虫虫首页|资源下载|资源专辑|精品软件
登录|注册

Repeated

  • D169 Demo - DMA0 Repeated Burst to-from RAM, Software Trigger Description A 32 byte block from 22

    D169 Demo - DMA0 Repeated Burst to-from RAM, Software Trigger Description A 32 byte block from 220h-240h is transfered to 240h-260h using DMA0 in a burst block using software DMAREQ trigger. After each transfer, source, destination and DMA size are reset to inital software setting because DMA transfer mode 5 is used. P1.0 is toggled durring DMA transfer only for demonstration purposes. ** RAM location 0x220 - 0x260 used - always make sure no compiler conflict ** ACLK= n/a, MCLK= SMCLK= default DCO ~ 800k

    标签: Description Repeated Software to-from

    上传时间: 2014-01-08

    上传用户:thinode

  • This example shows how to perform a Repeated sequence of conversions using // "repeat sequence-of-c

    This example shows how to perform a Repeated sequence of conversions using // "repeat sequence-of-channels" mode.

    标签: sequence-of-c conversions Repeated sequence

    上传时间: 2016-09-04

    上传用户:gxmm

  • 无人机高速遥测信道中OFDM峰均比抑制性能研究

    OFDM是无人机高速遥测信道中的主要传输技术之一,但是OFDM系统的主要缺陷之一是具有较高的峰均比。文中研究了一种信道纠错编码与迭代限幅滤波算法(Repeated Clipping and Filtering,RCF)相结合的峰均比抑制方案。仿真结果表明,RCF算法能够实现峰均比的有效抑制,卷积编码和Turbo编码能够有效抑制RCF算法产生的限幅噪声,降低系统误码率。

    标签: OFDM 无人机 信道 峰均比

    上传时间: 2013-10-08

    上传用户:sunshie

  • PID calculations for the _pid structure *a. This function uses the positional form of the pid equati

    PID calculations for the _pid structure *a. This function uses the positional form of the pid equation, and incorporates an integral windup prevention algorithim. Rectangular integration is used, so this function must be Repeated on a consistent time basis for accurate control.

    标签: the calculations positional pid

    上传时间: 2014-01-16

    上传用户:moerwang

  • Ink Blotting One method for escaping from a maze is via ‘ink-blotting’. In this method your startin

    Ink Blotting One method for escaping from a maze is via ‘ink-blotting’. In this method your starting square is marked with the number ‘1’. All free, valid squares north, south, east and west around the number ‘1‘ are marked with a number ‘2’. In the next step, all free, valid squares around the two are marked with a ‘3’ and the process is Repeated iteratively until :  The exit is found (a free square other than the starting position is reached on the very edge of the maze), or,  No more free squares are available, and hence no exit is possible.

    标签: method ink-blotting Blotting escaping

    上传时间: 2014-12-03

    上传用户:123啊

  • Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2

    Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair Playfair Key Matrix 1.a 5X5 matrix of letters based on a keyword 2.fill in letters of keyword (sans duplicates) 3.fill rest of matrix with other letters Encrypting and Decrypting -plaintext is encrypted two letters at a time 1. if a pair is a Repeated letter, insert filler like X’ 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end) 3. if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) 4. otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair

    标签: monoalphabetic Playfair provides security

    上传时间: 2017-05-24

    上传用户:变形金刚

  • Cooperation in Wireless Networks

    Cooperation has been the subject of intensive study in the social and biological sciences, as well as in mathematics and artificial intelligence. The fundamental finding is that even egoists can sustain cooperation provided the structure of their environment allows for Repeated interactions (Axelrod 1984).

    标签: Cooperation Wireless Networks in

    上传时间: 2020-05-26

    上传用户:shancjb

  • System Requirements Analysis

    The serious study of the practice of how to determine the appropriate content of a specification is a seldom-appreciated pastime. Those who have the responsibility to design a product would prefer a greater degree of freedom than permitted by the con- tent of a specification. Many of those who would manage those who would design a product would prefer to allocate all of the project funding and schedule to what they consider more productive labor. These are the attitudes, of course, that doom a project to defeat but they are hard to counter no matter how many times Repeated by design engineers and managers. A system engineer who has survived a few of these experiences over a long career may retire and forget the past but we have an endur- ing obligation to work toward changing these attitudes while trying to offer younger system engineers a pathway toward a more sure success in requirements analysis and specification publishing.

    标签: Requirements Analysis System

    上传时间: 2020-05-31

    上传用户:shancjb

  • Auto-Machine-Learning-Methods-Systems-Challenges

    The past decade has seen an explosion of machine learning research and appli- cations; especially, deep learning methods have enabled key advances in many applicationdomains,suchas computervision,speechprocessing,andgameplaying. However, the performance of many machine learning methods is very sensitive to a plethora of design decisions, which constitutes a considerable barrier for new users. This is particularly true in the booming field of deep learning, where human engineers need to select the right neural architectures, training procedures, regularization methods, and hyperparameters of all of these components in order to make their networks do what they are supposed to do with sufficient performance. This process has to be Repeated for every application. Even experts are often left with tedious episodes of trial and error until they identify a good set of choices for a particular dataset.

    标签: Auto-Machine-Learning-Methods-Sys tems-Challenges

    上传时间: 2020-06-10

    上传用户:shancjb