虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Approaches

  • State Machine Coding Styles for Synthesis

      本文论述了状态机的verilog编码风格,以及不同编码风格的优缺点,Steve Golson's 1994 paper, "State Machine Design Techniques for Verilog and VHDL" [1], is agreat paper on state machine design using Verilog, VHDL and Synopsys tools. Steve's paper alsooffers in-depth background concerning the origin of specific state machine types.This paper, "State Machine Coding Styles for Synthesis," details additional insights into statemachine design including coding style Approaches and a few additional tricks.

    标签: Synthesis Machine Coding Styles

    上传时间: 2013-10-12

    上传用户:sardinescn

  • 基于微处理器的5V系统接口

    This application note discusses a variety of Approaches for interfacing analog signals to 5V powered systems. Synthesizing a "rail-to-rail" op amp and scaling techniques for A/D converters are covered. A voltage-to-frequency converter, applicable where high resolution is required, is also presented.  

    标签: 微处理器 系统接口

    上传时间: 2013-10-12

    上传用户:181992417

  • Locally weighted polynomial regression LWPR is a popular instance based al gorithm for learning c

    Locally weighted polynomial regression LWPR is a popular instance based al gorithm for learning continuous non linear mappings For more than two or three in puts and for more than a few thousand dat apoints the computational expense of pre dictions is daunting We discuss drawbacks with previous Approaches to dealing with this problem

    标签: polynomial regression weighted instance

    上传时间: 2013-11-28

    上传用户:sunjet

  • Our approach to understanding mobile learning begins by describing a dialectical approach to the de

    Our approach to understanding mobile learning begins by describing a dialectical approach to the development and presentation of a task model using the sociocognitive engineering design method. This analysis synthesises relevant theoretical Approaches. We then examine two field studies which feed into the development of the task model.

    标签: approach understanding dialectical describing

    上传时间: 2014-11-28

    上传用户:comua

  • OReilly.Ajax.on.Rails.Dec.2006. ISBN-10: 0-596-52744-6. Learn to build dynamic, interactive web ap

    OReilly.Ajax.on.Rails.Dec.2006. ISBN-10: 0-596-52744-6. Learn to build dynamic, interactive web applications using the two most important Approaches to web development today: Ajax and the phenomenally efficient Ruby on Rails platform. This book teaches intermediate to advanced web developers how to use both Ajax and Rails to quickly build high-performance, scalable applications without being overwhelmed with thousands of lines of JavaScript code. More than just recipes, you also get a thorough, low-level understanding of what s happening under the hood.

    标签: interactive OReilly dynamic 52744

    上传时间: 2015-10-07

    上传用户:独孤求源

  • In this paper, we provide an overview of the security concerns introduced by wireless LANs, current

    In this paper, we provide an overview of the security concerns introduced by wireless LANs, current Approaches to wireless LAN security, their limitations, and the weaknesses of various “band aid” security solutions. We conclude by describing how the ReefEdge Connect System provides a comprehensive solution to wireless LAN security.

    标签: introduced overview concerns security

    上传时间: 2015-11-02

    上传用户:凌云御清风

  • This paper presents an interactive technique that produces static hairstyles by generating individu

    This paper presents an interactive technique that produces static hairstyles by generating individual hair strands of the desired shape and color, subject to the presence of gravity and collisions. A variety of hairstyles can be generated by adjusting the wisp parameters, while the deformation is solved efficiently, accounting for the effects of gravity and collisions. Wisps are generated employing statistical Approaches. As for hair deformation, we propose a method which is based on physical simulation concepts but is simplified to efficiently solve the static shape of hair. On top of the statistical wisp model and the deformation solver, a constraint-based styler is proposed to model artificial features that oppose the natural flow of hair under gravity and hair elasticity, such as a hairpin. Our technique spans a wider range of human hairstyles than previously proposed methods, and the styles generated by this technique are fairly realistic.

    标签: interactive hairstyles generating technique

    上传时间: 2013-12-20

    上传用户:sssl

  • This paper introduces an affine invariant of trapezia, and the explicit constraint equation between

    This paper introduces an affine invariant of trapezia, and the explicit constraint equation between the intrinsic matrix of a camera and the similarity invariants of a trapezium are established using the affine invariant. By this constraint, the inner parameters, motion parameters of the cameras and the similarity invariants of trapezia can be linearly determined using some prior knowledge on the cameras or the trapezia. The proposed algorithms have wide applicability since parallel lines are not rare in many scenes. Experimental results validate the proposed Approaches. This work presents a unifying framework based on the parallelism constraint, and the previous methods based on the parallelograms or the parallelepipeds can be integrated into this framework. Key words: invariant parallelism constraint camera calibration 3D reconstruction

    标签: introduces constraint invariant explicit

    上传时间: 2014-01-16

    上传用户:6546544

  • In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadl

    In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadline violations. Priority inheritance protocol is one of the Approaches to reduce priority inversion. Unfortunately, RTOS like uC/OS can’t support priority inheritance protocol since it does not allow kernel to have multiple tasks at the same priority. Although it has different ways to avoid priority inversion such as priority ceiling protocol, developers still have some difficulties in programming real time applications with it. In this paper, we redesign the uC/OS kernel to provide the ability to support round robin scheduling and implement priority inheritance semaphore on the modified kernel. As result, we port new kernel with priority inheritance semaphore to evaluation board, and evaluate the execution time of each of the kernel service as well as verify the operations of our implementation.

    标签: priority preemptive inversion problem

    上传时间: 2015-12-14

    上传用户:气温达上千万的

  • In recent years large scientific interest has been devoted to joint data decoding and parameter est

    In recent years large scientific interest has been devoted to joint data decoding and parameter estimation techniques. In this paper, iterative turbo decoding joint to channel frequency and phase estimation is proposed. The phase and frequency estimator is embedded into the structure of the turbo decoder itself, taking into consideration both turbo interleaving and puncturing. Results show that the proposed technique outperforms conventional Approaches both in terms of detection capabilities and implementation complexity.

    标签: scientific parameter interest decoding

    上传时间: 2015-12-30

    上传用户:894898248