XAPP520将符合2.5V和3.3V I/O标准的7系列FPGA高性能I/O Bank进行连接
The I/Os in Xilinx® 7 series FPGAs are classified as either high range (HR) or high performance (HP) banks. HR I/O banks can be operated from 1.2V to 3.3V, whereas HP I/O banks are optimized for operation between 1.2V and ...
XAPP520将符合2.5V和3.3V I/O标准的7系列FPGA高性能I/O Bank进行连接
The I/Os in Xilinx® 7 series FPGAs are classified as either high range (HR) or high performance (HP) banks. HR I/O banks can be operated from 1.2V to 3.3V, whereas HP I/O banks are optimized for operation between 1.2V and ...
The purpose of this chapter is to present a survey of recent publications concerning medical
image registration techniques. These publications will be classified according to a model based
on nine salient criteria, the main dichotomy of which is extrinsic versus intrinsic methods
This data set contains WWW-pages collected from computer science departments of various universities in January 1997 by the World Wide Knowledge Base (Web->Kb) project of the CMU text learning group. The 8,282 pages were manually classified into the following categories:
student (1641)
faculty (11 ...
This is the source code for encryption using the latest AES algorithm.
AES algorithm is also called Rijndael algorithm. AES algorithm is
recommended for non-classified use by the National Institute of Standards
and Technology(NIST), USA. Now-a-days AES is being used for almost
all encryption appl ...
This course is about "distributed algorithms".Distributed algorithms include a wide range of parallel algorithms,which can be classified by a variety of attributes.
The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of classified examples a decision tree is induced, biased by the information gain measure, which heuristically leads to small trees. The examples are given in attribute-value representation. The set of poss ...
Wireless penetration has witnessed explosive growth over the last two decades.
Accordingly, wireless devices have become much denser per unit area, resulting
in an overcrowded usage of wireless resources. To avoid radio interferences and
packet collisions, wireless stations have to exchange control ...
In the first chapter, the topic of this book is classified into the area of pervasive com-
puting. Further, security and privacy in the scope of RFID technology is motivated
and the vision that guides the remainder of this book is introduced.