亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

discussed

  • The widespread use of embedded systems mandates the development of industrial software design method

    The widespread use of embedded systems mandates the development of industrial software design methods, i.e. computer-aided design and engineering of embedded applications using formal models (frameworks) and standardized prefabricated components, much in the same way as in other mature areas of engineering such as mechanical engineering and electronics. These guidelines have been used to develop Component-based Design of Software for Embedded Systems (COMDES). The paper gives an overview of the COMDES framework, followed by a presentation of a generic component types, such as function blocks, activities and function units. The execution of function units is discussed in the context of a newly developed execution model, i.e. timed-multitasking, which has been extended to distributed embedded systems.

    標簽: development widespread industrial embedded

    上傳時間: 2014-01-23

    上傳用戶:z754970244

  • This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Page

    This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Pages environment, but most of the techniques discussed have equivalents in other database environments. It should be viewed as a "follow up", or perhaps an appendix, to the previous paper, "Advanced SQL Injection". The paper covers in more detail some of the points described in its predecessor, providing examples to clarify areas where the previous paper was perhaps unclear. An effective method for privilege escalation is described that makes use of the openrowset function to scan a network. A novel method for extracting information in the absence of helpful error messages is described the use of time delays as a transmission channel. Finally, a number of miscellaneous observations and useful hints are provided, collated from responses to the original paper, and various conversations around the subject of SQL injection in a SQL Server environment.

    標簽: Server SQL Injection Microsoft

    上傳時間: 2014-07-28

    上傳用戶:xhz1993

  • The concept of the Altera Nios II embedded processor implementation inside Field Programmable Gate A

    The concept of the Altera Nios II embedded processor implementation inside Field Programmable Gate Array [FPGA] of the CCD camera for the “Pi of the Sky” experiment is presented. The digital board of the CCD camera, its most important components, current implementation of firmware [VHDL] inside the FPGA and the role of external 8051 microcontroller is briefly described. The main goal of the presented work is to get rid of the external microcontroller and to design new system with Nios II processor built inside FPGA chip. Constraints for implementing the design into the existing camera boards are discussed. New possibilities offered by a larger FPGA for next generation of cameras are considered.

    標簽: implementation Programmable processor embedded

    上傳時間: 2014-01-02

    上傳用戶:dyctj

  • The emphasis of this book is on real-time application of Synopsys tools, used to combat various pro

    The emphasis of this book is on real-time application of Synopsys tools, used to combat various problems seen at VDSM geometries. Readers will be exposed to an effective design methodology for handling complex, submicron ASIC designs. Significance is placed on HDL coding styles, synthesis and optimization, dynamic simulation, formal verification, DFT scan insertion, links to layout, physical synthesis, and static timing analysis. At each step, problems related to each phase of the design flow are identified, with solutions and work-around described in detail. In addition, crucial issues related to layout, which includes clock tree synthesis and back-end integration (links to layout) are also discussed at length. Furthermore, the book contains in-depth discussions on the basics of Synopsys technology libraries and HDL coding styles, targeted towards optimal synthesis solution.

    標簽: application real-time Synopsys emphasis

    上傳時間: 2017-07-05

    上傳用戶:waitingfy

  • The code for this article was written for version 1.0 of the Active Template Library (ATL). The cu

    The code for this article was written for version 1.0 of the Active Template Library (ATL). The current version of the code (in SieveATL) was built with Visual C++ 6.0 and the ATL provided with that compiler. It may be slightly different than the code shown in the article. The directory SieveMFC contains an MFC version of a component equivalent to the ATL version discussed in the article. It was built with version 5 of the C++ compiler and the MFC version provided with it. The code discussed in the article was later adapted for Hardcore Visual Basic, Second Edition. Comparable Visual Basic versions are discussed in Chapter 10 of the book. Bruce McKinney

    標簽: The for Template Library

    上傳時間: 2013-12-01

    上傳用戶:古谷仁美

  • The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at

    The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.

    標簽: cryptographic applications attractive for

    上傳時間: 2013-12-07

    上傳用戶:zhuimenghuadie

  • 用于鋰 - 硫電池的納米結構金屬氧化物和硫化物(1)

    Lithium–sulfur (Li–S) batteries with high energy density and long cycle life are considered to be one of the most promising next-generation energy-storage systems beyond routine lithium-ion batteries. Various approaches have been proposed to break down technical barriers in Li–S battery systems. The use of nanostructured metal oxides and sulfides for high sulfur utilization and long life span of Li–S batteries is reviewed here. The relationships between the intrinsic properties of metal oxide/sulfide hosts and electrochemical performances of Li–S batteries are discussed. Nanostructured metal oxides/ sulfides hosts used in solid sulfur cathodes, separators/interlayers, lithium- metal-anode protection, and lithium polysulfides batteries are discussed respectively. Prospects for the future developments of Li–S batteries with nanostructured metal oxides/sulfides are also discussed.

    標簽: 電池 納米結構 硫化物 金屬氧化物

    上傳時間: 2017-11-23

    上傳用戶:653357637

  • Essentials+of+Radio+Wave+Propagation

    The objective of this book is to allow the reader to predict the received signal power produced by a particular radio transmitter. The first two chapters examine propagation in free space for point-to-point and point-to-area transmission, respectively. This is combined with a dis- cussion regarding the characteristics of antennas for various purposes. In chapter 3, the effect of obstacles, whether buildings or mountains, is discussed and analytical methods, whereby the strength of a signal is the shadow of an obstacle can be predicted, are presented. 

    標簽: Propagation Essentials Radio Wave of

    上傳時間: 2020-05-27

    上傳用戶:shancjb

  • ESD_protection_for_RF_and_AMS_ICs

    This paper reviews key factors to practical ESD protection design for RF and analog/mixed-signal (AMS) ICs, including general challenges emerging, ESD-RFIC interactions, RF ESD design optimization and prediction, RF ESD design characterization, ESD-RFIC co-design technique, etc. Practical design examples are discussed. It means to provide a systematic and practical design flow for whole-chip ESD protection design optimization and prediction for RF/AMS ICs to ensure 1 st Si design success.

    標簽: ESD_protection_for_RF_and_AMS_ICs

    上傳時間: 2020-06-05

    上傳用戶:shancjb

  • Dynamic Security

    This book is written for engineers involved in the operation, control, and planning of electric power systems. In addition, the book provides information and tools for researchers working in the fields of power system security and stability. The book consists of two volumes. The first volume provides traditional techniques for the stability analysis of large scale power systems. In addition, an overview of the main drivers and requirements for modernization of the traditional methods for online applications are discussed. The second volume provides techniques for online security assessment and corrective action studies. In addition, the impact of variable generation on the security of power systems is considered in the second volume. The first volume may be considered as a background builder while the second volume is intended for the coverage of edge techniques and methods for online dynamic security studies.

    標簽: Security Dynamic

    上傳時間: 2020-06-07

    上傳用戶:shancjb

主站蜘蛛池模板: 霸州市| 辉县市| 乐业县| 阆中市| 天全县| 武胜县| 和林格尔县| 灵山县| 福鼎市| 黄大仙区| 尉犁县| 怀化市| 张家口市| 白朗县| 竹北市| 阿克| 宁阳县| 庐江县| 武陟县| 莫力| 宣化县| 邹城市| 大冶市| 咸阳市| 镇安县| 都昌县| 阳山县| 丰宁| 湘阴县| 桂平市| 永寿县| 衡阳县| 南和县| 汉阴县| 泉州市| 阜康市| 江达县| 依安县| 黄山市| 华容县| 万宁市|