搜索结果
找到约 44 项符合
approaches 的查询结果
按分类筛选
可编程逻辑 State Machine Coding Styles for Synthesis
 
本文论述了状态机的verilog编码风格,以及不同编码风格的优缺点,Steve Golson's 1994 paper, "State Machine Design Techniques for Verilog and VHDL" [1], is agreat paper on state machine design using Verilog, VHDL and Synopsys tools. Steve's paper alsooffers in-depth background concernin ...
接口技术 基于微处理器的5V系统接口
This application note discusses a variety of approaches for interfacing analog signals to 5V powered systems. Synthesizing a "rail-to-rail" op amp and scaling techniques for A/D converters are covered. A voltage-to-frequency converter, applicable where high resolution is required, is also presente ...
人工智能/神经网络 Locally weighted polynomial regression LWPR is a popular instance based al gorithm for learning c
Locally weighted polynomial regression LWPR is a popular instance based al gorithm for learning continuous non linear mappings For more than two or three in puts and for more than a few thousand dat apoints the computational expense of pre dictions is daunting We discuss drawbacks with previous ...
行业发展研究 Our approach to understanding mobile learning begins by describing a dialectical approach to the de
Our approach to understanding mobile learning begins by describing a dialectical
approach to the development and presentation of a task model using the sociocognitive
engineering design method. This analysis synthesises relevant theoretical
approaches. We then examine two field studies which feed in ...
Java书籍 OReilly.Ajax.on.Rails.Dec.2006. ISBN-10: 0-596-52744-6. Learn to build dynamic, interactive web ap
OReilly.Ajax.on.Rails.Dec.2006. ISBN-10: 0-596-52744-6.
Learn to build dynamic, interactive web applications using the two most important approaches to web development today: Ajax and the phenomenally efficient Ruby on Rails platform. This book teaches intermediate to advanced web developers how to ...
其他书籍 In this paper, we provide an overview of the security concerns introduced by wireless LANs, current
In this paper, we provide an overview of the security concerns introduced by wireless LANs, current approaches to wireless LAN security, their limitations, and the weaknesses of various “band aid” security solutions. We conclude by describing how the ReefEdge Connect System provides a comprehensiv ...
VC书籍 This paper presents an interactive technique that produces static hairstyles by generating individu
This paper presents an interactive technique that
produces static hairstyles by generating individual hair strands
of the desired shape and color, subject to the presence of gravity
and collisions. A variety of hairstyles can be generated by
adjusting the wisp parameters, while the deformation is so ...
行业发展研究 This paper introduces an affine invariant of trapezia, and the explicit constraint equation between
This paper introduces an affine invariant of trapezia, and the explicit constraint equation between the intrinsic matrix of a camera and the similarity invariants of a trapezium are established using the affine invariant. By this constraint, the inner parameters, motion parameters of the cameras and ...
软件设计/软件工程 In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadl
In a preemptive priority based RTOS, priority inversion
problem is among the major sources of deadline
violations. Priority inheritance protocol is one of the
approaches to reduce priority inversion. Unfortunately,
RTOS like uC/OS can’t support priority inheritance
protocol since it does not allow ...
其他书籍 In recent years large scientific interest has been devoted to joint data decoding and parameter est
In recent years large scientific interest has been
devoted to joint data decoding and parameter estimation
techniques. In this paper, iterative turbo decoding joint
to channel frequency and phase estimation is proposed.
The phase and frequency estimator is embedded into the
structure of the turbo de ...