虫虫首页|资源下载|资源专辑|精品软件
登录|注册

specifies

  • The present document specifies the CAMEL Application Part (CAP) supporting the fourth phase of the n

    The present document specifies the CAMEL Application Part (CAP) supporting the fourth phase of the network feature Customized Applications for Mobile network Enhanced Logic. CAP is based on a sub-set of the ETSI Core INAP CS-2 as specified by ETSI EN 301 140 1 [26]. Descriptions and definitions provided by ETSI EN 301 140 1 [26] are directly referenced by this standard in the case no additions or clarifications are needed for the use in the CAP.

    标签: the Application supporting specifies

    上传时间: 2015-12-24

    上传用户:84425894

  • This ECMA Standard specifies the form and establishes the interpretation of programs written in the

    This ECMA Standard specifies the form and establishes the interpretation of programs written in the C# programming language. It specifies The representation of C# programs The syntax and constraints of the C# language The semantic rules for interpreting C# programs The restrictions and limits imposed by a conforming implementation of C#.

    标签: the interpretation establishes specifies

    上传时间: 2013-12-18

    上传用户:chenjjer

  • csp application specifiescsp app lication specifiescsp app lication specifies

    csp application specifiescsp app lication specifiescsp app lication specifies

    标签: specifiescsp lication application app

    上传时间: 2013-12-14

    上传用户:牧羊人8920

  • This document specifies a subset of the C programming language which is intended to be suitable for

    This document specifies a subset of the C programming language which is intended to be suitable for embedded automotive systems up to and including safety integrity level 3 (as defined in the MISRA Guidelines). It contains a list of rules concerning the use of the C programming language together with justifications and examples.

    标签: programming specifies document language

    上传时间: 2013-12-11

    上传用户:cursor

  • SHA Hash algorithm. This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384,

    SHA Hash algorithm. This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA- 512.

    标签: SHA algorithms algorithm specifies

    上传时间: 2014-01-01

    上传用户:teddysha

  • This document specifies a collection of compiler directives, library routines, and environment vari

    This document specifies a collection of compiler directives, library routines, and environment variables that can be used to specify shared-memory parallelism in C, C++ and Fortran programs. This functionality collectively defines the specification of the OpenMP Application Program Interface (OpenMP API). This specification provides a model for parallel programming that is portable across shared memory architectures from different vendors. Compilers from numerous vendors support the OpenMP API. More information about OpenMP can be found at the following web site:

    标签: environment collection directives specifies

    上传时间: 2013-12-25

    上传用户:shinesyh

  • Wide-input dc/dc modules offer

    When a system designer specifies a nonisolated dc/dc powermodule, considering the needed input voltage range isequally as important as considering the required performanceattributes and features. Generally, nonisolated moduleshave either a narrow or a wide input voltage range. Narrowinputmodules typically have a nominal input voltage of3.3, 5, or 12 V. For systems that operate from a tightlyregulated input bus—such as those that do not use batterybackup—a narrow-input module is often adequate sincethe input remains fairly stable.Offering greater flexibility, wide-input modules operatewithin a range of 7 to 36 V, which includes the popular12- or 24-V industrial bus. This enables a single module tobe used for generating multiple voltages. These modulesare ideal for industrial controls, HVAC systems, vehicles,medical instrumentation, and other applications that usea loosely regulated distribution bus. In addition, systemspowered by a rectifier/battery charger with lead-acidbattery backup almost always require wide-input modules.System designers who choose power supplies may wantto take a close look at the latest generation of wide-inputdc/dc modules.

    标签: Wide-input modules offer dc

    上传时间: 2014-12-24

    上传用户:dragonhaixm

  • The Point-to-Point Protocol (PPP) for the Transmission of Multi-protocol Datagrams over Point-to-

    The Point-to-Point Protocol (PPP) for the Transmission of Multi-protocol Datagrams over Point-to-Point Links Status of this Memo This RFC specifies an IAB standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "IAB Official Protocol Standards" for the standardization state and status of this protocol. Distribution of this memo is unlimited.

    标签: Point-to-Point Multi-protocol Transmission Datagrams

    上传时间: 2014-01-22

    上传用户:cazjing

  • Frequency Scale Conversion From f To f Scale frq2mel mel2frq mel The mel scale is based on the hu

    Frequency Scale Conversion From f To f Scale frq2mel mel2frq mel The mel scale is based on the human perception of sinewave pitch. frq2erb erb2frq erb The erb scale is based on the equivalent rectangular bandwidths of the human ear. frq2midi midi2frq midi The midi standard specifies a numbering of semitones with middle C being 60. They can use the normal equal tempered scale or else the pythagorean scale of just intonation. They will in addition output note names in a character format.

    标签: Scale Conversion Frequency mel

    上传时间: 2015-06-07

    上传用户:kjl

  • The government of a small but important country has decided that the alphabet needs to be streamline

    The government of a small but important country has decided that the alphabet needs to be streamlined and reordered. Uppercase letters will be eliminated. They will issue a royal decree in the form of a String of B and A characters. The first character in the decree specifies whether a must come ( B )Before b in the new alphabet or ( A )After b . The second character determines the relative placement of b and c , etc. So, for example, "BAA" means that a must come Before b , b must come After c , and c must come After d . Any letters beyond these requirements are to be excluded, so if the decree specifies k comparisons then the new alphabet will contain the first k+1 lowercase letters of the current alphabet. Create a class Alphabet that contains the method choices that takes the decree as input and returns the number of possible new alphabets that conform to the decree. If more than 1,000,000,000 are possible, return -1. Definition

    标签: government streamline important alphabet

    上传时间: 2015-06-08

    上传用户:weixiao99