虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

user-space

  • documentation for optimal filtering toolbox for mathematical software package Matlab. The methods i

    documentation for optimal filtering toolbox for mathematical software package Matlab. The methods in the toolbox include Kalman filter, extended Kalman filter and unscented Kalman filter for discrete time state space models. Also included in the toolbox are the Rauch-Tung-Striebel and Forward-Backward smoother counter-parts for each filter, which can be used to smooth the previous state estimates, after obtaining new measurements. The usage and function of each method are illustrated with five demonstrations problems. 1

    标签: documentation mathematical for filtering

    上传时间: 2014-01-20

    上传用户:changeboy

  • documentation for optimal filtering toolbox for mathematical software package Matlab. The methods i

    documentation for optimal filtering toolbox for mathematical software package Matlab. The methods in the toolbox include Kalman filter, extended Kalman filter and unscented Kalman filter for discrete time state space models. Also included in the toolbox are the Rauch-Tung-Striebel and Forward-Backward smoother counter-parts for each filter, which can be used to smooth the previous state estimates, after obtaining new measurements. The usage and function of each method are illustrated with five demonstrations problems. 1

    标签: documentation mathematical for filtering

    上传时间: 2013-12-10

    上传用户:zxc23456789

  • This taglib contains tags used to create struts input forms, as well as other tags generally useful

    This taglib contains tags used to create struts input forms, as well as other tags generally useful in the creation of HTML-based user interfaces. Many of the tags in this tag library will throw a JspException at runtime when they are utilized incorrectly (such as when you specify an invalid combination of tag attributes). JSP allows you to declare an "error page" in the <%@ page %> directive. If you wish to process the actual exception that caused the problem, it is passed to the error page as a request attribute under key org.apache.struts.action.EXCEPTION.

    标签: tags generally contains taglib

    上传时间: 2017-02-21

    上传用户:dianxin61

  • Freetz is a firmware-extension (modification) for the AVM Fritz!Box and devices with identical hardw

    Freetz is a firmware-extension (modification) for the AVM Fritz!Box and devices with identical hardware. The original firmware from the manufacturer is extended with new functions and programs which may be selected by the user

    标签: firmware-extension modification identical devices

    上传时间: 2014-12-08

    上传用户:qw12

  • Murphy 大俠 GPL 的 C++/x86 RTOS, 支持 MMU, 用戶/核心 模式區隔. http://hpc.ee.ntu.edu.tw/~murphy/me/EKernel.html

    Murphy 大俠 GPL 的 C++/x86 RTOS, 支持 MMU, 用戶/核心 模式區隔. http://hpc.ee.ntu.edu.tw/~murphy/me/EKernel.html part 2 of 3: user mode LIB

    标签: EKernel Murphy murphy RTOS

    上传时间: 2013-12-23

    上传用户:小鹏

  • cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used

    cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used to calculate a whole range of scientific functions including sin, cos, tan, arctan, arcsin, arccos, sinh, cosh, tanh, arctanh, log, exp, square root and even multiply and divide. the method dates back to volder [1959], and due to its versatility and compactness, it made possible the microcoding of the hp35 pocket scientific calculator in 1972. here is some code to illustrate the techniques. ive split the methods into three parts linear, circular and hyperbolic. in the hp35 microcode these would be unified into one function (for space reasons). because the linear mode can perform multiply and divide, you only need add/subtract and shift to complete the implementation. you can select in the code whether to do the multiples and divides also by cordic means. other multiplies and divides are all powers of 2 (these dont count). to eliminate these too, would involve ieee hackery.

    标签: essentially algorithm describe suitably

    上传时间: 2017-03-02

    上传用户:litianchu

  • Java technology is both a programming language and a platform. The Java programming language origina

    Java technology is both a programming language and a platform. The Java programming language originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time operating platform. When the project started, C++ was the language of choice. But over time the difficulties encountered with C++ grew to the point where the problems could best be addressed by creating an entirely new language platform. Design and architecture decisions drew from a variety of languages such as Eiffel, SmallTalk, Objective C, and Cedar/Mesa. The result is a language platform that has proven ideal for developing secure, distributed, network-based end-user applications in environments ranging from network-embedded devices to the World-Wide Web and the desktop

    标签: programming language Java technology

    上传时间: 2014-01-03

    上传用户:huangld

  • Windows Mobile NLED driver proxy. Created for customization of incoming call ring vibration. While

    Windows Mobile NLED driver proxy. Created for customization of incoming call ring vibration. While original Windows Mobile ring vibration constant vibrating during all ring, this driver help to apply any user vibrating pattern.

    标签: customization vibration incoming Windows

    上传时间: 2017-03-07

    上传用户:498732662

  • This project demonstrates the use of secure hash functions technique to implement a file encryption

    This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.

    标签: demonstrates encryption functions implement

    上传时间: 2017-03-08

    上传用户:xuanchangri

  • This project demonstrates the use of secure hash functions technique to implement a file encryption

    This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.

    标签: demonstrates encryption functions implement

    上传时间: 2014-01-10

    上传用户:yyq123456789