虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Bishop-<b>pattern</b>-Recognition-and-Ma

  • Rotating shafts experience a an elliptical motion called whirl. It is important to decompose this mo

    Rotating shafts experience a an elliptical motion called whirl. It is important to decompose this motion into a forward and backward whil orbits. The current function makes use of two sensors to generate a bi-directional spectrogram. The method can be extended to any time-frequency distribution % % compute the forward/backward Campbell/specgtrogram % % INPUT: % y (n x 2) each column is measured from a different sensor % /////// % __ % |s1| y(:,1) % |__| % __ % / \ ________|/ % | | | s2 |/ y(:,2) % \____/ --------|/ % % Fs Sampling frequnecy % % OUTPUT: % B spectrogram/Campbel diagram % x x-axis coordinate vector (time or Speed) % y y-axis coordinate vector (frequency [Hz])

    标签: experience elliptical decompose important

    上传时间: 2015-06-23

    上传用户:372825274

  • matlab矩阵处理例程。A matrix processor, Matx_Proc() is developed which can be used to process and edit ma

    matlab矩阵处理例程。A matrix processor, Matx_Proc() is developed which can be used to process and edit matrices and state space models, and perform various kind of matrix analysis in a visible way.

    标签: Matx_Proc developed processor process

    上传时间: 2015-06-23

    上传用户:Breathe0125

  • 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an

    加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]

    标签: Cryptographic Primitives generate Library

    上传时间: 2015-07-16

    上传用户:wqxstar

  • This section contains a brief introduction to the C language. It is intended as a tutorial on the la

    This section contains a brief introduction to the C language. It is intended as a tutorial on the language, and aims at getting a reader new to C started as quickly as possible. It is certainly not intended as a substitute for any of the numerous textbooks on C. 2. write a recursive function FIB (n) to find out the nth element in theFibanocci sequence number which is 1,1,2,3,5,8,13,21,34,55,…3. write the prefix and postfix form of the following infix expressiona + b – c / d + e * f – g * h / i ^ j4. write a function to count the number of nodes in a binary tr

    标签: introduction the contains intended

    上传时间: 2013-12-23

    上传用户:liansi

  • A Java Framework for connecting to and exchanging data from GPS units to J2ME Mobile Devices. Serial

    A Java Framework for connecting to and exchanging data from GPS units to J2ME Mobile Devices. Serial and Bluetooth connections to GPS devices. Support for NMEA-0183 GPS Standard. An Observer-Design Pattern makes the library extendable. Based on GPSlib4j.

    标签: connecting exchanging Framework Devices

    上传时间: 2014-12-05

    上传用户:yzhl1988

  • By Tom Christiansen and Nathan Torkington ISBN 1-56592-243-3 First Edition, published August 1998

    By Tom Christiansen and Nathan Torkington ISBN 1-56592-243-3 First Edition, published August 1998. (See the catalog page for this book.) Search the text of Perl Cookbook. Table of Contents Copyright Page Foreword Preface Chapter 1: Strings Chapter 2: Numbers Chapter 3: Dates and Times Chapter 4: Arrays Chapter 5: Hashes Chapter 6: Pattern Matching Chapter 7: File Access Chapter 8: File Contents Chapter 9: Directories Chapter 10: Subroutines Chapter 11: References and Records Chapter 12: Packages, Libraries, and Modules Chapter 13: Classes, Objects, and Ties Chapter 14: Database Access Chapter 15: User Interfaces Chapter 16: Process Management and Communication Chapter 17: Sockets Chapter 18: Internet Services Chapter 19: CGI Programming Chapter 20: Web Automation Index Colophon

    标签: Christiansen Torkington published Edition

    上传时间: 2014-02-20

    上传用户:yyq123456789

  • palm编成,这种书很少,有兴趣看看 Title: Palm Programming: The Developer s Guide URL: http://safari.oreilly.com/J

    palm编成,这种书很少,有兴趣看看 Title: Palm Programming: The Developer s Guide URL: http://safari.oreilly.com/JVXSL.asp?x=1&mode=section&sortKey=rank&sortOrder=desc&view=book&xmlid=1-56592-525-4&open=false&srchText=palm+programming&code=&h=&m=&l=1&catid=&s=1&b=1&f=1&t=1&c=1&u=1&page=0 ISBN: 1-56592-525-4 Author: Julie McKeehan/ Neil Rhodes Publisher: O Reilly Page: 478 Edition: 1st edition (December 1998) Catalog: PDA programming / Palm Format: pdf Size: 2.06M Supplier: Summary: Emerging as the bestselling hand-held computers of all time, PalmPilots have spawned intense developer activity and a fanatical following. Used by Palm in their developer training, this tutorial-style book shows intermediate to experienced C programmers how to build a Palm application from the ground up. Includes a CD-ROM with source code and third-party developer tools

    标签: Programming Developer oreilly safari

    上传时间: 2013-12-10

    上传用户:litianchu

  • You can call MsgBoxEx instead of MsgBox MsgBoxEx will return the same vbMsgBoxResults as MsgBox, b

    You can call MsgBoxEx instead of MsgBox MsgBoxEx will return the same vbMsgBoxResults as MsgBox, but adds the frm, Left, and Top parameters.

    标签: MsgBoxEx MsgBox vbMsgBoxResults instead

    上传时间: 2013-12-22

    上传用户:zycidjl

  • The concept of sustainable development has received growing recognition, but it is a new idea for m

    The concept of sustainable development has received growing recognition, but it is a new idea for many business executives. For most, the concept remains abstract and theoretical. Protecting an organization’s capital base is a well-accepted business principle. Yet organizations do not generally recognize

    标签: development sustainable recognition received

    上传时间: 2014-09-04

    上传用户:498732662

  • The concept of sustainable development has received growing recognition, but it is a new idea for m

    The concept of sustainable development has received growing recognition, but it is a new idea for many business executives. For most, the concept remains abstract and theoretical. Protecting an organization’s capital base is a well-accepted business principle. Yet organizations do not generally recognize

    标签: development sustainable recognition received

    上传时间: 2013-12-12

    上传用户:362279997