的EF信号(表示RAM内部的数据为空)和FF信号(表示RAM内部的数据为满)来表示RAM内部的状态,并且控制FIFO的输入信号WEN(写使能)和REN(读使能)。以及为了更好得控制FIFO电路,AEF(表示RAM内部的数据即将空)信号也同时输出。
上传时间: 2016-02-06
上传用户:zhoujunzhen
This R2.9 revision of the CLID detector provides the TYPE 1 (on-hook, between first and second ring, or before first ring) signal detection and returns the message raw byte data without parsing of particular fields such as Message Type, Parameter(s) Type(s), etc. The decoding of the message meaning should be performed by the user application.主叫号码识别CID算法for TI DSP
标签: the revision detector provides
上传时间: 2014-01-18
上传用户:天诚24
The algorm of viterbi. You talk to your friend three days in a row and discover that on the first day he went for a walk, on the second day he went shopping, and on the third day he cleaned his apartment. You have two questions: What is the overall probability of this sequence of observations? And what is the most likely sequence of rainy/sunny days that would explain these observations? The first question is answered by the forward algorithm the second question is answered by the Viterbi algorithm. These two algorithms are structurally so similar (in fact, they are both instances of the same abstract algorithm) that they can be implemented in a single function:
标签: discover viterbi algorm friend
上传时间: 2016-02-16
上传用户:xc216
关于设计模式的权威著作 head first中的源代码, 用C#实现, 但对其它语言使用者也不会产生理解困难, 非常值得一看
上传时间: 2013-12-23
上传用户:啊飒飒大师的
This file contains the material presented as the first Embedded MATLAB webinar on the MathWorks web site on September 13, 2007. It contains the PDF version of presentation slides and all necessary demonstration files (including MATLAB M-files and Simulink models).
标签: the MathWorks presented Embedded
上传时间: 2016-03-07
上传用户:66666
This document represents the first stage in a process of taking the National Strategy for Police Information Systems (NSPIS) forward. It defines the mechanisms to ensure that we (and our partners) have access to the right information, in the right form, in the right time at an appropriate cost. The Strategy will ensure the Police Service has a collective understanding of the value of information and that we are able to exploit National Information Assets in support of local policing.
标签: represents the National Strategy
上传时间: 2016-03-08
上传用户:wangdean1101
The first task at hand is to set up the endpoints appropriately for this example. The following code switches the CPU clock speed to 48 MHz (since at power-on default it is 12 MHz), and sets up EP2 as a Bulk OUT endpoint, 4x buffered of size 512, and EP6 as a Bulk IN endpoint, also 4x buffered of size 512. This set-up utilizes the maximum allotted 4-KB FIFO space. It also sets up the FIFOs for manual mode, word-wide operation, and goes through a FIFO reset and arming sequence to ensure that they are ready for data operations
标签: appropriately The endpoints following
上传时间: 2013-12-02
上传用户:dianxin61
Compile SQLite using the cross-compiler such as arm-linux-gcc first, get sqlite-3.3.6.tar.gz from www.sqlite.org unzip it, #tar -zxvf sqlite-3.3.6.tar.gz change into the sqlite-3.3.6 directory cd sqlite-3.3.6
标签: cross-compiler arm-linux-gcc Compile SQLite
上传时间: 2016-03-14
上传用户:qb1993225
The most up to date, comprehensive, and practical guide to Web services security, and the first to cover the final release of new standards SAML 1.1 and WS-Security.
标签: comprehensive and practical to
上传时间: 2014-01-26
上传用户:小宝爱考拉