搜索结果
找到约 483 项符合
machine-generated 的查询结果
VHDL/FPGA/Verilog Top module name : SHIFTER (File name : SHIFTER.v) 2. Input pins: SHIFT [3:0], IN [15:0], SIGN, RIGH
Top module name : SHIFTER (File name : SHIFTER.v)
2. Input pins: SHIFT [3:0], IN [15:0], SIGN, RIGHT.
3. Output pins: OUT [15:0].
4. Input signals generated from test pattern are latched in one cycle and are
synchronized at clock rising edge.
5. The SHIFT signal describes the shift number. The shift ...
数学计算 The inverse of the gradient function. I ve provided versions that work on 1-d vectors, or 2-d or 3-d
The inverse of the gradient function. I ve provided versions that work on 1-d vectors, or 2-d or 3-d arrays. In the 1-d case I offer 5 different methods, from cumtrapz, and an integrated cubic spline, plus several finite difference methods.
In higher dimensions, only a finite difference/linear alge ...
微处理器开发 ST32 基于(英蓓特)STM32V100的EXTI程序 This example shows how to configure an external interrupt line. In t
ST32
基于(英蓓特)STM32V100的EXTI程序
This example shows how to configure an external interrupt line.
In this example, the EXTI line 9 is configured to generate an interrupt on each
falling edge. In the interrupt routine a led connected to PC.06 is toggled.
This led will be toggled due to the softa ...
其他 If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction dis
If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction disallowing scripts to run in files opened on your local machine. When you first try to run the examples, you will most likely get a message saying, "To help protect your security, Internet Explorer has ...
VHDL/FPGA/Verilog rc5的decryption
rc5的decryption,同样带state machine,同样有四个状态
嵌入式/单片机编程 These instances, whenmapped to an N-dimensional space, represent a core set that can be used to con
These instances, whenmapped to an N-dimensional space, represent a core set that can be
used to construct an approximation to theminimumenclosing ball. Solving the SVMlearning
problem on these core sets can produce a good approximation solution in very fast speed.
For example, the core-vector machin ...
微处理器开发 Many of the pattern fi nding algorithms such as decision tree, classifi cation rules and c
Many of the pattern &#64257 nding algorithms such as decision tree, classi&#64257 cation rules and clustering
techniques that are frequently used in data mining have been developed in machine learning
research community. Frequent pattern and association rule mining is one of the few excep-
tions to ...
单片机开发 Semantic analysis of multimedia content is an on going research area that has gained a lot of atten
Semantic analysis of multimedia content is an on going research
area that has gained a lot of attention over the last few years.
Additionally, machine learning techniques are widely used for multimedia
analysis with great success. This work presents a combined approach
to semantic adaptation of neur ...
其他 We propose a technique that allows a person to design a new photograph with substantially less effo
We propose a technique that allows a person to design a new photograph
with substantially less effort. This paper presents a method that generates a composite image when a user types
in nouns, such as “boat” and “sand.” The artist can optionally design an intended image by specifying other
const ...
单片机开发 The DHRY program performs the dhrystone benchmarks on the 8051. Dhrystone is a general-performanc
The DHRY program performs the dhrystone benchmarks on the 8051.
Dhrystone is a general-performance benchmark test originally
developed by Reinhold Weicker in 1984. This benchmark is
used to measure and compare the performance of different
computers or, in this case, the efficiency of the code
gener ...