- <br>Level of Detail for 3D Graphics<br><br>作者: David Luebke , Martin Reddy , Jonathan D. Cohen , Amitabh Varshney , Benjamin Watson , Robert Huebner <br><br>出版:Morgan Kaufmann <br><br><br>The Morgan Kaufmann Series in Computer Graphics and Geometric Modeling<br><br>Series Editor: Brian A. Barsky, University of California, Berkeley<br><br><br><br><br><br>Level of detail (LOD) techniques are increasingly used by professional real-time developers to strike the balance between breathtaking virtual worlds and smooth, flowing animation. Level of Detail for 3D Graphics brings together, for the first time, the mechanisms, principles, practices, and theory needed by every graphics developer seeking to apply LOD methods.<br><br>Continuing advances in level of detail management have brought this powerful technology to the forefront of 3D graphics optimization research. This book, written by the very researchers and developers who have built LOD technology, is both a state-of-the-art chronicle of LOD advances and a practical sourcebook, which will enable graphics developers from all disciplines to apply these formidable techniques to their own work.<br><br>This Book:<br>* Is a complete, practical resource for programmers wishing to incorporate LOD technology into their own systems.<br>* Is an important reference for professionals in game development, computer animation, information visualization, real-time graphics and simulation, data capture and preview, CAD display, and virtual worlds.<br>* Is accessible to anyone familiar with the essentials of computer science and interactive computer graphics.<br>* Covers the full range of LOD methods from mesh simplification to error metrics, as well as advanced issues of human perception, temporal detail, and visual fidelity measurement.<br>* Includes an accompanying Web site rich in supplementary material including source code, tools, 3D models, public domain software, documentation, LOD updates, and more.<br><br><br><br>http://pixhost.eu/avaxhome/gfxworld/2007-01-01/lod_3d_gfx.jpg<br><br><br>http://www.amazon.com/Detail-Graphics-Morgan-Kaufmann-Computer/dp/1558608389<br><br><br>http://www.ebookee.com.cn/Level-of-Detail-for-3D-Graphics_150488.html<br><br><br>5 340浏览会员免费
- ACCESS数据库\Access2007实用教程.pdf4 586浏览会员免费
- 还是比较不错的一个文档,对mfc通过ado连接access数据库有很详细的介绍,自习阅读一下,是可以看明白的5 1306浏览会员免费
- BC417: BAPI Development for Accessing SAP Components<br>开发自定义 BAPI 的方法4 80浏览会员免费
- Welcome to TestDirector Administration........................................... vii<br>Using This Guide ............................................................................... viii<br>TestDirector Documentation Set....................................................... viii<br>Online Resources ..................................................................................ix<br>Documentation Updates .......................................................................x<br>Typographical Conventions..................................................................x<br>PART I: PROJECT CUSTOMIZATION<br>Chapter 1: Project Customization at a Glance .....................................3<br>Starting Project Customization .............................................................3<br>Understanding the Project Customization Window ............................7<br>Chapter 2: Managing Users in a Project ...............................................9<br>About Managing Users in a Project .......................................................9<br>Adding a User to a Project ...................................................................10<br>Assigning Users to a User Group.........................................................12<br>Removing a User from a Project..........................................................14<br>Chapter 3: Managing User Groups and Permissions..........................15<br>About Managing User Groups and Permissions .................................16<br>Adding User Groups ............................................................................17<br>Setting User Group Permissions .........................................................19<br>Setting Transition Rules ......................................................................23<br>Hiding Data for a User Group .............................................................27<br>Assigning Existing Sets of Permissions to User Groups ......................30<br>Renaming User Groups .......................................................................30<br>Deleting User Groups ..........................................................................31<br>Understanding the Permission Settings Tasks ....................................31<br>Customizing Module Access for User Groups .....................................42<br>Chapter 4: Customizing TestDirector Projects ..................................45<br>About Customizing TestDirector Projects ...........................................45<br>Customizing Project Entities ..............................................................46<br>Customizing Project Lists ...................................................................55<br>Chapter 5: Setting the Mailing Configuration ...................................59<br>About Setting the Mailing Configuration...........................................59<br>Designating Mail Fields .......................................................................60<br>Defining Mail Conditions ...................................................................61<br>Chapter 6: Setting Traceability Notification Rules .............................63<br>About Setting Traceability Notification Rules.....................................63<br>Setting Traceability Notification Rules................................................65<br>Chapter 7: Setting Up the TestDirector Workflow ............................67<br>About Setting Up the TestDirector Workflow.....................................68<br>Customizing Lists ................................................................................70<br>Customizing Fields by User Groups ....................................................72<br>Using the Script Editor ........................................................................76<br>Understanding TestDirector Events ....................................................86<br>Reference for TestDirector Events .......................................................87<br>Understanding TestDirector Objects.................................................102<br>Understanding the Actions Object ...................................................103<br>Understanding the Action Object .....................................................104<br>Understanding the x_Fields Objects .................................................105<br>Understanding the Field Object ........................................................106<br>Understanding the Lists Object ........................................................108<br>Understanding the User Object ........................................................109<br>PART II: SITE ADMINISTRATION<br>Chapter 8: Site Administrator at a Glance........................................113<br>Starting the Site Administrator .........................................................113<br>The Site Administrator ......................................................................116<br>Changing the Site Administrator Password ......................................117<br><br>Chapter 9: Managing TestDirector Projects ....................................119<br>About Managing TestDirector Projects .............................................120<br>Understanding the TestDirector Project Structure............................121<br>Creating TestDirector Domains.........................................................123<br>Creating TestDirector Projects ..........................................................125<br>Copying TestDirector Projects...........................................................138<br>Updating Project Details ...................................................................141<br>Querying Project Tables ....................................................................144<br>Upgrading Projects ............................................................................146<br>Deactivating and Activating Projects ................................................151<br>Pinging Projects .................................................................................152<br>Renaming Projects .............................................................................152<br>Removing Projects from the Projects List .........................................153<br>Deleting Projects................................................................................153<br>Deleting Domains..............................................................................154<br>Editing the Connection String ..........................................................155<br>Restoring Project Access ....................................................................157<br>Backing Up TestDirector Projects ......................................................161<br>Renaming the Defects Module for a Project .....................................162<br>Chapter 10: Managing TestDirector Users .......................................163<br>About Managing Users ......................................................................163<br>Adding