虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

significantly

  • An optimal neuron evolution algorithm for the restoration of linearly distorted images is presented

    An optimal neuron evolution algorithm for the restoration of linearly distorted images is presented in this paper. The proposed algorithm is motivated by the symmetric positive-definite quadratic programming structure inherent in restoration. Theoretical analysis and experimental results show that the algorithm not only significantly increases the convergence rate of processing, hut also produces good restoration results. In addition, the algorithm provides a genuine parallel processing structure which ensures computationally feasible spatial domain image restoration

    标签: restoration evolution algorithm distorted

    上传时间: 2013-12-21

    上传用户:yy541071797

  • Writing Robust Java Code The AmbySoft Inc. Coding Standards for Java v17.01d Scott W. Ambler Sof

    Writing Robust Java Code The AmbySoft Inc. Coding Standards for Java v17.01d Scott W. Ambler Software Process Mentor This Version: January 15, 2000 Copyright 1998-1999 AmbySoft Inc.Purpose of this White Paper This white paper describes a collection of standards, conventio code. They are based on sound, proven software engineering p understand, to maintain, and to enhance. Furthermore, by foll productivity as a Java developer should increase remarkably ¨C write high-quality code right from the start you will have a much development process. Finally, following a common set of codi making teams of developers significantly more productive.

    标签: W. Java Standards AmbySoft

    上传时间: 2013-12-22

    上传用户:mhp0114

  • The purpose of Software Project Tracking and Oversight is to provide adequate visibility into actual

    The purpose of Software Project Tracking and Oversight is to provide adequate visibility into actual progress so that management can take effective actions when the project s performance deviates significantly from the plans.

    标签: visibility Oversight Software Tracking

    上传时间: 2017-02-27

    上传用户:三人用菜

  • We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f

    We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.

    标签: effectiveness analytically numerically cloaking

    上传时间: 2017-03-30

    上传用户:zxc23456789

  • Behavioral models are used in games and computer graphics for realistic simulation of massive crowd

    Behavioral models are used in games and computer graphics for realistic simulation of massive crowds. In this paper, we present a GPU based implementation of Reynolds [1987] algorithm for simulating flocks of birds and propose an extension to consider environment self occlusion. We performed several experiments and the results showed that the proposed approach runs up to three times faster than the original algorithm when simulating high density crowds, without compromising significantly the original crowd behavior.

    标签: Behavioral simulation realistic computer

    上传时间: 2017-09-08

    上传用户:hanli8870

  • TJA1040

    The TJA1040 is an advanced high speed CAN transceiver for use in  automotive and general industrial applications. It supports the differential  bus signal representation described in the international standard for  in-vehicle high speed CAN applications (ISO11898). CAN (Controller Area  Network) is the standard protocol for serial in-vehicle bus communication,  particularly for Engine Management and Body Multiplexing. The TJA1040 provides a Standby mode, as known from its functional  predecessors PCA82C250 and PCA82C251, but with significantly  reduced power consumption. Besides the excellent low-power behavior  the TJA1040 offers several valuable system improvements. Highlights are  the absolute passive bus behavior if the device is unpowered as well as  the excellent EMC performance.

    标签: CAN

    上传时间: 2015-03-23

    上传用户:Yuan Lo

  • 4G & Beyond Convergence of Networks

    From the transition of analog to digital communication along with seamless mobility and high computing power of small handheld devices, the wireless communications industry has seen tremendous changes leading to the integration of several telecommunication networks, devices and services over last 30 years. The rate of this progress and growth has increased particularly in the past decade because people no longer use their devices and networks for voice only, but demand bundle contents such as data download/streaming, HDTV, HD video , 3D video conferencing with higher efficiency, seamless connectivity, intelligence, reliability and better user experience. Although the challenges facing service providers and telecommunication companies differ by product, region, market size, and their areas of concentration but time to market, efficient utilization of their assets and revenue expansion, have impacted significantly how to manage and conduct their business while maintaining sufficient margin. 

    标签: Convergence Networks Beyond 4G of

    上传时间: 2020-05-26

    上传用户:shancjb

  • LTE-Advanced+Relay+Technology

    LTE-Advanced becomes a truly global standard for 4G cellular communications. Relay, as one of the key technologies of LTE-Advanced, can significantly extend the coverage, and improve the system throughput. LTE-A standards and tech- nologies were described in several recent books where the limited pages for relay feature prevent the detailed explanations of the technology. In this book, we tried to provide an in-depth description of LTE-A relay development. More specifically, significant portions are spent on relay channel modeling and potential technologies during the study item phase of the development, although some of those tech- nologies, such as Type 2 cooperative relay, multi-hop relay, relay with backhaul of carrier aggregation, were not standardized in Release 10 LTE.

    标签: LTE-Advanced Technology Relay

    上传时间: 2020-05-27

    上传用户:shancjb

  • Modern+Receiver+Front-Ends

    In recent years, the research and developments in the area of RF and microwave technologies have progressed significantly due to the growing demand for applica- bility in wireless communication technologies. Starting from 1992, wireless com- munication technologies have become quite mature. In the modern era of electronic developments, design of wireless handsets is an example of integration of many di- verse skill sets. Classical books in the areas of microwave technology provide us with an in-depth knowledge of electromagnetic fundamentals.

    标签: Front-Ends Receiver Modern

    上传时间: 2020-05-31

    上传用户:shancjb

  • Physical Layer Security in Wireless Communications

    The ever-increasing demand for private and sensitive data transmission over wireless net- works has made security a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, computer scientists and engineers have tried hard to continuously come up with improved crypto- graphic algorithms. But typically we do not need to wait too long to find an efficient way to crack these algorithms. With the rapid progress of computational devices, the current cryptographic methods are already becoming more unreliable. In recent years, wireless re- searchers have sought a new security paradigm termed physical layer security. Unlike the traditional cryptographic approach which ignores the effect of the wireless medium, physi- cal layer security exploits the important characteristics of wireless channel, such as fading, interference, and noise, for improving the communication security against eavesdropping attacks. This new security paradigm is expected to complement and significantly increase the overall communication security of future wireless networks.

    标签: Communications Physical Security Wireless Layer in

    上传时间: 2020-05-31

    上传用户:shancjb