This program would work fine only with a specific flash tool through PC printer port under EPP mode.Program is capable of identifying flash chip manufacturer, device type, capacity,... It also allows user to dump flash data, edit/revise the content of flash chip on the Screen, and re-write them back to the chip.
標簽: specific program printer through
上傳時間: 2014-01-16
上傳用戶:ywqaxiwang
This a free web game, animportantnote of this, "xia domain" for free software, follow the "general public to permit" all the provisions of any recognition can be modified to increase capacity, publish, but to revise and increase the No need to publish, not of any reason not to open
標簽: free animportantnote software general
上傳時間: 2016-11-23
上傳用戶:colinal
無線中新出來的一個NFC,就是near field communication,剛起步的技術,是好東西,這包含了它的協(xié)議和測試方法
上傳時間: 2016-11-26
上傳用戶:星仔
We describe and demonstrate an algorithm that takes as input an unorganized set of points fx1 xng IR3 on or near an unknown manifold M, and produces as output a simplicial surface that approximates M. Neither the topology, the presence of boundaries, nor the geometry of M are assumed to be known in advance — all are inferred automatically from the data. This problem naturally arises in a variety of practical situations such as range scanning an object from multiple view points, recovery of biological shapes from two-dimensional slices, and interactive surface sketching.
標簽: demonstrate unorganized algorithm describe
上傳時間: 2013-12-18
上傳用戶:xc216
A passive optical network (PON) is a point-to-multipoint, fiber to the premises network architecture in which unpowered optical splitters are used to enable a single optical fiber to serve multiple premises, typically 32-128. A PON consists of an Optical Line Termination (OLT) at the service provider s central office and a number of Optical Network Units (ONUs) near end users. A PON configuration reduces the amount of fiber and central office equipment required compared with point to point architectures
標簽: network point-to-multipoint architecture premises
上傳時間: 2016-12-10
上傳用戶:王慶才
Tristar Flash dodges saves the material, mainly introduced Tristar dodges most newly saves the chip use, the working voltage, the capacity and the seal form.
標簽: Tristar dodges saves introduced
上傳時間: 2017-02-14
上傳用戶:685
A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak with the ideal material parameters is a perfect invisibility cloak by systematically studying the change of the scattering coefficients from the near-ideal case to the ideal one. However, due to the slow convergence of the zeroth order scattering coefficients, a tiny perturbation on the cloak would induce a noticeable field scattering and penetration.
標簽: cylindrical scattering expansion developed
上傳時間: 2017-03-30
上傳用戶:lhc9102
We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.
標簽: effectiveness analytically numerically cloaking
上傳時間: 2017-03-30
上傳用戶:zxc23456789
We obtained the energy transport velocity distribution for a three dimensional ideal cloak explicitly. Near the operation frequency, the energy transport velocity has rather peculiar distribution. The velocity along a line joining the origin of the cloak is a constant, while the velocity approaches zero at the inner boundary of the cloak. A ray pointing right into the origin of the cloak will experience abrupt changes of velocities when it impinges on the inner surface of the cloak. This peculiar distribution causes long time delays for beams passing through the ideal cloak within a geometric optics description.
標簽: distribution dimensional transport obtained
上傳時間: 2013-12-19
上傳用戶:zhliu007
Airline Reservations System A small airline has just purchased a computer for its new automated reservation system. You have been asked to develop the new system called ARSystem. You are to write an application to assign seats on each flight of the airline s only plane (capacity: 24 seats.) Your application should display the following alternatives: Please type 1 for FirstClass and Please type 2 for Economy. If the user types 1, your application should assign a seat in the first-class section (seats 1-8). If the user types 2, your application should assign a seat in the economy section (seats 9-24). Your application should then display a boarding pass indicating the person s seat number and whether it is in the first-class or economy
標簽: Reservations automated purchased computer
上傳時間: 2017-04-14
上傳用戶:lizhizheng88