a New User ...........................................................................164<br>Importing a New User .......................................................................166<br>Defining User Properties ...................................................................168<br>Changing Passwords..........................................................................169<br>Enabling Users to Work with Windows Authentication ..................170<br>Deleting Users....................................................................................172<br>Chapter 11: Managing User Connections and Licenses ...................173<br>About Managing User Connections and Licenses ............................173<br>Monitoring User Connections .........................................................174<br>Managing TestDirector Licenses........................................................175<br>Chapter 12: Configuring Servers and Parameters............................177<br>About Configuring Servers and Parameters ......................................177<br>Configuring TestDirector Server Information ..................................178<br>Defining New Database Servers ........................................................181<br>Modifying Database Server Properties ..............................................184<br>Deleting Database Servers .................................................................187<br>Setting TestDirector Configuration Parameters ...............................187<br>Appendix A: TestDirector 7.6 and 8.0: Migration Process ...............195<br>Migrating Project Databases ..............................................................196<br>Migrating Project Directories ............................................................198<br>Migrating Domain Repositories ........................................................199<br>Migrating TestDirector Servers ..........................................................202<br>Oracle Database Operations ..............................................................208<br>Microsoft SQL Database Operations .................................................211<br>Sybase Database Operations..............................................................214<br>Checking Project Directories.............................................................217<br>Project Sanity Template.....................................................................219<br>Appendix B: TestDirector 7.2: Guidelines for Upgrading ................221<br>About Creating a Staging Environment............................................221<br>Creating a Staging Environment.......................................................222<br>Index..................................................................................................227<br><br>4 86浏览会员免费
- BC417: BAPI Development for Accessing SAP Components<br>开发自定义 BAPI 的方法4 202浏览会员免费
- OPC UA 规范 总共11部分: OPC+UA+Part+1+-+Concepts+1[1].00+Specification OPC+UA+Part+2+-+Security+Model+1[1].00+Specification OPC+UA+Part+3+-+Address+Space+Model+1[1].00+Specification OPC+UA+Part+4+-+Services+Draft+1[1].01.05+Specification OPC+UA+Part+5+-+Information+Model+1[1].00+Specification OPC+UA+Part+6+-+Mappings+RC0[1].93+Specification OPC+UA+Part+7+-+Profiles+Draft0[1].23+Specification OPC+UA+Part+8+-++Data+Access+1[1].00+Specification OPC+UA+Part+9+Alarms+Draft+v0[1].62 OPC+UA+Part+10+-+Programs+1[1].00+Specification OPC+UA+Part+11+-+Historical+Access+1[1].00+Specification4 269浏览会员免费
- Access 2007中文版入门与实例教程, 实例丰富.5 519浏览会员免费
- 【作者】: Ezio Biglieri Robert Calderbank, Anthony Constantinides, Andrea Goldsmith, Arogyaswami Paulraj and H. Vincent Poor 【ISBN 】: 978-0-521-87328-4 【页数 】:339 【开本 】 :16 【出版社】 :Cambridge University Press 【出版日期】:2007 【文件格式】:pdf 【目录】: 1 Introduction 1 1.1 MIMO wireless communication 1 1.2 MIMO channel and signal model 4 1.3 A fundamental trade-off 8 1.4 MIMO transceiver design 11 1.5 MIMO in wireless networks 15 1.6 MIMO in wireless standards 18 1.7 Organization of the book and future challenges 19 1.8 Bibliographical notes 20 References 20 2 Capacity limits of MIMO systems 24 2.1 Introduction 24 2.2 Mutual information and Shannon capacity 25 2.3 Single-user MIMO 29 2.4 Multi-user MIMO 49 2.5 Multi-cell MIMO 66 2.6 MIMO for ad hoc networks 69 2.7 Summary 75 2.8 Bibliographical notes 77 References 77 3 Precoding design 88 3.1 Transmit channel side information 89 3.2 Information-theoretic foundation for exploiting CSIT 95 3.3 A transmitter structure 100 3.4 Precoding design criteria 103 3.5 Linear precoder designs 109 3.6 Precoder performance results and discussion 122 3.7 Applications in practical systems 127 3.8 Conclusion 132 3.9 Bibliographical notes 133 Appendix 3.1 133 References 135 4 Space–time coding for wireless communications: principles and applications 140 4.1 Introduction 140 4.2 Background 141 4.3 Space–time coding principles 149 4.4 Applications 161 4.5 Discussion and future challenges 174 4.6 Bibliographical notes 176 Appendix 4.1 Algebraic structure: quadratic forms 177 References 180 5 Fundamentals of receiver design 186 5.1 Introduction 186 5.2 Reception of uncoded signals 186 5.3 Factor graphs and iterative processing 190 5.4 MIMO receivers for uncoded signals 202 5.5 MIMO receivers for coded signals 206 5.6 Some iterative receivers 223 5.7 Bibliographical notes 226 References 227 6 Multi-user receiver design 230 6.1 Introduction 230 6.2 Multiple-access MIMO systems 231 6.3 Iterative space–time multi-user detection 245 6.4 Multi-user detection in space–time coded systems 256 6.5 Adaptive linear space–time multi-user detection 271 6.6 Summary 288 6.7 Bibliographical notes 289 References 289 Bibliography 293 Index 3155 250浏览会员免费
- This standard defines a test access port and boundary-scan architecture for digital integrated circuits and for<br>the digital portions of mixed analog/digital integrated circuits. The facilities defined by the standard seek to<br>provide a solution to the problem of testing assembled printed circuit boards and other products based on<br>highly complex digital integrated circuits and high-density surface-mounting assembly techniques. They<br>also provide a means of accessing and controlling design-for-test features built into the digital integrated circuits<br>themselves. Such features might, for example, include internal scan paths and self-test functions as<br>well as other features intended to support service applications in the assembled product.5 461浏览会员免费
- Office 2003 教程完全指南,word2003,Excel2003,Access,全部包含5 116浏览会员免费
- For courses in Adaptive Filters. Haykin examines both the mathematical theory behind various linear adaptive filters and the elements of supervised multilayer perceptrons. In its fourth edition, this highly successful book has been updated and refined to stay current with the field and develop concepts in as unified and accessible a manner as possible.5 331浏览会员免费
- Haskell is one of the leading languages for teaching functional programming, enabling students to write simpler and cleaner code, and to learn how to structure and reason about programs. This introduction is ideal for beginners: it requires no previous programming experience and all concepts are explained from first principles via carefully chosen examples. Each chapter includes exercises that range from the straightforward to extended projects, plus suggestions for further reading on more advanced topics. The author is a leading Haskell researcher and instructor, well-known for his teaching skills. The presentation is clear and simple, and benefits from having been refined and class-tested over several years. The result is a text that can be used with courses, or for self-learning. Features include: freely accessible powerpoint slides for each chapter; solutions to exercises, and examination questions (with solutions) available to instructors; downloadable code that's fully compliant with the latest Haskell release.5 97浏览会员免费
- 网上收集,只限个人学习参考,不能用于商业。谢谢大家。0 5853浏览会员免费
- 802.3at-2009 IEEE Standard for Information Technology--Part 3: CSMA/CD Access Method and Physical Layer Specifications - Amendment 3: Data Terminal Equipment (DTE) Power via the Media Dependent Interface (MDI) Enhancements. This amendment is to augment the capabilities of the IEEE Std 802.3 with higher power levels and improved power management information. It will augment the methodology for the provision of power via balanced cabling to connected Data Terminal Equipment with IEEE 802.3 interfaces. Optional augmented power limit will be made available for certain structured cabling systems. Compatibility with existing equipment will be maintained. http://grouper.ieee.org/groups/802/3/ Amendment of IEEE Std 802.3-2008 Price: Member and Affiliate Price: $77.00 Non-Member Price: $99.00 Part Number: STD95959 Format: PDF Pages: 141 Standard Number: 802.3at-2009 Publication Date: 30/10/20095 150浏览会员免费
- 802.11n-2009 IEEE Standard for Information Technology-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment : Enhancements for Higher Throughput This amendment defines modifications to both the 802.11 physical layers (PHY) and the 802.11 Medium Access Control Layer (MAC) so that modes of operation can be enabled that are capable of much higher throughputs, with a maximum throughput of at least 100 Mb/s, as measured at the MAC data service access point (SAP). http://grouper.ieee.org/groups/802/11/ Amendment to IEEE Std 802.11-2007. Other amendments are 802.11r-2008, 802.11k-2008, 802.11y-2008, and 802.11w-2009 Price: Member and Affiliate Price: $133.00 Non-Member Price: $165.00 Part Number: STD95961 Format: PDF Pages: 536 Standard Number: 802.11n-2009 Publication Date: 29/10/20095 288浏览会员免费
