一款Java实现的HTTP代理服务器,兼容HTTP/1.1,支持SSL链接。RabbIT可以通过过滤背景图片,降低图片的解析率来加速网络浏览的速度。-new Java HTTP proxy server and is compatible with HTTP/1.1, support SSL link. RabbIT can filter background pictures, pictures of analytic lower rates to accelerate the speed of Web browsers.
上传时间: 2017-06-11
上传用户:hebmuljb
This tutorial explains how to communicate with IO devices on the DE2 Board and how to deal with interrupts using C and the Altera Monitor Program. Two example programs are given that diplay the state of the toggle switches on the red LEDs. The fi rst program uses the programmed I/O approach and the second program uses interrupts.
标签: with communicate how tutorial
上传时间: 2013-12-13
上传用户:熊少锋
The objective is to set up SPI communication between VTI Technologies digital pressure sensor component and an MCU of an application device ATMEGA16L. In this code example: ?The MCU is configured ?SCP1000-D01 is initialized and configured ?The high resolution measurement mode is activated ?Temperature and pressure information is read always when the DRDY pin is in high state Please refer to the document "SCP1000 Product Family Specification 8260800" for further information on SCP1000 register addressing and SPI communication. This document applies to the SCP1000-D01.
标签: communication Technologies objective pressure
上传时间: 2017-06-17
上传用户:youmo81
用JAVA写的简单爬虫,使用HttpURLConnection,需要的可以写入循环,然后用htmlparser解析出link。
标签: JAVA
上传时间: 2017-06-22
上传用户:独孤求源
Text mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth examination of core text mining and link detection algorithms and operations, this book examines advanced pre-processing techniques, knowledge representation considerations, and visualization approaches. Finally, it explores current real-world, mission-critical applications of text mining and link detection in such varied fields as M&A business intelligence, genomics research and counter-terrorism activities.
标签: information techniques combining overload
上传时间: 2014-01-02
上传用户:Late_Li
药物开发中的基于结构的从头设计代码,能够实现GROW和LINK的从头设计,同时POCKET模块还能对蛋白质的活性位点进行分析
标签: 代码
上传时间: 2014-12-20
上传用户:leehom61
Httpd pada Slackware 12 memberikan banyak contoh file konfigurasi apache. Mulai dari virtual host, ssl, dan lain sebagainya. Peletakan dokument root pada Slackware 12 adalah pada direktory /srv tetapi tetap ter-link dengan direktory /www seperti pada slackware 11.
标签: konfigurasi memberikan Slackware virtual
上传时间: 2017-07-21
上传用户:四只眼
The FPGA can realize a more optimized Digital controller in DC/DC Converters when compare to DSPs. In this paper, based on the FPGA platform, The theoretical analysis, characteristics, simulation and design consideration are given. The methods to implement the digital DC/DC Converters have been researched. The function module, state machine of digital DC/DC controller and high resolution DPWM with Sigma- Delta dither has been introduced. They are verified by experiments on a 20 W, 300 KHz non-isolated synchronous buck converters.
标签: Converters controller optimized Digital
上传时间: 2013-12-31
上传用户:tzl1975
In this paper, a new method is introduced to implement chaotic generators based on the Henon map and Lorenz chaotic generators given by the state equations using the Field Programmable Gate Array (FPGA). The aim of this method is to increase the frequency of the chaotic generators. The new method is based on the MATLAB® Software, Xilinx System Generator, Xilinx Alliance tools and Synplicity Synplify.
标签: introduced generators implement chaotic
上传时间: 2017-07-24
上传用户:qq521
Wireless range extenders or wireless repeaters can extend the range of an existing wireless network. Range extenders can be strategically placed to elongate a signal area or allow for the signal area to reach around barriers such as those created in L-shaped corridors. Wireless devices connected through repeaters will suffer from an increased latency for each hop. Additionally, a wireless device connected to any of the repeaters in the chain will have a throughput that is limited by the weakest link between the two nodes in the chain from which the connection originates to where the connection ends
标签: wireless range extenders repeaters
上传时间: 2014-01-02
上传用户:zhangyigenius