虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

exploited

  • The advantages of automation can be exploited in order to solve or to minimize the needs of manual

    The advantages of automation can be exploited in order to solve or to minimize the needs of manual approach. In order to support the development of survey accurate cadastral system, an automatic programming approach will be adopted. Database selection system will conduct several outliers integrity checking, rebuild cadastral spatial topology (cadastral lot) and make selfcorrection procedures based on cadastral survey concepts and mathematical model respective to the cadastral lots selected. This is to ensure that all cadastral lots are kept in a closed polygon and provide accurate and "clean" cadastral information.. This system was developed in windows environment.

    标签: advantages automation exploited minimize

    上传时间: 2017-04-29

    上传用户:520

  • MEMS 经典教材

    The field of microelectromechanical systems (MEMS), particularly micromachinedmechanical transducers, has been expanding over recent years, and the productioncosts of these devices continue to fall. Using materials, fabrication processes, anddesign tools originally developed for the microelectronic circuits industry, newtypes of microengineered device are evolving all the time—many offering numerousadvantages over their traditional counterparts. The electrical properties of siliconhave been well understood for many years, but it is the mechanical properties thathave been exploited in many examples of MEMS. This book may seem slightlyunusual in that it has four editors. However, since we all work together in this fieldwithin the School of Electronics and Computer Science at the University of Southampton,it seemed natural to work together on a project like this. MEMS are nowappearing as part of the syllabus for both undergraduate and postgraduate coursesat many universities, and we hope that this book will complement the teaching thatis taking place in this area.

    标签: MEMS 教材

    上传时间: 2013-10-16

    上传用户:朗朗乾坤

  • 半导体器件物理与设计

    It would not be an exaggeration to say that semiconductor devices have transformed humanlife. From computers to communications to internet and video games these devices and the technologies they have enabled have expanded human experience in a way that is unique in history. Semiconductor devices have exploited materials, physics and imaginative applications to spawn new lifestyles. Of course for the device engineer, in spite of the advances, the challenges of reaching higher frequency, lower power consumption, higher power generation etc.

    标签: 半导体器件 物理

    上传时间: 2013-10-28

    上传用户:songnanhua

  • The jacobi.f program solves the Helmholtz equation on a regular mesh, using an iterative Jacobi meth

    The jacobi.f program solves the Helmholtz equation on a regular mesh, using an iterative Jacobi method with over-relaxation. Parallelism is exploited in both the solver and the numerical error checking

    标签: Helmholtz iterative equation program

    上传时间: 2016-04-03

    上传用户:杜莹12345

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    标签: vulnerabilities Introduction discovered undeniably

    上传时间: 2014-01-05

    上传用户:yph853211

  • Linux was first released into an unsuspecting world in the summer of 1991. Initially the spare-time

    Linux was first released into an unsuspecting world in the summer of 1991. Initially the spare-time hobby of a Finnish computer scientist by the name of Linus Torvalds, Linux was at first accessible only in software source code form to those with enough expertise to build and install it. Early enthusiasts (most also developers themselves by necessity) exploited the growth of the Internet in the early 1990s as a means to build online communities and drive development forward. These communities helped to build the first Linux software distributions, containing all the software components needed to install and use a Linux system without requiring users to be technical experts.

    标签: unsuspecting spare-time Initially the

    上传时间: 2013-12-12

    上传用户:dianxin61