搜索结果

找到约 9 项符合 repeated 的查询结果

微处理器开发 D169 Demo - DMA0 Repeated Burst to-from RAM, Software Trigger Description A 32 byte block from 22

D169 Demo - DMA0 Repeated Burst to-from RAM, Software Trigger Description A 32 byte block from 220h-240h is transfered to 240h-260h using DMA0 in a burst block using software DMAREQ trigger. After each transfer, source, destination and DMA size are reset to inital software setting because DMA tran ...
https://www.eeworm.com/dl/655/336955.html
下载: 128
查看: 1041

数学计算 This example shows how to perform a repeated sequence of conversions using // "repeat sequence-of-c

This example shows how to perform a repeated sequence of conversions using // "repeat sequence-of-channels" mode.
https://www.eeworm.com/dl/641/341581.html
下载: 36
查看: 1085

通信网络 无人机高速遥测信道中OFDM峰均比抑制性能研究

OFDM是无人机高速遥测信道中的主要传输技术之一,但是OFDM系统的主要缺陷之一是具有较高的峰均比。文中研究了一种信道纠错编码与迭代限幅滤波算法(Repeated Clipping and Filtering,RCF)相结合的峰均比抑制方案。仿真结果表明,RCF算法能够实现峰均比的有效抑制,卷积编码和Turbo编码能够有效抑制RCF算法产生的限幅噪声 ...
https://www.eeworm.com/dl/564/33125.html
下载: 74
查看: 1057

DSP编程 PID calculations for the _pid structure *a. This function uses the positional form of the pid equati

PID calculations for the _pid structure *a. This function uses the positional form of the pid equation, and incorporates an integral windup prevention algorithim. Rectangular integration is used, so this function must be repeated on a consistent time basis for accurate control.
https://www.eeworm.com/dl/516/139716.html
下载: 39
查看: 1085

游戏 Ink Blotting One method for escaping from a maze is via ‘ink-blotting’. In this method your startin

Ink Blotting One method for escaping from a maze is via ‘ink-blotting’. In this method your starting square is marked with the number ‘1’. All free, valid squares north, south, east and west around the number ‘1‘ are marked with a number ‘2’. In the next step, all free, valid squares around ...
https://www.eeworm.com/dl/625/254453.html
下载: 164
查看: 1070

CA认证 Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2

Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair Playfair Key M ...
https://www.eeworm.com/dl/640/444418.html
下载: 143
查看: 1070

书籍 Cooperation in Wireless Networks

Cooperation has been the subject of intensive study in the social and biological sciences, as well as in mathematics and artificial intelligence. The fundamental finding is that even egoists can sustain cooperation provided the structure of their environment allows for repeated interactions (Axelrod ...
https://www.eeworm.com/dl/521857.html
查看: 130

书籍 System Requirements Analysis

The serious study of the practice of how to determine the appropriate content of a specification is a seldom-appreciated pastime. Those who have the responsibility to design a product would prefer a greater degree of freedom than permitted by the con- tent of a specification. Many of those who would ...
https://www.eeworm.com/dl/522132.html
下载: 1
查看: 61

书籍 Auto-Machine-Learning-Methods-Systems-Challenges

The past decade has seen an explosion of machine learning research and appli- cations; especially, deep learning methods have enabled key advances in many applicationdomains,suchas computervision,speechprocessing,andgameplaying. However, the performance of many machine learning methods is very sensi ...
https://www.eeworm.com/dl/522489.html
下载: 1
查看: 21