虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

real-tim

  • An example to accompany PCW March 2004 Visual Programming Hands On. To use, open the solution in

    An example to accompany PCW March 2004 Visual Programming Hands On. To use, open the solution in the SchoolApp folder. April 2004: Now revised to add New and Delete options. Tim Anderson http://www.itwriting.com/pcw/

    标签: Programming accompany solution example

    上传时间: 2015-12-09

    上传用户:qunquan

  • 从结构上来说

    从结构上来说,实时多任务操作系统包括两部分,一部分为操作系统内核(kernel),即实时执行程序(Real Time Executive:RTX),另一部分是输入输出部分(I/O)(注意开发系统不属于操作系统的范畴);嵌入式系统对I/O的需求通常比较小(无文件系统需求),因此很多实时多任务操作系统本质上就是一个实时执行程序,如AMX(Kadak),VRTX(Microtec),iRMX(Intel)等(这里的X即:eXecutive),如果纯粹从kernel的角度来考察目前流行的各种实时多任务操作系统的性能,它们的效率差别都不大。 在市面上可以得到一些RTX的源代码(有用C实现的,有用汇编实现的,还有用PL/M语言实现的),从internet上也可以荡一些下来(我介绍一个站点www.eg3.com,堪称世界电子工程师资源宝库),下面我要介绍的一个RTX版本(我命名为SRTX:short RTX),可以说是RTX中的元老级产品了,来自某研究所,九十年代初他们到美国考察,从美国某公司购得。五年以前,SRTX在国内有售,许多搞工控的研究所利用SRTX开发了一些大型或小型的产品,这里介绍的SRTX我作了一些简化和改动.

    标签:

    上传时间: 2015-12-09

    上传用户:wang5829

  • In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadl

    In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadline violations. Priority inheritance protocol is one of the approaches to reduce priority inversion. Unfortunately, RTOS like uC/OS can’t support priority inheritance protocol since it does not allow kernel to have multiple tasks at the same priority. Although it has different ways to avoid priority inversion such as priority ceiling protocol, developers still have some difficulties in programming real time applications with it. In this paper, we redesign the uC/OS kernel to provide the ability to support round robin scheduling and implement priority inheritance semaphore on the modified kernel. As result, we port new kernel with priority inheritance semaphore to evaluation board, and evaluate the execution time of each of the kernel service as well as verify the operations of our implementation.

    标签: priority preemptive inversion problem

    上传时间: 2015-12-14

    上传用户:气温达上千万的

  • This application report describes the use of Timer_A3 to decode RC5 and SIRC TV IR remote control si

    This application report describes the use of Timer_A3 to decode RC5 and SIRC TV IR remote control signals. The decoder described in this report is interrupt-driven and operates a background function using specific features the Timer_A3. Only a small portion of the MSP430 CPU?s nonreal-time resources is used. Specific hardware bit-latching capabilities of the Timer_A3 module are used for real-time decoding of the IR data signal, independent and asynchronous to the CPU. CPU activity and power consumption are kept to an absolute minimum level. The Timer_A3 decoder implementation also allows other tasks to occur simultaneously if required. The solutions provided are written specifically for MSP430x11x(1) and MSP430x12x derivatives, but can be adapted to any other MSP430 incorporating Timer_A3. 電視遙控器設計基於MSP430

    标签: application describes Timer_A control

    上传时间: 2014-01-01

    上传用户:qq21508895

  • celestia源代码

    celestia源代码,Celestia, a real-time 3D space simulation featuring a database of over 100000 stars, nearly a hundred solar system, objects, and a complete catalog of extrasolar planets.

    标签: celestia 源代码

    上传时间: 2013-12-26

    上传用户:缥缈

  • 《JavaServer Faces》 In JavaServer Faces, developers learn how to use the new JavaServer Faces framew

    《JavaServer Faces》 In JavaServer Faces, developers learn how to use the new JavaServer Faces framework to build real-world web applications. The book contains everything you ll need: how to construct the HTML on the front end how to create the user interface components that connect the front end to your business objects how to write a back-end that s JSF-friendly and how to create the deployment descriptors that tie everything together. This book is a complete guide to the crucial new JSF technology.

    标签: JavaServer Faces developers framew

    上传时间: 2016-01-02

    上传用户:redmoons

  • Rao-Blackwellised Particle Filters (RBPFs) are a class of Particle Filters (PFs) that exploit condi

    Rao-Blackwellised Particle Filters (RBPFs) are a class of Particle Filters (PFs) that exploit conditional dependencies between parts of the state to estimate. By doing so, RBPFs can improve the estimation quality while also reducing the overall computational load in comparison to original PFs. However, the computational complexity is still too high for many real-time applications. In this paper, we propose a modified RBPF that requires a single Kalman Filter (KF) iteration per input sample. Comparative experiments show that while good convergence can still be obtained, computational efficiency is always drastically increased, making this algorithm an option to consider for real-time implementations.

    标签: Particle Filters Rao-Blackwellised exploit

    上传时间: 2016-01-02

    上传用户:refent

  • Robotics TOOLBOX The Toolbox provides many functions that are useful in robotics including such thi

    Robotics TOOLBOX The Toolbox provides many functions that are useful in robotics including such things as kinematics, dynamics, and trajectory generation. The Toolbox is useful for simulation as well as analyzing results from experiments with real robots. Have fun with the toolbox. It is self-explanatory and very (robotics) user friendly...see the robot.pdf

    标签: functions including Robotics provides

    上传时间: 2014-12-06

    上传用户:yyyyyyyyyy

  • 《为Windows Vista编写安全的代码》

    《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars

    标签: Windows Vista 编写 代码

    上传时间: 2016-01-07

    上传用户:zxc23456789

  • With this foundation, you explore a development model that addresses the complete range of issues in

    With this foundation, you explore a development model that addresses the complete range of issues in the design of embedded communications software, including real-time operating systems, hardware and software partitioning, layering, and protocol stacks.

    标签: development foundation addresses complete

    上传时间: 2016-01-16

    上传用户:zyt