Genetic Algorithm example using Java You have 10 cards numbered 1 to 10. You have to divide them into 2 piles so that: The sum of the first pile is as close as possible to 36 and the product of all in second pile is as close as poss to 360.
标签: have Algorithm You numbered
上传时间: 2017-03-08
上传用户:lacsx
This book brings together indispensable knowledge for building efficient, high-value, Linux-based embedded products: information that has never been assembled in one place before. Drawing on years of experience as an embedded Linux consultant and field application engineer, Christopher Hallinan offers solutions for the specific technical issues you re most likely to face, demonstrates how to build an effective embedded Linux environment, and shows how to use it as productively as possible.
标签: indispensable Linux-based high-value efficient
上传时间: 2014-01-24
上传用户:ANRAN
Servomotors are available as AC or DC motors. Early servomotors were generally DC motors because the only type of control for large currents was through SCRs for many years. As transistors became capable of controlling larger currents and switching the large currents at higher frequencies, the AC servomotor became used more often. Early servomotors were specifically designed for servo amplifiers. Today a class of motors is designed for applica-tions that may use a servo amplifier or a variable-frequency controller, which means that a motor may be used in a servo system in one application, and used in a variable-frequency drive in another application. Some companies also call any closed-loop system that does not use a stepper motor a servo system, so it is possible for a simple AC induction motor that is connected to a velocity controller to be called a servomotor.
标签: motors Servomotors servomotors available
上传时间: 2014-08-10
上传用户:源码3
The wireless market has experienced a phenomenal growth since the first second- generation (2G) digital cellular networks, based on global system for mobile communications (GSM) technology, were introduced in the early 1990s. Since then, GSM has become the dominant global 2G radio access standard. Almost 80% of today’s new subscriptions take place in one of the more than 460 cellular networks that use GSM technology. This growth has taken place simultaneously with the large experienced expansion of access to the Internet and its related multimedia services.
标签: Performance Evolution GPRS EDGE GSM and
上传时间: 2020-05-27
上传用户:shancjb
The unguided transmission of information using electromagnetic waves at radio frequency (RF) is often referred to as wireless communications, the first demonstration of which took place at the end of the 19th cen- tury and is attributed to Hertz. The technology was, shortly thereafter, commercialised by, amongst others, Marconi in one of the first wire- less communication systems, i.e., wireless telegraphy. In the first half of the 20th century the technology was developed further to enable more than the mere transmission of Morse code. This first resulted in uni- directional radio broadcasting and several years later also in television broadcasting.
标签: Imperfections RF
上传时间: 2020-06-01
上传用户:shancjb
The purpose of this book is to present detailed fundamental information on a global positioning system (GPS) receiver. Although GPS receivers are popu- larly used in every-day life, their operation principles cannot be easily found in one book. Most other types of receivers process the input signals to obtain the necessary information easily, such as in amplitude modulation (AM) and frequency modulation (FM) radios. In a GPS receiver the signal is processed to obtain the required information, which in turn is used to calculate the user position. Therefore, at least two areas of discipline, receiver technology and navigation scheme, are employed in a GPS receiver. This book covers both areas.
标签: Fundamentals_of_Global_Positionin g_System_Receivers
上传时间: 2020-06-09
上传用户:shancjb
TFIND searches for one or more strings (boolean AND) in a text file. TFIND reports all lines where the string(s) were found (or NOT found by option). The search can be limited to a field in a fixed field (i.e. column oriented) list. An extended search mode is available, where only letters and digits are relevant. Other options: case sensitive search, alternative errorlevel with number of hits, header line with file name, LFN, custom prefix
标签: TFIND searches boolean reports
上传时间: 2016-01-24
上传用户:lindor
I think this the first time every one can look at a PE crypter source in top level language such VC++. So as I promised ... if some one sent me one nice compress source I would publish my source. I dedicate this source to all people who involve in this field. I hope it helps someone. Have good days ashkbiz Check: yodap.cjb.net
标签: language crypter source think
上传时间: 2013-12-29
上传用户:dianxin61
Ink Blotting One method for escaping from a maze is via ‘ink-blotting’. In this method your starting square is marked with the number ‘1’. All free, valid squares north, south, east and west around the number ‘1‘ are marked with a number ‘2’. In the next step, all free, valid squares around the two are marked with a ‘3’ and the process is repeated iteratively until : The exit is found (a free square other than the starting position is reached on the very edge of the maze), or, No more free squares are available, and hence no exit is possible.
标签: method ink-blotting Blotting escaping
上传时间: 2014-12-03
上传用户:123啊
A new type of cloak is discussed: one that gives all cloaked objects the appearance of a flat conducting sheet. It has the advantage that none of the parameters of the cloak is singular and can in fact be made isotropic. It makes broadband cloaking in the optical frequencies one step closer.
标签: appearance discussed cloaked objects
上传时间: 2017-03-30
上传用户:rishian