搜索结果
找到约 30 项符合
depending 的查询结果
按分类筛选
通讯编程文档 The files adi_ssl_init.h and adi_ssl_init.c are used to define the functions adi_ssl_Init()
The files adi_ssl_init.h and adi_ssl_init.c are used to define the functions
adi_ssl_Init() and 慳di_ssl_Terminate()?which initialize and terminate all the
Blackfin System Services in the appropriate order, for a particular EZ-Kit, depending
on the Blackfin processor used.
DSP编程 C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and exam
C280x C/C++ Header Files and Peripheral Examples
The DSP28xx C/C++ peripheral header files and example projects files facilitate writing C/C++ Code for the TI鈥檚 28xx MCUs. The code can be used as a learning tool or as the basis for a development platform depending on the current needs of the user. ...
Java编程 Besides enhanced looks and advanced features, one of the best things about Swing is its pluggable lo
Besides enhanced looks and advanced features, one of the best things about Swing is its pluggable look and feel (PLAF). PLAF architecture allows seamless changes in the appearance of an application and the way an application interacts with the user. However, designing and developing a PLAF is much m ...
微处理器开发 Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in A
Introduction
? ?
The ARM Cortex -A8 microprocessor is the first applications microprocessor in ARM!ˉs
new Cortex family. With high performance and power efficiency, it targets a wide
variety of mobile and consumer applications including mobile phones, set-top boxes,
gaming consoles and automot ...
数值算法/人工智能 The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of cla
The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of classified examples a decision tree is induced, biased by the information gain measure, which heuristically leads to small trees. The examples are given in attribute-value representation. The set of poss ...
论文 Bi-density twin support vector machines
In this paper we present a classifier called bi-density twin support vector machines (BDTWSVMs) for data classification. In the training stage, BDTWSVMs first compute the relative density degrees for all training points using the intra-class graph whose weights are determined by a local sc ...
书籍 virtual decomposition control
obot control, a subject aimed at making robots behave as desired, has been
extensively developed for more than two decades. Among many books being
published on this subject, a common feature is to treat a robot as a single
system that is to be controlled by a variety of control algorithms depending ...
书籍 Feedback+Strategies+for+Wireless+Communication
During the past decade, many wireless communication techniques have been
developedto achievevariousgoals suchas higherdata rate,morerobustlink quality,
and higher number of users in a given bandwidth. For wireless communication
systems, depending on the availability of a feedback link, two approache ...
书籍 Stochastic Geometry and Wireless Networks
A wireless communication network can be viewed as a collection of nodes, located in some domain, which
can in turn be transmitters or receivers (depending on the network considered, nodes may be mobile users,
base stations in a cellular network, access points of a WiFi mesh etc.). At a given time, s ...
书籍 Smart Grid Security
The field of cyber security, or information security, or information
assurance, depending on your preference, is an interdisciplinary one.
It is part computer science, part statistics, part psychology, part law,
and a part of many other fields. Moreover, any cyber security practi-
tioner needs to kn ...