一种基于FPGA的设计实时高分辨率图像处理系统的设计方法。英文为Real-Time System for High-Image Resolution Disparity Estimation。主要讲算法和系统构架
标签: Estimation High-Image Resolution Disparity
上传时间: 2014-01-07
上传用户:lacsx
Face Recognition System
标签: Recognition System Face
上传时间: 2015-11-29
上传用户:klin3139
The FatFs/Tiny-FatFs module is opened for education, reserch and development. fat file.You can use, modify and republish it for personal, non-profit or profit use without any limitation under your responsibility.
标签: development Tiny-FatFs education reserch
上传时间: 2013-11-29
上传用户:wcl168881111111
BER of the VUS-MUMIMO-SM Uplink System
标签: VUS-MUMIMO-SM Uplink System BER
上传时间: 2014-03-03
上传用户:yimoney
BER of the VUS-MUMIMO-SM Uplink System - Rayleigh
标签: VUS-MUMIMO-SM Rayleigh Uplink System
上传时间: 2014-01-18
上传用户:270189020
BER of the VUS-MUMIMO-SM Uplink System - Rayleigh
标签: VUS-MUMIMO-SM Rayleigh Uplink System
上传时间: 2015-11-29
上传用户:saharawalker
Contiki is an open source, highly portable, multi-tasking operating system for memory-constrained networked embedded systems
标签: memory-constrained multi-tasking operating portable
上传时间: 2013-12-16
上传用户:CSUSheep
<pricinples of communication system simulation with wireless aplications>国外的一本很好的无线通信书籍,对通信建模有很大帮助,而且理论分析挺深刻的,里面包含了各章节的源代码,看看对你是否有帮助
标签: communication aplications pricinples simulation
上传时间: 2014-11-04
上传用户:zsjzc
本文:采用了FPGA方法来模拟高动态(Global Position System GPS)信号源中的C/A码产生器。C/A码在GPS中实现分址、卫星信号粗捕和精码(P码)引导捕获起着重要的作用,通过硬件描述语言VERILOG在ISE中实现电路生成,采用MODELSIM、SYNPLIFY工具分别进行仿真和综合。
标签: GPS Position Global System
上传时间: 2015-12-01
上传用户:李彦东
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)
标签: Sometimes the contents desire
上传时间: 2013-12-25
上传用户:playboys0