-
H.264中二进制算术编码的硬件实现 H_264
H.264中二进制算术编码的硬件实现Binary arithmetic coding in H.264 hardware implementation(Binary arithmetic coding in H.264 hardware implementation)
- 2020-06-28 14:20:02下载
- 积分:1
-
Impact-of-EV-Charging
电动汽车充电策略对高峰需求减少和负荷因数的影响 (Impact of EV Charging Strategies on Peak Demand Reduction and Load Factor Improvement)
- 2017-04-05 23:12:52下载
- 积分:1
-
LanVisa
内网管理
相对应SQL 2000数据库文件
相对应SQL 2000数据库文件(相对应SQL 2000数据库文件)
- 2009-11-15 12:33:05下载
- 积分:1
-
BMS
绿色能源,电动汽车动力电池管理系统(BMS)设计资料(According to the important status of
power management system in the autocar powersystem the importance of test for power system has been discussed.)
- 2010-11-21 17:09:54下载
- 积分:1
-
Box-optimal-allocation-problem
箱子最优分配——有n个集装箱要装上1艘载重量分别为c的轮船,其中第i个集装箱的重量为wi。最优装载问题要求确定在装载体积不受限制的情况下,将尽可能多的集装箱装上轮船,并找出一种装载方案
输入(Box optimal allocation- there are n containers to be loaded on a ship load of c, respectively, where the i-th container weight wi. Required to determine the optimal loading problem in the case of unrestricted loading volume, as many containers loaded on ships, and to find a loading program input)
- 2014-07-16 15:15:21下载
- 积分:1
-
nn-ocr
example matlab code for character recognition
- 2010-01-22 12:08:14下载
- 积分:1
-
考勤管理系统设计方案
这是一个考勤管理系统的设计方案.. 里面含:流程图,ER图,源代码. 欢迎大家来(This is an appraisal management system design .. inside containing : flowchart, ER map, the source code. Welcome everyone to see )
- 2020-06-26 08:40:01下载
- 积分:1
-
vm
说明: Owing to the broad application value of audio
watermarking in remote transmission and mobile
extraction, it is very important to study watermarking
approaches against A/D and D/A conversion. Based
on wavelet decomposition and cepstrum technology,
an audio watermarking algorithm is proposed where
the low-frequency wavelet coefficients are chosen for
cepstrum transforming. Then, the obtained cepstrum
data shows stable for watermark hiding by the
methods of edging data cutting and statistical mean
modification. The synchronization is not required in
the algorithm. Experimental results show that the
proposed algorithm can resist on the attack of A/D
and D/A successfully with features of large capacity
and zero bit error. It will be helpful for the mobile
audio in secure broadcast and management in the
- 2010-02-05 01:56:27下载
- 积分:1
-
The-Control-Strategy-Inverter
在风力发电网侧逆变器动态数学模型基础上 采用空间矢量脉冲宽度调制 SVPWM 方式和电网电压合成矢量定向 实现了电流有功分量和无功分量的解耦及功率因数的可调控制.(Dynamic mathematical model based on wind power grid-side inverter the resultant vector of the vector mode and the grid voltage space vector pulse width modulation directed to achieve a decoupling of the current active component and reactive component and power factor adjustable control.)
- 2012-04-19 16:09:56下载
- 积分:1
-
LOAD
文件为基于蒙特卡洛模型的电动车充电负荷计算,包括电动公交车,电动私家车和电动出租车等(The calculations are based on Monte Carlo models for electric vehicle charging, including electric buses, electric private cars, and electric taxis)
- 2017-10-09 14:28:03下载
- 积分:1