該程序用以查找任意兩個整數(shù)之間的所有素數(shù)。 Prime number finder can find all primes between a and b and will write the results to the file PRIMES.TXT
標(biāo)簽: and between number finder
上傳時間: 2014-01-14
上傳用戶:cccole0605
Fire and Fury。 This article is about the 2018 book. For other uses, see Fire and Fury (disambiguation). The title refers to a quote by Trump about the conflict with North Korea. The book became a New York Times number one bestseller.Fire and Fury: Inside the Trump White House is a 2018 book by Michael Wolff which details the behavior of U.S. President Donald Trump and the staff of his 2016 presidential campaign and White House. The book highlights descriptions of Trump's behavior, chaotic interactions among senior White House staff, and derogatory comments about the Trump family by former White House Chief StrategistSteve Bannon. Trump is depicted as being held in low regard by his White House staff, leading Wolff to state that "100% of the people around him" believe Trump is unfit for office.[1] Reviewers generally accepted Wolff's portrait of a dysfunctional Trump administration, but were skeptical of many of the book's most controversial claims.
上傳時間: 2018-02-26
上傳用戶:Yoobaobao
This article is about the 2018 book. For other uses, see Fire and Fury (disambiguation). The title refers to a quote by Trump abot the conflict with North Korea. The book became a New York Times number one bestseller.Fire and Fury: Inside the Trump White House is a 2018 book by Michael Wolff which details the behavior of U.S. President Donald Trump and the staff of his 2016 presidential campaign and White House. The book highlights descriptions of Trump's behavior, chaotic interactions among senior White House staff, and derogatory comments about the Trump family by former White House Chief StrategistSteve Bannon. Trump is depicted as being held in low regard by his White House staff, leading Wolff to state that "100% of the people around him" believe Trump is unfit for office.[1] Reviewers generally accepted Wolff's portrait of a dysfunctional Trump administration, but were skeptical of many of the book's most controversial claims.
上傳時間: 2018-02-26
上傳用戶:Yoobaobao
為了改變目前電網(wǎng)現(xiàn)場作業(yè)管理的變電巡檢、變電檢修試驗、輸電線路巡檢檢修等管理系統(tǒng)各自獨立運行,信息不能共享,功能、效率受限,建設(shè)和維護(hù)成本高的現(xiàn)狀,提出了采用B/S+C/S構(gòu)架模式,將各現(xiàn)場作業(yè)管理模塊和生產(chǎn)MIS(管理系統(tǒng))集成為一體的現(xiàn)場作業(yè)管理系統(tǒng)的設(shè)計方案,做到各子系統(tǒng)和生產(chǎn)MIS軟硬資源共享,做到同一數(shù)據(jù)唯一入口、一處錄入多處使用。各子系統(tǒng)設(shè)備人員等基礎(chǔ)信息來源于生產(chǎn)管理系統(tǒng),各子系統(tǒng)又是生產(chǎn)管理系統(tǒng)的作業(yè)數(shù)據(jù)、缺陷信息的重要來源。經(jīng)過研究試用成功和推廣應(yīng)用,目前該系統(tǒng)已在江西電網(wǎng)220 kV及以上變電站全面應(yīng)用。 Abstract: In order to improve the status that the substation field inspection system, substation equipments maintenance and testing system, power-line inspection and maintenance system are running independent with each other. They can?蒺t share the resource information which accordingly constrains their functions and efficiency, and their construction and maintenance costs are high. This paper introduces a field standardized work management system based on B/S+C/S mode, integrating all field work management systems based on MIS and share the equipments and employee?蒺s data of MIS,the field work data of the sub systems are the source information of MIS, by which the same single data resouce with one-time input can be utilized in multiple places. After the research and testing, this system is triumphantly using in all 220kV and above substations in Jiangxi grid.
