TC35i模块有40个引脚,通过一个ZIF(Zero Insertion Force,零阻力插座)连接器引出。这40个引脚可以划分为5类,即电源、数据输入/输出、SIM卡、音频接口和控制。
上传时间: 2017-04-23
上传用户:dave520l
OTSU Gray-level image segmentation using Otsu s method. Iseg = OTSU(I,n) computes a segmented image (Iseg) containing n classes by means of Otsu s n-thresholding method (Otsu N, A Threshold Selection Method from Gray-Level Histograms, IEEE Trans. Syst. Man Cybern. 9:62-66 1979). Thresholds are computed to maximize a separability criterion of the resultant classes in gray levels. OTSU(I) is equivalent to OTSU(I,2). By default, n=2 and the corresponding Iseg is therefore a binary image. The pixel values for Iseg are [0 1] if n=2, [0 0.5 1] if n=3, [0 0.333 0.666 1] if n=4, ... [Iseg,sep] = OTSU(I,n) returns the value (sep) of the separability criterion within the range [0 1]. Zero is obtained only with images having less than n gray level, whereas one (optimal value) is obtained only with n-valued images.
标签: OTSU segmentation Gray-level segmented
上传时间: 2017-04-24
上传用户:yuzsu
Basic function to locate and measure the positive peaks in a noisy data sets. Detects peaks by looking for downward zero-crossings in the smoothed third derivative that exceed SlopeThreshold and peak amplitudes that exceed AmpThreshold. Determines, position, height, and approximate width of each peak by least-squares curve-fitting the log of top part of the peak with a parabola.
标签: peaks function positive Detects
上传时间: 2017-04-26
上传用户:彭玖华
Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two main problems seriously darken the future of this technology though. Firstly, the large number of attacks and weaknesses which appear as fast as new algorithms are proposed, emphasizes the limits of this technology and in particu-lar the fact that it may not match users expectations. Secondly, the requirements, tools and methodologies to assess the current technologies are almost non-existent. The lack of benchmarking of current algorithms is bla-tant. This confuses rights holders as well as software and hardware manufacturers and prevents them from using the solution appropriate to their needs. Indeed basing long-lived protection schemes on badly tested watermarking technology does not make sense.
标签: Watermarking watermarking evaluation presented
上传时间: 2013-12-04
上传用户:thinode
oracle中常用函数说明. SQL中的单记录函数 1.ASCII 返回与指定的字符对应的十进制数 SQL> select ascii( A ) A,ascii( a ) a,ascii( 0 ) zero,ascii( ) space from dual A A ZERO SPACE --------- --------- --------- --------- 65 97 48 32 2.CHR 给出整数,返回对应的字符 SQL> select chr(54740) zhao,chr(65) chr65 from dual ZH C -- - 赵 A 3.CONCAT 连接两个字符串 SQL> select concat( 010- , 88888888 )|| 转23 高乾竞电话 from dual 高乾竞电话 ---------------- 010-88888888转23
上传时间: 2014-11-23
上传用户:zhangyigenius
The aip file contains few Matlab routines for 1D line scan analysis, 1D scaling, 2D scaling, image brightness or contrast variation routine and rouitne for finding area between zero cossings of 1D times series.
标签: scaling contains analysis routines
上传时间: 2014-01-19
上传用户:xmsmh
This is a code of Pseudo-Arc Length Continuation Method , the method can be used for solving the nonlinear equations, the principle can re found in some text books. In the code,I prove the agreement of the code with other methods
标签: Continuation Pseudo-Arc the solving
上传时间: 2013-12-03
上传用户:xzt
This program take a two sequences with differents lengths and transform in two sequences with same length with use zero padding method.
标签: sequences with differents two
上传时间: 2017-05-27
上传用户:kikye
4 16 64 QAM plots for simulated and theoretical results for OFDM system with addition of Cyclic prefix and a zero-Forcing equalizer.
标签: theoretical for simulated addition
上传时间: 2017-06-02
上传用户:hgy9473
1. Consider the FIR system described by H(z) = 1/16(-1 + 9z--2 + 16z-3 + 9z--4 - z-6), and plot the pole-zero locations in the z-plane.
标签: the described Consider system
上传时间: 2014-07-10
上传用户:himbly