Reconfigurable systems

Xem 1-19 trên 19 kết quả Reconfigurable systems
  • This book attempts to bring together selected recent advances, tools, application and new ideas in manufacturing systems. Manufacturing system comprise of equipment, products, people, information, control and support functions for the competitive development to satisfy market needs. Manufacturing System provides a comprehensive collection of papers on the latest fundamental and applied industrial research. The book will be of great interest to those involved in manufacturing engineering, systems and management and those involved in manufacturing research....

    pdf460p wqwqwqwqwq 06-07-2012 49 20   Download

  • Today, the data acquisition technology has found its way into virtually every segment of electronics. A digital signal processing (DSP) system accepts analog signals as input, converts those analog signals to numbers, performs computations using the numbers and eventually converts the results of the computations back into analog signals. Once converted to numbers, signals are unconditionally stable. Error detection and correction methods can be applied to store,transmit and reproduce numbers with no corruption. Signals stored digitally are really just large arrays of numbers.

    pdf351p namde01 11-04-2013 33 7   Download

  • Today, the data acquisition technology has found its way into virtually every segment of electronics. A digital signal processing (DSP) system accepts analog signals as input, converts those analog signals to numbers, performs computations using the numbers and eventually converts the results of the computations back into analog signals. Once converted to numbers, signals are unconditionally stable. Error detection and correction methods can be applied to store, transmit and reproduce numbers with no corruption....

    pdf352p greengrass304 15-09-2012 21 3   Download

  • UNIX Administration: A Comprehensive Sourcebook for Effective Systems & Network Management is a one-stop handbook for the administration and maintenance of UNIX systems and networks. With an outstanding balance of concepts and practical matters, it covers the entire range of administrative tasks, from the most basic to the advanced, from system startup and shutdown to network security and kernel reconfiguration. While focusing on the primary UNIX platforms, the author discusses all of the most common UNIX “flavors,” including Solaris, Linux, HP-UX, AIX and SGI IRIX.

    pdf725p samsung_12 07-05-2013 19 3   Download

  • In designing embedded systems, the exploration and synthesis of different design alternatives and co-verification of a specific implementation are the most demanding tasks. Kaffe, an open-source technology, provides a platform for building a runtime environment and integrating different design methodologies. Integrating Kaffe into embedded systems is the cornerstone of java-like technologies, allowing possibilities such as the development of portable programs on mobile devices.

    pdf7p tuanlocmuido 19-12-2012 19 2   Download

  • The development and deployment of NEMS and MEMS are critical to the U.S. economy and society because nano- and microtechnologies will lead to major breakthroughs in information technology and computers, medicine and health, manufacturing and transportation, power and energy systems, and avionics and national security.

    pdf22p longmontran 14-01-2010 91 35   Download

  • Data can be analog or digital. The term analog data refers to information that is continuous; digital data refers to information that has discrete states. Analog data take on continuous values. Digital data take on discrete values.Data can be analog or digital. Analog data are continuous and take continuous values. Digital data have discrete states and take discrete values.

    ppt116p hoangchung_dtvt 10-12-2012 35 6   Download

  • When talking about modelling it is natural to talk about simulation. Simulation is the imitation of the operation of a real-world process or systems over time. The objective is to generate a history of the model and the observation of that history helps us understand how the real-world system works, not necessarily involving the real-world into this process. A system (or process) model takes the form of a set of assumptions concerning its operation.

    pdf300p kimngan_1 05-11-2012 29 5   Download

  • Tuyển tập các báo cáo nghiên cứu khoa học ngành toán học được đăng trên tạp chí toán học quốc tế đề tài: Reconfigurable parasitic antennas for compact mobile terminals in multiuser wireless systems

    pdf32p dauphong11 04-02-2012 32 3   Download

  • In the last few years, the search for radically new approaches to software engineering has witnessed a great momentum. These efforts are well justified by the troubling state of present day computer science. Software engineering practices based on design-time architectural composition (the only assessed way of doing software engineering so far), lead to brittle and fragile systems, unable to gracefully cope with reconfiguration and faults.

