虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

On-the-Go

  • VxWorks 6.6 BSP开发执导 This document describes, in general terms, the elements that make up a board

    VxWorks 6.6 BSP开发执导 This document describes, in general terms, the elements that make up a board support package [BSP], the requirements for a VxWorks BSP, and the general behavior of a BSP during the boot process. This document outlines the steps needed to port an existing BSP to a new hardware platform or to write a new VxWorks BSP for custom hardware using a reference BSP or template BSP as a starting point. It provides hints and tips for debugging a BSP and solving common BSP development problems. It also provides information on the BSP validation test suite [BSP VTS] that is used to assess the functionality of a VxWorks BSP.

    标签: describes document elements VxWorks

    上传时间: 2017-03-23

    上传用户:磊子226

  • For the practicing programmer with little time to spare, Essential C++ offers a fast-track to learn

    For the practicing programmer with little time to spare, Essential C++ offers a fast-track to learning and working with C++ on the job. This book is specifically designed to bring you up to speed in a short amount of time. It focuses on the elements of C++ programming that you are most likely to encounter and examines features and techniques that help solve real-world programming challenges.

    标签: practicing fast-track programmer Essential

    上传时间: 2017-03-29

    上传用户:洛木卓

  • A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di

    A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak with the ideal material parameters is a perfect invisibility cloak by systematically studying the change of the scattering coefficients from the near-ideal case to the ideal one. However, due to the slow convergence of the zeroth order scattering coefficients, a tiny perturbation on the cloak would induce a noticeable field scattering and penetration.

    标签: cylindrical scattering expansion developed

    上传时间: 2017-03-30

    上传用户:lhc9102

  • We obtained the energy transport velocity distribution for a three dimensional ideal cloak explicit

    We obtained the energy transport velocity distribution for a three dimensional ideal cloak explicitly. Near the operation frequency, the energy transport velocity has rather peculiar distribution. The velocity along a line joining the origin of the cloak is a constant, while the velocity approaches zero at the inner boundary of the cloak. A ray pointing right into the origin of the cloak will experience abrupt changes of velocities when it impinges on the inner surface of the cloak. This peculiar distribution causes long time delays for beams passing through the ideal cloak within a geometric optics description.

    标签: distribution dimensional transport obtained

    上传时间: 2013-12-19

    上传用户:zhliu007

  • Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits.

    Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits. It has proved to be an extremely versatile tool on the unix platform. So why should NT always be unix s poor cousin when it comes to tcp/ip testing and exploration? I bet many NT admins out there keep a unix box around to use tools such as Netcat or to test their systems with the unix version of an NT vulnerability exploit. With Netcat for NT part of that feeling disempowerment is over.

    标签: the resource Netcat Swiss

    上传时间: 2017-04-02

    上传用户:onewq

  • In some graphs, the shortest path is given by optimizing two different metrics: the sum of weights o

    In some graphs, the shortest path is given by optimizing two different metrics: the sum of weights of the edges and the number of edges. For example: if two paths with equal cost exist then, the path with the least number of edges is chosen as the shortest path. Given this metric, you have find out the shortest path between a given pair of vertices in the input graph. The output should be the number of edges on the path, the cost of the shortest path, and the path itself. Input is the adjacency matrix and the two vertices.

    标签: optimizing different the shortest

    上传时间: 2014-10-25

    上传用户:1159797854

  • full wave rectifierDuring the period from 伪 to 蟺, the input voltage vs input current is are positive

    full wave rectifierDuring the period from 伪 to 蟺, the input voltage vs input current is are positive and the power flows from supply to the load. The converter is said to be operated at rectification mode .During the period from 蟺 to 蟺+伪 , the input voltage vs is negative and the input current is is positive and reverse power flows from load to the supply. The converter is said to be operated in inversion mode. Depending on the value of 伪, average output voltage can be either positive or negative and hence provides 2 quadrant operation.

    标签: input rectifierDuring the positive

    上传时间: 2017-04-10

    上传用户:alan-ee

  • The main MIPS processor of SMP8630 comes with a JTAG interface, allowing:  access to caches and da

    The main MIPS processor of SMP8630 comes with a JTAG interface, allowing:  access to caches and data bus (DRAM) with a bandwidth of about 200kbit/s  examining the processor state whatever the execution mode (monice)  connecting to monice using mdi-server and using a gdb client on the processor to step and break accurately whatever the execution mode  running semi-hosted applications  fl ash write tool  memory testing (MT command)  real-time traces: has not been built in CPU (Config3_TL=0) and only supported by MajicPLUS probes (maybe built into emulator?)

    标签: interface processor allowing access

    上传时间: 2013-12-19

    上传用户:youke111

  • Control your PC with Mobile Phone-it controls your pc using mobile phone from anywhere in the world.

    Control your PC with Mobile Phone-it controls your pc using mobile phone from anywhere in the world. A command can be send by mobile phone through sms.Based on the command ur pc performs tasks such as shut down,open file,play music etc.

    标签: your Phone-it controls anywhere

    上传时间: 2017-04-13

    上传用户:四只眼

  • There are _NO_ standard sample rate for the samples used in modules. But most often the samples are

    There are _NO_ standard sample rate for the samples used in modules. But most often the samples are done on the rate called C-3 (which is about 16574 Hz if you have a PAL machine). Sometimes drums are sampled at A-3 (around 28 kHz), and some sounds are at ~8 kHz or anything else to save space.

    标签: samples are the standard

    上传时间: 2017-04-14

    上传用户:稀世之宝039