Constrained

共 23 篇文章
Constrained 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 23 篇文章,持续更新中。

Hybrid constrained simulation

融合约束模拟退火与遗传算法的混合优化方法,适用于非线性约束问题求解。提供算法实现思路与实验分析,适合优化算法研究者和工程应用开发者参考。

Power-constrained Testing of VLSI Circuits (英).pdf

资料->【E】光盘论文->【E5】英文书籍->Power-constrained Testing of VLSI Circuits (英).pdf

期刊论文:The Distance Field Model and Distance Constrained MAP A

·期刊论文:The Distance Field Model and Distance Constrained MAP Adaptation Algorithm

基于FPGA的远程实体操控单片机实验平台开发

<p>传统单片机实验教学大多采取现场实体操作模式,受时间和空间约束较大,学生对课程预习与复习均缺少一种相对便利的方式。因此,针对实际教学中遇到的问题,设计并开发了基于FPGA的远程实体操控单片机实验平台。该平台使用FPGA对底层结构进行搭建,实现了远程连线、现场跟连、远程下载实体实验箱程序、远程观看实体实验箱波形等功能,具有时空开放、资源优化、虚实结合的崭新特点,能够弥补传统实验教学设备的不足,对

Embedded_Deep_Learning_-_Algorithms

Although state of the art in many typical machine learning tasks, deep learning<br /> algorithmsareverycostly interms ofenergyconsumption,duetotheirlargeamount<br /> of required computations and huge

Essentials+of+Short-Range+Wireless

Over the past ten years there has been a revolution in the devel-<br /> opment and acceptance of mobile products. In that period, cel-<br /> lular telephony and consumer electronics have moved from th

this modified PSO algorithm can solve for constrained optimization problem

this modified PSO algorithm can solve for constrained optimization problem

Foschini & Mirjanic algorithm in Constrained Power control(CPC) for mobile networks

Foschini & Mirjanic algorithm in Constrained Power control(CPC) for mobile networks

WSNs being energy constrained systems, one major problem is to employ the sensor nodes in such a man

WSNs being energy constrained systems, one major problem is to employ the sensor nodes in such a manner so as to ensure maximum coverage and connectivity with minimal or optimal number of nodes and fu

实时障碍物识别 Realtime Obstacle Detection and Tracking Based on Constrained Delaunay Triangulation

实时障碍物识别 Realtime Obstacle Detection and Tracking Based on Constrained Delaunay Triangulation

bound-constrained SVM

bound-constrained SVM

kXML is a small XML pull parser, specially designed for constrained environments such as Applets, Pe

kXML is a small XML pull parser, specially designed for constrained environments such as Applets, Personal Java or MIDP devices.

EM algorithm based on constrained mixture Gaussion model

EM algorithm based on constrained mixture Gaussion model

This open source, event-drived, RAM constrained embedded system.

This open source, event-drived, RAM constrained embedded system.

This sample displays a basic integer calculator powered by the 8051 microcontroller. Although Keil

This sample displays a basic integer calculator powered by the 8051 microcontroller. Although Keil C51 has a full floating point math library the evaluation version is restricted to 2k of object c

Demostration of example 6.2: Constrained Receding Horizon Control Example retired from the book: Re

Demostration of example 6.2: Constrained Receding Horizon Control Example retired from the book: Receding Horizon Control - Model Predictive Control for State Models published on 2007-03-28

the book provides many solved examples that illustrate the principles involved, and includes, in ad

the book provides many solved examples that illustrate the principles involved, and includes, in addition, two chapters that deal exclusively with applications of unconstrained and constrained optim

Protothreads are extremely lightweight stackless threads designed for severely memory constrained s

Protothreads are extremely lightweight stackless threads designed for severely memory constrained systems such as small embedded systems or sensor network nodes.

BNB20 Finds the constrained minimum of a function of several possibly integer variables. % Usage: [

BNB20 Finds the constrained minimum of a function of several possibly integer variables. % Usage: [errmsg,Z,X,t,c,fail] = % BNB20(fun,x0,xstatus,xlb,xub,A,B,Aeq,Beq,nonlcon,settings,options,P1,P2,.

In the next generation of wireless communication systems, there will be a need for the rapid deploy

In the next generation of wireless communication systems, there will be a need for the rapid deployment of independent mobile users. Significant examples include establishing survivable, efficient,