    pdf242p transang3 30-09-2012 19 3   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Reconfigurable parasitic antennas for compact mobile terminals in multiuser wireless systems

    pdf32p sting07 16-02-2012 19 2   Download

  • Computer Techniques Computer Hided and Integrated Manufacturing Systems II S-Volume Sel Cornelius T Leondes .Vol.l Computer Techniques C o m p u t e r H i d e d and Integrated Manufacturing Systems A S-Volume Set .This page is intentionally left blank .Vol.l Computer Techniques C o m p u t e r R i d e d and Integrated Manufacturing Systems H S-Volume Ser Cornelius TLeondes Unifmity of Calikmia, Lm Angeles, USA I j f e World Scientific IM New Jersey 9 London • Singapore • Hong Kong .Published by World Scientific Publishing Co. Pte. Ltd.

    pdf248p bachduong1311 12-12-2012 27 2   Download

  • Physical security has been around since the first caveman guarded his mammoth skins and clubbed his neighbor over the head for trying to steal them. Because of its long history, physical security is a very mature field. However, as many InfoSec professionals start out as technicians, this aspect of security is often overlooked. In most circumstances, security is completely compromised once physical access is achieved. With physical access, attackers can disable, reconfigure, replace, and/or steal systems.

    pdf10p vinhnghi 26-08-2009 94 16   Download

  • Today’s transmission methods and equipment are robust and reliable and feature integrated network monitoring, troubleshooting, maintenance, and provisioning systems. However, public carriers and most major private networks have historically engineered their network’s physical plant to include access points at which they can gain quick and organized “hard-contact” access to any particular circuit path. Typically, these access points were comprised of analog jackfields with “line-drop-monitor” access capability.

    pdf6p minhtuan 10-08-2009 166 6   Download

  • Visual compression has been a very active field of research and development for over 20 years, leading to many different compression systems and to the definition of international standards. There is likely to be a continued need for better compression efficiency, as video content becomes increasingly ubiquitous and places unprecedented pressure on upcoming new applications in the future. At the same time, the challenge of handling ever more diverse content coded in a wide variety of formats makes reconfigurable coding a potentially useful prospect....

    pdf162p bi_bi1 09-07-2012 21 5   Download

  • The IESO will continue its leadership in implementing the government’s green energy policy, and in facilitating innovations in the way the province’s bulk power system is operated, with an ongoing focus on reliability and efficiency. The changes underway are the most significant in the 100-plus- year history of the province’s electricity industry.

    pdf0p mebachano 01-02-2013 20 4   Download

  • Advanced fiber management systems incorporate the latest techniques for optimizing access networks for accessibility and time required to reconfigure, perform maintenance, or troubleshoot problems. Successful fiber management plays an increasingly important role in eliminating potential problem areas that can become both costly and time consuming over the life of the network.

    pdf4p mylinh 14-08-2009 60 3   Download

  • The first item to discuss when talking about router security is the router’s operating system (OS). The OS on Cisco routers is called Internetworking Operating System, or IOS. Most routers will be running an IOS version between 11.x and 12.x. By the time this book is published,Cisco may have released 13.x. Every OS has vulnerabilities, and IOS is no exception. These vulnerabilities generally allow an attacker to disable a router (a denial of service attack),collect information from a router (information leakage), or reconfigure a router (an actual compromise)....

    pdf5p vinhnghi 27-08-2009 44 3   Download

  • The ultimate long term goal of this project is to create a practical infrastructure that enables the network to become self-configuring so that necessary network-wide reconfiguration is initiated by the change within the system itself, and not by the coordinated actions of teams of human operators. To allow us to achieve tangible results in reasonable time, the present project focuses on some specific issues that we feel are key to success in the larger plan and for which there is a clear path to generalization.

    pdf15p khongmuonnghe 04-01-2013 20 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản