搜索资源列表
12334566dcs
- 这里是DCS教程,包括DCS的发展历史发展前景,技术情况,和PLC比较的优势与缺点.是了解DCS的好资料-DCS Guide is here, including the history of development of DCS development prospects, technology, and PLC compare the strengths and weaknesses. DCS is a good understanding of the information
imregister
- In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data
JPEGanJPEG2000final
- The purpose of this study is to compare between the to methods which is JPEG and JPEG2000 that are using in lossless image compression .
capacitymimo
- This paper deals with the capacity behavior of wireless Orthogonal Frequency Division Multiplexing (OFDM)-based spatial multiplexing system when considering realistic channel delay profiles. In both the SISO and the MIMO contexts, we compare the
ControlOptimization
- In this paper it is studied the modeling and control of a robotic bird. The results are positive for the design and construction of flying robots and a new generation of airplanes developed to the similarity of flying animals. The development of comp
ders4_2007
- Develop two different implementations of Snake model by using a Greedy algorthm and an Gradient Descent method. Compare results. Put all details and results in your report.
ders5_2007
- Develop two different implementations of Snake model by using a Greedy algorthm and an Gradient Descent method. Compare results. Put all details and results in your report.
ders6_2007
- Develop two different implementations of Snake model by using a Greedy algorthm and an Gradient Descent method. Compare results. Put all details and results in your report.
ders7_2006
- Develop two different implementations of Snake model by using a Greedy algorthm and an Gradient Descent method. Compare results. Put all details and results in your report.
ders8_2006
- Develop two different implementations of Snake model by using a Greedy algorthm and an Gradient Descent method. Compare results. Put all details and results in your report.
110-35-10kV
- 为满足经济发展的需要,根据有关单位的决定修建1座110KV盐北变电所。 本工程初步设计内容包含变电所电气设计,新建的盐北变电所从110KV侧东郊变电所受电,其负荷分为35KV和10KV两个电压等级。 通过技术和经济比较,现采用下列方案: 1. 内设两台三绕组变压器,电压等级为121/37.8/11。 2. 110KV进线采用内桥接线形式。 3. 本工程初步设计内容包括变电所电气设计。 4. 35KV和10KV配电装置同样采用单母线分段接线。 5. 所用电分别从10KV
S1G_Shear-Force-And-Bending-Moment
- The Shear Force at any point along the beam is the total forces acting perpendicular to beam longitudinal axis up to the point. The bending moment at any point along the beam is equal to the area under the shear force diagram up to that point. (Note:
science4
- The current European Union (EU) energy policy seeks to reach a balance between sustainable development, competitiveness and secure supply. In this sense, the EU energy policy sets the target of a 13 share of renewable energy sources (RESs) for B
ajp-jp3v7p2433
- The current European Union (EU) energy policy seeks to reach a balance between sustainable development, competitiveness and secure supply. In this sense, the EU energy policy sets the target of a 13 share of renewable energy sources (RESs) for B
DiskUtils
- package to compare two folders
FACE3D
- Abstract. We present a novel 3D face recognition approach based on geometric invariants introduced by Elad and Kimmel. The key idea of the proposed algorithm is a representation of the facial surface, invari- ant to isometric deformations, such
Comparing-the-real-time-scheduling-policies-of-th
- By Le Trung Thang,April 2012 By default, the Linux kernel build used in the many open source distributions is the normal/default kernel which doesn’t support real time scheduling. If an embedded developer wants to compare the scheduling policies
79e41508a9edd0a2a1
- Arabic writer identifi cation is a very active re- search fi eld. However, no standard benchmark is available for researchers in this fi eld. The aim of this competition is to gather researchers and compare recent advances in Arabic wr
IPSec--VPN-and-SSL-VPN
- 内容简介:在解决远程安全访问方面目前有两种热门的vPN技术:IPsec vPN和sSL VPN。通过对这两种VPN技术在安全性、可扩展性、使用方便性和可控制性等特点的分析和比较,给出了两种VPN技术各自适合的应用领域。-Introduction: In terms of solving secure remote access vPN There are two popular techniques: IPsec vPN and sSL VPN. Through these two VPN te
kurtosises
- Kurtosis calculate of blurred and restored image and compare them