iris localization using integro differential operator. The rar contains 5 files in order to computer the integro differential operator of the normalized contour of the iris and puil boundaries and then add circles to the respective boundaries.
资源简介:iris localization using integro differential operator. The rar contains 5 files in order to computer the integro differential operator of the normalized contour of the iris and puil boundaries and then add circles to the respective boundari...
上传时间: 2017-03-23
上传用户:希酱大魔王
资源简介:This program is used to calculating CRC32 checksums of files in order to verify the integrity of files. Written in Visual C# 2005.
上传时间: 2017-03-10
上传用户:ryb
资源简介:The advantages of automation can be exploited in order to solve or to minimize the needs of manual approach. In order to support the development of survey accurate cadastral system, an automatic programming approach will be adopted. Data...
上传时间: 2017-04-28
上传用户:520
资源简介:This program accesses a SPI EEPROM using polled mode access. The F12x MCU is configured in 4-wire Single Master Mode, and the EEPROM is the only slave device connected to the SPI bus. The read/write operations are tailored to access a Micro...
上传时间: 2016-03-28
上传用户:gut1234567
资源简介:// This program accesses a SPI EEPROM using polled mode access. The F06x MCU // is configured in 4-wire Single Master Mode, and the EEPROM is the only // slave device connected to the SPI bus. The read/write operations are // tailored to...
上传时间: 2014-01-18
上传用户:liglechongchong
资源简介:// This program accesses a SPI EEPROM using polled mode access. The F06x MCU // is configured in 4-wire Single Master Mode, and the EEPROM is the only // slave device connected to the SPI bus. The read/write operations are // tailored to...
上传时间: 2016-04-12
上传用户:qb1993225
资源简介:Windowed-Burg method is made in order to improve the Clasical Burg method. Previously, I send the PBURGW.m file, but now I include also the ARBURGW.m algorithm and some NOTES-EXAMPLES to explain it and compare with the pburg.m algorithm fro...
上传时间: 2013-12-22
上传用户:familiarsmile
资源简介:The two C source files in this archive are specific to the TRS-80 Model 4 with high-resolution graphics board. However, the code which performs Huffman enco- ding and decoding is of general interest.
上传时间: 2014-11-04
上传用户:二驱蚊器
资源简介:The two C source files in this archive are specific to the TRS-80 Model 4 with high-resolution graphics board. However, the code which performs Huffman enco- ding and decoding is of general interest.
上传时间: 2013-12-18
上传用户:417313137
资源简介:This zip file shows the use ROM Services in order to speed up an application and reduce its code size. It shows how to open services such as ROM Entry, Xmodem and DataFlash and how to simply use their methods. Includes main.html file for he...
上传时间: 2014-11-02
上传用户:66666
资源简介:This zip file shows the use ROM Services in order to speed up an application and reduce its code size. It shows how to load a method of the Xmodem service and obtain a first level bootloader. Includes main.html file for help.
上传时间: 2013-12-05
上传用户:我们的船长
资源简介:an external program called from Adam s FitnessFunction class in order to evaluate the fitness of a genome within a distributed grid.
上传时间: 2015-09-25
上传用户:pompey
资源简介:Is a Application Demo (an example) of how to use the package LCD in order to make an application stand alone that show a scrolling message on display.
上传时间: 2016-05-28
上传用户:tianyi223
资源简介:USART coded in VHDL. It is writted in 5 files. I am uploading the files in order.
上传时间: 2013-11-25
上传用户:问题问题
资源简介:USART coded in VHDL. It is writted in 5 files. I am uploading the files in order.
上传时间: 2014-11-05
上传用户:lizhizheng88
资源简介:USART coded in VHDL. It is writted in 5 files. I am uploading the files in order.
上传时间: 2013-12-30
上传用户:wfeel
资源简介:USART coded in VHDL. It is writted in 5 files. I am uploading the files in order.
上传时间: 2014-11-27
上传用户:宋桃子
资源简介:USART coded in VHDL. It is writted in 5 files. I am uploading the files in order.
上传时间: 2017-03-11
上传用户:Andy123456
资源简介:A sample C program to demonstrate the usage of rtc() function in Linux to read the read time clock.
上传时间: 2017-04-02
上传用户:米卡
资源简介:synopsys for the students in order to guide them
上传时间: 2017-08-23
上传用户:yangbo69
资源简介:synopsys for the students in order to guide them
上传时间: 2017-08-23
上传用户:杜莹12345
资源简介:SA Encryption and Decryption using Matlab The program set contains thirteen files listed below. errormeg.fig errormsg.m helpmsg.fig helpmsg.m inputmsg.fig inputmsg.m mesgcut.m pro2.fig pro2.m rsacore.m readme.txt screensh...
上传时间: 2017-04-06
上传用户:dreamboy36
资源简介:Due to the asymmetry between the amount of data traffic in the downlink and uplink direction of nowadays and future wireless networks, a proper design of the transceivers in the broadcast channel is inevitable in order to satisfy the users...
上传时间: 2020-05-27
上传用户:shancjb
资源简介:Abstract: A sliding mode observer and fractional-order phase-locked loop (FO-PLL) method is proposed for the sensorless speed control of a permanent magnet synchronous motor (PMSM).The saturation function is adopted in order to reduce the c...
上传时间: 2022-06-17
上传用户:pagedown
资源简介:This program is the best program ever used in optimisation using differential evolution. Check it u will found it very useful.
上传时间: 2014-01-08
上传用户:GHF
资源简介:source code for unrar3.3.4,uppack the .rar files,for multi-os
上传时间: 2015-03-16
上传用户:lanwei
资源简介:They have been developed using the AZTEC C86 compiler, and are portable to any other standard C environment. I have tested this code with AZTEC CII for the 8080, and with the C compiler on XENIX 286, and they work fine.
上传时间: 2014-01-05
上传用户:lizhen9880
资源简介:should modify the .rar to .doc :)
上传时间: 2013-12-13
上传用户:洛木卓
资源简介:Single-layer neural networks can be trained using various learning algorithms. The best-known algorithms are the Adaline, Perceptron and Backpropagation algorithms for supervised learning. The first two are specific to single-layer neural n...
上传时间: 2015-06-17
上传用户:赵云兴
资源简介:What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Pr...
上传时间: 2013-12-25
上传用户:playboys0