虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Paradigm

  • 美国tern公司开发的嵌入式开发平台586E

    美国tern公司开发的嵌入式开发平台586E,配合Paradigm c/c++集成开发环境,是x86嵌入式开发的典型的程序,对从事嵌入式开发具有重要的参考价值。

    标签: tern 586E 美国 嵌入式

    上传时间: 2014-01-18

    上传用户:朗朗乾坤

  • MATLAB Adventures in Bifurcations & Chaos - (ABC++) is a GUI application, which runs in a MATLAB env

    MATLAB Adventures in Bifurcations & Chaos - (ABC++) is a GUI application, which runs in a MATLAB environment and has been designed for the For the exploration of bifurcations and chaos within the Chua Circuit Paradigm

    标签: MATLAB Bifurcations application Adventures

    上传时间: 2014-01-24

    上传用户:youth25

  • c++从入门到精通.pdf电子书 第二版

    我们编写的程序由两个主要方面组成 1 算法的集合就是将指令组织成程序来解决某个特定的问题 2 数据的集合算法在这些数据上操作以提供问题的解决方案 纵观短暂的计算机发展史这两个主要方面算法和数据一直保持不变发展演化的 是它们之间的关系就是所谓的程序设计方法programming Paradigm 在过程化程序设计方法procedural programming 中一个问题可直接由一组算法来建 立模型例如公共图书馆的资料借阅/登记check out/check in 系统是由一系列过程表现 出来的其中两个主要的过程是资料的借阅和登记这些数据被独立存储起来我们既可以 在某个全局位置上访问这些数据或者把数据传递给过程以便它能够访问这些数据Fortran C 和 Pascal 是三种著名的过程语言C++也支持过程化程序设计单独的过程如check_in() check_out() over_due() fine()等等都被称为函数第三篇将集中讨论C++对过程化程序 设计方法的支持尤其将重点讨论函数函数模板和通用算法 在20 世纪70 年代程序设计的焦点从过程化程序设计方法转移到了抽象数据类型 abstract data type 简写为ADT 的程序设计上现在通常称之为基于对象(object based 的程序设计在基于对象的程序设计方法中我们通过一组数据抽象来建立问题的模型在 C++中我们把这些抽象称为类class 例如在这种方法下图书馆资料借阅登记系统就 由类的对象实例比如书借阅者还书时间罚款等之间的相互作用表现出来以此表 示出图书馆的抽象概念与每个类相关的算法被称为该类的公有接口public interface 数 据以私有形式被存储在每个对象中对数据的访问应与一般的程序代码隔离开来CLU Ada 和Modula-2 是三种支持抽象数据类型的程序设计语言第四篇将说明和讨论C++对抽象数据 类型程序设计方法的支持 面向对象的程序设计方法通过继承inheritance 机制和动态绑定dynamic binding 机 制扩展了抽象数据类型继承机制是对现有实现代码的重用动态绑定是指对现有的公有接 口的重用以前独立的类型现在有了类型/子类型的特定关系一本书一盒录像带一段录 音甚至孩子的宠物尽管它们有各自的借阅/登记方式但都可以成为图书馆的收藏资料 共享的公有接口和私有的数据都放在一个抽象类图书馆资料LibraryMaterial 中每个特 殊的图书馆资料类都从LibraryMaterial 抽象类继承共享的行为它们只需要提供与自身行为相 关的算法和数据Simula Smalltalk 和Java 是三种支持面向对象程序设计方法的著名语言 第五篇将集中讨论C++对面向对象程序设计方法的支持 C++是一种支持多种程序设计方法的语言虽然我们主要把它当作面向对象的语言但 实际上它也提供对过程化的和基于对象的程序设计方法的支持这样做的好处是对每个问题 都能够提供最合适的解决方案事实上没有一种程序设计方法能够

    标签: c++从入门到精通.pdf电子书 第二版

    上传时间: 2019-01-30

    上传用户:jizhi111

  • Cognitive+Networked+Sensing+and+Big+Data

    The idea of writing this book entitled “Cognitive Networked Sensing and Big Data” started with the plan to write a briefing book on wireless distributed computing and cognitive sensing. During our research on large-scale cognitive radio network (and its experimental testbed), we realized that big data played a central role. As a result, the book project reflects this Paradigm shift. In the context, sensing roughly is equivalent to “measurement.”

