虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Two-column

  • 本文档介绍了如何使用各种内嵌工具

    本文档介绍了如何使用各种内嵌工具,函数和其他一些小技巧来加强使用matlab的速度和效率,是广大爱好者必读的文档。具体内容请参阅文档。 Learn how to use the Profiler tool, vectorized functions, and other tricks to writing efficient MATLAB code. This article includes how to convert any array into a column vector, bounding a value without if statements, and repeating/tiling a vector without repmat. Contents: * The Profiler * Array Preallocation * JIT Acceleration * Vectorization * Inlining Simple Functions * Referencing Operations * Numerical Integration * Signal Processing * Miscellaneous Tricks

    标签: 文档 如何使用 内嵌

    上传时间: 2013-12-11

    上传用户:cuiyashuo

  • This book explains how to write device drivers for the newest members of the MicrosoftWindows family

    This book explains how to write device drivers for the newest members of the MicrosoftWindows family of operating systems using the Windows Driver Model (WDM). In this Introduction, I ll explain who should be reading this book, the organization of the book, and how to use the book most effectively. You ll also find a note on errors and a section on other resources you can use to learn about driver programming. Looking ahead, Chapter 1 explains how the two main branches of the Windows family operate internally, what a WDM device driver is, and how it relates to the rest of Windows.

    标签: MicrosoftWindows the explains drivers

    上传时间: 2014-01-04

    上传用户:dongqiangqiang

  • Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features:

    Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/

    标签: open-source encryption Features software

    上传时间: 2013-12-20

    上传用户:123啊

  • a MATLAB program which tries to correct situations in which a triangulation includes corner triangle

    a MATLAB program which tries to correct situations in which a triangulation includes corner triangles, that is, triangles which have two sides on boundary

    标签: which triangulation situations includes

    上传时间: 2014-01-23

    上传用户:cursor

  • To review what a metaball is, and how to render them and to describe a new optimization I ve made

    To review what a metaball is, and how to render them and to describe a new optimization I ve made for rendering metaballs. For complex scenes, it can render hundreds of times faster, though I m certain others have discovered this trick as well. It does very slightly change the characteristic shape of the blobs, but there is no loss in image quality whatsoever. (I actually developed all this about two years ago, but just now felt like writing it all down, and had the time!)

    标签: optimization and metaball describe

    上传时间: 2013-12-27

    上传用户:彭玖华

  • The basic principle using the branchand- bound strategy to solve the traveling salesperson optimiz

    The basic principle using the branchand- bound strategy to solve the traveling salesperson optimization problem (TSP) consists of two parts. 􀂄 There is a way to split the solution space. 􀂄 There is a way to predict a lower bound for a class of solutions. 􀂄 There is also a way to find an upper bound of an optimal solution. 􀂄 If the lower bound of a solution exceeds this upper bound, this solution cannot be optimal. Thus, we should terminate the branching associated with this solution.

    标签: salesperson principle branchand the

    上传时间: 2017-02-19

    上传用户:comua

  • 调试通道例子。DCC is available on ARM cores which contain EmbeddedICE logic, e.g. ARM7TDMI, ARM9TDMI, etc

    调试通道例子。DCC is available on ARM cores which contain EmbeddedICE logic, e.g. ARM7TDMI, ARM9TDMI, etc. DCC is accessed by the target via coprocessor 14 using the ARM instructions MCR and MRC. The two assembler source files provided are: outchan.s for Target to debugger communication inchan.s for Debugger to target communication

    标签: ARM e.g. TDMI EmbeddedICE

    上传时间: 2013-12-21

    上传用户:liuchee

  • This article describes how to consume Web services in Java 1.5.0 using the new JAX-WS 2.0 API (JSR 2

    This article describes how to consume Web services in Java 1.5.0 using the new JAX-WS 2.0 API (JSR 228). Developers around the world, including me, have always complained about the hard ways to work in Java to consume even a Web service as simple as adding two numbers. However, with JAX-WS 2.0 API now available in core Java in JDK 1.5.0, life is simple like never before.

    标签: describes services article consume

    上传时间: 2013-11-27

    上传用户:kelimu

  • VoyagerGX display driver for Windows CE .NET 5.XX Silicon Motion, Inc. VoyagerGX Driver is architec

    VoyagerGX display driver for Windows CE .NET 5.XX Silicon Motion, Inc. VoyagerGX Driver is architected from the beginning to support variety of features and extension of Windows CE .NET, such as DirectDraw feature, Dynamic Rotation feature, Multimon feature, SMI Multimon Emulation feature (using single VoyagerGX chip to drive two independent displays), WCEfA (Windows CE for Automotive) feature, and more

    标签: VoyagerGX architec Silicon display

    上传时间: 2013-12-31

    上传用户:远远ssad

  • observable distribution grid are investigated. A distribution grid is observable if the state of th

    observable distribution grid are investigated. A distribution grid is observable if the state of the grid can be fully determined. For the simulations, the modified 34-bus IEEE test feeder is used. The measurements needed for the state estimation are generated by the ladder iterative technique. Two methods for the state estimation are analyzed: Weighted Least Squares and Extended Kalman Filter. Both estimators try to find the most probable state based on the available measurements. The result is that the Kalman filter mostly needs less iterations and calculation time. The disadvantage of the Kalman filter is that it needs some foreknowlegde about the state.

    标签: distribution observable grid investigated

    上传时间: 2014-12-08

    上传用户:ls530720646