- With the latest release of the Xcode Developer Tools, the new developer has access to a formidable tool-chest for Mac and iPhone development that is easier to use than any previous version. The missing piece, to me, has always been a simple and clear description of the tools and technologies needed to write for the Mac and iPhone. That is why I have written this book.5 136浏览会员免费
- Quartz 2D is an advanced, two-dimensional drawing engine available for iPhone application development and to all Mac OS X application environments outside of the kernel. Quartz 2D provides low-level, lightweight 2D rendering with unmatched output fidelity regardless of display or printing device. Quartz 2D is resolutionand device-independent; you don’t need to think about the final destination when you use the Quartz 2D application programming interface (API) for drawing. The Quartz 2D API is easy to use and provides access to powerful features such as transparency layers, path-based drawing, offscreen rendering, advanced color management, anti-aliased rendering, and PDF document creation, display, and parsing. The Quartz 2D API is4 106浏览会员免费
- IEEE802.3最新版本(原版) 就最后Section 5给1分就好,谢谢^_^下了一定要看哟 (Revision of IEEE Std 802.3-2005) Section Five—Includes Clause 56 through Clause 74 and Annex 57A through Annex 74A. Clause 56 through Clause 67 and associated annexes specify subscriber access physical layers and sublayers for operation from 512 kb/s to 1000 Mb/s, and defines services and protocol elements that enable the exchange of IEEE Std 802.3 format frames between stations in a subscriber access network. Clause 68 specifies a 10 Gb/s physical layer specification. Clause 69 through Clause 74 and associated annexes specify Ethernet operation over electrical backplanes at speeds of 1000 Mb/s and 10 Gb/s.5 213浏览会员免费
- Complete Digital Design - A Comprehensive Guide to Digital Electronics and Computer System Architecture PART 1 Digital Fundamentals Chapter 1 Digital Logic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 1.1 Boolean Logic / 3 1.2 Boolean Manipulation / 7 1.3 The Karnaugh map / 8 1.4 Binary and Hexadecimal Numbering / 10 1.5 Binary Addition / 14 1.6 Subtraction and Negative Numbers / 15 1.7 Multiplication and Division / 17 1.8 Flip-Flops and Latches / 18 1.9 Synchronous Logic / 21 1.10 Synchronous Timing Analysis / 23 1.11 Clock Skew / 25 1.12 Clock Jitter / 27 1.13 Derived Logical Building Blocks / 28 Chapter 2 Integrated Circuits and the 7400 Logic Families. . . . . . . . . . . . . . . . . . . . .33 2.1 The Integrated Circuit / 33 2.2 IC Packaging / 38 2.3 The 7400-Series Discrete Logic Family / 41 2.4 Applying the 7400 Family to Logic Design / 43 2.5 Synchronous Logic Design with the 7400 Family / 45 2.6 Common Variants of the 7400 Family / 50 2.7 Interpreting a Digital IC Data Sheet / 51 Chapter 3 Basic Computer Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55 3.1 The Digital Computer / 56 3.2 Microprocessor Internals / 58 3.3 Subroutines and the Stack / 60 3.4 Reset and Interrupts / 62 3.5 Implementation of an Eight-Bit Computer / 63 3.6 Address Banking / 67 3.7 Direct Memory Access / 68 3.8 Extending the Microprocessor Bus / 70 3.9 Assembly Language and Addressing Modes / 72 Chapter 4 Memory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77 4.1 Memory Classifications / 77 4.2 EPROM / 79 4.3 Flash Memory / 81 4.4 EEPROM / 85 4.5 Asynchronous SRAM / 86 4.6 Asynchronous DRAM / 88 4.7 Multiport Memory / 92 4.8 The FIFO / 94 Chapter 5 Serial Communications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97 5.1 Serial vs. Parallel Communication / 98 5.2 The UART / 99 5.3 ASCII Data Representation / 102 5.4 RS-232 / 102 5.5 RS-422 / 107 5.6 Modems and Baud Rate / 108 5.7 Network Topologies / 109 5.8 Network Data Formats / 110 5.9 RS-485 / 112 5.10 A Simple RS-485 Network / 114 5.11 Interchip Serial Communications / 117 Chapter 6 Instructive Microprocessors and Microcomputer Elements . . . . . . . . . .121 6.1 Evolution / 121 6.2 Motorola 6800 Eight-bit Microprocessor Family / 122 6.3 Intel 8051 Microcontroller Family / 125 6.4 Microchip PIC® Microcontroller Family / 131 6.5 Intel 8086 16-Bit Microprocessor Family / 134 6.6 Motorola 68000 16/32-Bit Microprocessor Family / 139 PART 2 Advanced Digital Systems Chapter 7 Advanced Microprocessor Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . .145 7.1 RISC and CISC / 145 7.2 Cache Structures / 149 7.3 Caches in Practice / 154 7.4 Virtual Memory and the MMU / 158 7.5 Superpipelined and Superscalar Architectures / 161 7.6 Floating-Point Arithmetic / 165 7.7 Digital Signal Processors / 167 7.8 Performance Metrics / 169 Chapter 8 High-Performance Memory Technologies. . . . . . . . . . . . . . . . . . . . . . . . .173 8.1 Synchronous DRAM / 173 8.2 Double Data Rate SDRAM / 179 8.3 Synchronous SRAM / 182 8.4 DDR and QDR SRAM / 185 8.5 Content Addressable Memory / 188 Chapter 9 Networking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .193 9.1 Protocol Layers One and Two / 193 9.2 Protocol Layers Three and Four / 194 9.3 Physical Media / 197 9.4 Channel Coding / 198 9.5 8B10B Coding / 203 9.6 Error Detection / 207 9.7 Checksum / 208 9.8 Cyclic Redundancy Check / 209 9.9 Ethernet / 215 Chapter 10 Logic Design and Finite State Machines . . . . . . . . . . . . . . . . . . . . . . . . .221 10.1 Hardware Description Languages / 221 10.2 CPU Support Logic / 227 10.3 Clock Domain Crossing / 233 10.4 Finite State Machines / 237 10.5 FSM Bus Control / 239 10.6 FSM Optimization / 243 10.7 Pipelining / 245 Chapter 11 Programmable Logic Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .249 11.1 Custom and Programmable Logic / 249 11.2 GALs and PALs / 252 11.3 CPLDs / 255 11.4 FPGAs / 257 PART 3 Analog Basics for Digital Systems Chapter 12 Electrical Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .267 12.1 Basic Circuits / 267 12.2 Loop and Node Analysis / 268 12.3 Resistance Combination / 271 12.4 Capacitors / 272 12.5 Capacitors as AC Elements / 274 12.6 Inductors / 276 12.7 Nonideal RLC Models / 276 12.8 Frequency Domain Analysis / 279 12.9 Lowpass and Highpass Filters / 283 12.10 Transformers / 288 Chapter 13 Diodes and Transistors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .293 13.1 Diodes / 293 13.2 Power Circuits with Diodes / 296 13.3 Diodes in Digital Applications / 298 13.4 Bipolar Junction Transistors / 300 13.5 Digital Amplification with the BJT / 301 13.6 Logic Functions with the BJT / 304 13.7 Field-Effect Transistors / 306 13.8 Power FETs and JFETs / 309 Chapter 14 Operational Amplifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .311 14.1 The Ideal Op-amp / 311 14.2 Characteristics of Real Op-amps / 316 14.3 Bandwidth Limitations / 324 14.4 Input Resistance / 325 14.5 Summation Amplifier Circuits / 328 14.6 Active Filters / 331 14.7 Comparators and Hysteresis / 333 Chapter 15 Analog Interfaces for Digital Systems . . . . . . . . . . . . . . . . . . . . . . . . . . .339 15.1 Conversion between Analog and Digital Domains / 339 15.2 Sampling Rate and Aliasing / 341 15.3 ADC Circuits / 345 15.4 DAC Circuits / 348 15.5 Filters in Data Conversion Systems / 350 PART 4 Digital System Design in Practice Chapter 16 Clock Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .355 16.1 Crystal Oscillators and Ceramic Resonators / 355 16.2 Low-Skew Clock Buffers / 357 16.3 Zero-Delay Buffers: The PLL / 360 16.4 Frequency Synthesis / 364 16.5 Delay-Locked Loops / 366 16.6 Source-Synchronous Clocking / 367 Chapter 17 Voltage Regulation and Power Distribution . . . . . . . . . . . . . . . . . . . . . .371 17.1 Voltage Regulation Basics / 372 17.2 Thermal Analysis / 374 17.3 Zener Diodes and Shunt Regulators / 376 17.4 Transistors and Discrete Series Regulators / 379 17.5 Linear Regulators / 382 17.6 Switching Regulators / 386 17.7 Power Distribution / 389 17.8 Electrical Integrity / 392 Chapter 18 Signal Integrity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .397 18.1 Transmission Lines / 398 18.2 Termination / 403 18.3 Crosstalk / 408 18.4 Electromagnetic Interference / 410 18.5 Grounding and Electromagnetic Compatibility / 413 18.6 Electrostatic Discharge / 415 Chapter 19 Designing for Success . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .419 19.1 Practical Technologies / 420 19.2 Printed Circuit Boards / 422 19.3 Manually Wired Circuits / 425 19.4 Microprocessor Reset / 428 19.5 Design for Debug / 429 19.6 Boundary Scan / 431 19.7 Diagnostic Software / 433 19.8 Schematic Capture and Spice / 436 19.9 Test Equipment / 440 Appendix A Further Education. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .443 Index 4455 385浏览会员免费
- Today, our imagination is limited by the computer systems we have built. The demand for sophisticated tools has grown faster than the corresponding<br>developments of the supporting science base. Written by one of the leading experts in the Meld of solid-modeling systems, Geometric and Solid Modeling: An Introduction provides the start of a scientimc basis to support the coming revolution in computer-aided design. It deals with the concepts and tools needed to design and implement solidmodeling systems, and makes this information accessible to the novice, as well as to the experienced designer.4 203浏览会员免费
