Many programs today suffer from the fact that their users have to connect using IP addresses. This is impossible for dialup users, whose IPs change all the time, and painful for LAN users who don t know their IP addresses or whose addresses also change. In addition, many collaborative programs could benefit from offering friends lists, showing friends as online or offline, providing status information. This kind of functionality is hard to provide, requiring a dedicated Internet database and a new client - client protocol. But it is offered today through a system called AwareNet, which is offered free of charge and royalty
標(biāo)簽: addresses programs connect suffer
上傳時(shí)間: 2013-12-05
上傳用戶:CHENKAI
Beginning with an overview of SQL Server 2000, this book discusses online transaction processing (OLTP) and online analytical processing (OLAP), features a tour of different SQL Server releases, and offers a guide to installation. The author describes and demonstrates the changes since SQL Server 7.0, thoroughly exploring SQL Server 2000 s capacity as a Web-enabled database server. Readers are then immersed in advanced database administration topics such as performance optimization and debugging techniques.
標(biāo)簽: transaction processing Beginning discusses
上傳時(shí)間: 2013-11-28
上傳用戶:eclipse
Programs in the irregular grid design package described in this manual are used to carry out five main functions: verification and adjustment of coastline and bathymetric data preparation of an irregular triangular depth grid covering the domain to be modelled production of a preliminary irregular triangular model grid with nodes suitably positioned for accurate and efficient numerical modelling interactive checking and editing, including trimming and joining, of model grid display and plotting of model output.
標(biāo)簽: described irregular Programs package
上傳時(shí)間: 2016-04-09
上傳用戶:fnhhs
Refer to the UML diagram above and implement the Course class. After you define the Course class, you must create a Course object with the following details: Programming I, WXES1114, taught by SMT. Besides, your program must test all the accessor and mutator methods you had defined and the toString() method. toString() method is a special method inherited from the Object class. You have to override this method to display all the information about a course.
標(biāo)簽: Course the class implement
上傳時(shí)間: 2014-01-26
上傳用戶:cx111111
The widespread use of embedded systems mandates the development of industrial software design methods, i.e. computer-aided design and engineering of embedded applications using formal models (frameworks) and standardized prefabricated components, much in the same way as in other mature areas of engineering such as mechanical engineering and electronics. These guidelines have been used to develop Component-based Design of Software for Embedded Systems (COMDES). The paper gives an overview of the COMDES framework, followed by a presentation of a generic component types, such as function blocks, activities and function units. The execution of function units is discussed in the context of a newly developed execution model, i.e. timed-multitasking, which has been extended to distributed embedded systems.
標(biāo)簽: development widespread industrial embedded
上傳時(shí)間: 2014-01-23
上傳用戶:z754970244
Collection of key-value pairs. TDictionary represents a generic collection of key-value pairs. This class provides a mapping from a collection of keys to a collection of values. When you create a TDictionary object, you can specify various combinations of initial capacity, equality operation, and initial content. You can add a key that is associated with a corresponding value with the Add or AddOrSetValue methods. You can remove entries with Remove or Clear, which removes all key-value pairs. Adding or removing a key-value pair and looking up a key are efficient, close to O(1), because keys are hashed. A key must not be nil (though a value may be nil) and there must be an equality comparison operation for keys. You can test for the presence or keys and values with the TryGetValue, ContainsKey and ContainsValue methods. The Items property lists all Count dictionary entries. You can also set and get values by indexing the Items property. Setting the value this way overwrites any existing value. The class TObjectDictionary inherits from TDictionary and provides an automatic mechanism for freeing objects removed from dictionary entries.
標(biāo)簽: Delphi 泛型
上傳時(shí)間: 2015-07-01
上傳用戶:mirage
An application that adds products to an electronic shopping cart. The application uses three classes: Product, ShoppingCart, and ShoppingCartApplication. Part of the work has been done for you and is provided in the student archive. You will implement the method in ShoppingCartApplication that reads product information from the keyboard and creates a Product object.
標(biāo)簽: Product ShoppingCart
上傳時(shí)間: 2015-11-12
上傳用戶:chengzi74
We show in the context of a new economic geography model that when labor is heterogenous trade liberalization may lead to industrial agglomeration and inter-regional trade. Labor heterogeneity gives local monopoly power to firms but also introduces variations in the quality of the job match. Matches are likely to be better when there are more firms and workers in the local market, giving rise to an agglomeration force which can offset the forces against, trade costs and the erosion of monopoly power. We derive analytically a robust agglomeration equilibrium and illustrate its properties with numerical simulations
標(biāo)簽: 經(jīng)濟(jì)、城市化和經(jīng)濟(jì)增長(zhǎng)
上傳時(shí)間: 2016-04-02
上傳用戶:kinda233
Nature is seldom kind. One of the most appealing uses for radio- telephone systems—communication with people on the move—must over- come radio transmission problems so difficult they challenge the imagina- tion. A microwave radio signal transmitted between a fixed base station and a moving vehicle in a typical urban environment exhibits extreme variations in both amplitude and apparent frequency.
標(biāo)簽: Communications Microwave Mobile
上傳時(shí)間: 2020-05-28
上傳用戶:shancjb
This paper presents a Hidden Markov Model (HMM)-based speech enhancement method, aiming at reducing non-stationary noise from speech signals. The system is based on the assumption that the speech and the noise are additive and uncorrelated. Cepstral features are used to extract statistical information from both the speech and the noise. A-priori statistical information is collected from long training sequences into ergodic hidden Markov models. Given the ergodic models for the speech and the noise, a compensated speech-noise model is created by means of parallel model combination, using a log-normal approximation. During the compensation, the mean of every mixture in the speech and noise model is stored. The stored means are then used in the enhancement process to create the most likely speech and noise power spectral distributions using the forward algorithm combined with mixture probability. The distributions are used to generate a Wiener filter for every observation. The paper includes a performance evaluation of the speech enhancer for stationary as well as non-stationary noise environment.
標(biāo)簽: Telecommunications Processing Signal for
上傳時(shí)間: 2020-06-01
上傳用戶:shancjb
蟲(chóng)蟲(chóng)下載站版權(quán)所有 京ICP備2021023401號(hào)-1