虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Kernel-<b>BASED</b>

  • USB Manager(usbmgr) 0.4.8 Shuu Yamaguchi <shuu@wondernetworkresources.com> Special Helper: Phi

    USB Manager(usbmgr) 0.4.8 Shuu Yamaguchi <shuu@wondernetworkresources.com> Special Helper: Philipp Thomas When USB devices connect to or disconnect from a USB hub, the usbmgr works as the following according to configuration. a) It loads and unloads files Linux kernel modules. b) It execute file to setup USB devices.

    标签: wondernetworkresources Yamaguchi Manager Special

    上传时间: 2014-01-27

    上传用户:zhaiyanzhong

  • 用于motorala 68K系列处理器的小实时多任务操作系统 The OMU Kernel was written to provide a cut-down Unix-like O/S for a

    用于motorala 68K系列处理器的小实时多任务操作系统 The OMU Kernel was written to provide a cut-down Unix-like O/S for a home-made 6809-based home computer built by me, Steven Hosgood, in the early 1980s. This package contains the RTOS version of omu68k, derived from a port of the original 6809 code to the 68000 done by Terry Barnaby and me.

    标签: Unix-like motorala cut-down provide

    上传时间: 2014-01-21

    上传用户:1159797854

  • In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadl

    In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadline violations. Priority inheritance protocol is one of the approaches to reduce priority inversion. Unfortunately, RTOS like uC/OS can’t support priority inheritance protocol since it does not allow kernel to have multiple tasks at the same priority. Although it has different ways to avoid priority inversion such as priority ceiling protocol, developers still have some difficulties in programming real time applications with it. In this paper, we redesign the uC/OS kernel to provide the ability to support round robin scheduling and implement priority inheritance semaphore on the modified kernel. As result, we port new kernel with priority inheritance semaphore to evaluation board, and evaluate the execution time of each of the kernel service as well as verify the operations of our implementation.

    标签: priority preemptive inversion problem

    上传时间: 2015-12-14

    上传用户:气温达上千万的

  • Atheros无线芯片AR-6000系列wince 6驱动源代码(这东西我也没用过别问我,我是搜别的wince资源搜到的) AR6K SDIO support. Requires firmware

    Atheros无线芯片AR-6000系列wince 6驱动源代码(这东西我也没用过别问我,我是搜别的wince资源搜到的) AR6K SDIO support. Requires firmware 1.1 on SD13 cards. readme: Atheros Communications AR6001 WLAN Driver for SDIO installation Read Me March 26,2007 (based on k14 fw1.1) Windows CE Embedded CE 6.0 driver installation. 1. Unzip the installation file onto your system (called installation directory below) 2. Create an OS design or open an existing OS design in Platform Builder 6.0. a. The OS must support the SD bus driver and have an SD Host Controller driver (add these from Catalog Items). b. Run image size should be set to allow greater than 32MB. 3. a. From the Project menu select Add Existing Subproject... b. select AR6K_DRV.pbxml c. select open This should create a subproject within your OS Design project for the AR6K_DRV driver. 4. Build the solution. 转自Tony嵌入式,原文地址:http://www.cevx.com/bbs/dispbbs.asp?boardID=4&ID=11762&page=1

    标签: wince Requires firmware Atheros

    上传时间: 2014-11-11

    上传用户:bibirnovis

  • The kernel-ica package is a Matlab program that implements the Kernel ICA algorithm for independent

    The kernel-ica package is a Matlab program that implements the Kernel ICA algorithm for independent component analysis (ICA). The Kernel ICA algorithm is based on the minimization of a contrast function based on kernel ideas. A contrast function measures the statistical dependence between components, thus when applied to estimated components and minimized over possible demixing matrices, components that are as independent as possible are found.

    标签: independent kernel-ica implements algorithm

    上传时间: 2014-01-17

    上传用户:yiwen213

  • A stability analysis is presented for staggered schemes for the governing equations of compressible

    A stability analysis is presented for staggered schemes for the governing equations of compressible flow. The method is based on Fourier analysis. The approximate nature of pressure-correction solution methods is taken into account.  2001 IMACS. Published by Elsevier Science B.V. All rights reserved

    标签: compressible stability for equations

    上传时间: 2016-12-02

    上传用户:yph853211

  • This document provides guidelines and describes how to easily port S60 2nd Edition C++ application

    This document provides guidelines and describes how to easily port S60 2nd Edition C++ applications to S60 3rd Edition. The document has been written based on experiences of porting regular S60 2nd Edition applications, such as the S60 Platform: POP/IMAP Example [4] that can be downloaded from Forum Nokia. Code snippets from the example are shown in Chapter 8, “Application build changes,” and in Appendix A, “Code example." In addition, Appendix B, "Commonly used functions that require capabilities," and Appendix C, "Commonly used interfaces that have been changed or removed," provide useful information on some frequently used functions and interfaces in third-party applications.

    标签: application guidelines describes document

    上传时间: 2017-01-29

    上传用户:wang5829

  • We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f

    We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.

    标签: effectiveness analytically numerically cloaking

    上传时间: 2017-03-30

    上传用户:zxc23456789

  • Creating barcodes in Microsoft庐 Office has never been easier. With BarCodeWiz Toolbar you can add b

    Creating barcodes in Microsoft庐 Office has never been easier. With BarCodeWiz Toolbar you can add barcodes to Microsoft庐 Office applications with a click of a button. In Microsoft庐 Word, create single barcodes, pages of labels, or mail merge documents. In Microsoft庐 Excel庐, select a range of cells and automatically convert each cell to a barcode. In Microsoft庐 Access庐, create reports with barcodes based on your data tables.

    标签: BarCodeWiz Microsoft Creating barcodes

    上传时间: 2013-12-18

    上传用户:asddsd

  • ISIS Timer Design

    A design about 8051 (running at 12MHz) based system with 3 7-Seg displays and two buttons to implement the following functions.  1. When press the + button, the display C = A+B.  2. When press the button, the display C = A - B.  “A” and “B” are 8-bit inputs when “C” is 9-bit output. 

    标签: ISIS AT89C52

    上传时间: 2015-05-05

    上传用户:guoxiy