Technique
共 142 篇文章
Technique 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 142 篇文章,持续更新中。
RF Amplifier Design
RF Amplifier Design:1. Active devices and S-parameters
2. Amplifier impedance matching technique
3. Power gain of amplifiers
4. Stability of RF amplifiers
5. Power gain circles of amplifiers
6. Bias n
包含了H.264编码标准的两篇文章
包含了H.264编码标准的两篇文章,是讲多描述编码的。An Effective Epipolar Geometry Assisted Motion Estimation Technique for Multi-View Image and Video Coding和An Epipolar Geometry-Based Fast Disparity Estimation Algorithm for
observable distribution grid are investigated. A distribution grid is observable if the state of th
observable distribution grid are investigated. A distribution
grid is observable if the state of the grid can be fully determined.
For the simulations, the modified 34-bus IEEE test feeder is used.
3D shape reconstruction matlab code. It used shape from defocus technique with divergence. You can r
3D shape reconstruction matlab code. It used shape from defocus technique with divergence. You can reconstruct 3D shape with only two different depth images.
A Design and Implementation of The Online Shopping System Abstract: Along with the development
A Design and Implementation of The Online Shopping System
Abstract: Along with the development of the computer ,the database technique is widespread in the application of Internet, more and more
DWT based watermarking technique
DWT based watermarking technique
3D shape reconstruction matlab code. It used shape from defocus technique with diffusion. You can re
3D shape reconstruction matlab code. It used shape from defocus technique with diffusion. You can reconstruct 3D shape with only two different depth images.
sinusoidal PWM Technique for three voltage source Inverter
sinusoidal PWM Technique for three voltage source Inverter
this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryp
this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.
香港大学的David W.Cheung写的“A General Incremental Technique for Maintaining Discovered Association Rules”中
香港大学的David W.Cheung写的“A General Incremental Technique for Maintaining Discovered Association Rules”中提到的FUP2算法,用来解决数据库更新后的关联规则挖掘
Abstract—We describe a technique for image encoding in which local operators of many scales but iden
Abstract—We describe a technique for image encoding in which local operators of many scales but identical shape serve as the basis functions. The representation differs from established techniques in
Technique for counting NATed hosts.
Technique for counting NATed hosts.
逐次逼近式AD转换器研究
<p>
<span style="color: rgb(26, 24, 24); font-family: Arial, Helvetica, sans-serif; line-height: 15px; ">A tutorial on SAR type A/D converters, this note contains detailed information on several 12-b
WiseMAC is a medium access control protocol designed for the WiseNETTMwireless sensor network. It i
WiseMAC is a medium access control protocol designed for
the WiseNETTMwireless sensor network. It is based on
CSMA and uses the preamble sampling technique to minimize
the power consumed when liste
Feature selection is a preprocessing technique frequently used in data mining and machine learning t
Feature selection is a preprocessing technique frequently used in data mining and machine learning tasks. It can reduce dimensionality, remove irrelevant data, increase learning accuracy, and improve
In this paper, a new family of Cassinian wave-guides is proposed, simulating and calculation are fi
In this paper, a new family of Cassinian wave-guides
is proposed, simulating and calculation are finished with CST
Microwave Studio that based on Finite Integral Technique (FIT),
and some results a
Many of the pattern fi nding algorithms such as decision tree, classifi cation rules and c
Many of the pattern fi nding algorithms such as decision tree, classifi cation rules and clustering
techniques that are frequently used in data mining have been developed in machine learnin
This sample shows different ways of performing anti-aliasing - both by using only the native hardwa
This sample shows different ways of performing anti-aliasing - both by using only
the native hardware AA support, and by mixing the hardware modes with additional
supersampling. There are various wa
This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly
a visual servoing technique which can be applied for robtic control
a visual servoing technique which can be applied for robtic control