虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

these

  • JLAB is a set of Matlab functions I have written or co-written over the past fifteen years for the p

    JLAB is a set of Matlab functions I have written or co-written over the past fifteen years for the purpose of analyzing data. It consists of four hundred m-files spanning thirty thousand lines of code. JLAB includes functions ranging in complexity from one-line aliases to high-level algorithms for certain specialized tasks. these have been collected together and made publicly available for you to use, modify, and --- subject to certain very reasonable constraints --- to redistribute. Some of the highlights are: a suite of functions for the rapid manipulation of multi-component, potentially multi-dimensional datasets a systematic way of dealing with datasets having components of non-uniform length tools for fine-tuning figures using compact, straightforward statements and specialized functions for spectral and time / frequency analysis, including advanced wavelet algorithms developed by myself and collaborators.

    标签: co-written functions the fifteen

    上传时间: 2014-01-26

    上传用户:hjshhyy

  • 用fpga实现的DA转换器

    用fpga实现的DA转换器,有说明和源码,VDHL文件。 A PLD Based Delta-Sigma DAC Delta-Sigma modulation is the simple, yet powerful, technique responsible for the extraordinary performance and low cost of today s audio CD players. The simplest Delta-Sigma DAC consists of a Delta-Sigma modulator and a one bit DAC. Since, both of these components can be realized using digital circuits, it is possible to implement a low precision Delta-Sigma DAC using a PLD.

    标签: fpga DA转换器

    上传时间: 2016-06-10

    上传用户:bjgaofei

  • ssd8考试一 计算机网络 A Web proxy server listens to requests, then retrieves the requested files from othe

    ssd8考试一 计算机网络 A Web proxy server listens to requests, then retrieves the requested files from other Web servers and serves them to the clients. these proxy servers are useful in certain situations, such as on firewalls, where they can allow access to certain pages and deny access to others

    标签: requested retrieves requests listens

    上传时间: 2014-01-05

    上传用户:四只眼

  • A Web proxy server listens to requests, then retrieves the requested files from other Web servers an

    A Web proxy server listens to requests, then retrieves the requested files from other Web servers and serves them to the clients. these proxy servers are useful in certain situations, such as on firewalls, where they can allow access to certain pages and deny access to others

    标签: Web requested retrieves requests

    上传时间: 2014-01-25

    上传用户:xiaohuanhuan

  • Of the password is: Server: "1." Client: + for the month of the date of the machine. Such as

    Of the password is: Server: "1." Client: + for the month of the date of the machine. Such as "2005/08/05", compared with the number "85" Database: "xzxq". I made the changes: 1, stations and customer-service once every 30 seconds to exchange information (to ensure continuous line) 2, computer services-an increase of the serial number 3, client-service to send the card serial number and send IP addresses to the service side 4, the desktop client by the embargo, since the definition of the icon to start the process faster (from the window Superman Code) 5, CS-shielding some function keys, but CTRL + ALT + DEL keys can not shield the hope that a revised modify these friends 6, there are some corners of Laws (such as title, etc.). Client desktop icon in the Settings page set up first class to enter FXZWN999 open on to add, delete icon button

    标签: the password machine Client

    上传时间: 2016-06-27

    上传用户:xsnjzljj

  • T-kernel 的extension源代码

    T-kernel 的extension源代码,是日本最著名的T-kernel所独有的,适合开发T-kernel的朋友们使用! TK/SE is the program that extends T-Kernel and provides the functions such as a file system and a process management. The TK/SE archive to be provided is comprised of the main portion and the 2 extended file system portions, and TK/SE object is built by adding these to T-Kernel source. a) tkernel_se_1.00.00.tar.gz Main source of T-Kernel/SE b) extfs_fatfs_1.00.00.tar.gz Difference source of T-Kernel/SE extended file system (FAT) c) extfs_cdrom_1.00.00.tar.gz Difference source of T-Kernel/SE extended file system (CD-ROM)

    标签: extension T-kernel 源代码

    上传时间: 2014-01-20

    上传用户:czl10052678

  • This book is the culmination of more than 20 years of building, studying, and teaching real-time sys

    This book is the culmination of more than 20 years of building, studying, and teaching real-time systems. The author’s travels have taken him to NASA, UPS, Lockheed Martin, the Canadian and Australian Defense Forces, MIT’s Charles Stark Draper Labs, and many other places. these visits and interactions with literally hundreds of students from such places as Boeing, Motorola, and Siemens have resulted in a wider understanding of real-time systems and particularly their real application. This book is, in essence, a compendium of these experiences. The author’s intent is to provide a practical framework for software engineers to design and implement real-time systems. This approach is somewhat different from that of other texts on the subject.

    标签: culmination real-time building studying

    上传时间: 2014-01-01

    上传用户:fnhhs

  • A major goal of this book is to show to make devices that are inherently reliable by design. While a

    A major goal of this book is to show to make devices that are inherently reliable by design. While a lot of attention has been given to “quality improvement,” the majority of the emphasis has been placed on the processes that occur after the design of a product is complete. Design deficiencies are a significant problem, and can be exceedingly difficult to identify in the field. these types of quality problems can be addressed in the design phase with relatively little effort, and with far less expense than will be incurred later in the process. Unfortunately, there are many hardware designers and organizations that, for various reasons, do not understand the significance and expense of an unreliable design. The design methodology presented in this text is intended to address this problem.

    标签: inherently reliable devices design

    上传时间: 2016-07-30

    上传用户:xiaodu1124

  • Abstract—Wireless networks in combination with image sensors open up a multitude of previously unth

    Abstract—Wireless networks in combination with image sensors open up a multitude of previously unthinkable sensing applications. Capable tools and testbeds for these wireless image sensor networks can greatly accelerate development of complex, yet efficient algorithms that meet application requirements. In this paper, we introduce WiSNAP, a Matlab-based application development platform intended for wireless image sensor networks. It allows researchers and developers of such networks to investigate, design, and evaluate algorithms and applications using real target hardware. WiSNAP offers standardized and easy-to-use Application Program Interfaces (APIs) to control image sensors and wireless motes, which do not require detailed knowledge of the target hardware. Nonetheless, its open system architecture enables support of virtually any kind of sensor or wireless mote. Application examples are presented to illustrate the usage of WiSNAP as a powerful development tool.

    标签: combination previously multitude Abstract

    上传时间: 2013-12-03

    上传用户:D&L37

  • C/C++ Reference There are no "Introduction to Programming" tutorials here. This site is meant to

    C/C++ Reference There are no "Introduction to Programming" tutorials here. This site is meant to be used by more-or-less experienced C++ programmers, who have a good idea of what they want to do and simply need to look up the syntax. If you re interested in learning C/C++, try one of these sites: How C Programming Works C Programming C++ Language Tutorial

    标签: Introduction Programming Reference tutorials

    上传时间: 2014-07-26

    上传用户:ljmwh2000