虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

DEVice-specific

  • CH375 是一个USB总线的通用接口芯片

    CH375 是一个USB总线的通用接口芯片,支持USB-HOST主机方式和USB-DEVICE/SLAVE 设备方式。

    标签: 375 USB CH 总线

    上传时间: 2013-12-17

    上传用户:jyycc

  • After the successful global introduction during the past decade of the second generation (2G) digita

    After the successful global introduction during the past decade of the second generation (2G) digital mobile communications systems, it seems that the third generation (3G) Universal Mobile Communication System (UMTS) has finally taken off, at least in some regions. The plethora of new services that are expected to be offered by this system requires the development of new paradigms in the way scarce radio resources should be managed. The Quality of Service (QoS) concept, which introduces in a natural way the service differentiation and the possibility of adapting the resource consumption to the specific service requirements, will open the door for the provision of advanced wireless services to the mass market.

    标签: the introduction successful generation

    上传时间: 2013-12-30

    上传用户:qq21508895

  • The TMS320C54x, TMS320LC54x, and TMS320VC54x fixed-point, digital signal processor (DSP) families (

    The TMS320C54x, TMS320LC54x, and TMS320VC54x fixed-point, digital signal processor (DSP) families (hereafter referred to as the ’54x unless otherwise specified) are based on an advanced modified Harvard architecture that has one program memory bus and three data memory buses. These processors also provide an arithmetic logic unit (ALU) that has a high degree of parallelism, application-specific hardware logic, on-chip memory, and additional on-chip peripherals. These DSP families also provide a highly specialized instruction set, which is the basis of the operational flexibility and speed of these DSPs.

    标签: TMS 320 fixed-point processor

    上传时间: 2013-12-27

    上传用户:宋桃子

  • Base Class Library for RS232 Communications. -------------------------------------------- Ref: "Se

    Base Class Library for RS232 Communications. -------------------------------------------- Ref: "Serial Comm: Use P/Invoke to Develop a .NET Base Class Library for Serial Device Communications" John Hind, MSDN Magazine, Oct 2002.

    标签: Communications Library Class Base

    上传时间: 2014-01-01

    上传用户:小鹏

  • A UML Documentation for an Elevator System:This paper is a PhD project report for the course Distrib

    A UML Documentation for an Elevator System:This paper is a PhD project report for the course Distributed Embedded Systems at Carnegie Mellon University. Throughout this course, a distributed real-time system – an elevator control system– is specified, designed, built, and simulated. Object Oriented Analysis and Design methods, in specific the Unified Modeling Language (UML) are used when designing the system.

    标签: Documentation for Elevator Distrib

    上传时间: 2013-12-14

    上传用户:zhouli

  • Semantic analysis of multimedia content is an on going research area that has gained a lot of atten

    Semantic analysis of multimedia content is an on going research area that has gained a lot of attention over the last few years. Additionally, machine learning techniques are widely used for multimedia analysis with great success. This work presents a combined approach to semantic adaptation of neural network classifiers in multimedia framework. It is based on a fuzzy reasoning engine which is able to evaluate the outputs and the confidence levels of the neural network classifier, using a knowledge base. Improved image segmentation results are obtained, which are used for adaptation of the network classifier, further increasing its ability to provide accurate classification of the specific content.

    标签: multimedia Semantic analysis research

    上传时间: 2016-11-24

    上传用户:虫虫虫虫虫虫

  • We propose a technique that allows a person to design a new photograph with substantially less effo

    We propose a technique that allows a person to design a new photograph with substantially less effort. This paper presents a method that generates a composite image when a user types in nouns, such as “boat” and “sand.” The artist can optionally design an intended image by specifying other constraints. Our algorithm formulates the constraints as queries to search an automatically annotated image database. The desired photograph, not a collage, is then synthesized using graph-cut optimization, optionally allowing for further user interaction to edit or choose among alternative generated photos. An implementation of our approach, shown in the associated video, demonstrates our contributions of (1) a method for creating specific images with minimal human effort, and (2) a combined algorithm for automatically building an image library with semantic annotations from any photo collection.

    标签: substantially photograph technique propose

    上传时间: 2016-11-24

    上传用户:三人用菜

  • This Application Note describes the steps that are required to install and use the Keil Monitor-51 o

    This Application Note describes the steps that are required to install and use the Keil Monitor-51 on a user specific hardware. The Keil Monitor-51 allows you to connect your 8051 hardware to the μVision2 Debugger. You can use the powerful debugging interface to test application programs in your target hardware.

    标签: Application describes the required

    上传时间: 2013-12-03

    上传用户:lvzhr

  • The literature of cryptography has a curious history. Secrecy, of course, has always played a centra

    The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.

    标签: cryptography literature has Secrecy

    上传时间: 2016-12-08

    上传用户:fxf126@126.com

  • ST uPSD32XX I2C This example demo code is provided as is and has no warranty, implied or otherwise.

    ST uPSD32XX I2C This example demo code is provided as is and has no warranty, implied or otherwise. You are free to use/modify any of the provided code at your own risk in your applications with the expressed limitation of liability (see below) so long as your product using the code contains at least one uPSD products (device)

    标签: otherwise provided warranty example

    上传时间: 2013-12-07

    上传用户:标点符号