搜索结果

找到约 483 项符合 machine-generated 的查询结果

VHDL/FPGA/Verilog Top module name : SHIFTER (File name : SHIFTER.v) 2. Input pins: SHIFT [3:0], IN [15:0], SIGN, RIGH

Top module name : SHIFTER (File name : SHIFTER.v) 2. Input pins: SHIFT [3:0], IN [15:0], SIGN, RIGHT. 3. Output pins: OUT [15:0]. 4. Input signals generated from test pattern are latched in one cycle and are synchronized at clock rising edge. 5. The SHIFT signal describes the shift number. The shift ...
https://www.eeworm.com/dl/663/361749.html
下载: 129
查看: 1034

数学计算 The inverse of the gradient function. I ve provided versions that work on 1-d vectors, or 2-d or 3-d

The inverse of the gradient function. I ve provided versions that work on 1-d vectors, or 2-d or 3-d arrays. In the 1-d case I offer 5 different methods, from cumtrapz, and an integrated cubic spline, plus several finite difference methods. In higher dimensions, only a finite difference/linear alge ...
https://www.eeworm.com/dl/641/363636.html
下载: 137
查看: 1109

微处理器开发 ST32 基于(英蓓特)STM32V100的EXTI程序 This example shows how to configure an external interrupt line. In t

ST32 基于(英蓓特)STM32V100的EXTI程序 This example shows how to configure an external interrupt line. In this example, the EXTI line 9 is configured to generate an interrupt on each falling edge. In the interrupt routine a led connected to PC.06 is toggled. This led will be toggled due to the softa ...
https://www.eeworm.com/dl/655/367657.html
下载: 79
查看: 1061

其他 If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction dis

If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction disallowing scripts to run in files opened on your local machine. When you first try to run the examples, you will most likely get a message saying, "To help protect your security, Internet Explorer has ...
https://www.eeworm.com/dl/534/368159.html
下载: 84
查看: 1044

VHDL/FPGA/Verilog rc5的decryption

rc5的decryption,同样带state machine,同样有四个状态
https://www.eeworm.com/dl/663/369645.html
下载: 45
查看: 1051

嵌入式/单片机编程 These instances, whenmapped to an N-dimensional space, represent a core set that can be used to con

These instances, whenmapped to an N-dimensional space, represent a core set that can be used to construct an approximation to theminimumenclosing ball. Solving the SVMlearning problem on these core sets can produce a good approximation solution in very fast speed. For example, the core-vector machin ...
https://www.eeworm.com/dl/647/370109.html
下载: 46
查看: 1044

微处理器开发 Many of the pattern &#64257 nding algorithms such as decision tree, classi&#64257 cation rules and c

Many of the pattern &#64257 nding algorithms such as decision tree, classi&#64257 cation rules and clustering techniques that are frequently used in data mining have been developed in machine learning research community. Frequent pattern and association rule mining is one of the few excep- tions to ...
https://www.eeworm.com/dl/655/370113.html
下载: 49
查看: 1042

单片机开发 Semantic analysis of multimedia content is an on going research area that has gained a lot of atten

Semantic analysis of multimedia content is an on going research area that has gained a lot of attention over the last few years. Additionally, machine learning techniques are widely used for multimedia analysis with great success. This work presents a combined approach to semantic adaptation of neur ...
https://www.eeworm.com/dl/648/370773.html
下载: 113
查看: 1038

其他 We propose a technique that allows a person to design a new photograph with substantially less effo

We propose a technique that allows a person to design a new photograph with substantially less effort. This paper presents a method that generates a composite image when a user types in nouns, such as “boat” and “sand.” The artist can optionally design an intended image by specifying other const ...
https://www.eeworm.com/dl/534/370774.html
下载: 188
查看: 1102

单片机开发 The DHRY program performs the dhrystone benchmarks on the 8051. Dhrystone is a general-performanc

The DHRY program performs the dhrystone benchmarks on the 8051. Dhrystone is a general-performance benchmark test originally developed by Reinhold Weicker in 1984. This benchmark is used to measure and compare the performance of different computers or, in this case, the efficiency of the code gener ...
https://www.eeworm.com/dl/648/373183.html
下载: 69
查看: 1104