搜索结果

找到约 10,462 项符合 Abstract-the 的查询结果

VHDL/FPGA/Verilog VHDL 关于2DFFT设计程序 u scinode1 &#8764 scinode9.vhd: Every SCI node RTL vhdl code. The details can be

VHDL 关于2DFFT设计程序 u scinode1 &#8764 scinode9.vhd: Every SCI node RTL vhdl code. The details can be seen in the following section. u 2dfft.vhd: The top module includes these scinodes and form a 3x3 SCI Torus network, and it support these sub-modules scinode1&#8764 scinode9 reset and clk and glob ...
https://www.eeworm.com/dl/663/152303.html
下载: 130
查看: 1105

生物技术 The software package provides a MAX-MIN Ant System implemented in the Hyper-Cube Framework for the

The software package provides a MAX-MIN Ant System implemented in the Hyper-Cube Framework for the application to Unconstrained Binary Quadratic Programming (UBQP).
https://www.eeworm.com/dl/670/152307.html
下载: 157
查看: 1064

其他书籍 Using short message service to encourage interactivity in the classroom.rar

Using short message service to encourage interactivity in the classroom.rar
https://www.eeworm.com/dl/542/152390.html
下载: 197
查看: 1039

其他 -PID controller has been extensively used in the industrial world. But in this controller it is dif

-PID controller has been extensively used in the industrial world. But in this controller it is difficult to tune the PID gains. We apply the genetic algorithm(GA) to tune the PID gains. The GA is an optimization algorithm using the biotic genetics.
https://www.eeworm.com/dl/534/152396.html
下载: 110
查看: 1078

其他书籍 The LT&reg 1529/LT1529-3.3/LT1529-5 are 3A low dropout regulators with micropower quiescent current

The LT&reg 1529/LT1529-3.3/LT1529-5 are 3A low dropout regulators with micropower quiescent current and shutdown. The devices are capable of supplying 3A of output current with a dropout voltage of 0.6V. Designed for use in battery-powered systems, the low quiescent current, 50mA operating and 16mA ...
https://www.eeworm.com/dl/542/152491.html
下载: 36
查看: 1073

嵌入式/单片机编程 NORTi3 is a realtime multitasking operating system conforming to the micro-ITRON 3.0 specification.

NORTi3 is a realtime multitasking operating system conforming to the micro-ITRON 3.0 specification. NORTi3 is divided into two packages: NORTi3 Standard and NORTi3 Extended. The product NORTi3 Extended has implemented all the system calls of level E placed as "added and extended functions” in the m ...
https://www.eeworm.com/dl/647/152665.html
下载: 65
查看: 1129

数学计算 The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: he

The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: header file for same ptfsf-demo.c: FDTD code which demonstrates use of perfect TFSF code. Essentially this program used to generate results shown in the paper ptfsf-file-maker.c: code to generate an inci ...
https://www.eeworm.com/dl/641/152718.html
下载: 25
查看: 1069

数学计算 The module LSQ is for unconstrained linear least-squares fitting. It is based upon Applied Statisti

The module LSQ is for unconstrained linear least-squares fitting. It is based upon Applied Statistics algorithm AS 274 (see comments at the start of the module). A planar-rotation algorithm is used to update the QR- factorization. This makes it suitable for updating regressions as more data become a ...
https://www.eeworm.com/dl/641/152732.html
下载: 144
查看: 1046

matlab例程 This a very simple Yee algorithm 3D FDTD code in C implementing the free space form of Maxwell s equ

This a very simple Yee algorithm 3D FDTD code in C implementing the free space form of Maxwell s equations on a Cartesian grid. There are no internal materials or geometry. The code as delivered simulates an idealized rectangular waveguide by treating the interior of the mesh as free space/air and e ...
https://www.eeworm.com/dl/665/152737.html
下载: 153
查看: 1076

Internet/网络编程 I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco

I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. ...
https://www.eeworm.com/dl/620/152835.html
下载: 92
查看: 1056