MPEG-2 has 7 distinct parts as well. The first part is the Systems section which defines the container format and the Transport Streams that are designed to carry the digital video and audio over ATSC and DVB. The Program Stream defines the container format for lossy compression on optical disks, DVDs and SVCDs.
标签: the distinct Systems defines
上传时间: 2014-07-02
上传用户:奇奇奔奔
This example uses the AIC23 codec module of the DM642 EVM Board Support * Library to generate a 1KHz sine wave on the audio outputs for 5 seconds.
标签: the generate Support Library
上传时间: 2014-12-08
上传用户:lingzhichao
一个Windows mobiles 音频codec驱动IC源码,喜欢研究audio codec的朋友可以借鉴,该驱动以wolfson为实例,其他IC也可以参考。
上传时间: 2014-02-04
上传用户:彭玖华
RGA: Biowaste Game Example This C++ application demonstrates how to create a 2D mobile game for S60 devices using Real-Time Graphics and Audio (RGA) APIs. PREREQUISITES Symbian C++ basics Game Programming RGA plugin OpenC plugin
标签: demonstrates application Biowaste Example
上传时间: 2017-02-08
上传用户:dancnc
“任何设备皆可上以太网”,S-ET是最简单、智能的转换器,可轻松地将只有RS232/422/485的设备连到TCP/IP网络中。通过简单的增加一个S-ET转换器马上就可连接以太网,得以获取高集成都的设备服务。有了S-ET,CNCs、电表、冰水盘、火警盘、读卡器、PLC、传感器、UPS等设备将成为以太网上的强有力工具。
上传时间: 2014-01-01
上传用户:yzhl1988
This project uses the capabilities of LabVIEW and the data acquisition card to measure the power spectrum of an audio signal.
标签: the capabilities acquisition LabVIEW
上传时间: 2017-03-21
上传用户:hn891122
It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon. 1, p. 224) have however simplified material parameters in order to facilitate easier realization as well as to avoid infinities in optical constants. Here we show that the cylindrical cloaks with simplified material parameters inherently allow the zeroth-order cylindrical wave to pass through the cloak as if the cloak is made of a homogeneous isotropic medium, and thus visible. To all high-order cylindrical waves, our numerical simulation suggests that the simplified cloak inherits some properties of the ideal cloak, but finite scatterings exist.
标签: invisibility constructed proposed electrom
上传时间: 2013-12-18
上传用户:13215175592
Java Media APIs: Cross-Platform Imaging, Media, and Visualization presents integrated Java media solutions that demonstrate the best practices for using this diverse collection. According to Sun MicroSystems, "This set of APIs supports the integration of audio and video clips, animated presentations, 2D fonts, graphics, and images, as well as speech input/output and 3D models." By presenting each API in the context of its appropriate use within an integrated media application, the authors both illustrate the potential of the APIs and offer the architectural guidance necessary to build compelling programs.
标签: Media Java Cross-Platform Visualization
上传时间: 2013-12-04
上传用户:hanli8870
R1EX24xxx series are two-wire serial interface EEPROM (Electrically Erasable and Programmable ROM). They realize high speed, low power consumption and a high level of reliability by employing advanced MNOS memory technology and CMOS process and low voltage circuitry technology. They also have a 128-byte page programming function to make their write operation faster. Note: Renesas Technology鈥檚 serial EEPROM are authorized for using consumer applications such as cellular phone, camcorders, audio equipment. Therefore, please contact Renesas Technology鈥檚 sales office before using industrial applications such as automotive systems, embedded controllers, and meters
标签: Electrically Programmable interface Erasable
上传时间: 2014-01-07
上传用户:xiaohuanhuan
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.
标签: perceptual implementation algorithms fingerpr
上传时间: 2013-12-08
上传用户:星仔