虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

cx-ONE

  • A digital filter structure for wideband filtering is proposed. It consists of two allpass filters a

    A digital filter structure for wideband filtering is proposed. It consists of two allpass filters and a linearphase FIR filter. One major advantage of this structure is that the allpass filters are functions of zM which implies that the maximal sample frequency is M times higher for this structure than for the corresponding conventional structures.

    标签: structure filtering consists proposed

    上传时间: 2014-01-21

    上传用户:weixiao99

  • This m file hide an image jpeg,png in another jpeg,png image. The height and width of the secr

    This m file hide an image jpeg,png in another jpeg,png image. The height and width of the secret image is in LSB of 1st 32 pixels of 1st row of the cover image.This helps in the recovery of secret image. The secret image must be smaller than cover image.A message box will appear with a number ,that number is the maximum product of width and height of secret image that can be successfully embedded in the cover image. The final png image will appear in workspace with random name.This image contains the secret image.One such png image is in the zip file with name 4447.png it contains an image of res 100x122.

    标签: image jpeg png another

    上传时间: 2017-07-25

    上传用户:gououo

  • Exploring C++ uses a series of self–directed lessons to divide C++ into bite–sized chunks that you c

    Exploring C++ uses a series of self–directed lessons to divide C++ into bite–sized chunks that you can digest as rapidly as you can swallow them. The book assumes only a basic understanding of fundamental programming concepts (variables, functions, expressions, statements) and requires no prior knowledge of C or any other particular language. It reduces the usually considerable complexity of C++. The included lessons allow you to learn by doing, as a participant of an interactive education session. You’ll master each step in a one sitting before you proceed to the next. Author Ray Lischner has designed questions to promote learning new material. And by responding to questions throughout the text, youll be engaged every step of the way.

    标签: Exploring directed lessons series

    上传时间: 2014-11-15

    上传用户:caiiicc

  • LIBSVM 是台湾大学林智仁(Chih-Jen Lin)博士等开发设计的一个操作简单、易于使用、快速有效的通用SVM 软件包

    LIBSVM 是台湾大学林智仁(Chih-Jen Lin)博士等开发设计的一个操作简单、易于使用、快速有效的通用SVM 软件包,可以解决分类问题(包括C- SVC、n - SVC )、回归问题(包括e - SVR、n - SVR )以及分布估计(one-class-SVM )等问题,提供了线性、多项式、径向基和S形函数四种常用的核函数供选择,可以有效地解决多类问题、交叉验证选择参数、对不平衡样本加权、多类问题的概率估计等。 2.89版本是09年刚更新的一个版本。

    标签: Chih-Jen LIBSVM Lin SVM

    上传时间: 2014-01-18

    上传用户:baitouyu

  • This article discusses some issues that a typical Windows C++ programmer will encounter when approac

    This article discusses some issues that a typical Windows C++ programmer will encounter when approaching Symbian OS for the first time. Our experience in developing for three successive versions of Symbian OS has given us considerable perspective on what can be difficult when working in this otherwise rich and stable environment. While one reason for Symbian s success may be the desire of many mobile phone manufacturers not to be tied to Microsoft, the other reason is that Symbian has put together a lightweight, elegant system that succeeds in providing a very impressive range of functionality. Here are some pointers to help ease the transition to successful Symbian OS application development.

    标签: programmer discusses encounter article

    上传时间: 2017-07-30

    上传用户:zhaiyanzhong

  • A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digi

    A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certificate status information. PKI users select one or more certificate issuers as trust anchors, and establish security services based on certificates that may be validated using one of their trust anchors.

    标签: Infrastructure cryptographic entities physical

    上传时间: 2017-07-31

    上传用户:561596

  • This C++ code example demonstrates how to localise an application to adapt to the selected phone lan

    This C++ code example demonstrates how to localise an application to adapt to the selected phone language. The example application has two sets of localised strings (English and German) for the application name, labels, text, and image. The application also includes number, currency, date, and time localisation, in which the TLocale method is used for localisation even if the selected phone language is neither one of the two application languages. The updated example has been tested to support S60 5th Edition and touch UI.

    标签: demonstrates application to localise

    上传时间: 2013-12-17

    上传用户:shanml

  • For developers who design and program devices that use the USB interface. Introduce the USB and hel

    For developers who design and program devices that use the USB interface. Introduce the USB and help to get your devices and communicating as quickly and easily as possible.The USB is versatile enough for a wide range of peripheral devices. Standard peripherals that use USB include mice, keyboards, drives, printers, and audio/video devices. USB is also suitable for data-acquisition units, control systems, and other devices with specialized functions, including one-of-a-kind designs.

    标签: developers and USB Introduce

    上传时间: 2017-08-15

    上传用户:dave520l

  • this is a document about radio frequency identification RFID, this was a project ,i have done last y

    this is a document about radio frequency identification RFID, this was a project ,i have done last year ,actually this technology is a very inpotrtant one due to its relation with newest technologies , like GPS , or the miniturization of integrated circuits ,and that is described in chapter 3 . chapter 1 gives an introduction of the technology RFID , chapter 2 gives a discussion of a library using RFID , and chapter 3 is about the future of RFID , and finally the conclusion .

    标签: this identification frequency document

    上传时间: 2014-01-10

    上传用户:gtzj

  • Hibernate: A Developer s Notebook shows you how to use Hibernate to automate persistence: you write

    Hibernate: A Developer s Notebook shows you how to use Hibernate to automate persistence: you write natural Java objects and some simple configuration files, and Hibernate automates all the interaction between your objects and the database. You don t even need to know the database is there, and you can change from one database to another simply by changing a few statements in a configuration file. If you ve needed to add a database backend to your application, don t put it off. It s much more fun than it used to be, and Hibernate: A Developer s Notebook shows you why.

    标签: Hibernate persistence Developer you

    上传时间: 2017-08-17

    上传用户:曹云鹏