- 经典的关于椭圆方程的书籍,畅销不衰,至今仍是重要的研究椭圆型方程的参考书籍,很多学校将这本书作为讨论班教材5 1316浏览会员免费
- Contents Preface xiii Acknowledgments xv Chapter 1 Communication Electronic Warfare Systems 1 1.1 Introduction 1 1.2 Information Warfare 1 1.3 Electronic Warfare 3 1.3.1 Electronic Support 3 1.3.2 Electronic Attack 4 1.3.3 Electronic Protect 4 1.4 Electronic Support 5 1.4.1 Low Probability of Detection/Interception/Exploitation 7 1.4.2 Future Communication Environments 8 1.4.3 Wired Communications 9 1.4.4 ES Summary 9 1.5 Electronic Attack 10 1.5.1 EA Summary 11 1.6 Typical EW System Configuration 11 1.6.1 System Control 11 1.6.2 Antennas 12 1.6.3 Signal Distribution 13 1.6.4 Search Receiver 13 1.6.5 Set-On Receiver 13 1.6.6 Signal Processing 14 1.6.7 Direction-Finding Signal Processing 14 1.6.8 Exciter 14 1.6.9 Power Amplifier 15 1.6.10 Filters 15 1.6.11 Communications 15 1.7 Concluding Remarks 16 References 16 Chapter 2 Electromagnetic Signal Propagation 19 2.1 Introduction 19 2.2 Signal Propagation 19 2.3 RF Band Designations 20 vi Introduction to Communication Electronic Warfare Systems 2.4 Polarization 22 2.5 Power Density 22 2.6 Free-Space Propagation 24 2.7 Direct Wave 27 2.8 Wave Diffraction 33 2.9 Reflected Waves 35 2.10 Surface Wave 40 2.11 Ducting 41 2.12 Meteor Burst 41 2.13 Scattering 42 2.14 Characteristics of the Mobile VHF Channel 43 2.15 Propagation Via the Ionosphere 46 2.15.1 Ionospheric Layers 46 2.15.2 Refraction 48 2.15.3 Near-Vertical Incidence Sky Wave 50 2.15.4 HF Fading 50 2.15.5 Maximum Usable Frequency and Lowest Usable Frequency 51 2.15.6 Automatic Link Establishment 52 2.16 Concluding Remarks 52 References 53 Chapter 3 Noise and Interference 55 3.1 Introduction 55 3.2 Thermal Noise 56 3.3 Internal Noise Sources 56 3.4 External Noise Sources 57 3.5 Cochannel and Multipath Interference 59 3.6 Concluding Remarks 60 References 60 Chapter 4 Radio Communication Technologies 61 4.1 Introduction 61 4.2 Modulation 63 4.2.1 Amplitude Modulation 65 4.2.2 Angle Modulation 67 4.2.3 Orthogonal Signaling 71 4.2.4 Access Methods 73 4.2.5 Duplexing 77 4.2.6 Digital Signaling 78 4.2.7 Spread Spectrum 97 Contents vii 4.3 Coding of Communication Signals 110 4.3.1 Source Coding for Data Compression 110 4.3.2 Channel Coding for Error Control 115 4.4 Modems 134 4.5 Facsimile 140 4.6 Communication Security 140 4.6.1 Data Encryption 141 4.6.2 Public Key Encryption 141 4.6.3 Digital Signatures 142 4.6.4 Data Encryption Standard 144 4.6.5 Pretty Good Privacy 145 4.6.6 Fortezza Encryption System 146 4.6.7 Escrow Encryption System 147 4.6.8 Over-the-Air Rekeying 148 4.7 Concluding Remarks 148 References 149 Chapter 5 System Engineering 151 5.1 Introduction 151 5.2 System Engineering 151 5.2.1 Performance Characteristics 155 5.2.2 Environmental Characteristics 155 5.2.3 Reliability and Availability 160 5.2.4 Human-Factors Engineering 171 5.2.5 System Cost 174 5.3 Concluding Remarks 175 References 176 Chapter 6 Electronic Support 177 6.1 Introduction 177 6.2 Intercept 177 6.2.1 Internals Versus Externals 178 6.2.2 Propagation Loss 178 6.3 Geolocation 179 6.4 Triangulation with Multiple Bearings 180 6.5 Deployment Considerations 184 6.6 Electronic Mapping 185 6.7 Common Operational Picture 185 6.8 Operational Integration with Other Disciplines 186 6.9 Support to Targeting 187 6.10 Concluding Remarks 187 References 187 viii Introduction to Communication Electronic Warfare Systems Chapter 7 Electronic Attack 189 7.1 Introduction 189 7.2 Communication Jamming 189 7.3 Jammer Deployment 193 7.4 Look-Through 194 7.5 Analog Communications 195 7.6 Digital Communications 196 7.7 Narrowband/Partial-Band Jamming 197 7.8 Barrage Jamming 198 7.9 Jamming LPI Targets 201 7.10 Follower Jammer 202 7.11 Concluding Remarks 203 References 203 Chapter 8 Antennas 207 8.1 Introduction 207 8.2 Isotropic Antenna 209 8.3 Antenna Gain 210 8.4 Wire Antennas 211 8.4.1 Dipole 212 8.4.2 Monopole 214 8.4.3 Loop 215 8.4.4 Biconical/Discone 215 8.4.5 Yagi 216 8.4.6 Log Periodic 216 8.4.7 Helix Antennas 218 8.4.8 Spiral Antennas 220 8.5 Active Antennas 220 8.6 Aperture Antennas 222 8.6.1 Parabolic Dish 222 8.6.2 Antenna Arrays 223 8.7 Genetically Designed Antennas 225 8.8 More on Antenna Gain 226 8.9 Concluding Remarks 228 References 228 Chapter 9 Receivers 231 9.1 Introduction 231 9.2 Receivers 232 9.2.1 RF Amplification and Filtering 234 9.2.2 Sensitivity 236 Contents ix 9.2.3 Dynamic Range 237 9.2.4 Mixing/Frequency Conversion 240 9.2.5 Intermediate Frequency Filtering and Amplification 241 9.2.6 Detection/Demodulation 242 9.3 Types of Receivers 246 9.3.1 Narrowband Receivers 246 9.3.2 Wideband Receivers 250 9.4 Concluding Remarks 263 References 264 Chapter 10 Signal Processing 265 10.1 Introduction 265 10.2 Orthogonal Functions 266 10.3 Transforms 267 10.3.1 Trigonometric Transforms 268 10.3.2 Haar Transform 274 10.3.3 Wavelet Transforms 276 10.3.4 Fast Transforms 285 10.4 Cyclostationary Signal Processing 286 10.5 Higher-Order Statistics 289 10.6 Applications 291 10.6.1 Signal Detection 291 10.6.2 Signal Classification 302 10.6.3 Recognition/Identification 317 10.8 Concluding Remarks 328 References 329 Chapter 11 Direction-Finding Position-Fixing Techniques 331 11.1 Introduction 331 11.2 Bearing Estimation 331 11.2.1 Circular Antenna Array 332 11.2.2 Interferometry 333 11.2.3 Monopulse Direction Finder 347 11.2.4 Amplitude Direction Finding 352 11.2.5 Doppler Direction Finder 359 11.2.6 Array-Processing Bearing Estimation 362 11.2.7 Line-of-Bearing Optimization 375 11.3 Position-Fixing Algorithms 379 11.3.1 Eliminating Wild Bearings 380 11.3.2 Stansfield Fix Algorithm 381 11.3.3 Mean-Squared Distance Algorithm 384 x Introduction to Communication Electronic Warfare Systems 11.3.4 Combining Error Contours 388 11.4 Single-Site Location Techniques 391 11.5 Fix Accuracy 392 11.6 Fix Coverage 396 11.7 Concluding Remarks 399 References 401 Chapter 12 Hyperbolic Position-Fixing Techniques 403 12.1 Introduction 403 12.2 Time Difference of Arrival 403 12.3 Differential Doppler 410 12.4 Cross Ambiguity Function Processing 414 12.4.1 Position Fix Accuracy 416 12.5 Time of Arrival 418 12.6 Concluding Remarks 422 References 422 Chapter 13 Exciters and Power Amplifiers 425 13.1 Introduction 425 13.2 Exciters 425 13.2.1 Oscillators 426 13.2.2 Synthesizer 428 13.2.3 Modulator 429 13.3 Power Amplifiers 431 13.3.1 Amplifier Operating Characteristics 431 13.3.2 Efficiency 433 13.3.3 Push-Pull Architecture 434 13.3.4 Classes of Amplifiers 435 13.3.5 Switching Architectures 438 13.3.6 Amplifier Linearization 444 13.3.7 Basic Power Modules 445 13.3.8 Combiners 448 13.3.9 Output Filters 449 13.3.10 Noise-Power Ratio 450 13.4 Concluding Remarks 451 References 451 Chapter 14 Early-Entry Organic Electronic Support 453 14.1 Introduction 453 14.2 Target Model 454 14.3 Intercept System Model 455 Contents xi 14.4 Simulation Results 459 14.4.1 Performance Versus the Number of Target Nets 460 14.4.2 Search Bandwidth 462 14.4.3 Noise Factor 464 14.4.4 Postprocessing Time 466 14.4.5 Mission Duration 467 14.5 Concluding Remarks 469 References 471 Chapter 15 Detection and Geolocation of Frequency-Hopping Communication Emitters 473 15.1 Introduction 473 15.2 Analysis 473 15.3 Simulation 476 15.3.1 ES System Operation 478 15.3.2 Results and Analysis 481 15.3.3 Discussion 484 15.4 Concluding Remarks 486 References 486 Chapter 16 Signal Detection Range 487 16.1 Introduction 487 16.2 Noise Limits on Detection Range 490 16.3 Targets 491 16.4 Detection Range with the Reflection Propagation Model 491 16.4.1 Airborne Configurations of ES Systems 492 16.4.2 Ground-Based Detection Ranges 497 16.4.3 Discussion 499 16.5 Concluding Remarks 501 References 503 Chapter 17 Electronic Attack: UAV and Ground-Based 505 17.1 Introduction 505 17.2 Signal Propagation at Long Ranges 506 17.3 Jamming ERP 507 17.4 Targets 508 17.5 RLOS 508 17.6 UAV Jammer 509 17.7 Ground-Based Jammer 511 17.8 Expendable Jammer 513 17.9 Concluding Remarks 514 References 516 xii Introduction to Communication Electronic Warfare Systems Appendix A Probability and Random Variables 517 A.1 Introduction 517 A.2 Means, Expected Values, and Moment Functions of Random Variables 517 A.3 Probability 520 A.3.1 Conditional Probability 521 A.3.2 Random Variable Distribution and Density Functions 522 A.4 Gaussian Density Function 525 A.5 Kurtosis 527 A.6 Skewness 527 A.7 Useful Characteristics of Probabilities, Density Functions, and Distribution Functions 528 A.8 Concluding Remarks 528 Reference 528 Appendix B Simulated Networks 529 B.1 Introduction 529 List of Acronyms 539 About the Author 545 Index 5475 444浏览会员免费
- Access2010 英文版 详细的操作4 364浏览会员免费
- access数据库学习必备,这本书既适合初学者,也可以作为高手的参资料4 367浏览会员免费
