项目描述: EMC is software that implements real-time control of equipment such as machine tools, robots, and coordinate measuring machines. It runs in real-time under Linux with the NMT rtlinux patch, and in nonrealtime under Solaris, and WindowsNT. EMC 是一个设备的实时控制软件,可以控制机器工具,机器人,协调式的测量机器。它可以实时在带有NMT补丁的Linux下运行,可以在Solaris, 和WindowsNT下可非实时运行。
标签: implements equipment real-time software
上传时间: 2016-12-28
上传用户:wl9454
Measurement of gamma characteristic(Ca200Sample_Gamma.exe)provides Gamma characteristics of W,R,G and B. Measurement at 16,32,64,128,256 gradation.
标签: characteristics characteristic Sample_Gamma Measurement
上传时间: 2016-12-29
上传用户:familiarsmile
数值计算牛顿迭代法的matlab源程序 说明如下: %fun----input,the part as the form of f(x) in the equation f(x)=0 % ini----input,sets the starting point to ini % err----input,sets admissible error % sol----output,returns the root of equation
上传时间: 2014-01-12
上传用户:妄想演绎师
As economy explodesand packaging industry lfourishes,itisacriticalissue thatinternational communityencountersthewasteofresourcesandenvironmentalpollution causedbypackaging waste.
标签: explodesand lfourishes packaging industry
上传时间: 2017-01-01
上传用户:xg262122
Wavelet Subband coding for speaker recognition The fn will calculated subband energes as given in the att tech paper of ruhi sarikaya and others. the fn also calculates the DCT part. using this fn and other algo for pattern classification(VQ,GMM) speaker identification could be achived. the progress in extraction is also indicated by progress bar.
标签: recognition calculated Wavelet Subband
上传时间: 2013-12-08
上传用户:guanliya
求解抛物型方程的交替隐方向P-R差分格式的matlab程序实现。不过大家在用的时候要用到原函数f.m和精确解函数uexact.m,应用程序的时候只要修改精确解和右端项就可以了。
上传时间: 2013-11-25
上传用户:hewenzhi
学习R语言的参考材料R for beginners.pdf
上传时间: 2017-01-11
上传用户:asdfasdfd
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
标签: vulnerabilities Introduction discovered undeniably
上传时间: 2014-01-05
上传用户:yph853211
电子琴 高音依次为1,2,3,4,5,6,7 中音依次为q,w,e,r,t,y,u 低音依次为a,s,d,f,g,h,j
上传时间: 2017-01-14
上传用户:fnhhs
This piece of software was written as a replacement and extension for Tripwire. Tripwire is an excellent program in itself but lacks some features and is a closed product.
标签: Tripwire replacement extension software
上传时间: 2014-01-25
上传用户:宋桃子