虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

industrial-strength

  • 改变文字颜色和背景色可以得到不同的效果。文字颜色修改

    改变文字颜色和背景色可以得到不同的效果。文字颜色修改,只要修改filter:glow(color=red,strength=2) 中的color项,strength为颜色的深度值 。

    标签: 改变 修改 背景色

    上传时间: 2015-06-01

    上传用户:songnanhua

  • This book is about the management of business processes. This is certainly not a new topic. Since t

    This book is about the management of business processes. This is certainly not a new topic. Since the beginning of the Industrial Revolution, it has been written about from every possible point of view—economic, sociological, psychological, accountancy, mechanical engineering and business administration. In this book, we examine the management of business processes from the perspective of computing, or—to put it more broadly—of information technology. The reason is that information technology has made huge leaps forward in recent years, resulting in the creation of completely new ways of organizing business processes. The development of generic software packages for managing business processes—so-called workflow management systems (WFMS)—is particularly important in this respect.

    标签: This management certainly processes

    上传时间: 2013-11-29

    上传用户:shus521

  • American Gladiator,You are consulting for a game show in which n contestants are pitted against n gl

    American Gladiator,You are consulting for a game show in which n contestants are pitted against n gladiators in order to see which contestants are the best. The game show aims to rank the contestants in order of strength this is done via a series of 1-on-1 matches between contestants and gladiators. If the contestant is stronger than the gladiator, then the contestant wins the match otherwise, the gladiator wins the match. If the contestant and gladiator have equal strength, then they are “perfect equals” and a tie is declared. We assume that each contestant is the perfect equal of exactly one gladiator, and each gladiator is the perfect equal of exactly one contestant. However, as the gladiators sometimes change from one show to another, we do not know the ordering of strength among the gladiators.

    标签: contestants consulting Gladiator are

    上传时间: 2013-12-18

    上传用户:windwolf2000

  • The need for accurate monitoring and analysis of sequential data arises in many scientic, industria

    The need for accurate monitoring and analysis of sequential data arises in many scientic, industrial and nancial problems. Although the Kalman lter is effective in the linear-Gaussian case, new methods of dealing with sequential data are required with non-standard models. Recently, there has been renewed interest in simulation-based techniques. The basic idea behind these techniques is that the current state of knowledge is encapsulated in a representative sample from the appropriate posterior distribution. As time goes on, the sample evolves and adapts recursively in accordance with newly acquired data. We give a critical review of recent developments, by reference to oil well monitoring, ion channel monitoring and tracking problems, and propose some alternative algorithms that avoid the weaknesses of the current methods.

    标签: monitoring sequential industria accurate

    上传时间: 2013-12-17

    上传用户:familiarsmile

  • Ideal for large low power (nanoWatt) and connectivity applications that benefit from the availabilit

    Ideal for large low power (nanoWatt) and connectivity applications that benefit from the availability of four serial ports: double synchronous serial ports (I² C™ and SPI™ ) and double asynchronous (LIN capable) serial ports. Large amounts of RAM memory for buffering and FLASH program memory make it ideal for instrumentation panels, TCP/IP enabled embedded applications as well as metering and industrial control and monitoring applications. While operating up to 40 MHz, it is also backward software and hardware compatible with the PIC18F8720.

    标签: connectivity applications availabilit nanoWatt

    上传时间: 2016-02-04

    上传用户:CHINA526

  • This document contains a description of the CAN Reference Model. This document is part of a set of

    This document contains a description of the CAN Reference Model. This document is part of a set of documents that standardize the CAN Application Layer for Industrial Applications.

    标签: document This description Reference

    上传时间: 2016-02-08

    上传用户:yoleeson

  • This manual describes Freescale’s IEEE™ 802.15.4 Standard compliant MAC/PHY software. The Frees

    This manual describes Freescale’s IEEE™ 802.15.4 Standard compliant MAC/PHY software. The Freescale 802.15.4 MAC/PHY software is designed for use with the Freescale MC1319x and MC1320x, family of short range, low power, 2.4 GHz Industrial, Scientific, and Medical (ISM) band transceivers, designed for use with the HCS08 Family of MCUs. The MAC/PHY software also works with the MC1321x family of short range, low power, 2.4 GHz ISM band transceivers that incorporate a low power 2.4 GHz radio frequency transceiver and an 8-bit microcontroller into a single LGA package. Throughout this manual, the term transceiver refers to either the MC1319x, MC1320x, or the internal counterpart inside the MC1321x System in a Package (SiP).

    标签: Freescale describes compliant Standard

    上传时间: 2016-04-17

    上传用户:caiiicc

  • This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message au

    This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared secret key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. The HMAC specification in this standard is a generalization of Internet RFC 2104, HMAC, Keyed-Hashing for Message Authentication, and ANSI X9.71, Keyed Hash Message Authentication Code.

    标签: message authentication keyed-hash describes

    上传时间: 2014-01-07

    上传用户:凤临西北

  • 利用java实现文件的AES加密功能 This Java AES Crypt package contains the Java class es.vocali.util.AESCrypt, whi

    利用java实现文件的AES加密功能 This Java AES Crypt package contains the Java class es.vocali.util.AESCrypt, which provides file encryption and decryption using aescrypt file format. Requirements The Java AES Crypt package only works in Java 6, but can be easily adapted to Java 5 by replacing the call to NetworkInterface.getHardwareAddress() with something else. In order to use 256 bit AES keys, you must download and install "Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files" from http://java.sun.com/javase/downloads/index.jsp

    标签: Java AES AESCrypt contains

    上传时间: 2017-02-11

    上传用户:kiklkook

  • With the advances in the semiconductor and communication industries, it has become increasingly imp

    With the advances in the semiconductor and communication industries, it has become increasingly important for electrical engineers to develop a good understanding of microelectronics. This book addresses the need for a text that teaches microelectronics from a modern and intuitive perspective. Guided by my industrial, research, and academic experience, I have chosen the topics, the order, and the depth and breadth so as to efficiently impart analysis and design principles that the students will find useful as they enter the industry or graduate school.

    标签: communication semiconductor increasingly industries

    上传时间: 2013-12-19

    上传用户:evil