A Java virtual machine instruction consists of an opcode specifying the operation to be performed, followed by zero or more operands embodying values to be operated upon. This chapter gives details about the format of each Java virtual machine instruction and the operation it performs.
标签: instruction specifying operation performed
上传时间: 2014-01-11
上传用户:yiwen213
A Java virtual machine instruction consists of an opcode specifying the operation to be performed, followed by zero or more operands embodying values to be operated upon. This chapter gives details about the format of each Java virtual machine instruction and the operation it performs.
标签: instruction specifying operation performed
上传时间: 2015-05-02
上传用户:daoxiang126
A Java virtual machine instruction consists of an opcode specifying the operation to be performed, followed by zero or more operands embodying values to be operated upon. This chapter gives details about the format of each Java virtual machine instruction and the operation it performs.
标签: instruction specifying operation performed
上传时间: 2015-05-02
上传用户:shawvi
A Java virtual machine instruction consists of an opcode specifying the operation to be performed, followed by zero or more operands embodying values to be operated upon. This chapter gives details about the format of each Java virtual machine instruction and the operation it performs.
标签: instruction specifying operation performed
上传时间: 2013-12-12
上传用户:朗朗乾坤
The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: header file for same ptfsf-demo.c: FDTD code which demonstrates use of perfect TFSF code. Essentially this program used to generate results shown in the paper ptfsf-file-maker.c: code to generate an incident-field file using the "perfect" incident fields ptfsf-demo-file.c: FDTD code which uses the perfect incident fields stored in a file fdtdgen.h: defines macros used in much of my code Makefile: simple make-file to compile programs Also include are some simple script files to run the programs with reasonable values. The code assumes a two-dimensional computational domain with TMz polarization (i.e., non-zero field Ez, Hx, and Hy). The program is currently written so that the incident field always strikes the lower-left corner of the total-field region first. (If you want a different corner, that should be a fairly simple tweak to the code, but for now you ll have to make that tweak yourself.)
标签: ptfsf following the contains
上传时间: 2013-11-28
上传用户:风之骄子
bayeserr - Computes the Bayesian risk for optimal classifier. % bayescln - Classifier based on Bayes decision rule for Gaussians. % bayesnd - Discrim. function, dichotomy, max aposteriori probability. % bhattach - Bhattacharya s upper limit of mean class. error. % pbayescln - Plots discriminat function of Bayes classifier.
标签: Classifier classifier bayeserr Computes
上传时间: 2015-06-14
上传用户:sunjet
The Reed-Somolon code is specified by the finite field, the length (length <= 2^m-1), the number of redundant symbols (length-k), and the initial zero of the code, init_zero, such that the zeros are: init_zero, init_zero+1, ..., init_zero+length-k-1
标签: length the Reed-Somolon specified
上传时间: 2014-07-31
上传用户:skfreeman
zemax源码: This DLL models a standard ZEMAX surface type, either plane, sphere, or conic The surface also demonstrates a user-defined apodization filter The filter is defined as part of the real ray trace, case 5 The filter can be used at the stop to produce x-y Gaussian apodization similar to the Gaussian pupil apodization in ZEMAX but separate in x and y. The amplitude apodization is of the form EXP[-(Gx(x/R)^2 + Gy(y/R)^2)] The transmission is of the form EXP[-2(Gx(x/R)^2 + Gy(y/R)^2)] where x^2 + y^2 = r^2 R = semi-diameter The tranmitted intensity is maximum in the center. T is set to 0 if semi-diameter < 1e-10 to avoid division by zero.
标签: standard surface models either
上传时间: 2013-12-05
上传用户:003030
MODE_Switch1Processing multi-interrupt request needs to set the priority of these interrupt requests. The IRQ flags of the 7 interrupt are controlled by the interrupt event occurring. But the IRQ flag set doesn t mean the system to execute the interrupt vector. The IRQ flags can be triggered by the events without interrupt enable. Just only any the event occurs and the IRQ will be logic "1".
标签: multi-interrupt MODE_Switch Processing interrupt
上传时间: 2013-12-04
上传用户:zhichenglu
This article describes Atmel’s FingerChip technology for electronic fingerprint sensing that combines the advantages of small size, low cost, high accuracy, zero maintenance, low energy consumption and portability. This technology has applications in a wide range of fixed and portable secured devices including access control systems, cash terminals, public transport, PCs, PDAs, Smart Card readers and motor vehicles. It can be used in almost any situation where rapid, reliable and accurate identification or authentication of an individual is required.
标签: fingerprint FingerChip technology electronic
上传时间: 2013-12-27
上传用户:h886166