Constrained
共 23 篇文章
Constrained 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 23 篇文章,持续更新中。
Hybrid constrained simulation
融合约束模拟退火与遗传算法的混合优化方法,适用于非线性约束问题求解。提供算法实现思路与实验分析,适合优化算法研究者和工程应用开发者参考。
Power-constrained Testing of VLSI Circuits (英).pdf
资料->【E】光盘论文->【E5】英文书籍->Power-constrained Testing of VLSI Circuits (英).pdf
期刊论文:The Distance Field Model and Distance Constrained MAP A
·期刊论文:The Distance Field Model and Distance Constrained MAP Adaptation Algorithm
基于FPGA的远程实体操控单片机实验平台开发
<p>传统单片机实验教学大多采取现场实体操作模式,受时间和空间约束较大,学生对课程预习与复习均缺少一种相对便利的方式。因此,针对实际教学中遇到的问题,设计并开发了基于FPGA的远程实体操控单片机实验平台。该平台使用FPGA对底层结构进行搭建,实现了远程连线、现场跟连、远程下载实体实验箱程序、远程观看实体实验箱波形等功能,具有时空开放、资源优化、虚实结合的崭新特点,能够弥补传统实验教学设备的不足,对
Embedded_Deep_Learning_-_Algorithms
Although state of the art in many typical machine learning tasks, deep learning<br />
algorithmsareverycostly interms ofenergyconsumption,duetotheirlargeamount<br />
of required computations and huge
Essentials+of+Short-Range+Wireless
Over the past ten years there has been a revolution in the devel-<br />
opment and acceptance of mobile products. In that period, cel-<br />
lular telephony and consumer electronics have moved from th
this modified PSO algorithm can solve for constrained optimization problem
this modified PSO algorithm can solve for constrained optimization problem
Foschini & Mirjanic algorithm in Constrained Power control(CPC) for mobile networks
Foschini & Mirjanic algorithm in Constrained Power control(CPC) for mobile networks
WSNs being energy constrained systems, one major problem is to employ the sensor nodes in such a man
WSNs being energy constrained systems, one major problem is to employ the sensor nodes in such a manner so as to ensure maximum coverage and connectivity with minimal or optimal number of nodes and fu
实时障碍物识别 Realtime Obstacle Detection and Tracking Based on Constrained Delaunay Triangulation
实时障碍物识别
Realtime Obstacle Detection and Tracking Based on Constrained
Delaunay Triangulation
bound-constrained SVM
bound-constrained SVM
kXML is a small XML pull parser, specially designed for constrained environments such as Applets, Pe
kXML is a small XML pull parser, specially designed for constrained environments such as Applets, Personal Java or MIDP devices.
EM algorithm based on constrained mixture Gaussion model
EM algorithm based on constrained mixture Gaussion model
This open source, event-drived, RAM constrained embedded system.
This open source, event-drived, RAM constrained embedded system.
This sample displays a basic integer calculator powered by the 8051 microcontroller. Although Keil
This sample displays a basic integer calculator powered
by the 8051 microcontroller. Although Keil C51 has a
full floating point math library the evaluation version
is restricted to 2k of object c
Demostration of example 6.2: Constrained Receding Horizon Control Example retired from the book: Re
Demostration of example 6.2: Constrained Receding Horizon Control
Example retired from the book: Receding Horizon Control - Model Predictive Control for State Models
published on 2007-03-28
the book provides many solved examples that illustrate the principles involved, and includes, in ad
the book provides many solved examples that illustrate the principles involved,
and includes, in addition, two chapters that deal exclusively with applications of
unconstrained and constrained optim
Protothreads are extremely lightweight stackless threads designed for severely memory constrained s
Protothreads are extremely lightweight stackless threads designed for
severely memory constrained systems such as small embedded systems or
sensor network nodes.
BNB20 Finds the constrained minimum of a function of several possibly integer variables. % Usage: [
BNB20 Finds the constrained minimum of a function of several possibly integer variables.
% Usage: [errmsg,Z,X,t,c,fail] =
% BNB20(fun,x0,xstatus,xlb,xub,A,B,Aeq,Beq,nonlcon,settings,options,P1,P2,.
In the next generation of wireless communication systems, there will be a need for the rapid deploy
In the next generation of wireless communication systems, there will be a need for the rapid
deployment of independent mobile users. Significant examples include establishing survivable, efficient,