- Book Description Learn how to harness the power of delta-sigma data converters Understanding Delta-Sigma Data Converters brings readers a clear understanding of the principles of delta-sigma (ΔΣ) converter operation—analog to digital and digital to analog. It introduces the best computer-aided analysis and design techniques available. With an understanding of the great versatility of the ΔΣ converter, readers can apply their new knowledge to a wide variety of applications, including digital telephony, digital audio, wireless and wired communications, medical electronics, and industrial and scientific instrumentation. The authors make the material accessible to all design engineers by focusing on developing an understanding of the physical operation rather than getting mired in complex mathematical treatments and derivations. Written for entry-level readers, the publication has a natural flow that begins with basic concepts, enabling the readers to develop a solid foundation for the book's more complex material. The text, therefore, starts with a general introduction to the ΔΣ converter, including a brief historical overview to place it in context. Next, the publication introduces the first-order ΔΣ modulator, covering oversampling, noise-shaping, decimation filtering and other key concepts. Then, using the first-order modulator as a foundation, second and higher-order modulators are presented and analyzed. Finally, the authors delve into implementation considerations and present several design examples using the Delta-Sigma Toolbox. Everything needed to facilitate quick comprehension and help readers apply their newly learned principles is provided: Simplified methods to understand complicated concepts such as spectral estimation and switched noise References that lead to in-depth analysis of specialized topics Figures and charts that illustrate complex design issues Conclusion section at the end of each chapter that highlights the key points Reference manual for the Delta-Sigma Toolbox, along with numerous practical examples that illustrate the use of the Toolbox This is essential reading for all design engineers who want to learn and fully harness the powerful capabilities of ΔΣ data converters. Upper-level undergraduates and graduate students will find the book's logical organization and clear style, coupled with numerous practical examples, a great entry into the field.5 435浏览会员免费
- Introduction to Algorithms, Second Edition This book provides a comprehensive introduction to the modern study of computer algorithms. It presents many algorithms and covers them in considerable depth, yet makes their design and analysis accessible to all levels of readers. We have tried to keep explanations elementary without sacrificing depth of coverage or mathematical rigor.0 80浏览会员免费
- 太远而IPhone6s4 227浏览会员免费
- 精通Access2007电子书,与上面的Excel VBA 编程是一起的哦。。。4 204浏览会员免费
- Apress, 2010 the hole name:Building iPhone OS Accessories: Use the iPhone Accessories API to Control and Monitor Devices This book provides a serious, in-depth look at Apple’s External Accessory Framework and the iPhone Accessories API. You’ll learn how to create new, integrated solutions that combine iPhone apps with dedicated hardware. The iPhone OS Accessories API expands the opportunities for innovative iPhone developers, allowing you to control and monitor external devices, whether you’ve built them yourself or obtained them from a third party. What you’ll learn * Develop accessories and apps for the iPhone and iPod touch. * Use Apple’s External Accessory Framework to create hardware/software interaction. * Control and monitor external devices using the iPhone Accessories API. * Use the specific controller classes within the iPhone OS SDK. * Build and control your own accessory. * Get your accessories approved by Apple’s AE program. Who this book is for This book is for iPhone and iPod touch developers who want to write apps to control external accessories and hardware developers who want to create accessories for iPhone and iPod touch. This includes embedded systems programmers who have been left out of the iPhone gold rush until now. The iPhone OS Accessories API expands the market of iPhone developers yet again, and this book is for all those developers wanting to use these new APIs to control and monitor external device—whether self-built or acquired from other sources. amazon link :http://www.amazon.com/exec/obidos/ASIN/1430229314/buythisbooks-205 146浏览会员免费
- GlassFish Server 9.1 帮助手册,包括了bin目录下所有命令的详细用法,是管理、配置glassfish的必备工具!!!!<br><br>例如asadmin start-domain 命令:<br>Name: start-domain – starts a domain<br>Synopsis: start-domain [--domaindir domain-dir]<br> --user admin_user --passwordfile file_name<br> [--terse={true|false}] [ --echo ={true|false}]<br> [ --interactive ={true|false}] [ --verbose ={true|false}]<br> [ --debug ={true|false}] [domain_name]<br>Description: Use the start-domain command to start a domain. If the domain directory is not specified,<br> the domain in the default install_dir/domains directory is started. If there are two or more<br> domains, the domain_name operand must be specified.<br> You can use the start-domain command to upgrade domains of Application Server 8.x or 9.0<br> to Application Server 9.1. Use one of the following ways to upgrade your domain:<br>Options:<br> --domaindir<br> The directory where the domain is to be started. If specified, the path must be accessible in<br> the filesystem. If not specified, the domain in the default install_dir/domains directory is<br> started.<br> -u --user<br> The authorized domain application server administrative username.<br> --passwordfile<br> The file containing the domain application server password associated with the<br> administrative instance. The password is defined in the following form:<br> AS_ADMIN_PASSWORD=password. Where password is the actual administrator password for<br> the domain.<br> -t--terse<br> Indicates that any output data must be very concise, typically avoiding human-friendly<br> sentences and favoring well-formatted data for consumption by a script.Default is false.<br> Name<br> Synopsis<br> Description<br> Options<br> start-domain(1)<br> Sun Java System Application 658 Server 9.1 ReferenceManual ? Last Revised 11 Jul 2007<br> -e --echo<br> Setting to true will echo the command line statement on to the standard output.Default is<br> false.<br> -I --interactive<br> If set to true (default), only the required password options are prompted.<br> --verbose<br> By default this flag is set to false. If set to true, detailed server startup output is displayed.<br> On Windows, press CTRL-Break in the domain's window to print a thread dump. On<br> UNIX, press CTRL-C to kill the server and press CTRL-\\ to print a thread dump.<br> --debug<br><br>。。。。。。。。。。。。。。。。。。。。。。。。。。。<br>更多、更详细的内容请下载该文档查阅。5 163浏览会员免费
- This book instructs readers on the nuances of DRAM design, making it accessible for both novice and practicing engineers and covering particular information necessary for working with both the analog and digital circuits present in DRAM chips.5 454浏览会员免费
- <br>Agile Software Construction <br><br>by John Hunt <br><br>Publisher: Springer; 1 edition (September 8, 2005)<br><br><br>Review<br><br>From the reviews:<br><br>\"A very comprehensive guide to the most popular current agile methods. The author fully succeeds in bringing together, in a very concise style, not only the essential approaches and methods … but also the necessary tools for a more effective application of agile methods in the real software development process. … By its content, the book addresses the software development theorists and practitioners alike. By its style, it is an excellent guide for any kind of student interested in achieving skills for agile software construction.\" (Tudor Balanescu, Zentralblatt MATH, Vol. 1095 (21), 2006)<br><br>\"Cyberneticians, systemists and software users and also developers will welcome a text that, says the publishers, focusses on the realities within which most software projects have to work. This appears to be useful addition to the literature and is branded as exhibiting the author’s ‘down-to-earth’ approach when he examines how different methods can be worked together for successful results. It is an easy-to-use book that provides ‘an accessible source of Agile techniques’ as well as useful applications.\" (W. R. Howard, Kybernetes, Vol. 35 (7-8), 2006)<br><br><br>Product Description<br><br>So you think you want to be Agile. But what does it mean? How can you develop software in an agile manner? How can you reap the benefits of agile modelling or Extreme Programming (XP)? What tools might you use to help you become more agile? This book tells you!<br><br>Agile software Construction reviews the leading agile development processes. It explains what each is and what they attempt to achieve. It also explains what they are not and dispels numerous myths surrounding agile development.<br><br>Agile software construction itself is an attempt to put the software being developed first, and to acknowledge that user requirements change. It is agile because it can respond quickly to the users changing needs. In turn, agile software development puts the software first because almost any activity undertaken must be to the benefit of the software that will be delivered.<br><br>This book will help you to determine if an agile approach is for you and which approach (or approaches) to adopt. It guides you in how to plan, organise and develop software systems in an Agile Manner. It introduces the core concepts in a concise and easily digested form, and evaluates how successful the core techniques can be, as well as what problems may be encountered. The book also shows how some of these problems have been overcome on real world projects by combining XP, Agile modelling and Feature Driven Development.<br><br><br>http://www.amazon.com/Agile-Software-Construction-John-Hunt/dp/1852339446/ref=sr_1_1?ie=UTF8&s=books&qid=1219631015&sr=1-1<br><br><br>5 102浏览会员免费
- 摘 要:VB 数据库中图像数据的存取对初学者来说是个难点,文章总结了绑定图片控件、存储图片文件路径、 利用PropertyBag 对象与Byte 数组中转三种较为简便的方法以供初学者参考。4 418浏览会员免费
- 非常清晰的版本,适合初学者,也适合进阶,讲的很详细0 2317浏览会员免费
