With this example-driven book, you get a quick, practical, and thorough introduction to Java s API for XML Web Services (JAX-WS) and the Java API for RESTful Web Services (JAX-RS).
標簽: example-driven introduction practical thorough
上傳時間: 2014-01-10
上傳用戶:zhliu007
This program incorporates the FV method for solving the Navier-Stokes equations using 2D, Cartesian grids and the staggered arrangement of variables. Variables are stored as 2D arrays. SIMPLE method is used for pressure calculation. UDS and CDS are implemented for the discretization of convective terms, CDS is used for the diffusive terms. The boundary conditions are set for the lid-driven cavity flow. Only steady flows are considered.
標簽: Navier-Stokes incorporates Cartesian equations
上傳時間: 2017-05-14
上傳用戶:ryb
Compute the matrix of mel filter coefficients given the sampling frequency, the length of the FFT and the number of desired mel filter channels.
標簽: the coefficients frequency sampling
上傳時間: 2017-05-16
上傳用戶:偷心的海盜
This file is distributed in the hope that it will be useful, but WITHOUT WARRANTY OF ANY KIND. Author(s): Ole Saether DESCRIPTION: This example should be used together with ex2a-tx433.asm. One nRF9E5 evaluation board (receiver) should be programmed with the hex-file generated from assembling this file and the other evaluation board (transmitter) programmed with the hex-file generated from assembling ex2a-tx433.asm. All switches on the DIP-swith S206 on the receiver must be set to the "on" position and all switches on the DIP-swith S205 on the transmitter must be set to the "on" position. When one of the switched SW1-SW4 on the transmitter is pressed the corresponding LED on the receiver is turned on. The functionality is the same as in ex2c-rx.c.
標簽: distributed WARRANTY WITHOUT useful
上傳時間: 2017-05-17
上傳用戶:xieguodong1234
In c++ risks is a reference to a variable which exists i.e. one 2nd name for the same variable. This program is broken up into functions.露the function hand constitutes the entrance point of the program, firstly there is the function message which us affiche hello , and the second function produced 露procedure affich_calcul, one declared the prototype and one it definite after one made the call has this function.
標簽: variable i.e. reference exists
上傳時間: 2013-12-17
上傳用戶:netwolf
H.264/AVC is the current video standardization project of the ITU-T Video Coding Experts Group (VCEG) and the ISO/IEC Moving Picture Experts Group (MPEG). The main goals of this standardization effort are to develop a simple and straightforward video coding design, with enhanced compression performance, and to provide a 鈥渘etwork-friendly鈥?video representation which addresses 鈥渃onversational鈥?(video telephony) and 鈥渘on-conversational鈥?(storage, broadcast or streaming) applications.
標簽: standardization the current Experts
上傳時間: 2014-01-02
上傳用戶:SimonQQ
Traveling Salesperson Problem Our branch-and-strategy splits a branch and bound solution into two groups: one group including a particular arc and the other excluding this arc. 1.Each splitting incurs a lower bound and we shall traverse the searching tree with the "lower" lower bound. 2.If a constant subtracted from any row or any column of the cost matrix, an optimal solution does not change.
標簽: branch-and-strategy Salesperson Traveling solution
上傳時間: 2013-12-29
上傳用戶:璇珠官人
How to control the time s equence of LM3033B- 0BR3 LCD module by C51 programming was dis cus s ed in this paper. In this way the LCD module was driven by parallel communication and the characters and graphics could be were narrated in detail.
標簽: programming control equence module
上傳時間: 2017-05-29
上傳用戶:熊少鋒
This is program with source code to convert ascii text files to the maxicode barcode standard. The input file consists of two columns. The first column represents a code and the second column is a string enclosed in quotes. The codes for the first column are as follows: PM, SM, CC, MO, SC, and PC.
標簽: maxicode standard barcode convert
上傳時間: 2017-06-07
上傳用戶:ardager
An Introduction To Cryptography Chapter 1, “The Basics of Cryptography,” provides an overview of the terminology and concepts you will encounter as you use PGP products. Chapter 2, “Phil Zimmermann on PGP,” written by PGP’s creator, contains discussions of security, privacy, and the vulnerabilities inherent in any security system, even PGP.
標簽: Cryptography Introduction provides overview
上傳時間: 2017-06-12
上傳用戶:cylnpy