虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Changes

  • In this paper we describe a control methodology for catching a fast moving object with a robot mani

    In this paper we describe a control methodology for catching a fast moving object with a robot manipulator, where visual information is employed to track the trajectory of the target. Sensing, planning and control are performed in real-time to cope with possible unpredictable trajectory Changes of the moving target, and prediction techniques are adopted to compensate the time delays introduced by visual processing and by the robot controller. A simple but reliable model of the robot controller has been taken into account in the control architecture for improving the performance of the system. Experimental results have shown that the robot system is capable of tracking and catching an object moving on a plane at velocities of up to 700 mm/s and accelerations of up to 1500 mm/s2.

    标签: methodology describe catching control

    上传时间: 2014-01-12

    上传用户:qq521

  • Given Perl s natural fit for web applications development, it s no surprise that Perl is also a natu

    Given Perl s natural fit for web applications development, it s no surprise that Perl is also a natural choice for web services development. It s the most popular web programming language, with strong implementations of both SOAP and XML-RPC, the leading ways to distribute applications using web services. But books on web services focus on writing these applications in Java or Visual Basic, leaving Perl programmers with few resources to get them started. "Programming Web Services with Perl" Changes that, bringing Perl users all the information they need to create web services using their favorite language.

    标签: Perl applications development surprise

    上传时间: 2014-11-21

    上传用户:xiaoyunyun

  • 不错的 PERL 教程 Find a Perl programmer, and you ll find a copy of Perl Cookbook nearby. Perl Cookbook

    不错的 PERL 教程 Find a Perl programmer, and you ll find a copy of Perl Cookbook nearby. Perl Cookbook is a comprehensive collection of problems, solutions, and practical examples for anyone programming in Perl. The book contains hundreds of rigorously reviewed Perl "recipes" and thousands of examples ranging from brief one-liners to complete applications. The second edition of Perl Cookbook has been fully updated for Perl 5.8, with extensive Changes for Unicode support, I/O layers, mod_perl, and new technologies that have emerged since the previous edition of the book. Recipes have been updated to include the latest modules. New recipes have been added to every chapter of the book, and some chapters have almost doubled in size.

    标签: Cookbook Perl programmer nearby

    上传时间: 2016-11-23

    上传用户:chenbhdt

  • DDR SDRAM控制器的VHDL源代码

    DDR SDRAM控制器的VHDL源代码,含详细设计文档。 The DDR, DCM, and SelectI/O™ features in the Virtex™ -II architecture make it the perfect choice for implementing a controller of a Double Data Rate (DDR) SDRAM. The Digital Clock Manager (DCM) provides the required Delay Locked Loop (DLL), Digital Phase Shift (DPS), and Digital Frequency Synthesis (DFS) functions. This application note describes a controller design for a 16-bit DDR SDRAM. The application note and reference design are enhanced versions of XAPP200 targeted to the Virtex-II series of FPGAs. At a clock rate of 133 MHz, 16-bit data Changes at both clock edges. The reference design is fully synthesizable and achieves 133 MHz performance with automatic place and route tools.

    标签: SDRAM VHDL DDR 控制器

    上传时间: 2014-11-01

    上传用户:l254587896

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware Changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    标签: vulnerabilities Introduction discovered undeniably

    上传时间: 2014-01-05

    上传用户:yph853211

  • This document provides guidelines and describes how to easily port S60 2nd Edition C++ application

    This document provides guidelines and describes how to easily port S60 2nd Edition C++ applications to S60 3rd Edition. The document has been written based on experiences of porting regular S60 2nd Edition applications, such as the S60 Platform: POP/IMAP Example [4] that can be downloaded from Forum Nokia. Code snippets from the example are shown in Chapter 8, “Application build Changes,” and in Appendix A, “Code example." In addition, Appendix B, "Commonly used functions that require capabilities," and Appendix C, "Commonly used interfaces that have been changed or removed," provide useful information on some frequently used functions and interfaces in third-party applications.

    标签: application guidelines describes document

    上传时间: 2017-01-29

    上传用户:wang5829

  • Connector/Net 5.0.6 Release Notes --- --- --- Welcome to the release notes for Connector/Net 5.

    Connector/Net 5.0.6 Release Notes --- --- --- Welcome to the release notes for Connector/Net 5.0.6. Important Changes --------------------- There are no major Changes in this version. Please see the changelog for the list of bugs fixed.

    标签: Connector Net Release Welcome

    上传时间: 2013-12-16

    上传用户:zyt

  • 很丰富的 Registry 改动例子

    很丰富的 Registry 改动例子,很多特别的例子 如: Change The Internet explorer Title, Showing the Windows Version on the Desktop Remove the shortcut arrows from all your icons Creating 3D Window Effect To prevent any Changes to the Start Menu Disable Registry Editing Tools

    标签: Registry

    上传时间: 2017-02-11

    上传用户:爺的气质

  • This file contains board-specific information for the Motorola cpv3060 target board. Specifically,

    This file contains board-specific information for the Motorola cpv3060 target board. Specifically, this file contains information on any BSP interface Changes from previous software or hardware versions, and contains caveats that the user must be aware of before using this BSP. Additionally, the target board s reference entry (i.e., cpv3060/target.nr) provides board-specific information necessary to run VxWorks, and should be read before this BSP is used.

    标签: board-specific Specifically information Motorola

    上传时间: 2017-02-16

    上传用户:libinxny

  • This file contains board-specific information for the Motorola LoPEC in support of the lopec BSP. S

    This file contains board-specific information for the Motorola LoPEC in support of the lopec BSP. Specifically, this file contains information on any BSP interface Changes from previous software or hardware versions, and contains caveats that the user must be aware of before using this BSP. Additionally, the target board s manual page entry (for example, lopec/target.nr) provides board-specific information necessary to run VxWorks, and should be read before this BSP is used.

    标签: board-specific information the Motorola

    上传时间: 2013-12-05

    上传用户:a673761058