虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

ESD-Phenomena-and-the-Reliability

  • DESCRIPTION This function initializes the pointers in the _pid structure   to the process variable

    DESCRIPTION This function initializes the pointers in the _pid structure   to the process variable and the setpoint. *pv and *sp are   integer pointers.

    标签: the DESCRIPTION initializes structure

    上传时间: 2014-01-15

    上传用户:邶刖

  • You may have heard the Latest Brief web service on CodeProject.com. It provides several methods for

    You may have heard the Latest Brief web service on CodeProject.com. It provides several methods for web client programs to retrieve information about CodeProject.com, such as the latest article updates, the latest comments, and the latest lounge posts, etc. Some very popular articles on the CodeProject site make use of this service. In this article, I am going to present a java client program that uses soap message to call the methods of this web service. My program is not a general java soap client, which means you cannot use it to call other web services directly. However, you can easily modify it for other web services. The program uses only basic Java, it does not depend on any other external class library.

    标签: CodeProject provides service methods

    上传时间: 2014-01-25

    上传用户:baiom

  • im2dat.m is used to convert images to data which can be plotted using the standard MATLAB functions.

    im2dat.m is used to convert images to data which can be plotted using the standard MATLAB functions. This is very handy if you have plots on hardcopy and you want to convert them into data that MATLAB can use. The scanned image can be analysed by this function and the output will allow you to perform any calculation/manipulations that MATLAB can perform, e.g. curve fitting.

    标签: functions standard convert plotted

    上传时间: 2014-12-07

    上传用户:gdgzhym

  • After the successful global introduction during the past decade of the second generation (2G) digita

    After the successful global introduction during the past decade of the second generation (2G) digital mobile communications systems, it seems that the third generation (3G) Universal Mobile Communication System (UMTS) has finally taken off, at least in some regions. The plethora of new services that are expected to be offered by this system requires the development of new paradigms in the way scarce radio resources should be managed. The Quality of Service (QoS) concept, which introduces in a natural way the service differentiation and the possibility of adapting the resource consumption to the specific service requirements, will open the door for the provision of advanced wireless services to the mass market.

    标签: the introduction successful generation

    上传时间: 2013-12-30

    上传用户:qq21508895

  • This a simple genetic algorithm implementation where the evaluation function takes positive values o

    This a simple genetic algorithm implementation where the evaluation function takes positive values only and the fitness of an individual is the same as the value of the objective function

    标签: implementation evaluation algorithm function

    上传时间: 2016-11-24

    上传用户:kelimu

  • Inside the C++ Object Model Inside the C++ Object Model focuses on the underlying mechanisms that s

    Inside the C++ Object Model Inside the C++ Object Model focuses on the underlying mechanisms that support object-oriented programming within C++: constructor semantics, temporary generation, support for encapsulation, inheritance, and "the virtuals"-virtual functions and virtual inheritance. This book shows how your understanding the underlying implementation models can help you code more efficiently and with greater confidence. Lippman dispells the misinformation and myths about the overhead and complexity associated with C++, while pointing out areas in which costs and trade offs, sometimes hidden, do exist. He then explains how the various implementation models arose, points out areas in which they are likely to evolve, and why they are what they are. He covers the semantic implications of the C++ object model and how that model affects your programs.

    标签: Inside Object the Model

    上传时间: 2013-12-24

    上传用户:zhouli

  • There are several problems related to the properties of the triangular mesh representation that des

    There are several problems related to the properties of the triangular mesh representation that describes a surface of an object. Sometimes, the surface is represented just as a set of triangles without any other information and the STL file format, which is used for data exchanges, is a typicalexampl e of this situation.

    标签: representation properties triangular the

    上传时间: 2014-11-12

    上传用户:colinal

  • To get started you should be somewhat familiar with the components of the system. The soccer simula

    To get started you should be somewhat familiar with the components of the system. The soccer simulation consists of three important parts: the server, the monitor and the agents.

    标签: components the familiar somewhat

    上传时间: 2013-12-23

    上传用户:gaome

  • MPEG-2 has 7 distinct parts as well. The first part is the Systems section which defines the contain

    MPEG-2 has 7 distinct parts as well. The first part is the Systems section which defines the container format and the Transport Streams that are designed to carry the digital video and audio over ATSC and DVB. The Program Stream defines the container format for lossy compression on optical disks, DVDs and SVCDs.

    标签: the distinct Systems defines

    上传时间: 2014-07-02

    上传用户:奇奇奔奔

  • The literature of cryptography has a curious history. Secrecy, of course, has always played a centra

    The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.

    标签: cryptography literature has Secrecy

    上传时间: 2016-12-08

    上传用户:fxf126@126.com