虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

state-of-the-art

  • multipleshooting to find the roots of the non-linear functions

    multipleshooting to find the roots of the non-linear functions

    标签: multipleshooting non-linear functions the

    上传时间: 2013-12-19

    上传用户:zhangliming420

  • This file contains a summary of what you will find in each of the files that make up your Process a

    This file contains a summary of what you will find in each of the files that make up your Process application.

    标签: contains Process summary files

    上传时间: 2014-01-25

    上传用户:wang0123456789

  • RS232.C was written to provide all of the basic functionality needed to employ serial I/O in any a

    RS232.C was written to provide all of the basic functionality needed to employ serial I/O in any application written with Borland C language compilers. Some features are: 1. Ease of use. No assembly language or library files are used and a simple "#include" statement is all that is required to access all of the functions provided. 2. Both input and output are buffered and interrupt driven for efficiency. 3. Serial ports 1 - 4 are supported on PC, AT and PS/2 compatibles.Chained interrupts used on port 3 and 4 are allowed for so as not to interfere with devices such as a mouse or printer. Transmission speeds of 110 to 115200 baud are available. 4. Detection and utilization of hardware buffered UARTs (NS16550AF etc.) found in some machines is automatic. 5. Interrupt driven hardware and XON/XOFF flow control is provided for. 6. All source code is included. RS232.C can be used with all memory models.

    标签: functionality provide written employ

    上传时间: 2016-08-24

    上传用户:小眼睛LSL

  • xl2tpd is an implementation of the Layer 2 Tunnelling Protocol (RFC 2661). L2TP allows you to tunne

    xl2tpd is an implementation of the Layer 2 Tunnelling Protocol (RFC 2661). L2TP allows you to tunnel PPP over UDP. Some ISPs use L2TP to tunnel user sessions from dial-in servers (modem banks, ADSL DSLAMs) to back-end PPP servers. Another important application is Virtual Private Networks where the IPsec protocol is used to secure the L2TP connection (L2TP/IPsec, RFC 3193). The L2TP/IPsec protocol is mainly used by Windows and Mac OS X clients. On Linux, xl2tpd can be used in combination with IPsec implementations such as Openswan.

    标签: implementation Tunnelling Protocol xl2tpd

    上传时间: 2014-01-20

    上传用户:Altman

  • Visual tracking is one of the key components for robots to accomplish a given task in a dynamic env

    Visual tracking is one of the key components for robots to accomplish a given task in a dynamic environment, especially when independently moving objects are included. This paper proposes an extension of Adaptive Visual Servoing (hereafter, AVS) for unknown moving object tracking. The method utilizes binocular stereo vision, but does not need the knowledge of camera parameters. Only one assumption is that the system need stationary references in the both images by which the system can predict the motion of unknown moving objects. The basic ideas how we extended the AVS method such that it can track unknown moving objects are given and formalized into a new AVS system. The experimental results with proposed control architecture are shown and a discussion is given.

    标签: components accomplish tracking dynamic

    上传时间: 2013-12-11

    上传用户:lizhen9880

  • This a very simple baseband simulator for SC-FDMA system. This simulator is part of the upcoming boo

    This a very simple baseband simulator for SC-FDMA system. This simulator is part of the upcoming book “Single Carrier FDMA: A New Air Interface for Long Term Evolution” (Wiley, Nov. 2008) which I co-authored with professor David J. Goodman at Polytechnic University. The purpose of this simulator is to give some concrete idea of how SC-FDMA system works. It does lack many realistic and sophisticated features such as channel coding, time-varying fading channel model, soft decision decoding, etc. Regardless, I am hoping that it will help you understand SC-FDMA which is a fairly new development in 3GPP LTE.

    标签: simulator This baseband upcoming

    上传时间: 2016-08-26

    上传用户:小草123

  • the original code of the book the principle and practice in sql server 2005

    the original code of the book the principle and practice in sql server 2005

    标签: the principle original practice

    上传时间: 2016-08-31

    上传用户:CHINA526

  • This directory includes matlab interface of the curvelet transform using usfft. Basic functions

    This directory includes matlab interface of the curvelet transform using usfft. Basic functions fdct_usfft.m -- forward curvelet transform afdct_usfft.m -- adjoint curvelet transform ifdct_usfft.m -- inverse curvelet transform fdct_usfft_param.m -- returns the location of each curvelet in phase-space Useful tools fdct_usfft_dispcoef.m -- returns a matrix contains all curvelet coefficients fdct_usfft_pos2idx.m -- for fixed scale and fixed direction, returns the curvelet which is closest to a certain point on the image Demos fdct_usfft_demo_basic.m -- display the shape of a curvelet fdct_usfft_demo_recon.m -- partial reconstruction using curvelet fdct_usfft_demo_disp.m -- display all the curvelet coefficients of an image fdct_usfft_demo_denoise.m -- image denoising using curvelet

    标签: directory functions interface transform

    上传时间: 2016-08-31

    上传用户:cooran

  • Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the rela

    Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced security and privacy and advanced network concepts, such as moving networks and mobile ad hoc networks. HIP is "cool", which means that as a mobile VPN solution, when your network interfaces go up or down, there is no need to re-establish a secure tunnel.

    标签: Identity Protocol Host implemetation

    上传时间: 2016-09-01

    上传用户:皇族传媒

  • MATLAB implementation of the 3GPP Spatial Channel Model

    MATLAB implementation of the 3GPP Spatial Channel Model

    标签: implementation Channel Spatial MATLAB

    上传时间: 2014-01-20

    上传用户:李梦晗