虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

nR-Method

  • The widespread use of embedded systems mandates the development of industrial software design method

    The widespread use of embedded systems mandates the development of industrial software design methods, i.e. computer-aided design and engineering of embedded applications using formal models (frameworks) and standardized prefabricated components, much in the same way as in other mature areas of engineering such as mechanical engineering and electronics. These guidelines have been used to develop Component-based Design of Software for Embedded Systems (COMDES). The paper gives an overview of the COMDES framework, followed by a presentation of a generic component types, such as function blocks, activities and function units. The execution of function units is discussed in the context of a newly developed execution model, i.e. timed-multitasking, which has been extended to distributed embedded systems.

    标签: development widespread industrial embedded

    上传时间: 2014-01-23

    上传用户:z754970244

  • Whenever there is an application to write, breaking it up to small pieces is a great idea. The small

    Whenever there is an application to write, breaking it up to small pieces is a great idea. The smallest piece of any application would probably be a data object, or a simple Bean in Java. Java Beans are simple Java classes that have a distinctive look and behavior. Their simplest purpose is to contain data and they accomplish this by having properties. Each property is actually a data-member containing/referencing the actual data and a couple of methods, a getter method and a setter method. Thus, the simplest data-bean describing a person could be expressed as such:

    标签: small application Whenever breaking

    上传时间: 2016-11-07

    上传用户:lingzhichao

  • This approach addresses two difficulties simultaneously: 1) the range limitation of mobile robot se

    This approach addresses two difficulties simultaneously: 1) the range limitation of mobile robot sensors and 2) the difficulty of detecting buildings in monocular aerial images. With the suggested method building outlines can be detected faster than the mobile robot can explore the area by itself, giving the robot an ability to “see” around corners. At the same time, the approach can compensate for the absence of elevation data in segmentation of aerial images. Our experiments demonstrate that ground-level semantic information (wall estimates) allows to focus the segmentation of the aerial image to find buildings and produce a ground-level semantic map that covers a larger area than can be built using the onboard sensors.

    标签: simultaneously difficulties limitation addresses

    上传时间: 2014-06-11

    上传用户:waitingfy

  • We propose a technique that allows a person to design a new photograph with substantially less effo

    We propose a technique that allows a person to design a new photograph with substantially less effort. This paper presents a method that generates a composite image when a user types in nouns, such as “boat” and “sand.” The artist can optionally design an intended image by specifying other constraints. Our algorithm formulates the constraints as queries to search an automatically annotated image database. The desired photograph, not a collage, is then synthesized using graph-cut optimization, optionally allowing for further user interaction to edit or choose among alternative generated photos. An implementation of our approach, shown in the associated video, demonstrates our contributions of (1) a method for creating specific images with minimal human effort, and (2) a combined algorithm for automatically building an image library with semantic annotations from any photo collection.

    标签: substantially photograph technique propose

    上传时间: 2016-11-24

    上传用户:三人用菜

  • Subspace Projection Based Blind Channel Order Estimation of MIMO Systems m file for a classical

    Subspace Projection Based Blind Channel Order Estimation of MIMO Systems m file for a classical channel order estimation method

    标签: Projection Estimation classical Subspace

    上传时间: 2016-11-26

    上传用户:weixiao99

  • Range imaging offers an inexpensive and accurate means for digitizing the shape of three-dimensiona

    Range imaging offers an inexpensive and accurate means for digitizing the shape of three-dimensional objects. Because most objects self occlude, no single range image suffices to describe the entire object. We present a method for combining a collection of range images into a single polygonal mesh that completely describes an object to the extent that it is visible from the outside.

    标签: three-dimensiona inexpensive digitizing accurate

    上传时间: 2016-11-29

    上传用户:yxgi5

  • A stability analysis is presented for staggered schemes for the governing equations of compressible

    A stability analysis is presented for staggered schemes for the governing equations of compressible flow. The method is based on Fourier analysis. The approximate nature of pressure-correction solution methods is taken into account.  2001 IMACS. Published by Elsevier Science B.V. All rights reserved

    标签: compressible stability for equations

    上传时间: 2016-12-02

    上传用户:yph853211

  • 在模式识别应用中

    在模式识别应用中,用分支定界法(branch-and-board method)进行特征的选择。该程序在matlab环境下实现了该算法,以从六个特征中选择两个最佳特征为例

    标签: 模式识别

    上传时间: 2014-01-09

    上传用户:nanshan

  • 文件说明java模式

    文件说明java模式,The CustomerFacade class offers a higher level business service in the form of the saveCustomerData method. Instead of interacting with each of the subsystem components directly, the client AccountManager can make use of the higher level, more simplified interface offered by the CustomerFacade object to validate and save the input customer data.

    标签: java 模式

    上传时间: 2016-12-10

    上传用户:kernaling

  • This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Page

    This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Pages environment, but most of the techniques discussed have equivalents in other database environments. It should be viewed as a "follow up", or perhaps an appendix, to the previous paper, "Advanced SQL Injection". The paper covers in more detail some of the points described in its predecessor, providing examples to clarify areas where the previous paper was perhaps unclear. An effective method for privilege escalation is described that makes use of the openrowset function to scan a network. A novel method for extracting information in the absence of helpful error messages is described the use of time delays as a transmission channel. Finally, a number of miscellaneous observations and useful hints are provided, collated from responses to the original paper, and various conversations around the subject of SQL injection in a SQL Server environment.

    标签: Server SQL Injection Microsoft

    上传时间: 2014-07-28

    上传用户:xhz1993