    标签: Cognitive Networked Sensing Data Big and

    上传时间: 2020-05-26

    上传用户:shancjb

  • Cognitive+Radio+Networks

    According to the statistics of the Federal Communications Commission (FCC), temporal and geographical variations in the utilization of the as- signed spectrum range from 15% to 85%. The limited available radio spec- trum and the inefficiency in spectrum usage necessitate a new commu- nication Paradigm to exploit the existing spectrum dynamically. 

    标签: Cognitive Radio Networks

    上传时间: 2020-05-26

    上传用户:shancjb

  • Mobile Cloud Computing Systems

    There is a phenomenal burst of research activities in mobile cloud computing systems, which extends cloud computing functions, ser- vices, and results to the world of future mobile communications applications, and the Paradigm of cloud computing and virtualization to mobile networks. Mobile applications demand greater resources and improved interactivity for better user experience. 

    标签: Mobile Cloud Computing Systems

    上传时间: 2020-05-30

    上传用户:shancjb

  • Physical Layer Security in Wireless Communications

    The ever-increasing demand for private and sensitive data transmission over wireless net- works has made security a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, computer scientists and engineers have tried hard to continuously come up with improved crypto- graphic algorithms. But typically we do not need to wait too long to find an efficient way to crack these algorithms. With the rapid progress of computational devices, the current cryptographic methods are already becoming more unreliable. In recent years, wireless re- searchers have sought a new security Paradigm termed physical layer security. Unlike the traditional cryptographic approach which ignores the effect of the wireless medium, physi- cal layer security exploits the important characteristics of wireless channel, such as fading, interference, and noise, for improving the communication security against eavesdropping attacks. This new security Paradigm is expected to complement and significantly increase the overall communication security of future wireless networks.

    标签: Communications Physical Security Wireless Layer in

    上传时间: 2020-05-31

    上传用户:shancjb

  • Wireless Communications 2nd Edition

    n the first part of this book, we give an introduction to the basic applications of wireless com- munications, as well as the technical problems inherent in this communication Paradigm. After a brief history of wireless, Chapter 1 describes the different types of wireless services, and works out their fundamental differences. The subsequent Section 1.3 looks at the same problem from a different angle: what data rates, ranges, etc., occur in practical systems, and especially, what combination of performance measures are demanded (e.g., what data rates need to be transmitted over short distances; what data rates are required over long distances?) Chapter 2 then describes the technical challenges of communicating without wires, putting special emphasis on fading and co-channel interference. Chapter 3 describes the most elementary problem of designing a wireless system, namely to set up a link budget in either a noise-limited or an interference-limited system. After studying this part of the book, the reader should have an overview of different types of wireless services, and understand the technical challenges involved in each of them. The solutions to those challenges are described in the later parts of this book.

    标签: Communications Wireless Edition 2nd

    上传时间: 2020-06-01

    上传用户:shancjb

  • Computational+Intelligence

    The large-scale deployment of the smart grid (SG) Paradigm could play a strategic role in supporting the evolution of conventional electrical grids toward active, flexible and self- healing web energy networks composed of distributed and cooperative energy resources. From a conceptual point of view, the SG is the convergence of information and operational technologies applied to the electric grid, providing sustainable options to customers and improved security. Advances in research on SGs could increase the efficiency of modern electrical power systems by: (i) supporting the massive penetration of small-scale distributed and dispersed generators; (ii) facilitating the integration of pervasive synchronized metering systems; (iii) improving the interaction and cooperation between the network components; and (iv) allowing the wider deployment of self-healing and proactive control/protection Paradigms.

    标签: Computational Intelligence

    上传时间: 2020-06-07

    上传用户:shancjb

  • RFID AND SENSOR NETWORKS Architectures

    Radio frequency identification (RFID) technology is witnessing a recent explosion of development in both industry and academia. A number of applications include supply chain management, electronic payments, RFID passports, environmental monitoring and control, office access control, intelligent labels, target detection and tracking, port management, food production control, animal identification, and so on. RFID is also an indispensable foundation to realize the pervasive computing Paradigm—“Internet of things.” It is strongly believed that many more scenarios will be identified when the principles of RFID are thoroughly understood, cheap components available, and when RFID security is guaranteed.

    标签: Architectures NETWORKS SENSOR RFID AND

    上传时间: 2020-06-08

    上传用户:shancjb