虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Self-made

  • cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used

    cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used to calculate a whole range of scientific functions including sin, cos, tan, arctan, arcsin, arccos, sinh, cosh, tanh, arctanh, log, exp, square root and even multiply and divide. the method dates back to volder [1959], and due to its versatility and compactness, it made possible the microcoding of the hp35 pocket scientific calculator in 1972. here is some code to illustrate the techniques. ive split the methods into three parts linear, circular and hyperbolic. in the hp35 microcode these would be unified into one function (for space reasons). because the linear mode can perform multiply and divide, you only need add/subtract and shift to complete the implementation. you can select in the code whether to do the multiples and divides also by cordic means. other multiplies and divides are all powers of 2 (these dont count). to eliminate these too, would involve ieee hackery.

    标签: essentially algorithm describe suitably

    上传时间: 2017-03-02

    上传用户:litianchu

  • A new type of cloak is discussed: one that gives all cloaked objects the appearance of a flat conduc

    A new type of cloak is discussed: one that gives all cloaked objects the appearance of a flat conducting sheet. It has the advantage that none of the parameters of the cloak is singular and can in fact be made isotropic. It makes broadband cloaking in the optical frequencies one step closer.

    标签: appearance discussed cloaked objects

    上传时间: 2017-03-30

    上传用户:rishian

  • It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom

    It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon. 1, p. 224) have however simplified material parameters in order to facilitate easier realization as well as to avoid infinities in optical constants. Here we show that the cylindrical cloaks with simplified material parameters inherently allow the zeroth-order cylindrical wave to pass through the cloak as if the cloak is made of a homogeneous isotropic medium, and thus visible. To all high-order cylindrical waves, our numerical simulation suggests that the simplified cloak inherits some properties of the ideal cloak, but finite scatterings exist.

    标签: invisibility constructed proposed electrom

    上传时间: 2013-12-18

    上传用户:13215175592

  • MATLAB implementation of time series prediction Based on the VQTAM method described in the following

    MATLAB implementation of time series prediction Based on the VQTAM method described in the following papers: G. A. Barreto & A. F. R. Araujo (2004) "Identification and Control of Dynamical Systems Using the Self-Organizing Map" IEEE Transactions on Neural Networks, vol. 15, no. 5.

    标签: implementation prediction described following

    上传时间: 2013-12-22

    上传用户:windwolf2000

  • TreeMenu Component ================== The TreeMenu is a descendant of TTreeView. It is a "steal

    TreeMenu Component ================== The TreeMenu is a descendant of TTreeView. It is a "stealth-realese" because the TreeMenu is created only run time and it changes a design time defined simple TreeView to self. Using it is very simple. Please see the demo files. Author: ======= Pal Sitkei sitkei@chello.hu

    标签: TreeMenu descendant Component TTreeView

    上传时间: 2013-12-21

    上传用户:gtf1207

  • Want to try a copy of Linux 2.6.29-rc5 in progess with Angstom and Opie? Opie probably isn t good fo

    Want to try a copy of Linux 2.6.29-rc5 in progess with Angstom and Opie? Opie probably isn t good for much but testing but it is kind of fun. This has a very slow boot, which is much improved since this NAND image was made. NAND image of Linux 2.6.9-rc5 with Angstrom and Opie for test. Download file. Set to NOR and power on. Install using the vivi command "Restore NAND Flash from HOST thru USB" Turn off, set to NAND, turn on. Enjoy.

    标签: Opie probably Angstom progess

    上传时间: 2013-12-17

    上传用户:gaojiao1999

  • It is a good program

    It is a good program,I think it can help you to you study ,and so you can made your own program more better!

    标签: program good It is

    上传时间: 2013-12-30

    上传用户:维子哥哥

  • In c++ risks is a reference to a variable which exists i.e. one 2nd name for the same variable. Thi

    In c++ risks is a reference to a variable which exists i.e. one 2nd name for the same variable. This program is broken up into functions.露the function hand constitutes the entrance point of the program, firstly there is the function message which us affiche hello , and the second function produced 露procedure affich_calcul, one declared the prototype and one it definite after one made the call has this function.

    标签: variable i.e. reference exists

    上传时间: 2013-12-17

    上传用户:netwolf

  • CodeGear Delphi2009 has lots of new features like use of Generics in Delphi. Generic methods, proced

    CodeGear Delphi2009 has lots of new features like use of Generics in Delphi. Generic methods, procedures and data types are made easy to use datatype free working with you classes.

    标签: Delphi CodeGear features Generics

    上传时间: 2017-05-22

    上传用户:fandeshun

  • pdf格式的英文文献

    pdf格式的英文文献,是关于认知无线电网络的,编者是加拿大桂尔夫大学的Qusay H. Mahmoud。ISBN:978-0-470-06196-1 章节内容: 1 Biologically Inspired Networking 2 The Role of Autonomic Networking in Cognitive Networks 3 Adaptive Networks 4 Self-Managing Networks 5 Machine Learning for Cognitive Networks: Technology Assessment and Research Challenges 6 Cross-Layer Design and Optimization in Wireless Networks 等,共计13章,全书348页,pdf文件383页。

    标签: 英文

    上传时间: 2014-01-27

    上传用户:daguda