虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

followed

  • SDRAM 参考设计:主要包括The following figure shows a high-level block diagram for this reference design follo

    SDRAM 参考设计:主要包括The following figure shows a high-level block diagram for this reference design followed by a brief description of each sub-section. The design consists of: · PowerPC processor · PLB-OPB bridge · BlockRAM Memory Controller · SDRAM Controller · Two GPIO ports · A UART Port · External SDRAM

    标签: high-level following reference diagram

    上传时间: 2013-12-15

    上传用户:Miyuki

  • Bold index entries have corresponding pages in the main body of the guide. The remaining index entr

    Bold index entries have corresponding pages in the main body of the guide. The remaining index entries are followed by a list of appropriate page references in the alphabetical reference sections, given in order of importance.

    标签: index corresponding the remaining

    上传时间: 2014-06-05

    上传用户:huql11633

  • The Ruby Way takes a "how-to" approach to Ruby programming with the bulk of the material consisting

    The Ruby Way takes a "how-to" approach to Ruby programming with the bulk of the material consisting of more than 400 examples arranged by topic. Each example answers the question "How do I do this in Ruby?" Working along with the author, you are presented with the task description and a discussion of the technical constraints. This is followed by a step-by-step presentation of one good solution. Along the way, the author provides detailed commentary and explanations to aid your understanding.

    标签: Ruby programming consisting the

    上传时间: 2013-12-13

    上传用户:yoleeson

  • this directory contains the following: * The acdc algorithm for finding the approximate general

    this directory contains the following: * The acdc algorithm for finding the approximate general (non-orthogonal) joint diagonalizer (in the direct Least Squares sense) of a set of Hermitian matrices. [acdc.m] * The acdc algorithm for finding the same for a set of Symmetric matrices. [acdc_sym.m](note that for real-valued matrices the Hermitian and Symmetric cases are similar however, in such cases the Hermitian version [acdc.m], rather than the Symmetric version[acdc_sym] is preferable. * A function that finds an initial guess for acdc by applying hard-whitening followed by Cardoso s orthogonal joint diagonalizer. Note that acdc may also be called without an initial guess, in which case the initial guess is set by default to the identity matrix. The m-file includes the joint_diag function (by Cardoso) for performing the orthogonal part. [init4acdc.m]

    标签: approximate directory algorithm the

    上传时间: 2014-01-17

    上传用户:hanli8870

  • The widespread use of embedded systems mandates the development of industrial software design method

    The widespread use of embedded systems mandates the development of industrial software design methods, i.e. computer-aided design and engineering of embedded applications using formal models (frameworks) and standardized prefabricated components, much in the same way as in other mature areas of engineering such as mechanical engineering and electronics. These guidelines have been used to develop Component-based Design of Software for Embedded Systems (COMDES). The paper gives an overview of the COMDES framework, followed by a presentation of a generic component types, such as function blocks, activities and function units. The execution of function units is discussed in the context of a newly developed execution model, i.e. timed-multitasking, which has been extended to distributed embedded systems.

    标签: development widespread industrial embedded

    上传时间: 2014-01-23

    上传用户:z754970244

  • This book is designed to teach you the best practices in developing Windows DNA applications. We ha

    This book is designed to teach you the best practices in developing Windows DNA applications. We have avoided making this book a primer on every technology associated with Windows DNA. If we had followed this course, this would be an encyclopedia set. Everyone has their favorite authors and books on the various technical subject areas. The market is full of books to teach you the basics, the how, this book tries to be different in that we pull out the important points to teach you about the why. If you need training in a particular technology covered in this book, Sams has a number of 24-hour and 21-day books that cover a wide range of topics.

    标签: applications developing practices designed

    上传时间: 2016-11-27

    上传用户:yyq123456789

  • Buses are a powerful and efficient modeling construct. Using them to produce optimal code is depende

    Buses are a powerful and efficient modeling construct. Using them to produce optimal code is dependent on following a basic set of best practices. This document provides a set of patterns that can be followed the best results

    标签: efficient construct powerful modeling

    上传时间: 2013-12-15

    上传用户:cc1015285075

  • The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at

    The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.

    标签: cryptographic applications attractive for

    上传时间: 2013-12-07

    上传用户:zhuimenghuadie

  • Industrial Network Security

    I would like to thank you for purchasing the second edition of “Industrial Network Security,” especially if you are one of the many supporters of the first edition. When the second edition was announced, many people asked me, “why a second edition?” and even more followed that up with, “and why a coauthor?” These ques- tions are harder to answer than you would think.

    标签: Industrial Security Network

    上传时间: 2020-06-07

    上传用户:shancjb

  • RFID_-_A_Guide_to_Radio_Frequency_IDentification

    Radio frequency identifi cation (RFID) technology is a wireless communication technology that enables users to uniquely identify tagged objects or people. RFID is rapidly becoming a cost-effective technology. This is in large part due to the efforts of Wal-Mart and the Department of Defense (DoD) to incorporate RFID technology into their supply chains. In 2003, with the aim of enabling pallet-level tracking of inventory, Wal-Mart issued an RFID mandate requiring its top suppliers to begin tagging pallets and cases, with Electronic Product Code (EPC) labels. The DoD quickly followed suit and issued the same mandate to its top 100 suppliers. This drive to incorporate RFID technology into their supply chains is motivated by the increased ship- ping, receiving and stocking effi ciency and the decreased costs of labor, storage, and product loss that pallet-level visibility of inventory can offer.

    标签: A_Guide_to_Radio_Frequency_IDenti fication RFID

    上传时间: 2020-06-08

    上传用户:shancjb