搜索:Repeated

找到约 10 项符合「Repeated」的查询结果

结果 10
https://www.eeworm.com/dl/641/341581.html 数学计算

This example shows how to perform a repeated sequence of conversions using // "repeat sequence-of-c

This example shows how to perform a repeated sequence of conversions using // "repeat sequence-of-channels" mode.
下载 36
·
查看 1112
https://www.eeworm.com/dl/655/336955.html 微处理器开发

D169 Demo - DMA0 Repeated Burst to-from RAM, Software Trigger Description A 32 byte block from 22

D169 Demo - DMA0 Repeated Burst to-from RAM, Software Trigger Description A 32 byte block from 220h-240h is transfered to 240h-260h using DMA0 in a burst block using software DMAREQ trigger. After each transfer, source, destination and DMA size are reset to inital software sett ...
下载 128
·
查看 1072
https://www.eeworm.com/dl/953562.html 技术资料

期刊论文:Tracking as Repeated Figure??Ground Segmentation [cvpr07]

·Tracking as Repeated Figure??Ground Segmentation [cvpr07]
下载 4
·
查看 8333
https://www.eeworm.com/dl/516/139716.html DSP编程

PID calculations for the _pid structure *a. This function uses the positional form of the pid equati

PID calculations for the _pid structure *a. This function uses the positional form of the pid equation, and incorporates an integral windup prevention algorithim. Rectangular integration is used, so this function must be repeated on a consistent time basis for accurate control.
下载 39
·
查看 1117
https://www.eeworm.com/dl/521857.html 书籍

Cooperation in Wireless Networks

Cooperation has been the subject of intensive study in the social and biological sciences, as well as in mathematics and artificial intelligence. The fundamental finding is that even egoists can sustain cooperation provided the structure of their environment allows for repeated i ...
查看 178
https://www.eeworm.com/dl/625/254453.html 游戏

Ink Blotting One method for escaping from a maze is via ‘ink-blotting’. In this method your startin

Ink Blotting One method for escaping from a maze is via ‘ink-blotting’. In this method your starting square is marked with the number ‘1’. All free, valid squares north, south, east and west around the number ‘1‘ are marked with a number ‘2’. In the next step, all free, v ...
下载 164
·
查看 1113
https://www.eeworm.com/dl/522489.html 书籍

Auto-Machine-Learning-Methods-Systems-Challenges

The past decade has seen an explosion of machine learning research and appli- cations; especially, deep learning methods have enabled key advances in many applicationdomains,suchas computervision,speechprocessing,andgameplaying. However, the performance of many machine learning m ...
下载 2
·
查看 56
https://www.eeworm.com/dl/564/33125.html 通信网络

无人机高速遥测信道中OFDM峰均比抑制性能研究

OFDM是无人机高速遥测信道中的主要传输技术之一,但是OFDM系统的主要缺陷之一是具有较高的峰均比。文中研究了一种信道纠错编码与迭代限幅滤波算法(Repeated Clipping and Filtering,RCF)相结合的峰均比抑制方案。仿真结果表明,RCF算法能够实现峰均比的有效抑制,卷积编码和Turbo编码能够有效抑制RC ...
下载 74
·
查看 1104
https://www.eeworm.com/dl/640/444418.html CA认证

Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2

Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Play ...
下载 143
·
查看 1107
https://www.eeworm.com/dl/522132.html 书籍

System Requirements Analysis

The serious study of the practice of how to determine the appropriate content of a specification is a seldom-appreciated pastime. Those who have the responsibility to design a product would prefer a greater degree of freedom than permitted by the con- tent of a specification. Man ...
下载 1
·
查看 93