Oracle Function Collect
上傳時間: 2014-10-25
上傳用戶:wang5829
NEW ENVIRENMENT TO ANTS/WE SHOULD Collect INFORMATION ABOUT AALGORITHM TO INTRODUCE THIS IDEA AND DOWNLOAD ALL THE PACKAGE
標簽: ENVIRENMENT INFORMATION AALGORITHM INTRODUCE
上傳時間: 2014-01-20
上傳用戶:xzt
為提高太陽能的利用率,以ATmega8單片機為控制核心,設計了一套光電跟蹤與視日運動軌跡跟蹤互補控制的雙軸太陽跟蹤器。該跟蹤器在晴天時,利用光敏電阻采集光強判斷太陽位置,控制步進電機實現光電跟蹤;在陰天時,采集時鐘器件PCF8583的時間信息,計算當前太陽位置來實現視日運動軌跡跟蹤。實驗表明:該太陽跟蹤器能在不同天氣狀況下對太陽進行較準確地跟蹤,能量接收效率提高了30%,達到充分利用太陽能的目的。 Abstract: To improve the utilization rate of solar energy,a kind of solar tracking controller which effectively combined the sun angle tracking and photo electric tracking based on ATmega8is designed.In the sunny days,the solar tracking con-troller determines the sun's position by using photosensitive resistances to Collect light intensity and control stepper motors to achieve photo electric tracking,n cloudy days,it Collects clock chip PCF8583time information to calculate the current position of the sun and achieve the sun angle tracking.Experimental results show the solar tracking controller accurately tracks the sun in different weather conditions,improves received energy efficiency by30%and reaches the purpose of full use of solar energy.
上傳時間: 2013-10-15
上傳用戶:urgdil
Web technology is not evolving in comfortable and incremental steps, but i s turbulent, erratic, and often rather uncomfortable. It is estimated that the Internet, arguably the most important part of the new technological environment, has expanded by about 2000 % and that is doubling in size every six to ten months. In recent years, the advance in computer and web technologies and the decrease in their cost have expanded the means available to Collect and store data. As an intermediate consequence, the amount of information (Meaningful data) stored has been increasing at a very fast pace.
標簽: comfortable incremental technology and
上傳時間: 2015-11-05
上傳用戶:Shaikh
在網絡安全中經常會遇到rootkit,NSA安全和入侵檢測術語字典( NSA Glossary of Terms Used in Security and Intrusion Detection)對rootkit的定義如下:A hacker security tool that captures passwords and message traffic to and from a computer. A Collection of tools that allows a hacker to provide a backdoor into a system, Collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.
上傳時間: 2017-04-04
上傳用戶:xaijhqx
This application can make a comparative analysis of two images using different methods: Logical Operators and singular value decomposition (SVD). In conclusion, with this work we have tried to Collect a few methods for differentiating textures.
標簽: application comparative different analysis
上傳時間: 2017-07-16
上傳用戶:蟲蟲蟲蟲蟲蟲
NEA1803 51單片機與12864 由串口中斷收取數據 顯示經度緯度 高度 速度 時間 使用衛星數-GPS development NEA1803 51 SCM and 12864 Collected by the serial interrupt data show a high degree of longitude latitude speed time-use satellite
標簽: 12864 1803 development NEA
上傳時間: 2017-08-22
上傳用戶:lepoke
能譜儀VC++6.0軟件個人設計是由本人2009年05月開發的γ能譜儀VC++6.0軟件 不過由于我是初次接觸VC,很多語句調用和邏輯算法都還是新手階段,請勿見笑 本軟件包括 1.調用MFC控件接受串口數據包(數據包為附件中通訊協議規定) 2.調用pDC繪圖(繪制表格和譜線) 3.實時采集數據并處理(處理部分其實還沒寫好) 4.調用WINDOWS系統的OFFICE控件將采集到的數據保存到EXCEL(由于我不會建立文件夾,所以在運行前,必須在C盤建立一個文件夾“Collect data”,即:"C:\\Collect data\\") 其實程序中很多都是參考WWW.PUDN.COM上的程序,本程序經過VC++6.0調試可用。
上傳時間: 2013-12-24
上傳用戶:diets
In writing this text my intention was to Collect together in a single place practical predictive modeling techniques, ideas and strategies that have been proven to work but which are rarely taught in business schools, data science courses or contained in any other single text.
標簽: Predictive Techniques Modeling Applied 92
上傳時間: 2020-06-06
上傳用戶:shancjb
Internet of Things (IoT) [26] is a new networking paradigm for cyber-physical systems that allow physical objects to Collect and exchange data. In the IoT, physical objects and cyber-agents can be sensed and controlled remotely across existing network infrastructure, which enables the integration between the physical world and computer-based systems and therefore extends the Internet into the real world. IoT can find numerous applications in smart housing, environmental monitoring, medical and health care systems, agriculture, transportation, etc. Because of its significant application potential, IoT has attracted a lot of attention from both academic research and industrial development.
標簽: Technologies Internet Things RFID for of
上傳時間: 2020-06-08
上傳用戶:shancjb