- About this book Principal component analysis is central to the study of multivariate data. Although one of the earliest multivariate techniques it continues to be the subject of much research, ranging from new model- based approaches to algorithmic ideas from neural networks. It is extremely versatile with applications in many disciplines. The first edition of this book was the first comprehensive text written solely on principal component analysis. The second edition updates and substantially expands the original version, and is once again the definitive text on the subject. It includes core material, current research and a wide range of applications. Its length is nearly double that of the first edition. Researchers in statistics, or in other fields that use principal component analysis, will find that the book gives an authoritative yet accessible account of the subject. It is also a valuable resource for graduate courses in multivariate analysis. The book requires some knowledge of matrix algebra. Ian Jolliffe is Professor of Statistics at the University of Aberdeen. He is author or co-author of over 60 research papers and three other books. His research interests are broad, but aspects of principal component analysis have fascinated him and kept him busy for over 30 years. Written for: Researchers, graduate students5 240浏览会员免费
- 非常全面实用,透彻地讲述了access2010 的方方面面。作者Roger Jennings不愧为access大师。4 153浏览会员免费
- 文章里介绍了 Access数据库的多用户访问机制 适合搞这方面应用的 看一下!4 377浏览会员免费
- Access 2016宝典 第8版 完整版 清晰中文版 带完整书签5 1545浏览会员免费
- PDF 格式,绝对可以打开,=) Chapter 1. Review of OpenGL Basics Section 1.1. OpenGL History Section 1.2. OpenGL Evolution Section 1.3. Execution Model Section 1.4. The Frame Buffer Section 1.5. State Section 1.6. Processing Pipeline Section 1.7. Drawing Geometry Section 1.8. Drawing Images Section 1.9. Coordinate Transforms Section 1.10. Texturing Section 1.11. Summary Section 1.12. Further Information Chapter 2. Basics Section 2.1. Introduction to the OpenGL Shading Language Section 2.2. Why Write Shaders? Section 2.3. OpenGL Programmable Processors Section 2.4. Language Overview Section 2.5. System Overview Section 2.6. Key Benefits Section 2.7. Summary Section 2.8. Further Information Chapter 3. Language Definition Section 3.1. Example Shader Pair Section 3.2. Data Types Section 3.3. Initializers and Constructors Section 3.4. Type Conversions Section 3.5. Qualifiers and Interface to a Shader Section 3.6. Flow Control Section 3.7. Operations Section 3.8. Preprocessor Section 3.9. Preprocessor Expressions Section 3.10. Error Handling Section 3.11. Summary Section 3.12. Further Information Chapter 4. The OpenGL Programmable Pipeline Section 4.1. The Vertex Processor Section 4.2. The Fragment Processor Section 4.3. Built-in Uniform Variables Section 4.4. Built-in Constants Section 4.5. Interaction with OpenGL Fixed Functionality Section 4.6. Summary Section 4.7. Further Information Chapter 5. Built-in Functions Section 5.1. Angle and Trigonometry Functions Section 5.2. Exponential Functions Section 5.3. Common Functions Section 5.4. Geometric Functions Section 5.5. Matrix Functions Section 5.6. Vector Relational Functions Section 5.7. Texture Access Functions Section 5.8. Fragment Processing Functions Section 5.9. Noise Functions Section 5.10. Summary Section 5.11. Further Information Chapter 6. Simple Shading Example Section 6.1. Brick Shader Overview Section 6.2. Vertex Shader Section 6.3. Fragment Shader Section 6.4. Observations Section 6.5. Summary Section 6.6. Further Information Chapter 7. OpenGL Shading Language API Section 7.1. Obtaining Version Information Section 7.2. Creating Shader Objects Section 7.3. Compiling Shader Objects Section 7.4. Linking and Using Shaders Section 7.5. Cleaning Up Section 7.6. Query Functions Section 7.7. Specifying Vertex Attributes Section 7.8. Specifying Uniform Variables Section 7.9. Samplers Section 7.10. Multiple Render Targets Section 7.11. Development Aids Section 7.12. Implementation-Dependent API Values Section 7.13. Application Code for Brick Shaders Section 7.14. Summary Section 7.15. Further Information Chapter 8. Shader Development Section 8.1. General Principles Section 8.2. Performance Considerations Section 8.3. Shader Debugging Section 8.4. Shader Development Tools Section 8.5. Scene Graphs Section 8.6. Summary Section 8.7. Further Information Chapter 9. Emulating OpenGL Fixed Functionality Section 9.1. Transformation Section 9.2. Light Sources Section 9.3. Material Properties and Lighting Section 9.4. Two-Sided Lighting Section 9.5. No Lighting Section 9.6. Fog Section 9.7. Texture Coordinate Generation Section 9.8. User Clipping Section 9.9. Texture Application Section 9.10. Summary Section 9.11. Further Information Chapter 10. Stored Texture Shaders Section 10.1. Access to Texture Maps from a Shader Section 10.2. Simple Texturing Example Section 10.3. Multitexturing Example Section 10.4. Cube Mapping Example Section 10.5. Another Environment Mapping Example Section 10.6. Glyph Bombing Section 10.7. Summary Section 10.8. Further Information Chapter 11. Procedural Texture Shaders Section 11.1. Regular Patterns Section 11.2. Toy Ball Section 11.3. Lattice Section 11.4. Bump Mapping Section 11.5. Summary Section 11.6. Further Information Chapter 12. Lighting Section 12.1. Hemisphere Lighting Section 12.2. Image-Based Lighting Section 12.3. Lighting with Spherical Harmonics Section 12.4. The ÜberLight Shader Section 12.5. Summary Section 12.6. Further Information Chapter 13. Shadows Section 13.1. Ambient Occlusion Section 13.2. Shadow Maps Section 13.3. Deferred Shading for Volume Shadows Section 13.4. Summary Section 13.5. Further Information Chapter 14. Surface Characteristics Section 14.1. Refraction Section 14.2. Diffraction Section 14.3. BRDF Models Section 14.4. Polynomial Texture Mapping with BRDF Data Section 14.5. Summary Section 14.6. Further Information Chapter 15. Noise Section 15.1. Noise Defined Section 15.2. Noise Textures Section 15.3. Trade-offs Section 15.4. A Simple Noise Shader Section 15.5. Turbulence Section 15.6. Granite Section 15.7. Wood Section 15.8. Summary Section 15.9. Further Information Chapter 16. Animation Section 16.1. On/Off Section 16.2. Threshold Section 16.3. Translation Section 16.4. Morphing Section 16.5. Other Blending Effects Section 16.6. Vertex Noise Section 16.7. Particle Systems Section 16.8. Wobble Section 16.9. Summary Section 16.10. Further Information Chapter 17. Antialiasing Procedural Textures Section 17.1. Sources of Aliasing Section 17.2. Avoiding Aliasing Section 17.3. Increasing Resolution Section 17.4. Antialiased Stripe Example Section 17.5. Frequency Clamping Section 17.6. Summary Section 17.7. Further Information Chapter 18. Non-Photorealistic Shaders Section 18.1. Hatching Example Section 18.2. Technical Illustration Example Section 18.3. Mandelbrot Example Section 18.4. Summary Section 18.5. Further Information Chapter 19. Shaders for Imaging Section 19.1. Geometric Image Transforms Section 19.2. Mathematical Mappings Section 19.3. Lookup Table Operations Section 19.4. Color Space Conversions Section 19.5. Image Interpolation and Extrapolation Section 19.6. Blend Modes Section 19.7. Convolution Section 19.8. Summary Section 19.9. Further Information Chapter 20. RealWorldz Section 20.1. Features Section 20.2. RealWorldz Internals Section 20.3. Implementation Section 20.4. Atmospheric Effects Section 20.5. Ocean Section 20.6. Clouds Section 20.7. Summary Section 20.8. Further Information Chapter 21. Language Comparison Section 21.1. Chronology of Shading Languages Section 21.2. RenderMan Section 21.3. OpenGL Shader (ISL) Section 21.4. HLSL Section 21.5. Cg Section 21.6. Summary Section 21.7. Further Information Appendix A. Language Grammar Appendix B. API Function Reference5 135浏览会员免费
- Microsoft Access 2010 VBA Programming Inside Out4 184浏览会员免费
- A comprehensive introduction to ICA for students and practitioners Independent Component Analysis (ICA) is one of the most exciting new topics in fields such as neural networks, advanced statistics, and signal processing. This is the first book to provide a comprehensive introduction to this new technique complete with the fundamental mathematical background needed to understand and utilize it. It offers a general overview of the basics of ICA, important solutions and algorithms, and in-depth coverage of new applications in image processing, telecommunications, audio signal processing, and more. Independent Component Analysis is divided into four sections that cover: * General mathematical concepts utilized in the book * The basic ICA model and its solution * Various extensions of the basic ICA model * Real-world applications for ICA models Authors Hyvarinen, Karhunen, and Oja are well known for their contributions to the development of ICA and here cover all the relevant theory, new algorithms, and applications in various fields. Researchers, students, and practitioners from a variety of disciplines will find this accessible volume both helpful and informative.5 116浏览会员免费
