詳細介紹了PCI9052接口器件的功能、結構和使用方法,并結合實際給出了基于PCI9052器件開發PCI總線接口卡的應用實例。 Abstract: The main functions,structures and Usage of PCI9052inferface chip are introduced in detail in this paper.And an application example of designing PCI bus interface card based on PCI9052is proposed in this paper.
上傳時間: 2013-10-16
上傳用戶:togetsomething
(Portmon is an application that lets you monitor serial and parallel activity on your local system, or any computer on the network that you can reach via TCP/IP. It is the most powerful tool available for tracking down port-related configuration problems and analyzing application port Usage.)
上傳時間: 2013-11-07
上傳用戶:1412904892
本文主要通過介紹PLC通訊的意義和三菱FX系列PLC的四種通訊方式,并重點介紹FX系列PLC與計算機無協議通訊,主要從無協議通訊的硬件、配線、數據寄存器設置、PLC與計算機無協議通訊的指令用法、PLC程序編寫和計算機VB程序的編寫來說明無協議通訊的過程和一般方法。 My dissertation introduces the significance of PLC communications and the four means of communication of Mitsubishi FX’s PLC, And highlights the no protocol communications of FX series PLC and computer, no protocol communications hardware, wiring, Register data set, and the Usage of command about no protocol communications, How to write PLC program and computer VB program to illustrate the process of no protocol communications and general method.
上傳時間: 2014-11-29
上傳用戶:Jerry_Chow
Abstract: This article discusses the benefits of a G3-PLC-based automation system and presents a real-world example of a systemfor reducing energy Usage and lowering maintenance costs in tunnels. The basic system design is explained and key performance
上傳時間: 2013-10-29
上傳用戶:康郎
The Virtex-4 features, such as the programmable IDELAY and built-in FIFO support, simplifythe bridging of a high-speed, PCI-X core to large amounts of DDR-SDRAM memory. Onechallenge is meeting the PCI-X target initial latency specification. PCI-X Protocol Addendum tothe PCI Local Bus Specification Revision 2.0a ([Ref 6]) dictates that when a target signals adata transfer, "the target must do so within 16 clocks of the assertion of FRAME#." PCItermination transactions, such as Split Response/Complete, are commonly used to meet thelatency specifications. This method adds complexity to the design, as well as additional systemlatency. Another solution is to increase the ratio of the memory frequency to the PCI-X busfrequency. However, this solution increases the required power and clock resource Usage.
上傳時間: 2013-11-24
上傳用戶:18707733937
CopyPwd is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Usage of CopyPwd is at the risk of the person or company using this software
標簽: distributed WARRANTY CopyPwd WITHOUT
上傳時間: 2013-12-09
上傳用戶:sjyy1001
制作本書的目的是為了方便大家的閱讀。轉載時請保持本電子書的完整性。 前言、條款2、16、21、44根據從Addison-Wesley出版社下載的開放條款翻譯。條款26、27、28、45根據從Scott Meyers的網站下載的《Three Guidelines for Effective Iterator Usage》一文翻譯。條款43根據從C/C++ Users Journal網站下載的《STL Algorithms vs. Hand-Written Loops》一文翻譯,條款45根據從C/C++ Users Journal網站下載的《Distinguishing STL Search Algorithms》一文翻譯。其余部分根據epubcn放出的電子書制作。
標簽: Addison-Wesley 家 保持
上傳時間: 2015-04-12
上傳用戶:jing911003
用JAVA語言編寫,包括PSO(Particle swarm optimization, 中文譯名為粒子群優化或微粒群算法), DE (Differential evolution, 中文譯名為差分進化或差異演化)等算法,有一些不帶約束和帶約束的算例(如Michelawicz的幾個問題)。使用說明見Usage.txt、RUNExample.bat和程序中的注釋。
上傳時間: 2014-01-06
上傳用戶:agent
I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. II. Screenshots $ ./kill-bill.pl . kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007) by Solar Eclipse <solareclipse@phreedom.org> Usage: kill-bill -p <port> -s <service> host Services: iis IIS HTTP server (port 80) iis-ssl IIS HTTP server with SSL (port 443) exchange Microsoft Exchange SMTP server (port 25) smb-nbt SMB over NetBIOS (port 139) smb SMB (port 445) If a service is running on its default port you don t have to specify both the service and the port. Examples: kill-bill -s iis 192.168.0.1 kill-bill -p 80 192.168.0.1 kill-bill -p 1234 -s smb 192.168.0.1
標簽: I. vulnerability Introduction undisclosed
上傳時間: 2015-05-15
上傳用戶:xhz1993
This example imports a text file into a database table using ADO. Because it uses ADO, it should work with all data sources, though it has only been tested with Access. Usage is explained in the code s comments.
標簽: ADO database Because example
上傳時間: 2013-12-27
上傳用戶:1079836864