虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Number

  • [SMS SDK V1.7 测试说明] 1)“接口库”为SDK库包其中: Release —— 发布的稳定库 Debug —— 为调试库 2)“演示代码”为测试代码目录。

    [SMS SDK V1.7 测试说明] 1)“接口库”为SDK库包其中: Release —— 发布的稳定库 Debug —— 为调试库 2)“演示代码”为测试代码目录。 [1] 测试代码中使用的库都是Release的版本。 [2] 如使用Debug库,需要设置环境变量GSMLIB_DEBUG等于2,则会在C:\下生成GSMModem.log文件。 若您在开发的过程中遇到问题,可以使用此方法获得GSMModem.log并发送给经销商,即可有 效的解决您的问题。 设置环境变量的方法: 我的电脑->属性->高级->环境变量->用户变量和系统变量->新建 变量名: GSMLIB_DEBUG 变量值: 2 3)执行测试: [1] C#/VB/VB6/C++/Delphi 直接找到exe可执行文件,即可运行测试程序; [2] JAVA测试: 可以修改一下test.bat文件,然后直接运行即可了。 需要修改以下内容: set Number=13681191399 接收的手机号码 set SN=ITIU-NWCJ-VCJD-WJDU 注册码 set JAVA_HOME=D:\JBuilder9\jdk1.4 JAVA环境

    标签: SDK Release Debug SMS

    上传时间: 2013-11-26

    上传用户:2404

  • In this application note we will only refer to the FX1. The same terminologies and concept is also

    In this application note we will only refer to the FX1. The same terminologies and concept is also used in the FX2. The FX2 has identical FIFO architecture and the same Number of endpoints as the FX1

    标签: terminologies application concept refer

    上传时间: 2014-01-10

    上传用户:zhangliming420

  • Program Description: The program asks the user to choice from the menu an option

    Program Description: The program asks the user to choice from the menu an option A. Check to see if a Number is prime. B. Count the Number of vowels in a line. X. Exit the program.

    标签: Description the Program program

    上传时间: 2017-04-08

    上传用户:磊子226

  • c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlyin

    c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths. Note that, these paths are not vertex-disjoint i.e., the vertices may repeat but they are all edge-disjoint i.e., no two paths have the same edges. The input is the adjacency matrix of a directed acyclic graph and a pair(s) of source and destination vertices and the output should be the Number of such disjoint paths and the paths themselves on separate lines. In case of multiple paths the output should be in order of paths with minimum vertices first. In case of tie the vertex Number should be taken in consideration for ordering.

    标签: fault-tolerant algorithms redundant underlyin

    上传时间: 2013-12-18

    上传用户:jkhjkh1982

  • In some graphs, the shortest path is given by optimizing two different metrics: the sum of weights o

    In some graphs, the shortest path is given by optimizing two different metrics: the sum of weights of the edges and the Number of edges. For example: if two paths with equal cost exist then, the path with the least Number of edges is chosen as the shortest path. Given this metric, you have find out the shortest path between a given pair of vertices in the input graph. The output should be the Number of edges on the path, the cost of the shortest path, and the path itself. Input is the adjacency matrix and the two vertices.

    标签: optimizing different the shortest

    上传时间: 2014-10-25

    上传用户:1159797854

  • Edge Disjoint Cycles. You are given an input graph that is either directed or undirected. Write a pr

    Edge Disjoint Cycles. You are given an input graph that is either directed or undirected. Write a program that reads in a vertex Number and lists the Number of edge disjoint cycles that start and end at this vertex. The output should also list the edges in each of the cycle discovered. Input will be the adjacency matrix preceded by a 0 or 1 representing Directed or Undirected graphs respectively.

    标签: undirected Disjoint directed Cycles

    上传时间: 2017-04-08

    上传用户:13188549192

  • Fortran 90 versions of all the Numerical Recipes routines appear in the following Chapters B1 throu

    Fortran 90 versions of all the Numerical Recipes routines appear in the following Chapters B1 through B20, Numbered in correspondence with Chapters 1 through 20 in Volume 1. Within each chapter, the routines appear in the same order as in Volume 1, but not broken out separately by section Number within Volume 1鈥檚 chapters. There are commentaries accompanying many of the routines, generally following the printed listing of the routine to which they apply. These are of two kinds: issues related to parallelizing the algorithm in question, and issues related to the Fortran 90 implementation. To distinguish between these two, rather different, kind

    标签: Numerical following the Chapters

    上传时间: 2017-04-12

    上传用户:6546544

  • Airline Reservations System A small airline has just purchased a computer for its new automated res

    Airline Reservations System A small airline has just purchased a computer for its new automated reservation system. You have been asked to develop the new system called ARSystem. You are to write an application to assign seats on each flight of the airline s only plane (capacity: 24 seats.) Your application should display the following alternatives: Please type 1 for FirstClass and Please type 2 for Economy. If the user types 1, your application should assign a seat in the first-class section (seats 1-8). If the user types 2, your application should assign a seat in the economy section (seats 9-24). Your application should then display a boarding pass indicating the person s seat Number and whether it is in the first-class or economy

    标签: Reservations automated purchased computer

    上传时间: 2017-04-14

    上传用户:lizhizheng88

  • This is the Reference Manual for the MySQL Database System. It documents MySQL up to Version 5.0.1-

    This is the Reference Manual for the MySQL Database System. It documents MySQL up to Version 5.0.1-alpha, but is also applicable for older versions of the MySQL software (such as 3.23 or 4.0-production) because functional changes are indicated with reference to a version Number.

    标签: MySQL Reference documents the

    上传时间: 2014-01-17

    上传用户:shinesyh

  • program which uses hashing techniques for storing and retrieving the data. Input to the program:

    program which uses hashing techniques for storing and retrieving the data. Input to the program: Some random Numbers. Input will be from a file. Output: First the program reads all the input and store it properly using some hash techniques. Once your program reads the complete input,it waits for the user input (prompt to the user). User now enters some Number.program displays if this Number exists in the list or not. it also display the time taken in the search operation.

    标签: program techniques retrieving the

    上传时间: 2017-04-27

    上传用户:shus521