亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Real-Time_Multitasking

  • "Java for C++" is a tool to generate C++-wrapper-classes for existing Java-classes. The implementati

    "Java for C++" is a tool to generate C++-wrapper-classes for existing Java-classes. The implementation of the wrapper classes uses JNI to call the real Java classes. The C++-API to use these wrapper classes is very close to the API of the Java classes.

    標簽: wrapper-classes Java-classes implementati for

    上傳時間: 2015-12-07

    上傳用戶:liuchee

  • 從結構上來說

    從結構上來說,實時多任務操作系統(tǒng)包括兩部分,一部分為操作系統(tǒng)內核(kernel),即實時執(zhí)行程序(Real Time Executive:RTX),另一部分是輸入輸出部分(I/O)(注意開發(fā)系統(tǒng)不屬于操作系統(tǒng)的范疇);嵌入式系統(tǒng)對I/O的需求通常比較小(無文件系統(tǒng)需求),因此很多實時多任務操作系統(tǒng)本質上就是一個實時執(zhí)行程序,如AMX(Kadak),VRTX(Microtec),iRMX(Intel)等(這里的X即:eXecutive),如果純粹從kernel的角度來考察目前流行的各種實時多任務操作系統(tǒng)的性能,它們的效率差別都不大。 在市面上可以得到一些RTX的源代碼(有用C實現(xiàn)的,有用匯編實現(xiàn)的,還有用PL/M語言實現(xiàn)的),從internet上也可以蕩一些下來(我介紹一個站點www.eg3.com,堪稱世界電子工程師資源寶庫),下面我要介紹的一個RTX版本(我命名為SRTX:short RTX),可以說是RTX中的元老級產(chǎn)品了,來自某研究所,九十年代初他們到美國考察,從美國某公司購得。五年以前,SRTX在國內有售,許多搞工控的研究所利用SRTX開發(fā)了一些大型或小型的產(chǎn)品,這里介紹的SRTX我作了一些簡化和改動.

    標簽:

    上傳時間: 2015-12-09

    上傳用戶:wang5829

  • In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadl

    In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadline violations. Priority inheritance protocol is one of the approaches to reduce priority inversion. Unfortunately, RTOS like uC/OS can’t support priority inheritance protocol since it does not allow kernel to have multiple tasks at the same priority. Although it has different ways to avoid priority inversion such as priority ceiling protocol, developers still have some difficulties in programming real time applications with it. In this paper, we redesign the uC/OS kernel to provide the ability to support round robin scheduling and implement priority inheritance semaphore on the modified kernel. As result, we port new kernel with priority inheritance semaphore to evaluation board, and evaluate the execution time of each of the kernel service as well as verify the operations of our implementation.

    標簽: priority preemptive inversion problem

    上傳時間: 2015-12-14

    上傳用戶:氣溫達上千萬的

  • This application report describes the use of Timer_A3 to decode RC5 and SIRC TV IR remote control si

    This application report describes the use of Timer_A3 to decode RC5 and SIRC TV IR remote control signals. The decoder described in this report is interrupt-driven and operates a background function using specific features the Timer_A3. Only a small portion of the MSP430 CPU?s nonreal-time resources is used. Specific hardware bit-latching capabilities of the Timer_A3 module are used for real-time decoding of the IR data signal, independent and asynchronous to the CPU. CPU activity and power consumption are kept to an absolute minimum level. The Timer_A3 decoder implementation also allows other tasks to occur simultaneously if required. The solutions provided are written specifically for MSP430x11x(1) and MSP430x12x derivatives, but can be adapted to any other MSP430 incorporating Timer_A3. 電視遙控器設計基於MSP430

    標簽: application describes Timer_A control

    上傳時間: 2014-01-01

    上傳用戶:qq21508895

  • celestia源代碼

    celestia源代碼,Celestia, a real-time 3D space simulation featuring a database of over 100000 stars, nearly a hundred solar system, objects, and a complete catalog of extrasolar planets.

    標簽: celestia 源代碼

    上傳時間: 2013-12-26

    上傳用戶:縹緲

  • 《JavaServer Faces》 In JavaServer Faces, developers learn how to use the new JavaServer Faces framew

    《JavaServer Faces》 In JavaServer Faces, developers learn how to use the new JavaServer Faces framework to build real-world web applications. The book contains everything you ll need: how to construct the HTML on the front end how to create the user interface components that connect the front end to your business objects how to write a back-end that s JSF-friendly and how to create the deployment descriptors that tie everything together. This book is a complete guide to the crucial new JSF technology.

    標簽: JavaServer Faces developers framew

    上傳時間: 2016-01-02

    上傳用戶:redmoons

  • Rao-Blackwellised Particle Filters (RBPFs) are a class of Particle Filters (PFs) that exploit condi

    Rao-Blackwellised Particle Filters (RBPFs) are a class of Particle Filters (PFs) that exploit conditional dependencies between parts of the state to estimate. By doing so, RBPFs can improve the estimation quality while also reducing the overall computational load in comparison to original PFs. However, the computational complexity is still too high for many real-time applications. In this paper, we propose a modified RBPF that requires a single Kalman Filter (KF) iteration per input sample. Comparative experiments show that while good convergence can still be obtained, computational efficiency is always drastically increased, making this algorithm an option to consider for real-time implementations.

    標簽: Particle Filters Rao-Blackwellised exploit

    上傳時間: 2016-01-02

    上傳用戶:refent

  • Robotics TOOLBOX The Toolbox provides many functions that are useful in robotics including such thi

    Robotics TOOLBOX The Toolbox provides many functions that are useful in robotics including such things as kinematics, dynamics, and trajectory generation. The Toolbox is useful for simulation as well as analyzing results from experiments with real robots. Have fun with the toolbox. It is self-explanatory and very (robotics) user friendly...see the robot.pdf

    標簽: functions including Robotics provides

    上傳時間: 2014-12-06

    上傳用戶:yyyyyyyyyy

  • 《為Windows Vista編寫安全的代碼》

    《為Windows Vista編寫安全的代碼》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars

    標簽: Windows Vista 編寫 代碼

    上傳時間: 2016-01-07

    上傳用戶:zxc23456789

  • With this foundation, you explore a development model that addresses the complete range of issues in

    With this foundation, you explore a development model that addresses the complete range of issues in the design of embedded communications software, including real-time operating systems, hardware and software partitioning, layering, and protocol stacks.

    標簽: development foundation addresses complete

    上傳時間: 2016-01-16

    上傳用戶:zyt

主站蜘蛛池模板: 平和县| 宁夏| 琼结县| 元谋县| 华坪县| 城步| 南和县| 衡南县| 湖口县| 马鞍山市| 繁峙县| 宜春市| 分宜县| 阿拉善盟| 佛冈县| 九江县| 铁岭市| 南投县| 株洲县| 大丰市| 托克逊县| 德令哈市| 伽师县| 淳安县| 抚州市| 凤翔县| 内江市| 温泉县| 萝北县| 奉化市| 遂昌县| 漳浦县| 太原市| 固阳县| 蒙城县| 凯里市| 鹤庆县| 永济市| 广丰县| 海丰县| 巩义市|