CORDIC (Coordinate Rotation Digital Computer) is a method for computing elementary functions using minimal hardware such as shifts, adds/subs and compares. CORDIC works by rotating the coordinate system through constant angles until the angle is reduces to zero. The angle offsets are selected such that the operations on X and Y are only shifts and adds.
标签: Coordinate elementary computing functions
上传时间: 2015-11-08
上传用户:saharawalker
To develop functional modules to process grayscale image intensity data. And perform Point and spatial operations. Uses Prewitt, Sobel, and Laplacian of Guassian Methods. And calculates their histograms.
标签: functional grayscale intensity develop
上传时间: 2015-11-09
上传用户:源弋弋
In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadline violations. Priority inheritance protocol is one of the approaches to reduce priority inversion. Unfortunately, RTOS like uC/OS can’t support priority inheritance protocol since it does not allow kernel to have multiple tasks at the same priority. Although it has different ways to avoid priority inversion such as priority ceiling protocol, developers still have some difficulties in programming real time applications with it. In this paper, we redesign the uC/OS kernel to provide the ability to support round robin scheduling and implement priority inheritance semaphore on the modified kernel. As result, we port new kernel with priority inheritance semaphore to evaluation board, and evaluate the execution time of each of the kernel service as well as verify the operations of our implementation.
标签: priority preemptive inversion problem
上传时间: 2015-12-14
上传用户:气温达上千万的
This library allows creating, modifying and extracting zip archives in the compatible way with PKZIP (2.5 and higher) and WinZip. Supported are all possible operations on the zip archive: creating, extracting, adding, deleting files from the archive, modifications of the existing archive. There is also the support for creating and extracting multiple disk archives (on non-removable devices as well) and for password encryption and decryption. This module uses compression and decompression functions from zlib library by Jean-loup Gailly and Mark Adler.
标签: compatible extracting modifying creating
上传时间: 2014-12-22
上传用户:chfanjiang
Matrix TCL Lite 1.12 This matrix C++ template class library is for performing common matrix operations in your C++ program like any other built-in data types. To install the package, just copy MATRIX.H file into the INCLUDE directory of your compiler and include this header file in your program source file.
标签: matrix performing template library
上传时间: 2016-01-05
上传用户:h886166
Contains source to demonstrate how to copy/delete files and folders with HFS+ APIs. It also demonstrates a technique to rename an object if an object of the same name exists in the destination. This sample shows how to perform these operations in an MP-safe way.
标签: demonstrate Contains demonstr folders
上传时间: 2016-01-14
上传用户:我们的船长
CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2 DOMAIN 2 – ACCESS CONTROL SYSTEMS 7 DOMAIN 3 – TELECOM AND NETWORK SECURITY 13 DOMAIN 4 – CRYPTOGRAPHY 34 DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46 DOMAIN 6 – operations SECURITY 56 DOMAIN 7 – APPLICATIONS AND SYSTEM DEVELOPMENT 63 DOMAIN 8 – BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING 70 DOMAIN 9 – LAW, INVESTIGATION AND ETHICS 78 DOMAIN 10 – PHYSICAL SECURITY 87
标签: CISSP MANAGEMENT PRACTICES SECURITY
上传时间: 2014-02-13
上传用户:sy_jiadeyi
This code implements min binomial heaps and min leftist trees.Plus, measure and compare the relative performance of these two implementations under the assumption that the only permissible operations are insert and delete-min.
标签: implements and min binomial
上传时间: 2014-11-27
上传用户:2467478207
The first task at hand is to set up the endpoints appropriately for this example. The following code switches the CPU clock speed to 48 MHz (since at power-on default it is 12 MHz), and sets up EP2 as a Bulk OUT endpoint, 4x buffered of size 512, and EP6 as a Bulk IN endpoint, also 4x buffered of size 512. This set-up utilizes the maximum allotted 4-KB FIFO space. It also sets up the FIFOs for manual mode, word-wide operation, and goes through a FIFO reset and arming sequence to ensure that they are ready for data operations
标签: appropriately The endpoints following
上传时间: 2013-12-02
上传用户:dianxin61
This program is a series of 51 single-chip microcomputer simulation IIC bus, the memory of the 24 operations
标签: microcomputer single-chip simulation the
上传时间: 2013-12-18
上传用户:yan2267246