搜索结果
找到约 1,502 项符合
One-Class 的查询结果
软件设计/软件工程 Robustnesstochangesinilluminationconditionsaswellas viewing perspectives is an important requirement
Robustnesstochangesinilluminationconditionsaswellas viewing perspectives is an important requirement formany computer vision applications. One of the key fac-ors in enhancing the robustness of dynamic scene analy-sis that of accurate and reliable means for shadow de-ection. Shadowdetectioniscritical ...
单片机开发 //Basic packet sending test at the MAC level, used for internal testing only. //This packet test ha
//Basic packet sending test at the MAC level, used for internal testing only.
//This packet test has one node sending out a variety of
//differently formatted packets to two assumed destination nodes.
其他书籍 Verilog and VHDL状态机设计
Verilog and VHDL状态机设计,英文pdf格式
State machine design techniques for Verilog and VHDL
Abstract : Designing a synchronous finite state Another way of organizing a state machine (FSM) is a common task for a digital logic only one logic block as shown in
engineer. This paper will discuss a var ...
人工智能/神经网络 This a A* pathfinding example to illustrate how to implement a A* pathfinding algorithm into your pr
This a A* pathfinding example to illustrate how to implement a A* pathfinding algorithm into your program. It s a port from Patrick Lesters example in BlitzBasic to VB.Net. It uses a Binary Heap class I made to sort the score values.
单片机开发 This prj demonstrates how to use the SROM memory classes for the Dallas DS80C400. This example uses
This prj demonstrates how to use the SROM memory classes for the Dallas DS80C400. This example uses the memcpy function to copy a function in the SROM memory class (which is located in CODE memory) to von Neumann mapped XDATA (starting at 0x110000) for execution.
Linux/Unix编程 About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based o
About WepDecrypt:
Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed.
WepDecrypt highlights:
- Implemented packet filters.
- Only on ...
其他 c语言程序
c语言程序,将阿拉伯数字翻译成英文。如输入:792677321
输出:seven hundred ninety-two million six hundred seventy-seven thousand three hundred twenty-one
其他嵌入式/单片机内容 AT90PWM3关于PSC功能的控制
AT90PWM3关于PSC功能的控制,PLL、FOUR、ONE、TWO、LAMP控制
VC书籍 软件开发工程是有趣的、多产的
软件开发工程是有趣的、多产的,甚至是大胆的。同时,它也能源源不断地带来商业价值,并保持在我们的掌控之下。 极限编程(XP)的构思和发展是针对小型团队进行软件开发时,在面对不确知的、变化的需求时所产生的特定需要的。这一新的、轻量级的方法学对许多传统思维提出了挑战,这其中包括一个一直以来的假设,即在软件开发 ...
Linux/Unix编程 American Gladiator,You are consulting for a game show in which n contestants are pitted against n gl
American Gladiator,You are consulting for a game show in which n contestants are pitted against n gladiators in order to see which contestants are the best. The game show aims to rank the contestants in order of strength this is done via a series of 1-on-1 matches between contestants and gladiators. ...