DrScheme 运算符的规则,run (parse (4 + 3 * 2)) will sHow you (+ (4) (* (3) (2)))
上传时间: 2013-12-23
上传用户:leixinzhuo
made by: kangkai data:2008.11.23 this one is used to test arm7 str71x. use a led to test GPIO. a---------P0.0 b---------P0.1 c---------P0.2 d---------P0.3 e---------P0.4 f---------P0.5 g---------P0.6 just run it and you will see the led to sHow 0-9 all the time.
上传时间: 2016-12-16
上传用户:moerwang
zlibyou can found an optimized version of Zlib 1.1.4 that you can embed into every Delphi executable without use external dlls. Further I have build a little example hoping to aid "young" Delphi programmers getting in trouble with streams... Please let me know if you ll discover errors. These objects and sources are targeted for executing into P6+ CPU core, and Delphi5-6-7-x software. Benchmarks sHow this zlib 40% average faster than native DLL distribution and 100% reliable.
标签: executable can optimized zlibyou
上传时间: 2016-12-19
上传用户:lili123
Distributed applications, devices, and services appear in many different arrangements in an enterprise. At your company, you probably access data from your intranet services, from computers distributed throughout the company network, and from services across the firewall out on the Web. For example, you might access a calendar-sharing application or a financial application to fill out expense sheets. Someone must maintain all these applications. Not only the applications, but also the hardware that supports them must be maintained. Resource management encompasses both applications and hardware. In fact, both application and hardware management can be supported through the development of Java Management Extensions (JMX) resource management software. This book will sHow how you can use JMX to manage and monitor all your resources across an enterprise—both software and hardware.
标签: applications arrangements Distributed different
上传时间: 2014-01-05
上传用户:330402686
The combinatorial core of the OVSF code assignment problem that arises in UMTS is to assign some nodes of a complete binary tree of height h (the code tree) to n simultaneous connections, such that no two assigned nodes (codes) are on the same root-to-leaf path. Each connection requires a code on a specified level. The code can change over time as long as it is still on the same level. We consider the one-step code assignment problem: Given an assignment, move the minimum number of codes to serve a new request. Minn and Siu proposed the so-called DCAalgorithm to solve the problem optimally. We sHow that DCA does not always return an optimal solution, and that the problem is NP-hard. We give an exact nO(h)-time algorithm, and a polynomial time greedy algorithm that achieves approximation ratio Θ(h). Finally, we consider the online code assignment problem for which we derive several results
标签: combinatorial assignment problem arises
上传时间: 2014-01-19
上传用户:BIBI
KML is an XML grammar used to encode and transport representations of geographic data for display in an earth browser. Put simply: KML encodes what to sHow in an earth browser, and how to sHow it. KML uses a tag-based structure with nested elements and attributes and is based on the XML standard.
标签: representations geographic transport grammar
上传时间: 2014-01-12
上传用户:thesk123
In this paper, we describe the development of a rapidly reconfigurable system in which the users’ tacit knowledge and requirements are elicited via a process of Interactive Evolution, finding the image processing parameters to achieve the required goals without any need for specialised knowledge of the machine vision system. We sHow that the resulting segmentation can be quickly and easily evolved from scratch, and achieves detection rates comparable to those of a hand-tuned system on a hot-rolled steel defect recognition problem.
标签: reconfigurable development the describe
上传时间: 2014-01-05
上传用户:hopy
The files included implement the M3 Enigma machine. Rotors.m implements the GUI and enigma.m implements the cipher substitutions. The implementation can be used as an aid to teaching the enigma machine. Also, the source can be used to sHow how to implement an enigma machine. The files are thoroughly commented and the application can run in MATLAB by just typing rotors
标签: implements implement the included
上传时间: 2017-02-24
上传用户:lixinxiang
It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon. 1, p. 224) have however simplified material parameters in order to facilitate easier realization as well as to avoid infinities in optical constants. Here we sHow that the cylindrical cloaks with simplified material parameters inherently allow the zeroth-order cylindrical wave to pass through the cloak as if the cloak is made of a homogeneous isotropic medium, and thus visible. To all high-order cylindrical waves, our numerical simulation suggests that the simplified cloak inherits some properties of the ideal cloak, but finite scatterings exist.
标签: invisibility constructed proposed electrom
上传时间: 2013-12-18
上传用户:13215175592
We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We sHow that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, sHown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.
标签: effectiveness analytically numerically cloaking
上传时间: 2017-03-30
上传用户:zxc23456789