Xem 1-20 trên 39 kết quả Hardware directly
  • The PIC 16F877A microcontroller is used as the reference device in this book, as it contains a full range of peripherals and a reasonable memory capacity. It was also used in the previous work on interfacing, so there is continuity if the book series is taken as a complete course in PIC application development. Microcontrollers are traditionally programmed in assembly language, each type having its own syntax, which translates directly into machine code.

    pdf278p trinh02 28-01-2013 42 21   Download

  • Data Streams: Models and Algorithms primarily discusses issues related to the mining aspects of data streams. Recent progress in hardware technology makes it possible for organizations to store and record large streams of transactional data. For example, even simple daily transactions such as using the credit card or phone result in automated data storage, which brings us to a fairly new topic called data streams.

    pdf364p ken333 07-06-2012 85 23   Download

  • The number of applications for RFID systems has increased each year and various research directions have been developed to improve the performance of these systems. Therefore IN-TECH publisher has decided to continue the series of books dedicated to the latest results of research in the RFID field and launch a new book, entitled “Radio Frequency Identification Fundamentals and Applications, Design Methods and Solutions”, which could support the further development of RFID.

    pdf334p 123859674 30-06-2012 56 22   Download

  • You might be tempted to yell something like this when you discover that Microsoft has implemented some, but not all, of the Win32 API in the .NET Framework. In some cases, you might find that Microsoft mislaid the feature in an out−of−the−way spot, but more often than not, the feature is simply missing. It’s not documented anywhere and Microsoft doesn’t give you even one clue as to where the feature might have gone. A visit to the newsgroups will often yield a pathetic claim that the missing feature will appear in the next version of the .

    pdf437p tailieuvip13 25-07-2012 64 13   Download

  • It has been many decades, since Computer Science has been able to achieve tremendous recognition and has been applied in various fields, mainly computer programming and software engineering. Many efforts have been taken to improve knowledge of researchers, educationists and others in the field of computer science and engineering. This book provides a further insight in this direction. It provides innovative ideas in the field of computer science and engineering with a view to face new challenges of the current and future centuries....

    pdf0p bi_bi1 11-07-2012 40 10   Download

  • Support GSM800M、850M、900M、1800M、1900M Support networking topology includes star, tree, chain and ring Support A5/1 and A5/2 encryption/decryption Support GPRS and EDGE Support dynamic and static power control Support the omni-directional coverage and directional coverage

    ppt137p daihocdientu4 20-05-2013 36 7   Download

  • The adult in each household who knows the most about the health of all household members is selected to answer all survey questions during the telephone interview. This respondent answers survey questions for him/herself as well as for all other household members. Since each household member does not speak directly to the interviewer, survey answers are “reported” by the respondent. The reader will see the phrase . . .” was reported to be . . .” in this report. In places where this phrase is not used, the reader should keep in mind that...

    pdf76p quaivatxanh 01-12-2012 37 6   Download

  • Brains rule the world, and brain-like computation is increasingly used in computers and electronic devices. Brain-like computation is about processing and interpreting data or directly putting forward and performing actions. Learning is a very important aspect. This book is on reinforcement learning which involves performing actions to achieve a goal. Two other learning paradigms exist. Supervised learning has initially been successful in prediction and classification tasks, but is not brain-like....

    pdf434p bi_bi1 11-07-2012 23 5   Download

  • Many foreign companies use a combination of exporting, licensing and direct investment in India. India permits 100% foreign equity in most industries. Units setting up in special economic zones (SEZs), operating in electronic hardware or software technology parks or operating as 100% export-oriented units also may be fully foreign-owned. Nevertheless, the government has set sector-specific caps on foreign equity in certain industries, such as basic and cellular telecommunications services, banking, civil aviation and retail trading.

    pdf32p quaivattim 01-12-2012 24 5   Download

  • Search of accessible beams for monitoring in a reception poin. Reception and processing physical channels in directions "subscriber-satellite" and "satellite-subscriber". Primary processing of the received digital signal (extraction of data packages, demultiplexing, removal of scrambler, deinterleaving,removal convolutional codings).

