熟悉用单片机产生声音的方法 硬件要求:拨码开关S10的第3位置ON,其他位置Off LIST P=16F877A,R=DEC 定义器件,默认为十进制
上传时间: 2013-12-26
上传用户:wpwpwlxwlx
熟悉时钟芯片DS1302的使用 先设置时间和日期为:秒(08),分(58),时(05),日(13),月(01),年(55) 六位数码观显示时间和日期,默认显示的是时间,通过小数点区分时与分、分与秒 按下RB1键不放,显示切换到日期显示。 硬件要求:拨码开关S9全部置ON 拨码开关S5、S6全部置ON 拨码开关S1第7位置ON,其他位置Off 其他拨码开关置O
上传时间: 2016-06-28
上传用户:cmc_68289287
In this paper, we present LOADED, an algorithm for outlier detection in evolving data sets containing both continuous and categorical attributes. LOADED is a tunable algorithm, wherein one can trade Off computation for accuracy so that domain-specific response times are achieved. Experimental results show that LOADED provides very good detection and false positive rates, which are several times better than those of existing distance-based schemes.
标签: algorithm detection containi evolving
上传时间: 2014-01-08
上传用户:aeiouetla
The Little Green BATS is the first and so far only Dutch team in the 3D simulation league. We are a group of graduate students from the department of AI at the University of Groningen, The Netherlands. Our team name is derived from the fact that the first 3D agents in the league were balls and from the very philosophical observation that Balls Are Truly Spheres (BATS). This abbreviation reminded us of our favorite song Little Green Bag by The George Baker Selection and so the whole team name was born. We entered the competition for the first time at the 10th edition of RoboCup at Bremen, Germany. unfortunately our hard work didn t pay Off that time: already in the second round we got eliminated. However, after this we had a good base to build upon and the good time we had at the event and the nice community inspired us to continue and work hard for another year. This turned out to be defiantly worth it, because in 2007 in Atlanta we managed to become vice world champions!
标签: simulation the Little league
上传时间: 2014-12-07
上传用户:youlongjian0
MSP-FET430P410 Demo - Timer_A Toggle P5.1, CCR0 Contmode ISR, DCO SMCLK Description Toggle P5.1 using using software and TA_0 ISR. Toggle rate is set at 50000 DCO/SMCLK cycles. Default DCO frequency used for TACLK. Durring the TA_0 ISR P5.1 is toggled and 50000 clock cycles are added to CCR0. TA_0 ISR is triggered exactly 50000 cycles. CPU is normally Off and used only durring TA_ISR. ACLK = n/a, MCLK = SMCLK = TACLK = DCO ~ 800k
标签: Toggle Description 5.1 Contmode
上传时间: 2014-01-04
上传用户:gut1234567
Where We ve Been Where We re Going Back in February (that s 1998, but it almost seems longer), Dr. GUI set Off to start a set of columns on the Active Template Library (ATL).
标签: Where February almost longer
上传时间: 2016-08-29
上传用户:JIUSHICHEN
This GTK+ version 2.12.3. GTK+ is a multi-platform toolkit for creating graphical user interfaces. Offering a complete set of widgets, GTK+ is suitable for projects ranging from small one-Off projects to complete application suites.
标签: multi-platform interfaces GTK graphical
上传时间: 2016-10-13
上传用户:ve3344
After the successful global introduction during the past decade of the second generation (2G) digital mobile communications systems, it seems that the third generation (3G) Universal Mobile Communication System (UMTS) has finally taken Off, at least in some regions. The plethora of new services that are expected to be Offered by this system requires the development of new paradigms in the way scarce radio resources should be managed. The Quality of Service (QoS) concept, which introduces in a natural way the service differentiation and the possibility of adapting the resource consumption to the specific service requirements, will open the door for the provision of advanced wireless services to the mass market.
标签: the introduction successful generation
上传时间: 2013-12-30
上传用户:qq21508895
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke Off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
标签: vulnerabilities Introduction discovered undeniably
上传时间: 2014-01-05
上传用户:yph853211
CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data on a CAN network, and how to move information to and from CAN RAM message objects. Each C8051F040-TB CAN node is configured to send a message when it s P3.7 button is depressed/released, with a 0x11 to indicate the button is pushed, and 0x00 when released. Each node also has a message object configured to receive messages. The C8051 tests the received data and will turn on/Off the target board s LED. When one target is loaded with CAN2.c and the other is loaded with CAN1.c, one target board s push-button will control the other target board s LED, establishing a simple control link via the CAN bus and can be observed directly on the target boards.
标签: CAN configuring and transmit
上传时间: 2013-12-11
上传用户:weiwolkt