虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

in-<b>Memory</b>

  • This prj demonstrates how to use the SROM memory classes for the Dallas DS80C400. This example uses

    This prj demonstrates how to use the SROM memory classes for the Dallas DS80C400. This example uses the memcpy function to copy a function in the SROM memory class (which is located in CODE memory) to von Neumann mapped XDATA (starting at 0x110000) for execution.

    标签: This demonstrates the classes

    上传时间: 2013-12-22

    上传用户:tuilp1a

  • TLV1544与TMS320VC5402通过串行口连接

    TLV1544与TMS320VC5402通过串行口连接,此时,A/D转换芯片作为从设备,DSP提供帧同步和输入/输出时钟信号。TLV1544与DSP之间数据交换的时序图如图3所示。 开始时, 为高电平(芯片处于非激活状态),DATA IN和I/OCLK无效,DATAOUT处于高阻状态。当串行接口使CS变低(激活),芯片开始工作,I/OCLK和DATAIN能使DATA OUT不再处于高阻状态。DSP通过I/OCLK引脚提供输入/输出时钟8序列,当由DSP提供的帧同步脉冲到来后,芯片从DATA IN接收4 b通道选择地址,同时从DATAOUT送出的前一次转换的结果,由DSP串行接收。I/OCLK接收DSP送出的输入序列长度为10~16个时钟周期。前4个有效时钟周期,将从DATAIN输入的4 b输入数据装载到输入数据寄存器,选择所需的模拟通道。接下来的6个时钟周期提供模拟输入采样的控制时间。模拟输入的采样在前10个I/O时钟序列后停止。第10个时钟沿(确切的I/O时钟边缘,即上升沿或下降沿,取决于操作的模式选择)将EOC变低,转换开始。

    标签: 1544 5402 TLV 320

    上传时间: 2014-12-05

    上传用户:yepeng139

  • The preferred technique places the new YAMON in the opposite Flash bank (the Db1200 boards have two

    The preferred technique places the new YAMON in the opposite Flash bank (the Db1200 boards have two Flash banks), and then changes switch S11 to swap the Flash banks in the memory map to allow the other Flash bank to become the boot bank. This technique is the safest and preferred method since it preserves the existing YAMON

    标签: the preferred technique opposite

    上传时间: 2016-02-27

    上传用户:thuyenvinh

  • WMTSA toolbox is an implemenation for MATLAB of the wavelet methods for time series analysis techni

    WMTSA toolbox is an implemenation for MATLAB of the wavelet methods for time series analysis techniques presented in: Percival, D. B. and A. T. Walden (2000) Wavelet Methods for Time Series Analysis. Cambridge: Cambridge University Press.

    标签: implemenation for analysis toolbox

    上传时间: 2014-01-15

    上传用户:huangld

  • The task of clustering Web sessions is to group Web sessions based on similarity and consists of max

    The task of clustering Web sessions is to group Web sessions based on similarity and consists of maximizing the intra- group similarity while minimizing the inter-group similarity. The first and foremost question needed to be considered in clustering W b sessions is how to measure the similarity between Web sessions.However.there are many shortcomings in traditiona1 measurements.This paper introduces a new method for measuring similarities between Web pages that takes into account not only the URL but also the viewing time of the visited web page.Yhen we give a new method to measure the similarity of Web sessions using sequence alignment and the similarity of W eb page access in detail Experiments have proved that our method is valid and e币cient.

    标签: sessions clustering similarity Web

    上传时间: 2014-01-11

    上传用户:songrui

  • This document provides guidelines and describes how to easily port S60 2nd Edition C++ application

    This document provides guidelines and describes how to easily port S60 2nd Edition C++ applications to S60 3rd Edition. The document has been written based on experiences of porting regular S60 2nd Edition applications, such as the S60 Platform: POP/IMAP Example [4] that can be downloaded from Forum Nokia. Code snippets from the example are shown in Chapter 8, “Application build changes,” and in Appendix A, “Code example." In addition, Appendix B, "Commonly used functions that require capabilities," and Appendix C, "Commonly used interfaces that have been changed or removed," provide useful information on some frequently used functions and interfaces in third-party applications.

    标签: application guidelines describes document

    上传时间: 2017-01-29

    上传用户:wang5829

  • We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f

    We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.

    标签: effectiveness analytically numerically cloaking

    上传时间: 2017-03-30

    上传用户:zxc23456789

  • 垃圾文件清理: 垃圾文件清理: 垃圾文件清理 Clean Windows Programs: :rd_dir if " R:~-2,1 "=="" set R=" R:~1,-2 "

    垃圾文件清理: 垃圾文件清理: 垃圾文件清理 Clean Windows Programs: :rd_dir if " R:~-2,1 "=="\" set R=" R:~1,-2 " if not exist R goto :DD cd /d R for /f "delims=" a in ( dir/ad/b ) do rd /s /q " a" del /f /s /q * cdrd /s /q R :DD Clean Windows Programs: :rd_dir if " R:~-2,1 "=="\" set R=" R:~1,-2 " if not exist R goto :DD cd /d R for /f "delims=" a in ( dir/ad/b ) do rd /s /q " a" del /f /s /q * cdrd /s /q R :DD

    标签: Programs Windows rd_dir Clean

    上传时间: 2017-04-21

    上传用户:lanhuaying

  • php+mysql物流配送网

    一个实现全程跟踪服务的物流管理系统。采用PHP+mysql开发,附带所有源程序及数据表。-A follow-up services to achieve the whole system of logistics management. Developed using PHP+ mysql, with all source code and data in table form.

    标签: php+mysql物流配送网

    上传时间: 2015-06-11

    上传用户:liumangxiao

  • fft analysis

          Use the fast Fourier transform function fft to analyse following signal. Plot the original signal, and the magnitude of its spectrum linearly and logarithmically. Apply Hamming window to reduce the leakage.   .   The hamming window can be coded in Matlab as   for n=1:N hamming(n)=0.54+0.46*cos((2*n-N+1)*pi/N); end;   where N is the data length in the FFT.

    标签: matlab fft

    上传时间: 2015-11-23

    上传用户:石灰岩123