虫虫首页|资源下载|资源专辑|精品软件
登录|注册

task

  • 业务管理:包括客房预订、入住登记、续住、换房、转账、其他服务提供、留言板、意见簿、走客结账、欠费结算。 ¯ 查询统计:包括历史单据、预订表、在住客人表、换房查询、转账查询、日经营状况、月收入状

    业务管理:包括客房预订、入住登记、续住、换房、转账、其他服务提供、留言板、意见簿、走客结账、欠费结算。 ¯ 查询统计:包括历史单据、预订表、在住客人表、换房查询、转账查询、日经营状况、月收入状况、客房利用率、实时房态。-system design focus of this chapter describe the development of small PowerBuilder 9.0 Rooms Management System process, through the study of this chapter, readers should be familiar with PowerBuilder 9.0 TreeView control and the right mouse button menu of use, master GroupBox, SingleLineEdit, CommandButton, RadioButton, PictureButton controls such as the similarities and differences to further understanding of data objects window displays various occasions the application. System to complete the task Macr system maintenance include : corporate information, the operator management, change passwords, management succession, dictionary management. Macr basic information : Rooms management system for the basic information management (including new, modify or delete), which is the basic informat

    标签: macr 查询 服务 留言板

    上传时间: 2013-12-19

    上传用户:ouyangtongze

  • Description The art galleries of the new and very futuristic building of the Center for Balkan Coop

    Description The art galleries of the new and very futuristic building of the Center for Balkan Cooperation have the form of polygons (not necessarily convex). When a big exhibition is organized, watching over all of the pictures is a big security concern. Your task is that for a given gallery to write a program which finds the surface of the area of the floor, from which each point on the walls of the gallery is visible. On the figure 1. a map of a gallery is given in some co-ordinate system. The area wanted is shaded on the figure 2.

    标签: Description futuristic galleries the

    上传时间: 2017-02-17

    上传用户:1427796291

  • s3c2410上用Keil开发的ucosII源代码

    s3c2410上用Keil开发的ucosII源代码,入门级 非常简单,只是演示了创建一个task(参考资料来源于网络),最后完成任务切换到OStaskIdle运行。

    标签: s3c2410 ucosII Keil 源代码

    上传时间: 2017-04-08

    上传用户:123456wh

  • The code performs a number (ITERS) of iterations of the Bailey s 6-step FFT alg

    The code performs a number (ITERS) of iterations of the Bailey s 6-step FFT algorithm (following the ideas in the CMU task parallel suite). 1.- Generates an input signal vector (dgen) with size n=n1xn2 stored in row major order In this code the size of the input signal is NN=NxN (n=NN, n1=n2=N) 2.- Transpose (tpose) A to have it stored in column major order 3.- Perform independent FFTs on the rows (cffts) 4.- Scale each element of the resulting array by a factor of w[n]**(p*q) 5.- Transpose (tpose) to prepair it for the next step 6.- Perform independent FFTs on the rows (cffts) 7.- Transpose the resulting matrix The code requires nested Parallelism.

    标签: iterations performs Bailey number

    上传时间: 2014-01-05

    上传用户:libenshu01

  • ucosII源码分析

    ucosII源码分析,从CPU的执行顺序来看吧,这样也许清晰一些,并且我们暂时抛弃那些Event/MailBox、信号量等元素,还是先看看作为一个OS核心的task Schedule部分内容吧。首先从main函数开始,下面是uC/OS-II main函数的大致流程:

    标签: ucosII 源码分析

    上传时间: 2017-06-19

    上传用户:hwl453472107

  • FreeRTOS 的實現詳解

    FreeRTOS 的實現詳解,包括TCB實現,調度原理,以及task通訊物件介紹。

    标签: FreeRTOS

    上传时间: 2013-12-19

    上传用户:gaojiao1999

  • A certification path is an ordered list of certificates starting with a certificate issued by the re

    A certification path is an ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509 and further defined in Internet Engineering task Force (IETF) Request for Comments (RFC) 3280. Certification path processing verifies the binding between the subject distinguished name and/or subject alternative name and the subject public key defined in the target certificate. The binding is limited by constraints, which are specified in the certificates that comprise the path, and inputs that are specified by the relying party. To ensure secure interoperation of PKI-enabled applications, the path validation must be done in accordance with the X.509 and RFC 3280 specifications. This document provides the test assertions and the test cases for testing path validation software against these specifications.

    标签: certification certificates certificate starting

    上传时间: 2017-07-31

    上传用户:清风冷雨

  • The potential of solving real-time demanding industrial applications, using vision-based algorithms

    The potential of solving real-time demanding industrial applications, using vision-based algorithms, drastically grew due to an increasing availability of computational power. In this thesis a novel real-time, vision-based Blackjack analysis system is presented. The embedding of the vision algorithms in a compound system of other information sources such as an electronic chip tray, reduces the vision task to detect cards and chips. Robust results are achieved by not just analyzing single frames but an image stream regarding game-ß ow informations. The requirements for such a system are a highly robust and adaptive behav- ior. This is motivated by the vital interest of casino entrepreneurs in a 100 statistical analysis of their offered gambling in order to support the business plan, measuring table and dealer performance and give accurate player rating. Extensive experiments show the robustness and applicability of the proposed system.

    标签: applications vision-based algorithms industrial

    上传时间: 2017-08-20

    上传用户:liansi

  • face detection Face detection can be regarded as a more general case of face localization In face

    face detection Face detection can be regarded as a more general case of face localization In face localization, the task is to find the locations and sizes of a known number of faces (usually one). In face detection, one does not have this additional information. Early face-detection algorithms focused on the detection of frontal human faces, whereas newer algorithms attempt to solve the more general and difficult problem of multi-view face detection. That is, the detection of faces that are either rotated along the axis from the face to the observer (in-plane rotation), or rotated along the vertical or left-right axis (out-of-plane rotation),or both.

    标签: detection face localization regarded

    上传时间: 2014-01-09

    上传用户:wfeel

  • 介绍Verilog HDL, 内容包括: – Verilog应用 – Verilog语言的构成元素 – 结构级描述及仿真 – 行为级描述及仿真 – 延时的特点及说明 – 介绍Verilog

    介绍Verilog HDL, 内容包括: – Verilog应用 – Verilog语言的构成元素 – 结构级描述及仿真 – 行为级描述及仿真 – 延时的特点及说明 – 介绍Verilog testbench • 激励和控制和描述 • 结果的产生及验证 – 任务task及函数function – 用户定义的基本单元(primitive) – 可综合的Verilog描述风格

    标签: Verilog HDL 仿真 语言

    上传时间: 2013-12-19

    上传用户:shanml