虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

inputs

  • pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr

    pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.

    标签: perceptual implementation algorithms fingerpr

    上传时间: 2013-12-08

    上传用户:星仔

  • This program implements a PIC-based fuzzy inference engine for the Fudge fuzzy development system

    This program implements a PIC-based fuzzy inference engine for the Fudge fuzzy development system from Motorola. It works by taking the output from Fudge for the 68HC11 processor, and converting it to a MPASM compatible assembler file using the convert batch file. This file can then be incorporated with fuzzy.asm to create a fuzzy inference engine. Tool chain ---------- FUDGE -> Fuzzy Rules -> MC68HC11.ASM -> CONVERT.BAT -> RULES.ASM -> MPASM FUZZY.ASM -> INTEL HEX Fuzzy input registers --------------------- current_ins 1..8 x 8-bit raw inputs Fuzzy inference function ------------------------ FuzzyEngine Fuzzy output registers ---------------------- cog_outs 1..8 x 8-bit raw outputs

    标签: fuzzy development implements PIC-based

    上传时间: 2014-01-18

    上传用户:caozhizhi

  • 具有检测FIR滤波器单位脉冲响应h[n]中零系数(zero tap detection)功能的LMS算法自适应均衡器

    具有检测FIR滤波器单位脉冲响应h[n]中零系数(zero tap detection)功能的LMS算法自适应均衡器,可处理相关输入(colored inputs)和独立输入(white inputs). 检测出零系数的个数和位置,减少后续计算次数,提高算法效率。

    标签: detection zero FIR tap

    上传时间: 2014-08-20

    上传用户:tzl1975

  • Two scripts are included here. 1. convsys.m - combines the state space representation of two syst

    Two scripts are included here. 1. convsys.m - combines the state space representation of two systems connected in series. [Ao,Bo,Co,Do]=convsys(A1,B1,C1,D1,A2,B2,C2,D2) This algorithm gives the convolution of two state space representations | A1 B1 | | A2 B2 | u ==> | | ==> | | ==> y | C1 D1 | | C2 D2 | The algorithm also accepts state space objects as inputs and gives out a state space object as output. 2. sysfeedbk.m [Ao,Bo,Co,Do]=convsys(A1,B1,C1,D1,A2,B2,C2,D2) Gives the closed loop state space representation for two systems connected with negative feedback in the following manner. | A1 B1 | u ==> | | ==> y + o | C1 D1 | | - | | | | A2 B2 | | |= | |= | | C2 D2 | The zip file also contains checkcompatibility.m , which checks the compatibility of matrix dimensions in the system and cleanss.m which can be used to clean a state space representation.

    标签: representation included combines scripts

    上传时间: 2017-07-25

    上传用户:semi1981

  • RS_latch using vhdl, When using static gates as building blocks, the most fundamental latch is the

    RS_latch using vhdl, When using static gates as building blocks, the most fundamental latch is the simple SR latch, where S and R stand for set and reset. It can be constructed from a pair of cross-coupled NOR (Not OR) logic gates. The stored bit is present on the output marked Q. Normally, in storage mode, the S and R inputs are both low, and feedback maintains the Q and Q outputs in a constant state, with Q the complement of Q. If S (Set) is pulsed high while R is held low, then the Q output is forced high, and stays high when S returns to low similarly, if R (Reset) is pulsed high while S is held low, then the Q output is forced low, and stays low when R returns to low.

    标签: using fundamental the RS_latch

    上传时间: 2017-07-30

    上传用户:努力努力再努力

  • A certification path is an ordered list of certificates starting with a certificate issued by the re

    A certification path is an ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509 and further defined in Internet Engineering Task Force (IETF) Request for Comments (RFC) 3280. Certification path processing verifies the binding between the subject distinguished name and/or subject alternative name and the subject public key defined in the target certificate. The binding is limited by constraints, which are specified in the certificates that comprise the path, and inputs that are specified by the relying party. To ensure secure interoperation of PKI-enabled applications, the path validation must be done in accordance with the X.509 and RFC 3280 specifications. This document provides the test assertions and the test cases for testing path validation software against these specifications.

    标签: certification certificates certificate starting

    上传时间: 2017-07-31

    上传用户:清风冷雨

  • This function is used to evaluate the max height and the max distance of a projectile and plot th

    This function is used to evaluate the max height and the max distance of a projectile and plot the trajectory. inputs v0 : The initial velocity in m/s theta: The angle at which the projectile is fired in degrees Outputs hmax : The maximum hieght in m dmax : The maximum distance in m

    标签: projectile and the max

    上传时间: 2013-12-22

    上传用户:dongbaobao

  • Hardware random number generators attempt to extract randomness directly from complex physical syst

    Hardware random number generators attempt to extract randomness directly from complex physical systems. In this way they create random outputs without requiring any seed inputs. In this paper we describe how to use Physical Random Functions (or Physical Unclonable Functions, PUFs) to create a candidate hardware random number generator.

    标签: generators randomness Hardware directly

    上传时间: 2013-12-20

    上传用户:缥缈

  • VideoMan (Video Manager) is an open-source C++ library that helps you developing video based applica

    VideoMan (Video Manager) is an open-source C++ library that helps you developing video based applications. We created VideoMan to increase our productivity developing computer vision applications, but it can be used in many other ways. With VideoMan is very easy and fast to initialize any kind of video input like webcams, video files, frame grabbers, IEEE 1394 cameras and so on. You can initialize multiple inputs at the same time and show them in the screen. Also, you can show the results of the processing steps of your computer vision algorithm (extracted edges, back projections, detected blobs...) This way you can see the results of what are you coding, checking the results of your algorithm steps. Moreover, the implemented visualization scheme make easier to combine computer graphics with video, for example to show a 3d model on top of video for augmented reality applications.

    标签: open-source developing VideoMan Manager

    上传时间: 2014-01-21

    上传用户:chongcongying

  • ISIS Timer Design

    A design about 8051 (running at 12MHz) based system with 3 7-Seg displays and two buttons to implement the following functions.  1. When press the + button, the display C = A+B.  2. When press the button, the display C = A - B.  “A” and “B” are 8-bit inputs when “C” is 9-bit output. 

    标签: ISIS AT89C52

    上传时间: 2015-05-05

    上传用户:guoxiy