- Part I Introduction 1 1 History of Wireless Networks 3 1.1 Introduction 3 1.2 Different Wireless Networks 4 1.3 Conclusion 14 2 Wireless Transmission Fundamentals 17 2.1 Wireless Channels 17 2.2 The Wireless Communication Graph 21 2.3 Power Assignment and Topology Control 23 2.4 The Wireless Interference Graph 28 2.5 Related Graph Problems and Geometry Concepts 32 2.6 Energy-Consumption Models 35 2.7 Mobility Models 38 2.8 Conclusion 41 Part II Wireless MACs 45 3 Wireless Medium-Access Control Protocols 47 3.1 Introduction 47 3.2 IEEE 802.11 Architecture and Protocols 49 3.3 WiMAX 60 3.4 Bluetooth 61 3.5 MAC Protocols for Wireless Sensor Networks 63 3.6 Conclusion 69 4 TDMA Channel Assignment 71 4.1 Introduction 71 4.2 System Model and Assumptions 73 4.3 Centralized Scheduling 75 4.4 Distributed Algorithms 85 4.5 Weighted Coloring and Schedulable Flows 90 4.6 Further Reading 94 4.7 Conclusion and Remarks 96 5 Spectrum Channel Assignment 99 5.1 Introduction 99 5.2 Network System Model 101 5.3 List-Coloring for Access Networks 102 5.4 List-Coloring for Ad Hoc Networks 112 5.5 Transition Phenomena on Channel Availability 114 5.6 Further Reading 116 5.7 Conclusion and Remarks 118 6 CDMA Code Channel Assignment 120 6.1 Introduction 120 6.2 System Model and Assumptions 123 6.3 Throughput and Bottleneck of General Graphs 126 6.4 Approximation Algorithms for Interference Graphs 129 6.5 Maximum Weighted Independent Set for a General Wireless Network Model 136 6.6 Further Reading 148 6.7 Conclusion and Remarks 150 Part III Topology Control and Clustering 153 7 Clustering and Network Backbone 155 7.1 Introduction 155 7.2 Network Models and Problem Formulation 155 7.3 Centralized Algorithms for a Connected Dominating Set 157 7.4 Message Lower Bound for Distributed-Backbone Construction 161 7.5 Some Backbone-Formation Heuristics 163 7.6 Efficient Distributed-Nontrivial-Backbone-Formation Method 166 7.7 Efficient Distributed-Backbone-Formation Method 170 7.8 Linear-Programming-Based Approaches 179 7.9 Geometry-Position-Based Approaches 184 7.10 Further Reading 186 7.11 Conclusion and Remarks 187 8 Weighted Network Backbone 190 8.1 Introduction 190 8.2 Study of Typical Methods 191 8.3 Centralized Low-Cost Backbone-Formation Algorithms 193 8.4 Efficient Distributed Low-Cost Backbone-Formation Algorithms 194 8.5 Performance Guarantee 197 8.6 Discussion 205 8.7 Further Reading 209 8.8 Conclusion and Remarks 211 9 Topology Control with Flat Structures 213 9.1 Introduction 213 9.2 Current State of Knowledge 219 9.3 Planar Structures 224 9.4 Bounded-Degree Spanner and Yao’s Family 228 9.5 Bounded-Degree Planar Spanner 231 9.6 Low-Weighted Structures 233 9.7 A Unified Structure: Energy Efficiency for Unicast and Broadcast 238 9.8 Spanners for Heterogeneous Networks 250 9.9 Fault-Tolerant Structures 259 9.10 Other Spanners 266 9.11 Conclusion and Remarks 267 10 Power Assignment 270 10.1 Introduction 270 10.2 Power Assignment for Connectivity 273 10.3 Power Assignment for Routing 280 10.4 Further Reading 284 10.5 Conclusion and Remarks 285 11 Critical Transmission Ranges for Connectivity 289 11.1 Introduction 289 11.2 Preliminaries 292 11.3 Critical Range for Connectivity 293 11.4 Critical Range for k-Connectivity 296 11.5 Connectivity with Bernoulli Nodes 301 11.6 Practical Performances 304 11.7 Further Reading 307 11.8 Conclusion and Remarks 310 12 Other Transition Phenomena 313 12.1 Introduction 313 12.2 Critical Node Degree for Connectivity 313 12.3 Critical Range for Connectivity in Sparse Networks 315 12.4 Critical Range for Connectivity for Mobile Networks 316 12.5 Critical Sensing Range for Coverage 320 12.6 Critical Range for Successful Routing 322 12.7 Further Reading 330 12.8 Conclusion and Remarks 331 Part IV Wireless Network Routing Protocols 333 13 Energy-Efficient Unicast Routing 335 13.1 Introduction 335 13.2 Proactive Approaches 336 13.3 Reactive Approaches 340 13.4 Geographic Approaches 347 13.5 Clustering and Hierarchical Routing 361 13.6 Further Reading 364 13.7 Conclusion and Remarks 365 14 Energy-Efficient Broadcast/Multicast Routing 369 14.1 Introduction 369 14.2 Centralized Methods 374 14.3 Efficient Distributed or Localized Methods 380 14.4 Scheduling Active and Sleep Periods 392 14.5 Energy-Efficient Multicast 394 14.6 Further Reading 398 14.7 Conclusion and Remarks 399 15 Routing with Selfish Terminals 402 15.1 Introduction 402 15.2 Preliminaries and Network Model 403 15.3 Truthful Payment Schemes for Multicast 408 15.4 Sharing Multicast Costs or Payments Among Receivers 416 15.5 Existence of Truthful Payment Scheme 431 15.6 Further Reading 433 15.7 Conclusion and Remarks 436 16 Joint Routing, Channel Assignment, and Link Scheduling 440 16.1 Introduction 440 16.2 System Model and Assumptions 441 16.3 Problem Formulation for Cross-Layer Optimization 444 16.4 Efficient Link, Channel Scheduling 449 16.5 Further Reading 455 16.6 Conclusion 458 Part V Other Issues 461 17 Localization and Location Tracking 463 17.1 Introduction 463 17.2 Available Information 465 17.3 Computational Complexity of Sensor Network Localization 470 17.4 Progressive Localization Methods 476 17.5 Network-Wide Localization Methods 482 17.6 Target Tracking and Classification 485 17.7 Experimental Location and Tracking Systems 498 17.8 Conclusion and Remarks 500 18 Performance Limitations of Random Wireless Ad Hoc Networks 503 18.1 Introduction 503 18.2 Capacity of Unicast for an Arbitrary Network 506 18.3 Capacity of Unicast for Randomly Deployed Networks 508 18.4 Capacity of Broadcast for an Arbitrary Network 510 18.5 Capacity of Broadcast for Randomly Deployed Networks 512 18.6 Further Reading 517 18.7 Conclusion and Remarks 518 19 Security of Wireless Ad Hoc Networks 521 19.1 Introduction 521 19.2 Cryptography Fundamentals 522 19.3 Key-Predistribution Protocols 536 19.4 Secure Routing Protocols 538 19.5 Further Reading 542 19.6 Conclusion and Remarks 543 Bibliography 547 Index 5795 336浏览会员免费
- Access 2016宝典,作者:[美]Michael Alexander [美]Dick Kusleika,翻译:张洪波5 412浏览会员免费
- 1 使用AGG的准备工作 1 2 AGG图形显示原理见下图: 1 3 要理解AGG的工作原理,先看一段代码: 2 4 顶点源(Vertex Source) 5 4.1 头文件 5 4.2 类型 5 4.3 画一条简单的箭头直线(基于此处代码) 6 4.4 自定义一个顶点源(基于此处代码) 7 5 Coordinate conversion pipeline 坐标转换管道 9 5.1 变换矩阵(trans_affine) 10 5.1.1 头文件 10 5.1.2 类型 10 5.1.3成员变量 10 5.1.4 成员方法 10 5.1.5 实验代码(基于此 处代码) 10 5.2 坐标转换管道 11 5.2.1 头文件 11 5.2.2 类型(演示程序基于基于此处代码) 12 6 Scanline Rasterizer 15 6.1 扫描线Scanline 15 6.1.1 头文件 15 6.1.2 类型 15 6.1.3 成员类型 15 6.1.4 成员方法 16 6.2 Rasterizer 16 6.2.1 头文件 16 6.2.2 类型 16 6.2.3 成员方法 16 7 Renderers 渲染器 17 7.1 Scanline Renderer 17 7.1.1 头文件 17 7.1.2 类型 17 7.1.3 实验代码(基于此 处代码) 18 7.2 Basic Renderers 19 7.2.1头文件 19 7.2.2类型 19 7.2.3 构造函数 19 7.2.4 成员方法 19 7.2.5 实验代码(基于此 处代码) 20 7.3 PixelFormat Renderer 20 7.3.1 头文件 21 7.3.2 类型 21 7.3.3 构造函数 21 7.3.4 类型定义 21 7.3.5 成员方法 21 7.3.6 实验代码(基于此 处代码) 22 8 Rendering Buffer 22 8.1 头文件: 22 8.2 类型: 22 8.3 构造函数: 22 8.4 成员方法: 23 8.5 实验代码(基于此处代码) 23 9 AGG与GDI显示 23 10 使用AGG提供的pixel_map类 26 11 线段生成器(Span Generator) 27 12 图案类线段生成器 28 12.1头文件 28 12.2类型 28 12.3 示例代码,使用span_image_filter_rgb_bilinear_clip 29 13 插值器Interpolator 31 13.1 头文件 31 13.2 类型 31 13.3实验代码,使用span_interpolator_persp_lerp 32 14 变换器Transformer 33 14.1 头文件 33 14.2 类型 33 14.3 实验代码,使用trans_warp_magnifier 33 15 图像访问器Image Accessor 34 15.1 头文件 34 15.2 类型 34 15.3 实验代码 35 16 图像过滤器(Image Filter) 36 16.1 头文件 36 16.2 类型 36 16.3 实验代码 37 17 色彩类线段生成器 37 17.1 头文件 37 17.2 类型 38 17.3 示例代码 38 18 渐变颜色 40 18.1 实验代码,使用std::vector<rgba8>实现多颜色渐变 40 18.2 gradient_lut 41 18.2.1 头文件 41 18.2.2 类声明 41 18.2.3 实验代码,使用gradient_lut实现多颜色渐变 41 19 渐变方式 42 20其它色彩类的线段生成器 43 21 组合类线段生成器 44 21.1 头文件 44 21.2 类型 44 21.3 演示代码 45 22 AGG的字符输出 47 22.1 方式一、使用gsv_text对象 47 22.2 方式二、使用字体引擎(Font Engine) 50 22.2.1 头文件 50 22.2.2 类型 50 22.2.3 成员类型 51 22.2.4 成员属性 51 22.2.5 成员方法 51 22.2.6示例代码1 - 从顶点源层输出文字 52 22.2.7 示例代码2 - 从Scanline Rasterizer层输出文字 53 22.3 方式三、使用FreeType 54 22.4 方式四、字体缓存管理器(font_cache_manager) 55 22.4.1 头文件 55 22.4.2 类型 55 22.4.3 成员方法 55 22.4.4 示例代码1-作为Rasterizer渲染: 56 22.4.5 示例代码2-作为顶点源渲染: 57 23 小结 585 278浏览会员免费
- 5G是国家新型基础设施的重要组成部分,2020年是5G独立组网全面商用落地之年。5G接入网关(UPF)作为5G数据处理和转发的核心功能,是5G和垂直行业的连接点,UPF已逐步从“核心”下沉到网络边缘,它不仅是运营商服务垂直行业的桥头堡,更是5G驱动垂直行业发展的发力点。0 1787浏览会员免费
- springer最新出版的LTE电子书,作者为《WCDMA.for.UMTS.Radio.Access.for.Third.Generation.Mobile.Communications》一书的两位作者:Harri Holma and Antti Toskala5 124浏览会员免费
- S7-200 与PC 机之间通过以太网的OPC 通讯4 318浏览会员免费
- Java Data Access ,看看名字,你就知道这是做什么用的了0 90浏览会员免费
- iii<br>目录<br>前言 ...................................................................................................................................................... xi<br>致读者 ........................................................................................................................................... xi<br>阅读指南 ....................................................................................................................................... xi<br>TortoiseSVN 是完全免费的! ......................................................................................................... xii<br>社区 ............................................................................................................................................. xii<br>致谢 ............................................................................................................................................. xii<br>本文使用的术语 ............................................................................................................................. xii<br>1. 简介 .................................................................................................................................................. 1<br>什么是 TortoiseSVN? .................................................................................................................... 1<br>TortoiseSVN 的历史 ....................................................................................................................... 