學習西門子S7-300/400PLC編程用。
上傳時間: 2015-01-02
上傳用戶:ifree2016
磁盤調度設計,磁盤調度算法的實現,包括 先來先服務調度算法 最短尋道優先調度算法 掃描算法 循環掃描算法 N—Step—SCAN算法
上傳時間: 2015-01-11
上傳用戶:lhw888
BREW手機平臺下的實例,實現蘋果的移動。 通過按鍵盤的 “UP”、“Down”、“Left”、“Right”使整個蘋果可以在屏幕上自由移動(Step=1),通過按“*”使蘋果回到初始位置(屏幕的中間) 1,蘋果是由4個對象組合而成,移動的時候如何成為一個整體 2、作為key事件驅動區分各個按鍵動作 3、蘋果的每一次移動都是以上一次蘋果的位置為參考
上傳時間: 2015-04-10
上傳用戶:佳期如夢
Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to work in the random access memory(RAM). Some of them do provide some mechanism for dumping the whole tree into a file and loading it back to the memory in order to make data in that tree persistent. It serves well when there s just small amount of data. When the tree is somewhat bigger, the dumping/loading process could take a lengthy time and makes your mission-critical program less efficient. How about an AVL tree that can directly use the disk for data storage ? If there s something like that, we won t need to read through the whole tree in order to pick up just a little bit imformation(a node), but read only the sectors that are neccssary for locating a certain node and the sectors in which that node lies. This is my initial motivation for writing a storage-media independent AVL Tree. However, as you step forth, you would find that it not only works fine with disks but also fine with memorys, too.
標簽: available libraries Although nearly
上傳時間: 2014-01-22
上傳用戶:zhoujunzhen
C++ Demystified: A Self-Teaching Guide by Jeff Kent ISBN:0072253703 McGraw-Hill/Osborne © 2004 This hands-on, step-by-step resource will guide you through each phase of C++ programming, providing you with the foundation to discover how computer programs and programming languages work.
標簽: Self-Teaching Demystified McGraw-Hill 0072253703
上傳時間: 2013-12-13
上傳用戶:1427796291
Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.
標簽: 802.11 introduction Beginning Security
上傳時間: 2013-12-04
上傳用戶:CHINA526
8051 monitor programm: - use external ram to run user program - use eeprom to save user program - provide single step debug, can read internal register and ram
上傳時間: 2015-07-11
上傳用戶:zhichenglu
使用到的參數跟談到彈性網絡的那一章里頭所講的是一樣的, ke 則是終止條件。如果 step 被打勾,則程式在每一步之間會暫停 100毫秒(或其他使用者輸入的數值)。如果 Random 被打勾,則程式會以系統時間作為亂數產生器的種子數,否則,就以使用者輸入的數( Random 右邊那一格)為種子數。 你可以利用 load 來載入推銷員問題檔與其最佳解,如此便可比較彈性網絡所找出來的解與最佳解差了多少。 Central, Radius, and Error 這三個參數的前兩個,只影響彈性網絡的起使位置和大小,對求解沒有影響。第三個參數代表城市與網絡點之間的容忍距離,也就是說,如果某城市與某網絡點之間的距離,小于容忍距離,那就把這個城市當成是被該網絡點所拜訪。 按下小 w按鈕會將目前的結果與參數值寫到“en.out”這個檔案。使得我們可以很方便地來比較不同參數的效果。
上傳時間: 2013-12-17
上傳用戶:84425894
it contains many classic Test Problems for Unconstrained Optimization such as camel6,treccani,goldstein,branin, shubert1,Ackley,dejong,dejong1,dejong2, dpower,rastrigin,Griewangk,Schwefel, rosenbrock2 and step. the package have the contour and mesh figures of these problem. it also give m files of these problems,and you can easily get your view of figures.
標簽: Unconstrained Optimization contains Problems
上傳時間: 2015-09-17
上傳用戶:bcjtao
CCS編程環境 使用的是匯編加C的混合編程方法: The programme of the Correlation Algorithm. Using INT2 to get the input signal. Array x, in first step, is the input signal produced by programme, in next step, is the input signal get from A/D, the length is 128, 32-bit floating point. Array y, in first step, is the input signal produced by programme, in next step, is the input signal get from A/D, the length is 128, 32-bit floating point. Array cor is the Correlation result, the length is 255, 32-bit floating point.
標簽: Correlation Algorithm programme the
上傳時間: 2013-12-21
上傳用戶:leixinzhuo