搜索结果

找到约 117 项符合 technique 的查询结果

通信网络 基于以太网分布式的数据采集控制系统

针对飞行模拟器座舱数据采集的复杂性,设计了一种基于以太网分布式的数据采集控制系统,该系统是RCM5700微处理器模块上的以太网应用。在系统的基础上具体讨论了PoE技术的应用,在传输数据的网线上同时提供电流,提出并实现了一种包括辅助电源在内的完整可靠的PoE供电方案。设计采用美国国家半导体的LM5073和LM5576并根据不 ...
https://www.eeworm.com/dl/564/33802.html
下载: 183
查看: 1045

可编程逻辑 XAPP328-使用CPLD设计MP3播放器

  MP3 portable players are the trend in music-listening technology. These players do not includeany mechanical movements, thereby making them ideal for listening to music during any type ofactivity. MP3 is a digital compression technique based on MPEG Layer 3 which stores music ina lot less ...
https://www.eeworm.com/dl/kbcluoji/40098.html
下载: 62
查看: 1038

源码/资料 This simple SDI Notepad-like application demonstrates how, taking advantage of the MFC support for U

This simple SDI Notepad-like application demonstrates how, taking advantage of the MFC support for Unicode, to Turkmenize labels of the specified menu items. Actually, Turkmen is not supported by Windows 2000, therefore, to create such resources as menu so that strings in Turkmen could be displayed ...
https://www.eeworm.com/dl/616/102984.html
下载: 78
查看: 1075

源码/资料 Displaying a large bitmap file on a dialog box, in its original size, is quite difficult in the VC++

Displaying a large bitmap file on a dialog box, in its original size, is quite difficult in the VC++ environment. However, it is possible to display a large bitmap to a predefined area of the dialog by using the StretchBlt( ) function.The major disadvantage of this is that the clarity of the image w ...
https://www.eeworm.com/dl/616/102987.html
下载: 194
查看: 1103

其他书籍 关于FPGA流水线设计的论文 This work investigates the use of very deep pipelines for implementing circuits in

关于FPGA流水线设计的论文 This work investigates the use of very deep pipelines for implementing circuits in FPGAs, where each pipeline stage is limited to a single FPGA logic element (LE). The architecture and VHDL design of a parameterized integer array multiplier is presented and also an IEEE 754 ...
https://www.eeworm.com/dl/542/179429.html
下载: 116
查看: 1060

Windows Mobile The goal of this project is to explore the idea of point-based radiosity, which is a shooting radio

The goal of this project is to explore the idea of point-based radiosity, which is a shooting radiosity technique suggested by Mark Harris at UNC. The primary idea is that features available in graphics hardware can be utilized to perform radiosity calculations. Facilities such as flat shading, diff ...
https://www.eeworm.com/dl/677/188102.html
下载: 31
查看: 1055

行业发展研究 This paper deals with the problem of speech enhancement when a corrupted speech signal with an addi

This paper deals with the problem of speech enhancement when a corrupted speech signal with an additive colored noise is the only information available for processing. Kalman filtering is known as an effective speech enhancement technique, in which speech signal is usually modeled as autoregressive ...
https://www.eeworm.com/dl/692/193694.html
下载: 119
查看: 1048

行业发展研究 This paper deals with the problem of speech enhancement when only a corrupted speech signal is avai

This paper deals with the problem of speech enhancement when only a corrupted speech signal is available for processing. Kalman filtering is known as an effective speech enhancement technique, in which speech signal is usually modeled as autoregressive (AR) model and represented in the state-space d ...
https://www.eeworm.com/dl/692/193696.html
下载: 76
查看: 1079

行业发展研究 3D reconstruction, medical image processing from colons, using intel image processing for based clas

3D reconstruction, medical image processing from colons, using intel image processing for based class. This source code. Some code missing but I think you can understand it. Development version. This source code is very interesting for learning segmentation and registration from dataset. This code a ...
https://www.eeworm.com/dl/692/223937.html
下载: 161
查看: 1164

加密解密 What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the poss

What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Bin ...
https://www.eeworm.com/dl/519/229032.html
下载: 65
查看: 1082