項目描述: EMC is software that implements real-time control of equipment such as machine tools, robots, and coordinate measuring machines. It runs in real-time under Linux with the NMT rtlinux patch, and in nonrealtime under Solaris, and WindowsNT. EMC 是一個設備的實時控制軟件,可以控制機器工具,機器人,協調式的測量機器。它可以實時在帶有NMT補丁的Linux下運行,可以在Solaris, 和WindowsNT下可非實時運行。
標簽: implements equipment real-time software
上傳時間: 2016-12-28
上傳用戶:wl9454
Measurement of gamma characteristic(Ca200Sample_Gamma.exe)provides Gamma characteristics of W,R,G and B. Measurement at 16,32,64,128,256 gradation.
標簽: characteristics characteristic Sample_Gamma Measurement
上傳時間: 2016-12-29
上傳用戶:familiarsmile
數值計算牛頓迭代法的matlab源程序 說明如下: %fun----input,the part as the form of f(x) in the equation f(x)=0 % ini----input,sets the starting point to ini % err----input,sets admissible error % sol----output,returns the root of equation
上傳時間: 2014-01-12
上傳用戶:妄想演繹師
As economy explodesand packaging industry lfourishes,itisacriticalissue thatinternational communityencountersthewasteofresourcesandenvironmentalpollution causedbypackaging waste.
標簽: explodesand lfourishes packaging industry
上傳時間: 2017-01-01
上傳用戶:xg262122
Wavelet Subband coding for speaker recognition The fn will calculated subband energes as given in the att tech paper of ruhi sarikaya and others. the fn also calculates the DCT part. using this fn and other algo for pattern classification(VQ,GMM) speaker identification could be achived. the progress in extraction is also indicated by progress bar.
標簽: recognition calculated Wavelet Subband
上傳時間: 2013-12-08
上傳用戶:guanliya
求解拋物型方程的交替隱方向P-R差分格式的matlab程序實現。不過大家在用的時候要用到原函數f.m和精確解函數uexact.m,應用程序的時候只要修改精確解和右端項就可以了。
上傳時間: 2013-11-25
上傳用戶:hewenzhi
學習R語言的參考材料R for beginners.pdf
上傳時間: 2017-01-11
上傳用戶:asdfasdfd
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
標簽: vulnerabilities Introduction discovered undeniably
上傳時間: 2014-01-05
上傳用戶:yph853211
電子琴 高音依次為1,2,3,4,5,6,7 中音依次為q,w,e,r,t,y,u 低音依次為a,s,d,f,g,h,j
上傳時間: 2017-01-14
上傳用戶:fnhhs
This piece of software was written as a replacement and extension for Tripwire. Tripwire is an excellent program in itself but lacks some features and is a closed product.
標簽: Tripwire replacement extension software
上傳時間: 2014-01-25
上傳用戶:宋桃子