    pdf24p lxtruonghn 18-03-2013 29 5   Download

  • In the recent years the electrical power utilities are undergoing rapid restructuring process worldwide. Indeed, with deregulation, advancement in technologies and concern about the environmental impacts, competition is particularly fostered in the generation side thus allowing increased interconnection of generating units to the utility networks. These generating sources are called as distributed generators (DG) and defined as the plant which is directly connected to distribution network and is not centrally planned and dispatched.

    pdf0p bi_bi1 11-07-2012 29 4   Download

  • Moving Pathway Control Points: Given two doors, multiple path- ways are possible. By moving the control points of the pathway, which is represented as a cubic Bezier curve, the pathway can change its course to avoid colliding with furniture objects. As shown in Figure 7, the free space of a pathway is represented by a series of rectangles along the curve. Thus, pathways can also be regarded as “furniture objects” whose control points may be mod- ified, and a move can be defined as the translation of a pathway control point in a certain direction.

    pdf10p connhobinh 10-12-2012 25 4   Download

  • With the recent increase in shareholder activism, companies are increasingly considering roles for lead directors in communicating with shareholders. Although management remains principally responsible for investor relations, having a lead director who can assist in certain types of commu- nications may add a useful voice.

    pdf54p thamgiacongdong 02-05-2013 17 4   Download

  • Here we investigate the extent to which common Internet application protocols remain dis- tinguishable even when packet payloads and TCP headers have been stripped away, leaving only extremely lean data which includes nothing more than the packets’ timing, size, and direction. We begin our analysis in §3 by exploring protocol recognition techniques for traffic aggregates where all flows carry the same application protocol. We then develop tools to enhance the initial analysis pro- vided by these first tools by addressing more specific scenarios.

    pdf13p khongmuonnghe 04-01-2013 15 3   Download

  • Partial evaluation technology continues to grow and mature. ACM SIGPLANsponsored conferences and workshops have provided a forum for researchers to share current results and directions of work. Partial evaluation techniques are being used in commercially available compilers (for example the Chez Scheme system). They are also being used in industrial scheduling systems (see Augustsson's article in this volume), they have been incorporated into popular commercial products (see Singh's article in this volume), and they are the basis of methodologies for implementing domain-specific languages....

    pdf445p hotmoingay3 09-01-2013 24 3   Download

  • A computer program, or just a program, is a sequence of instructions, written to perform a specified task with a computer.[1] A computer requires programs to function, typically executing the program's instructions in a central processor.[2] The program has an executable form that the computer can use directly to execute the instructions. The same program in its human-readable source code form, from which executable programs are derived (e.g., compiled), enables a programmer to study and develop its algorithms.

    pdf570p nt18105 28-05-2013 15 2   Download

  • A computer program, or just a program, is a sequence of instructions, written to perform a specified task with a computer.[1] A computer requires programs to function, typically executing the program's instructions in a central processor.[2] The program has an executable form that the computer can use directly to execute the instructions. The same program in its human-readable source code form, from which executable programs are derived (e.g., compiled), enables a programmer to study and develop its algorithms.

    pdf322p nt18105 28-05-2013 15 2   Download

  • Externalizing Resources ❘ 67 LISTING 3-3: Simple menu layout resource Using Resources As well as the resources you create, Android supplies several system resources that you can use in your applications. The resources can be used directly from your application code and can also be referenced from within other resources (e.g., a dimension resource might be referenced in a layout definition). Later in this chapter you’ll learn how to define alternative resource values for different languages, locations, and hardware.

    pdf50p kien2507 16-11-2010 113 62   Download

  • When a brand new computer comes off the factory assembly line, it can do nothing. The hardware needs software to make it work. Are we talking about applications software such as word processing or spreadsheet software? Partly. But an applications software package does not communicate directly with the hardware. Between the applications software and the hardware is a software interface – an operating system. An operating system is a set of programs that lies between applications software and the computer hardware....

    pdf3p xuankhuong 18-09-2009 253 17   Download

  • One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms. In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided.

    pdf353p ken333 06-07-2012 44 15   Download

Đồng bộ tài khoản