搜索结果

找到约 30 项符合 Depending 的查询结果

通讯编程文档 The files adi_ssl_init.h and adi_ssl_init.c are used to define the functions adi_ssl_Init()

The files adi_ssl_init.h and adi_ssl_init.c are used to define the functions adi_ssl_Init() and 慳di_ssl_Terminate()?which initialize and terminate all the Blackfin System Services in the appropriate order, for a particular EZ-Kit, depending on the Blackfin processor used.
https://www.eeworm.com/dl/646/428831.html
下载: 85
查看: 1107

DSP编程 C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and exam

C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and example projects files facilitate writing C/C++ Code for the TI鈥檚 28xx MCUs. The code can be used as a learning tool or as the basis for a development platform depending on the current needs of the user. ...
https://www.eeworm.com/dl/516/431958.html
下载: 60
查看: 1053

Java编程 Besides enhanced looks and advanced features, one of the best things about Swing is its pluggable lo

Besides enhanced looks and advanced features, one of the best things about Swing is its pluggable look and feel (PLAF). PLAF architecture allows seamless changes in the appearance of an application and the way an application interacts with the user. However, designing and developing a PLAF is much m ...
https://www.eeworm.com/dl/633/462690.html
下载: 172
查看: 1053

微处理器开发 Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in A

Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in ARM!ˉs new Cortex family. With high performance and power efficiency, it targets a wide variety of mobile and consumer applications including mobile phones, set-top boxes, gaming consoles and automot ...
https://www.eeworm.com/dl/655/468656.html
下载: 125
查看: 1084

数值算法/人工智能 The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of cla

The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of classified examples a decision tree is induced, biased by the information gain measure, which heuristically leads to small trees. The examples are given in attribute-value representation. The set of poss ...
https://www.eeworm.com/dl/518/480435.html
下载: 32
查看: 1055

论文 Bi-density twin support vector machines

In this paper we present a classifier called bi-density twin support vector machines (BDTWSVMs) for data classification. In the training stage, BDTWSVMs first compute the relative density degrees for all training points using the intra-class graph whose weights are determined by a local sc ...
https://www.eeworm.com/dl/520141.html
下载: 1
查看: 21

书籍 virtual decomposition control

obot control, a subject aimed at making robots behave as desired, has been extensively developed for more than two decades. Among many books being published on this subject, a common feature is to treat a robot as a single system that is to be controlled by a variety of control algorithms depending ...
https://www.eeworm.com/dl/520679.html
下载: 1
查看: 97

书籍 Feedback+Strategies+for+Wireless+Communication

During the past decade, many wireless communication techniques have been developedto achievevariousgoals suchas higherdata rate,morerobustlink quality, and higher number of users in a given bandwidth. For wireless communication systems, depending on the availability of a feedback link, two approache ...
https://www.eeworm.com/dl/521902.html
查看: 33

书籍 Stochastic Geometry and Wireless Networks

A wireless communication network can be viewed as a collection of nodes, located in some domain, which can in turn be transmitters or receivers (depending on the network considered, nodes may be mobile users, base stations in a cellular network, access points of a WiFi mesh etc.). At a given time, s ...
https://www.eeworm.com/dl/522131.html
下载: 1
查看: 67

书籍 Smart Grid Security

The field of cyber security, or information security, or information assurance, depending on your preference, is an interdisciplinary one. It is part computer science, part statistics, part psychology, part law, and a part of many other fields. Moreover, any cyber security practi- tioner needs to kn ...
https://www.eeworm.com/dl/522347.html
下载: 1
查看: 108