"Hard to find" full description of ContactID protocol from Ademco used by many home security devices to send messages to CMS (Central Monitoring Station) about security events. Has full technical description and can be used to easy make CMS communication module that sends info from your alarm system to CMS station.
标签: description ContactID protocol security
上传时间: 2017-05-30
上传用户:lifangyuan12
) Compression using huffman code -with a number of bits k per code word -provide huffman table Huffman coding is optimal for a symbol-by-symbol coding with a known input probability distribution.This technique uses a variable-length code table for encoding a source symbol. The table is derived in a particular way based on the estimated probability of occurrence for each possible value of the source symbol .Huffman coding uses a specific method for representing each symbol, resulting in a prefix code that expresses the most common characters using shorter strings of bits than those used for less common source symbols.The Huffman coding is a procedure to generate a binary code tree.
标签: code Compression huffman provide
上传时间: 2017-05-30
上传用户:yuchunhai1990
In the last decade the processing of polygonal meshes has emerged as an active and very productive research area. This can basically be attributed to two developments: Modern geometry acquisition devices, like laser scanners and MRT, easily produce raw polygonal meshes of ever growing complexity Downstream applications like analysis tools (medical imaging), computer aided manufacturing, or numerical simulations all require high quality polygonal meshes as input. The need to bridge the gap between raw triangle soup data and high-quality polygon meshes has driven the research on ecient data structures and algorithms that directly operate on polygonal meshes rather than on a (most often not feasible) intermediate CAD representation.
标签: processing productive the polygonal
上传时间: 2017-06-03
上传用户:TF2015
一个sms格式的PPC端短信备份的还原工具。原备份软件BkGenuis包含在rar文件内。 PPC上有个绿色的单独的短信备份还原工具,备份的格式是sms,但是还原是直接还原至手机短信中,在PC端不可以直接阅读。故编写了这个java程序来实现sms格式的解码。输入是input.sms。输出是txt文本格式。
上传时间: 2013-12-19
上传用户:小码农lz
This is program with source code to convert ascii text files to the maxicode barcode standard. The input file consists of two columns. The first column represents a code and the second column is a string enclosed in quotes. The codes for the first column are as follows: PM, SM, CC, MO, SC, and PC.
标签: maxicode standard barcode convert
上传时间: 2017-06-07
上传用户:ardager
This program implements a PIC-based fuzzy inference engine for the Fudge fuzzy development system from Motorola. It works by taking the output from Fudge for the 68HC11 processor, and converting it to a MPASM compatible assembler file using the convert batch file. This file can then be incorporated with fuzzy.asm to create a fuzzy inference engine. Tool chain ---------- FUDGE -> Fuzzy Rules -> MC68HC11.ASM -> CONVERT.BAT -> RULES.ASM -> MPASM FUZZY.ASM -> INTEL HEX Fuzzy input registers --------------------- current_ins 1..8 x 8-bit raw inputs Fuzzy inference function ------------------------ FuzzyEngine Fuzzy output registers ---------------------- cog_outs 1..8 x 8-bit raw outputs
标签: fuzzy development implements PIC-based
上传时间: 2014-01-18
上传用户:caozhizhi
The code performs a number (ITERS) of iterations of the Bailey s 6-step FFT algorithm (following the ideas in the CMU Task parallel suite). 1.- Generates an input signal vector (dgen) with size n=n1xn2 stored in row major order In this code the size of the input signal is NN=NxN (n=NN, n1=n2=N) 2.- Transpose (tpose) A to have it stored in column major order 3.- Perform independent FFTs on the rows (cffts) 4.- Scale each element of the resulting array by a factor of w[n]**(p*q) 5.- Transpose (tpose) to prepair it for the next step 6.- Perform independent FFTs on the rows (cffts) 7.- Transpose the resulting matrix The code requires nested Parallelism.
标签: iterations performs Bailey number
上传时间: 2014-01-05
上传用户:libenshu01
C++ C 词法分析器,编译原理, 运行时输入文件(input.txt)路径,文件内容为{}BEGIN FOR(I=0 I<10 I=I+1){} END
标签: 分析器
上传时间: 2013-12-18
上传用户:mikesering
This book gives a concise description of the Java 2 programming language. They give a quick reference for the reader who has already learned (or is learning) Java from a standard textbook and who wants to know the language in more detail. These book presents the entire Java programming language and essential parts of the class libraries: the collection classes and the input-output classes.
标签: description programming language concise
上传时间: 2017-06-20
上传用户:asdkin
A user-space device driver can do many of the things that kernel drivers can t, such as perform a long-running computation, block while waiting for an event, or read files from the file system. Unlike kernel drivers, a user-space device driver can use other device drivers--that is, access the network, talk to a serial port, get interactive input from the user, pop up GUI windows, or read from disks. User-space drivers implemented using FUSD can be much easier to debug it is impossible for them to crash the machine, are easily traceable using tools such as gdb, and can be killed and restarted without rebooting even if they become corrupted. FUSD drivers don t have to be in C--Perl, Python, or any other language that knows how to read from and write to a file descriptor can work with FUSD. User-space drivers can be swapped out, whereas kernel drivers lock physical memory.
标签: user-space can drivers perform
上传时间: 2014-01-01
上传用户:saharawalker