Quake 3 s MD3 Viewer (july 13, 2007), loads and displays a player and a weapon. Supports lighting, texture mapping and animation. Includes a sample player model with weapon. See README for how to use it. Note (1): it uses the POSIX opendir/readdir functions, which are not implemented in all compilers under Windows (MinGW supports them). Note (2): This demo works on little endian architectures only. Libraries: OpenGL, GLU, GLUT, boost, libjpeg. Files: md3loader.zip (2.4 MB)
标签: and Supports displays lighting
上传时间: 2017-09-10
上传用户:czl10052678
this program reads data from sensors and then sends it to a PIC-WEB which then loads it to a server and stores it into a database.
标签: then program PIC-WEB sensors
上传时间: 2013-12-30
上传用户:1101055045
Features a unique program to estimate the power spectral density. The spectrum containing all significant details is calculated from a time series model. Model type as well as model order are determined automatically from the data, using statistical criteria. Robust estimation algorithms and order selection criteria are used to obtain reliable results. Unlike in FFT analysis, where the experimenter has to set the amount of smoothing of the raw FFT, the right level of detail is assessed using the data only.
标签: containing Features estimate spectral
上传时间: 2014-02-09
上传用户:daguda
SQL: A Beginner’s Guide is recommended for anyone trying to build a foundation in SQL programming. The book is designed specifically for those who are new or relatively new to SQL however, those of you who need a refresher in SQL will also find this book beneficial.Whether you’re an experienced programmer, have had some web development experience, are a database administrator, or are new to programming and databases, SQL: A Beginner’s Guide provides a strong foundation that will be useful to any of you wishing to learn more about SQL.
标签: recommended programming foundation SQL
上传时间: 2013-12-24
上传用户:Amygdala
The Practical SQL Handbook begins with a step-by-step introduction to SQL basics and examines the issues involved in designing SQL-based database applications. It fully explores SQL s most popular implementations from industry leaders, Oracle, Microsoft, Sybase, and Informix.
标签: step-by-step introduction Practical SQL
上传时间: 2014-01-21
上传用户:fhzm5658
The object detector described below has been initially proposed by P.F. Felzenszwalb in [Felzenszwalb2010]. It is based on a Dalal-Triggs detector that uses a single filter on histogram of oriented gradients (HOG) features to represent an object category. This detector uses a sliding window approach, where a filter is applied at all positions and scales of an image. The first innovation is enriching the Dalal-Triggs model using a star-structured part-based model defined by a “root” filter (analogous to the Dalal-Triggs filter) plus a set of parts filters and associated deformation models. The score of one of star models at a particular position and scale within an image is the score of the root filter at the given location plus the sum over parts of the maximum, over placements of that part, of the part filter score on its location minus a deformation cost easuring the deviation of the part from its ideal location relative to the root. Both root and part filter scores are defined by the dot product between a filter (a set of weights) and a subwindow of a feature pyramid computed from the input image. Another improvement is a representation of the class of models by a mixture of star models. The score of a mixture model at a particular position and scale is the maximum over components, of the score of that component model at the given location.
标签: 计算机视觉
上传时间: 2015-03-15
上传用户:sb_zhang
Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.
标签: Fundamental Limits Secure Class on of
上传时间: 2020-01-04
上传用户:kddlas
A decade ago, I first wrote that people moved, and networks needed to adapt to the reality that people worked on the go. Of course, in those days, wireless LANs came with a trade-off. Yes, you could use them while moving, but you had to trade a great deal of throughput to get the mobility. Although it was possible to get bits anywhere, even while in motion, those bits came slower. As one of the network engineers I worked with put it, “We’ve installed switched gigabit Ethernet everywhere on campus, so I don’t understand why you’d want to go back to what is a 25-megabit hub.” He un- derestimated the allure of working on the go.
上传时间: 2020-05-26
上传用户:shancjb
It was only a few years ago that “ubiquitous connectivity” was recognized as the future of wireless communication systems. In the era of ubiquitous connectivity, it was expected that the broadband mobile Internet experience would be pervasive, and seamless connectivity on a global scale would be no surprise at all. The quality of service would be guaranteed no matter when/where/what the users wanted with the connectivity. Connectivity would even be extended to object-to-object communication, where no human intervention was required. All objects would become capable of autonomous communication.
标签: Protocols Radio LTE-A LTE for and
上传时间: 2020-06-01
上传用户:shancjb
Have you ever looked at some gadget and wondered how it really worked? Maybe it was a remote control boat, the system that controls an elevator, a vending machine, or an electronic toy? Or have you wanted to create your own robot or electronic signals for a model railroad, or per- haps you’d like to capture and analyze weather data over time? Where and how do you start?
标签: Introduction Workshop Hands-On Arduino
上传时间: 2020-06-09
上传用户:shancjb