標(biāo)簽: 電網(wǎng) 信息化 管理系統(tǒng)
上傳時間: 2013-11-15
上傳用戶:han_zh
All inputs of the C16x family have Schmitt-Trigger input characteristics. These Schmitt-Triggers are intended to always provide proper internal low and high levels, even if anundefined voltage level (between TTL-VIL and TTL-VIH) is externally applied to the pin.The hysteresis of these inputs, however, is very small, and can not be properly used in anapplication to suppress signal noise, and to shape slow rising/falling input transitions.Thus, it must be taken care that rising/falling input signals pass the undefined area of theTTL-specification between VIL and VIH with a sufficient rise/fall time, as generally usualand specified for TTL components (e.g. 74LS series: gates 1V/us, clock inputs 20V/us).The effect of the implemented Schmitt-Trigger is that even if the input signal remains inthe undefined area, well defined low/high levels are generated internally. Note that allinput signals are evaluated at specific sample points (depending on the input and theperipheral function connected to it), at that signal transitions are detected if twoconsecutive samples show different levels. Thus, only the current level of an input signalat these sample points is relevant, that means, the necessary rise/fall times of the inputsignal is only dependant on the sample rate, that is the distance in time between twoconsecutive evaluation time points. If an input signal, for instance, is sampled throughsoftware every 10us, it is irrelevant, which input level would be seen between thesamples. Thus, it would be allowable for the signal to take 10us to pass through theundefined area. Due to the sample rate of 10us, it is assured that only one sample canoccur while the signal is within the undefined area, and no incorrect transition will bedetected. For inputs which are connected to a peripheral function, e.g. capture inputs, thesample rate is determined by the clock cycle of the peripheral unit. In the case of theCAPCOM unit this means a sample rate of 400ns @ 20MHz CPU clock. This requiresinput signals to pass through the undefined area within these 400ns in order to avoidmultiple capture events.For input signals, which do not provide the required rise/fall times, external circuitry mustbe used to shape the signal transitions.In the attached diagram, the effect of the sample rate is shown. The numbers 1 to 5 in thediagram represent possible sample points. Waveform a) shows the result if the inputsignal transition time through the undefined TTL-level area is less than the time distancebetween the sample points (sampling at 1, 2, 3, and 4). Waveform b) can be the result ifthe sampling is performed more than once within the undefined area (sampling at 1, 2, 5,3, and 4).Sample points:1. Evaluation of the signal clearly results in a low level2. Either a low or a high level can be sampled here. If low is sampled, no transition willbe detected. If the sample results in a high level, a transition is detected, and anappropriate action (e.g. capture) might take place.3. Evaluation here clearly results in a high level. If the previous sample 2) had alreadydetected a high, there is no change. If the previous sample 2) showed a low, atransition from low to high is detected now.
標(biāo)簽: Signal Input Fall Rise
上傳時間: 2013-10-23
上傳用戶:copu
PhpDig is a search engine written in PHP that uses a MySQL database backend. It features indexing of both static and dynamic pages, spidering of almost all links in HTML content, in hrefs, areamaps, and frames, and full text indexing. The search results appearence is skin-able, using a very simple templates system. PhpDig是一個用PHP編寫的搜索引擎,它使用MySQL數(shù)據(jù)庫后臺。它的功能有靜態(tài)和動態(tài)頁面索引,在HTML內(nèi)容中用hrefs, areamaps,和frames以及全文本索引構(gòu)成所有的鏈接網(wǎng)。搜索結(jié)果的外觀是可定制外觀的,使用一個非常簡單的模板系統(tǒng)。
標(biāo)簽: database features indexing backend
上傳時間: 2014-01-03
上傳用戶:haohaoxuexi
WHAT MIME64 IS: MIME64 is an encoding described in RFC1341 as MIME base64.Its purpose is to encode binary files into ASCII so that they may be passedthrough e-mail gates. In this regard, MIME64 is similar to UUENCODE.Although most binaries these days are transmitted using UUENCODE, Ihave seen a few using MIME64, and I have had requests from friends thatI decode MIME64 files that have fallen into their hands. As long assome MIME64 continues to exist, a package such as this one is usefulto have.
標(biāo)簽: MIME described 64 encoding
上傳時間: 2013-12-17
上傳用戶:maizezhen
Verilog HDL: Magnitude For a vector (a,b), the magnitude representation is the following: A common approach to implementing these arithmetic functions is to use the Coordinate Rotation Digital Computer (CORDIC) algorithm. The CORDIC algorithm calculates the trigonometric functions of sine, cosine, magnitude, and phase using an iterative process. It is made up of a series of micro-rotations of the vector by a set of predetermined constants, which are powers of two. Using binary arithmetic, this algorithm essentially replaces multipliers with shift and add operations. In a Stratix™ device, it is possible to calculate some of these arithmetic functions directly, without having to implement the CORDIC algorithm.
標(biāo)簽: representation Magnitude the magnitude
上傳時間: 2013-12-24
上傳用戶:金宜
I think this the first time every one can look at a PE crypter source in top level language such VC++. So as I promised ... if some one sent me one nice compress source I would publish my source. I dedicate this source to all people who involve in this field. I hope it helps someone. Have good days ashkbiz Check: yodap.cjb.net
標(biāo)簽: language crypter source think
上傳時間: 2013-12-29
上傳用戶:dianxin61
Ink Blotting One method for escaping from a maze is via ‘ink-blotting’. In this method your starting square is marked with the number ‘1’. All free, valid squares north, south, east and west around the number ‘1‘ are marked with a number ‘2’. In the next step, all free, valid squares around the two are marked with a ‘3’ and the process is repeated iteratively until : The exit is found (a free square other than the starting position is reached on the very edge of the maze), or, No more free squares are available, and hence no exit is possible.
標(biāo)簽: method ink-blotting Blotting escaping
上傳時間: 2014-12-03
上傳用戶:123啊
蟲蟲下載站版權(quán)所有 京ICP備2021023401號-1