详细介绍了PCI9052接口器件的功能、结构和使用方法,并结合实际给出了基于PCI9052器件开发PCI总线接口卡的应用实例。 Abstract: The main functions,structures and usage of PCI9052inferface chip are introduced in detail in this paper.And an application example of designing PCI bus interface card based on PCI9052is proposed in this paper.
上传时间: 2013-10-16
上传用户:togetsomething
(Portmon is an application that lets you monitor serial and parallel activity on your local system, or any computer on the network that you can reach via TCP/IP. It is the most powerful tool available for tracking down port-related configuration problems and analyzing application port usage.)
上传时间: 2013-11-07
上传用户:1412904892
本文主要通过介绍PLC通讯的意义和三菱FX系列PLC的四种通讯方式,并重点介绍FX系列PLC与计算机无协议通讯,主要从无协议通讯的硬件、配线、数据寄存器设置、PLC与计算机无协议通讯的指令用法、PLC程序编写和计算机VB程序的编写来说明无协议通讯的过程和一般方法。 My dissertation introduces the significance of PLC communications and the four means of communication of Mitsubishi FX’s PLC, And highlights the no protocol communications of FX series PLC and computer, no protocol communications hardware, wiring, Register data set, and the usage of command about no protocol communications, How to write PLC program and computer VB program to illustrate the process of no protocol communications and general method.
上传时间: 2014-11-29
上传用户:Jerry_Chow
Abstract: This article discusses the benefits of a G3-PLC-based automation system and presents a real-world example of a systemfor reducing energy usage and lowering maintenance costs in tunnels. The basic system design is explained and key performance
上传时间: 2013-10-29
上传用户:康郎
The Virtex-4 features, such as the programmable IDELAY and built-in FIFO support, simplifythe bridging of a high-speed, PCI-X core to large amounts of DDR-SDRAM memory. Onechallenge is meeting the PCI-X target initial latency specification. PCI-X Protocol Addendum tothe PCI Local Bus Specification Revision 2.0a ([Ref 6]) dictates that when a target signals adata transfer, "the target must do so within 16 clocks of the assertion of FRAME#." PCItermination transactions, such as Split Response/Complete, are commonly used to meet thelatency specifications. This method adds complexity to the design, as well as additional systemlatency. Another solution is to increase the ratio of the memory frequency to the PCI-X busfrequency. However, this solution increases the required power and clock resource usage.
上传时间: 2013-11-24
上传用户:18707733937
CopyPwd is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. usage of CopyPwd is at the risk of the person or company using this software
标签: distributed WARRANTY CopyPwd WITHOUT
上传时间: 2013-12-09
上传用户:sjyy1001
制作本书的目的是为了方便大家的阅读。转载时请保持本电子书的完整性。 前言、条款2、16、21、44根据从Addison-Wesley出版社下载的开放条款翻译。条款26、27、28、45根据从Scott Meyers的网站下载的《Three Guidelines for Effective Iterator usage》一文翻译。条款43根据从C/C++ Users Journal网站下载的《STL Algorithms vs. Hand-Written Loops》一文翻译,条款45根据从C/C++ Users Journal网站下载的《Distinguishing STL Search Algorithms》一文翻译。其余部分根据epubcn放出的电子书制作。
标签: Addison-Wesley 家 保持
上传时间: 2015-04-12
上传用户:jing911003
用JAVA语言编写,包括PSO(Particle swarm optimization, 中文译名为粒子群优化或微粒群算法), DE (Differential evolution, 中文译名为差分进化或差异演化)等算法,有一些不带约束和带约束的算例(如Michelawicz的几个问题)。使用说明见usage.txt、RUNExample.bat和程序中的注释。
上传时间: 2014-01-06
上传用户:agent
I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. II. Screenshots $ ./kill-bill.pl . kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007) by Solar Eclipse <solareclipse@phreedom.org> usage: kill-bill -p <port> -s <service> host Services: iis IIS HTTP server (port 80) iis-ssl IIS HTTP server with SSL (port 443) exchange Microsoft Exchange SMTP server (port 25) smb-nbt SMB over NetBIOS (port 139) smb SMB (port 445) If a service is running on its default port you don t have to specify both the service and the port. Examples: kill-bill -s iis 192.168.0.1 kill-bill -p 80 192.168.0.1 kill-bill -p 1234 -s smb 192.168.0.1
标签: I. vulnerability Introduction undisclosed
上传时间: 2015-05-15
上传用户:xhz1993
This example imports a text file into a database table using ADO. Because it uses ADO, it should work with all data sources, though it has only been tested with Access. usage is explained in the code s comments.
标签: ADO database Because example
上传时间: 2013-12-27
上传用户:1079836864