虫虫首页|资源下载|资源专辑|精品软件
登录|注册

levels

  • What is Verilog? ➥ Verilog HDL is a Hardware Description Language (HDL) ➥ Verilog HDL

    What is Verilog? ➥ Verilog HDL is a Hardware Description Language (HDL) ➥ Verilog HDL allows describe designs at a high level of abstraction as well as the lower implementation levels ➥ Primary use of HDLs is the simulation of designs ➥ Verilog is a discrete event time simulator  What is VeriWell? ➥ VeriWell is a comprehensive implementation of Verilog HDL

    标签: Verilog HDL 10149 Description

    上传时间: 2017-02-17

    上传用户:kjl

  • This product has been manufactured to your company’s specifications a part for use in your company’

    This product has been manufactured to your company’s specifications a part for use in your company’s general electronic products. It is guaranteed to perform according to delivery specifications. For any other use apart from general electronic equipment, we cannot take responsibility if the product is used in medical devices, nuclear power control equipment, aerospace equipment, fire and security systems, or any other applications in which there is a direct risk to human life and where extremely high levels of reliability are required. If the product is to be used in any of the above applications, we will need to enter into a separate product liability agreement.

    标签: company your specifications manufactured

    上传时间: 2017-02-18

    上传用户:haohaoxuexi

  • The Software Engineering Institute’s (SEI) Capability Maturity Model (CMM) provides a well-known ben

    The Software Engineering Institute’s (SEI) Capability Maturity Model (CMM) provides a well-known benchmark of software process maturity. The CMM has become a popular vehicle for assessing the maturity of an organization’s software process in many domains. This white paper describes how the Rational Unified Process can support an organization that is trying to achieve CMM Level-2, Repeatable, and Level-3, Defined, software process maturity levels.

    标签: Engineering Capability well-known Institute

    上传时间: 2017-02-26

    上传用户:zhichenglu

  • It si very interesting ebook of administrarion for Linux, but there was describe computers network i

    It si very interesting ebook of administrarion for Linux, but there was describe computers network in detail: ISO recommendation, ISO levels, tools and features.

    标签: administrarion interesting computers describe

    上传时间: 2017-04-15

    上传用户:tianyi223

  • OTSU Gray-level image segmentation using Otsu s method. Iseg = OTSU(I,n) computes a segmented i

    OTSU Gray-level image segmentation using Otsu s method. Iseg = OTSU(I,n) computes a segmented image (Iseg) containing n classes by means of Otsu s n-thresholding method (Otsu N, A Threshold Selection Method from Gray-Level Histograms, IEEE Trans. Syst. Man Cybern. 9:62-66 1979). Thresholds are computed to maximize a separability criterion of the resultant classes in gray levels. OTSU(I) is equivalent to OTSU(I,2). By default, n=2 and the corresponding Iseg is therefore a binary image. The pixel values for Iseg are [0 1] if n=2, [0 0.5 1] if n=3, [0 0.333 0.666 1] if n=4, ... [Iseg,sep] = OTSU(I,n) returns the value (sep) of the separability criterion within the range [0 1]. Zero is obtained only with images having less than n gray level, whereas one (optimal value) is obtained only with n-valued images.

    标签: OTSU segmentation Gray-level segmented

    上传时间: 2017-04-24

    上传用户:yuzsu

  • Learn to model various modern communication systems with this book from one of the world s leading a

    Learn to model various modern communication systems with this book from one of the world s leading authors in communications, John G. Proakis. A very helpful reference to MATLAB users of various levels

    标签: communication leading systems various

    上传时间: 2017-05-06

    上传用户:jing911003

  • Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in A

    Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in ARM!ˉs new Cortex family. With high performance and power efficiency, it targets a wide variety of mobile and consumer applications including mobile phones, set-top boxes, gaming consoles and automotive navigation/entertainment systems. The Cortex-A8 processor spans a range of performance points depending on the implementation, delivering over to 2000 Dhrystone MIPS (DMIPS) of performance for demanding consumer applications and consuming less than 300mW for low-power mobile devices. This translates into a large increase in processing capability while staying with the power levels of previous generations of mobile devices. Consumer applications will benefit from the reduced heat dissipation and resulting lower packaging and integration costs.

    标签: microprocessor Introduction applications Cortex

    上传时间: 2013-12-09

    上传用户:xzt

  • A few years ago I became interested in first person shooter games and in particular how the world le

    A few years ago I became interested in first person shooter games and in particular how the world levels are created and rendered in real time. At the same time I found myself in between jobs and so I embarked on an effort to learn about 3D rendering with the goal of creating my own 3D rendering engine. Since I am a developer and not an artist I didn’t have the skills to create my own models, levels, and textures. So I decided to attempt to write a rendering engine that would render existing game levels. I mainly used information and articles I found on the web about Quake 2, Half Life, WAD and BSP files. In particular I found the Michael Abrash articles that he wrote for Dr. Dobbs magazine while working at Id to be very illuminating.

    标签: interested particular shooter became

    上传时间: 2013-12-13

    上传用户:hanli8870

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    标签: Fundamental Limits Secure Class on of

    上传时间: 2020-01-04

    上传用户:kddlas

  • Radio+Spectrum+Management

    An understanding of the policies, regulations, standards and techniques of radio spectrum management is useful to those who manage and administrate it, to operators, to equipment providers and to the users of wireless communication (i.e., all of us). For many years the author has been deeply involved in ruling the RF spectrum at the national, regional and global levels. The book is based on the professional experience of the author, his academic courses, presenta- tions and tutorials in five continents. The book reflects this legacy and will be of use to engineers, lawyers and economists, who serve the global industry of the wireless world; in it they may find solutions to the problems they frequently encounter.

    标签: Management Spectrum Radio

    上传时间: 2020-05-31

    上传用户:shancjb