虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

machine-generated

  • Top module name : SHIFTER (File name : SHIFTER.v) 2. Input pins: SHIFT [3:0], IN [15:0], SIGN, RIGH

    Top module name : SHIFTER (File name : SHIFTER.v) 2. Input pins: SHIFT [3:0], IN [15:0], SIGN, RIGHT. 3. Output pins: OUT [15:0]. 4. Input signals generated from test pattern are latched in one cycle and are synchronized at clock rising edge. 5. The SHIFT signal describes the shift number. The shift range is 0 to 15. 6. When the signal RIGHT is high, it shifts input data to right. On the other hand, it shifts input data to left. 7. When the signal SIGN is high, the input data is a signed number and it shifts with sign extension. However, the input data is an unsigned number if the signal SIGN is low. 8. You can only use following gates in Table I and need to include the delay information (Tplh, Tphl) in your design.

    标签: SHIFTER name module Input

    上传时间: 2014-01-20

    上传用户:三人用菜

  • The inverse of the gradient function. I ve provided versions that work on 1-d vectors, or 2-d or 3-d

    The inverse of the gradient function. I ve provided versions that work on 1-d vectors, or 2-d or 3-d arrays. In the 1-d case I offer 5 different methods, from cumtrapz, and an integrated cubic spline, plus several finite difference methods. In higher dimensions, only a finite difference/linear algebra solution is provided, but it is fully vectorized and fully sparse in its approach. In 2-d and 3-d, if the gradients are inconsistent, then a least squares solution is generated

    标签: gradient function provided versions

    上传时间: 2016-11-07

    上传用户:秦莞尔w

  • ST32 基于(英蓓特)STM32V100的EXTI程序 This example shows how to configure an external interrupt line. In t

    ST32 基于(英蓓特)STM32V100的EXTI程序 This example shows how to configure an external interrupt line. In this example, the EXTI line 9 is configured to generate an interrupt on each falling edge. In the interrupt routine a led connected to PC.06 is toggled. This led will be toggled due to the softawre interrupt generated on EXTI Line9 then at each falling edge.

    标签: configure interrupt external example

    上传时间: 2016-11-17

    上传用户:GavinNeko

  • If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction dis

    If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction disallowing scripts to run in files opened on your local machine. When you first try to run the examples, you will most likely get a message saying, "To help protect your security, Internet Explorer has restricted this file from showing active content that could access your computer." To see the example, you must click on the message and select "Allow Blocked Content". JavaScript高级程序设计 里面自代源码

    标签: restriction Explorer Internet security

    上传时间: 2016-11-18

    上传用户:源弋弋

  • rc5的decryption

    rc5的decryption,同样带state machine,同样有四个状态

    标签: decryption rc5

    上传时间: 2016-11-22

    上传用户:llandlu

  • These instances, whenmapped to an N-dimensional space, represent a core set that can be used to con

    These instances, whenmapped to an N-dimensional space, represent a core set that can be used to construct an approximation to theminimumenclosing ball. Solving the SVMlearning problem on these core sets can produce a good approximation solution in very fast speed. For example, the core-vector machine [81] thus produced can learn an SVM for millions of data in seconds.

    标签: N-dimensional whenmapped instances represent

    上传时间: 2016-11-23

    上传用户:lixinxiang

  • Many of the pattern fi nding algorithms such as decision tree, classifi cation rules and c

    Many of the pattern fi nding algorithms such as decision tree, classifi cation rules and clustering techniques that are frequently used in data mining have been developed in machine learning research community. Frequent pattern and association rule mining is one of the few excep- tions to this tradition. The introduction of this technique boosted data mining research and its impact is tremendous. The algorithm is quite simple and easy to implement. Experimenting with Apriori-like algorithm is the fi rst thing that data miners try to do.

    标签: 64257 algorithms decision pattern

    上传时间: 2014-01-12

    上传用户:wangdean1101

  • Semantic analysis of multimedia content is an on going research area that has gained a lot of atten

    Semantic analysis of multimedia content is an on going research area that has gained a lot of attention over the last few years. Additionally, machine learning techniques are widely used for multimedia analysis with great success. This work presents a combined approach to semantic adaptation of neural network classifiers in multimedia framework. It is based on a fuzzy reasoning engine which is able to evaluate the outputs and the confidence levels of the neural network classifier, using a knowledge base. Improved image segmentation results are obtained, which are used for adaptation of the network classifier, further increasing its ability to provide accurate classification of the specific content.

    标签: multimedia Semantic analysis research

    上传时间: 2016-11-24

    上传用户:虫虫虫虫虫虫

  • We propose a technique that allows a person to design a new photograph with substantially less effo

    We propose a technique that allows a person to design a new photograph with substantially less effort. This paper presents a method that generates a composite image when a user types in nouns, such as “boat” and “sand.” The artist can optionally design an intended image by specifying other constraints. Our algorithm formulates the constraints as queries to search an automatically annotated image database. The desired photograph, not a collage, is then synthesized using graph-cut optimization, optionally allowing for further user interaction to edit or choose among alternative generated photos. An implementation of our approach, shown in the associated video, demonstrates our contributions of (1) a method for creating specific images with minimal human effort, and (2) a combined algorithm for automatically building an image library with semantic annotations from any photo collection.

    标签: substantially photograph technique propose

    上传时间: 2016-11-24

    上传用户:三人用菜

  • The DHRY program performs the dhrystone benchmarks on the 8051. Dhrystone is a general-performanc

    The DHRY program performs the dhrystone benchmarks on the 8051. Dhrystone is a general-performance benchmark test originally developed by Reinhold Weicker in 1984. This benchmark is used to measure and compare the performance of different computers or, in this case, the efficiency of the code generated for the same computer by different compilers. The test reports general performance in dhrystones per second. Like most benchmark programs, dhrystone consists of standard code and concentrates on string handling. It uses no floating-point operations. It is heavily influenced by hardware and software design, compiler and linker options, code optimizing, cache memory, wait states, and integer data types. The DHRY program is available in different targets: Simulator: Large Model: DHRY example in LARGE model for Simulation Philips 80C51MX: DHRY example in LARGE model for the Philips 80C51MC

    标签: general-performanc benchmarks Dhrystone dhrystone

    上传时间: 2016-11-30

    上传用户:hphh