1<br>TortoiseSVN 的特性 ....................................................................................................................... 1<br>安装 TortoiseSVN ........................................................................................................................... 2<br>系统要求 ................................................................................................................................ 2<br>安装 ...................................................................................................................................... 2<br>语言包 ................................................................................................................................... 2<br>拼写检查器 .............................................................................................................................. 2<br>2. 基本概念 ............................................................................................................................................ 4<br>版本库 ........................................................................................................................................... 4<br>版本模型 ........................................................................................................................................ 4<br>文件共享的问题 ....................................................................................................................... 4<br>锁定-修改-解锁 方案 ............................................................................................................... 5<br>复制-修改-合并 方案 ............................................................................................................... 6<br>Subversion 怎么做? .............................................................................................................. 8<br>Subversion 实战 ............................................................................................................................. 9<br>工作副本 ................................................................................................................................ 9<br>版本库的 URL ....................................................................................................................... 10<br>修订版本 ............................................................................................................................... 11<br>工作副本怎样跟踪版本库 ........................................................................................................ 12<br>摘要 ............................................................................................................................................. 12<br>3. 配置服务器 ...................................................................................................................................... 13<br>基于 Apache 的服务器 .................................................................................................................. 13<br>简介 ..................................................................................................................................... 13<br>安装 Apache ........................................................................................................................ 13<br>安装 Subversion ................................................................................................................... 14<br>配置 ..................................................................................................................................... 14<br>多版本库 ............................................................................................................................... 16<br>路径为基础的授权 .................................................................................................................. 16<br>使用 Windows 域认证 .......................................................................................................... 17<br>多重认证源 ............................................................................................................................ 18<br>用 SSL 使服务器更安全 ......................................................................................................... 19<br>Using client certificates with virtual SSL hosts .................................................................... 21<br>基于 svnserve 的服务器 ................................................................................................................ 21<br>简介 ..................................................................................................................................... 21<br>安装 svnserve ...................................................................................................................... 21<br>运行 svnserve ...................................................................................................................... 22<br>svnserve 的认证 ................................................................................................................... 23<br>使用 svn+ssh 认证 ............................................................................................................... 24<br>svnserve 以路径为基础的授权 ............................................................................................... 24<br>Cyrus SASL Support ............................................................................................................ 24<br>4. 版本库 ............................................................................................................................................. 25<br>创建版本库 ................................................................................................................................... 25<br>使用命令行工具创建版本库 .................................................................................................... 25<br>使用 TortoiseSVN 创建版本库 ............................................................................................... 25<br>本地访问版本库 ..................................................................................................................... 26<br>Accessing a Repository on a Network Share ...................................................................... 26<br>版本库备份 ................................................................................................................................... 275 383浏览会员免费
- gbrank机器学习4 166浏览会员免费
- VISUAL+BASIC+ACCESS数据库开发与实例,已加书签5 353浏览会员免费
- labview ,数据库远程访问,通过链接地址3 744浏览会员免费
- dreamweaver+access+asp实现网店购物车5 599浏览会员免费
- The availability of large data sets has allowed researchers to uncover complex properties such as large-scale fluctuations and heterogeneities in many networks, leading to the breakdown of standard theoretical frameworks and models. Until recently these systems were considered as haphazard sets of points and connections. Recent advances have generated a vigorous research effort in understanding the effect of complex connectivity patterns on dynamical phenomena. This book presents a comprehensive account of these effects. A vast number of systems, from the brain to ecosystems, power grids and the Internet, can be represented as large complex networks. This book will interest graduate students and researchers in many disciplines, from physics and statistical mechanics, to mathematical biology and information science. Its modular approach allows readers to readily access the sections of most interest to them, and complicated maths is avoided so the text can be easily followed by non-experts in the subject.5 134浏览会员免费
- Recent years have witnessed an immense growth in the amount of textual information available, both on the World Wide Web and in institutional document repositories. In this context, text mining has become extremely prevalent, giving rise to an age where vast amounts of textual information can be accessed, analyzed, and processed in a fraction of a second. The bene- fits of text mining go well beyond search and have yielded innovations that help people better understand and make use of the information in document repositories. The development of new technologies to tackle problems such as topic detection, tracking, and trending—where a machine automatically identifies emergent topics in a text corpus—is bound to have wide application in the future. Such applications can be found in ubiquitous consumer-based applications as well as systems focused on banking5 178浏览会员免费
- The PS/2 device interface, used by many modern mice and keyboards, was developed by IBM and originally appeared in the IBM Technical Reference Manual. However, this document has not been printed for many years and as far as I know, there is currently no official publication of this information. I have not had access to the IBM Technical Reference Manual, so all information on this page comes from my own experiences as well as help from the references listed at the bottom of this page. PS/2 设备接口用于许多现代的鼠标和键盘它是由IBM 开发并且最初出现在IBM 技术参考手册里但 是当我知道的时候这篇文件就已经很多年没有印刷了因此关于这个内容现在没有官方的出版物我 无法访问IBM 的技术参考手册所以本网页中的所有信息都来自于我自己的经验及本页最下面列出的 参考的帮助4 1373浏览会员免费
- 这个文档是讲述如何在linux 以及相似的unix系统上面建立一个radius 并且支持eap tls 认证,和 Access Point 客户端如何配置的文档5 281浏览会员免费
- Access.2010.Bible 英文原版 Welcome to the Microsoft Access 2010 Bible, your personal guide to a powerful, easy-to-use database- management system. This book is in its eleventh revision and has been totally rewritten for Microsoft Access 2010 with new text, new pictures, and a completely new and improved set of example files.5 99浏览会员免费
- OPC UA Part 8 一共有11篇。 是英文资料来着哈。5 75浏览会员免费