Same

共 284 篇文章
Same 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 284 篇文章,持续更新中。

This toolbox contains Matlab files that implement the nonsubsample contourlet transform and its util

This toolbox contains Matlab files that implement the nonsubsample contourlet transform and its utility functions. Some Matlab files are the same as those in Contourlet Toolbox.

The ZZIPlib provides read access on ZIP-archives. The library uses only the patent-free compression-

The ZZIPlib provides read access on ZIP-archives. The library uses only the patent-free compression-algorithms supported by Zlib. It provides functions that transparently access files being either rea

The literature of cryptography has a curious history. Secrecy, of course, has always played a centra

The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less

The DHRY program performs the dhrystone benchmarks on the 8051. Dhrystone is a general-performanc

The DHRY program performs the dhrystone benchmarks on the 8051. Dhrystone is a general-performance benchmark test originally developed by Reinhold Weicker in 1984. This benchmark is used to measu

This a simple genetic algorithm implementation where the evaluation function takes positive values o

This a simple genetic algorithm implementation where the evaluation function takes positive values only and the fitness of an individual is the same as the value of the objective function

These files contain all of the code listings in C: The Complete Reference, 4th Edition The so

These files contain all of the code listings in C: The Complete Reference, 4th Edition The source code is organized into files by chapter. Within each chapter file, the listings are stored in

Its functions are: n order within (excluding n) At the same time, 3 and 7 can be integral to all nat

Its functions are: n order within (excluding n) At the same time, 3 and 7 can be integral to all natural and a few of the square root of s, and function as a value to return, the final result s output

% PURPOSE : Demonstrate the differences between the following filters on the same problem: % % 1)

% PURPOSE : Demonstrate the differences between the following filters on the same problem: % % 1) Extended Kalman Filter (EKF) % 2) Unscented Kalman Filter (UKF) % 3) Particle Filter (PF) % 4) P

ARP test mode. According to the idea we design the arithmetic for the key part, first the system sen

ARP test mode. According to the idea we design the arithmetic for the key part, first the system sends a message to the target machine, and then system wait for the response. Once system receives a me

The package includes 3 Matlab-interfaces to the c-code: 1. inference.m An interface to the full

The package includes 3 Matlab-interfaces to the c-code: 1. inference.m An interface to the full inference package, includes several methods for approximate inference: Loopy Belief Propagation,

libnids-Win32

V1.16 Win32 July 2012<br /> - Ported to Win32 C++<br /> - Allow multiple instances of libnids to coexist in the same process<br /> - Incorporate unofficial patch to track established TCP connections<b

This paper presents a low-power asynchronous implementation of the 80C51 microcontroller. It was rea

This paper presents a low-power asynchronous implementation of the 80C51 microcontroller. It was realized in a 0.5 &micro m CMOS process and it shows a power advantage of a factor 4 compared to a rece

计算本征值程序

Computes all eigenvalues and eigenvectors of a real symmetric matrix a, <br /> ! which is of size n by n, stored in a physical np by np array. <br /> ! On output, elements of a above the diagonal are

There are two files in the zip folder. bpsk_spread.m and jakesmodel.m Steps for simulation: 1] Run

There are two files in the zip folder. bpsk_spread.m and jakesmodel.m Steps for simulation: 1] Run jakesmodel.m first 2] Then run bpsk_spread.m . 3] Note that during the first run bpsk_spread.m ha

Now,I use the ARM7 and SDT2.51 to show how to DIY,the ADS1.2 is as same as the SDT2.51.

Now,I use the ARM7 and SDT2.51 to show how to DIY,the ADS1.2 is as same as the SDT2.51.

This example provides a description of how to use a DMA channel to transfer a word data buffer fro

This example provides a description of how to use a DMA channel to transfer a word data buffer from memory (Flash) to memory (RAM). The dedicated DMA channel is configured to transfer once a time a

The algorm of viterbi. You talk to your friend three days in a row and discover that on the first da

The algorm of viterbi. You talk to your friend three days in a row and discover that on the first day he went for a walk, on the second day he went shopping, and on the third day he cleaned his apartm

A new cable fault location method based on wavelet reconstruction is proposed. In this method the

A new cable fault location method based on wavelet reconstruction is proposed. In this method the difference between the currents of faulty phase and sound phase under the high voltage pulse excita

Visual Basic Shell Programming ventures where none have gone before by showing how to develop shell

Visual Basic Shell Programming ventures where none have gone before by showing how to develop shell extensions that more closely integrate an application with the Windows shell, while at the same time

This the second tutorial of the Writing Device Drivers series. There seems to be a lot of interest i

This the second tutorial of the Writing Device Drivers series. There seems to be a lot of interest in the topic, so this article will pick up where the first left off. The main focus of these articles