搜索结果
找到约 108 项符合
require 的查询结果
按分类筛选
- 全部分类
- 电源技术 (17)
- 书籍 (11)
- 汇编语言 (8)
- 模拟电子 (6)
- 单片机开发 (6)
- 其他书籍 (5)
- 可编程逻辑 (3)
- 电子书籍 (3)
- Internet/网络编程 (3)
- 其他 (3)
- matlab例程 (3)
- Linux/Unix编程 (3)
- 数值算法/人工智能 (3)
- 单片机编程 (2)
- 教程资料 (2)
- 软件设计/软件工程 (2)
- VC书籍 (2)
- 嵌入式/单片机编程 (2)
- 资料/手册 (1)
- 测试测量 (1)
- Delphi控件源码 (1)
- 微处理器开发 (1)
- 数据结构 (1)
- 游戏 (1)
- Java编程 (1)
- 软件工程 (1)
- 人工智能/神经网络 (1)
- 数学计算 (1)
- 其他嵌入式/单片机内容 (1)
- 文件格式 (1)
- 其他数据库 (1)
- 企业管理 (1)
- Java书籍 (1)
- 压缩解压 (1)
- 行业发展研究 (1)
- Delphi/CppBuilder (1)
- VHDL/FPGA/Verilog (1)
- 加密解密 (1)
- Matlab (1)
- 接口技术 (1)
- 软件 (1)
- 技术资料 (1)
压缩解压 The frequency domain plays an important role in image processing to smooth, enhance, and detect edg
The frequency domain plays an important role in image
processing to smooth, enhance, and detect edges of images. Although
image data typically does not include imaginary values, the fast Fourier
transform (FFT) has been used for obtaining spectra. In this paper,
the fast Hartley transform (FHT) is u ...
行业发展研究 In the last decade the processing of polygonal meshes has emerged as an active and very productive
In the last decade the processing of polygonal meshes has
emerged as an active and very productive research area. This
can basically be attributed to two developments:
Modern geometry acquisition devices, like laser scanners
and MRT, easily produce raw polygonal meshes of
ever growing complexity
D ...
Delphi/CppBuilder This example program is the source code for the FT232BM Test Application from our Utilities page.
This example program is the source code for the FT232BM Test Application from our Utilities page.
It can be used to test the handshaking lines on FT232BM based RS232/RS485/RS422 designs. This program can also be used for programming the external EEPROM over USB in a manufacturing environment. T ...
VC书籍 This book has been written to support a practically oriented course in programming language transla
This book has been written to support a practically oriented course in programming language
translation for senior undergraduates in Computer Science. More specifically, it is aimed at students
who are probably quite competent in the art of imperative programming (for example, in C++,
Pascal, or Mod ...
其他书籍 Abstract—In this paper, we propose transform-domain algorithms to effectively classify the characte
Abstract—In this paper, we propose transform-domain algorithms to
effectively classify the characteristics of blocks and estimate the strength
of the blocky effect. The transform-domain algorithms require much
lower computational complexity and much less memory than the spatial
ones. Along with the ...
其他书籍 The first two functions are useful for creating a blank image of the specified parameters. A possibl
The first two functions are useful for creating a blank image of the specified parameters. A possible use is in functions that require a pointer to a result.
The clone function performs an exact copy of the IplImage* parameter
VHDL/FPGA/Verilog In communication systems channel poses an important role. channels can convolve many different kind
In communication systems channel poses an important role. channels can convolve many different kind of distortions to our information. In perticular wireless channels multipath distortion is sevear.
and more sevear is such distortion is random.
To handle this, multipath affected channels require Eq ...
其他 // 该入口文件由ThinkPHP自动生成 define( THINK_PATH , ../ThinkPHP ) //定义项目名称
// 该入口文件由ThinkPHP自动生成
define( THINK_PATH , ../ThinkPHP )
//定义项目名称,如果不定义,默认为入口文件名称
define( APP_NAME , ajax )
define( APP_PATH , ./ajax )
//加载ThinkPHP框架公共入口文件
require(THINK_PATH. /ThinkPHP.php )
//实例化一个网站应用实例
$App = new App()
//执行 ...
单片机开发 In number theory, the Euclidean algorithm (also called Euclid s algorithm) is an algorithm to determ
In number theory, the Euclidean algorithm (also called Euclid s algorithm) is an algorithm to determine the greatest common divisor (GCD) of two elements of any Euclidean domain (for example, the integers). Its major significance is that it does not require factoring the two integers, and it is also ...
加密解密 a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded s
a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asym ...