This project developed in java leads us to realize a flight reservation system in order to emulate databases containing the structures for the flight and for the booking. These bases extend the List interface and implements additional search鈥檚 methods. Two interfaces provide an access to this system. The first one reads and handles reservation request message from a terminal. The arguments are then processed throw a middleware interface that call the flight system methods. The second one, a Graphical User Interfaces (GUI) application using Swing Java Foundation Classes (JFC), offers a simpler access to the systems.
標簽: reservation developed project emulate
上傳時間: 2017-04-27
上傳用戶:6546544
The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for firmware updating. The instruction set of the W78E58B is fully compatible with the standard 8052. The W78E58B contains a 32K bytes of main ROM and a 4K bytes of auxiliary ROM which allows the contents of the 32KB main ROM to be updated by the loader program located at the 4KB auxiliary ROM 512 bytes of on-chip RAM four 8-bit bi-directional and bit-addressable I/O ports an additional 4- bit port P4 three 16-bit timer/counters a serial port. These peripherals are supported by a eight sources Two-level interrupt capability. To facilitate programming and verification, the ROM inside the W78E58B allows the program memory to be programmed and read electronically. Once the code is confirmed, the user can protect the code for security
標簽: microcontroller programmable in-system W78E58B
上傳時間: 2017-04-27
上傳用戶:yiwen213
time workworkworkSystem will automatically delete the directory of debug and release, so please do not put files on these Two directory.
標簽: workworkworkSystem automatically directory release
上傳時間: 2017-04-27
上傳用戶:chenbhdt
The frequency domain plays an important role in image processing to smooth, enhance, and detect edges of images. Although image data typically does not include imaginary values, the fast Fourier transform (FFT) has been used for obtaining spectra. In this paper, the fast Hartley transform (FHT) is used to transform Two-dimensional image data. Because the Hartley transform is real valued, it does not require complex operations. Both spectra and autocorrelations of Two-dimensional ultrasound images of normal and abnormal livers were computed.
標簽: processing frequency important enhance
上傳時間: 2014-01-08
上傳用戶:1051290259
Please read your package and describe it at least 40 bytes. System will automatically delete the directory of debug and release, so please do not put files on these Two directory.
標簽: automatically describe package Please
上傳時間: 2013-12-27
上傳用戶:wqxstar
Please read your package and describe it at least 40 bytes. System will automatically delete the directory of debug and release, so please do not put files on these Two directory.
標簽: automatically describe package Please
上傳時間: 2014-01-02
上傳用戶:ynsnjs
伸展樹,基本數據結構,The tree is drawn in such a way that both of the edges down from a node are the same length. This length is the minimum such that the Two subtrees are separated by at least Two blanks.
標簽: 樹
上傳時間: 2017-05-07
上傳用戶:JIUSHICHEN
AdaBoost, Adaptive Boosting, is a well-known meta machine learning algorithm that was proposed by Yoav Freund and Robert Schapire. In this project there Two main files 1. ADABOOST_tr.m 2. ADABOOST_te.m to traing and test a user-coded learning (classification) algorithm with AdaBoost. A demo file (demo.m) is provided that demonstrates how these Two files can be used with a classifier (basic threshold classifier) for Two class classification problem.
標簽: well-known algorithm AdaBoost Adaptive
上傳時間: 2014-01-15
上傳用戶:qiaoyue
AdaBoost, Adaptive Boosting, is a well-known meta machine learning algorithm that was proposed by Yoav Freund and Robert Schapire. In this project there Two main files
標簽: well-known algorithm AdaBoost Adaptive
上傳時間: 2013-12-31
上傳用戶:jiahao131
Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two main problems seriously darken the future of this technology though. Firstly, the large number of attacks and weaknesses which appear as fast as new algorithms are proposed, emphasizes the limits of this technology and in particu-lar the fact that it may not match users expectations. Secondly, the requirements, tools and methodologies to assess the current technologies are almost non-existent. The lack of benchmarking of current algorithms is bla-tant. This confuses rights holders as well as software and hardware manufacturers and prevents them from using the solution appropriate to their needs. Indeed basing long-lived protection schemes on badly tested watermarking technology does not make sense.
標簽: Watermarking watermarking evaluation presented
上傳時間: 2013-12-04
上傳用戶:thinode