![](https://csdnimg.cn/release/downloadcmsfe/public/img/no-data.51c5211b.png)
![](https://csdnimg.cn/release/downloadcmsfe/public/img/good-course.ff455529.png)
- Access教程.pdf3d 桥梁 测绘 隧道 线路 水渠 制图 设计 计算 展示 模型 标签 立体 草图 cad 断面 横断面 设计断面
0 1244浏览
会员免费 - Professional Access 2013 ProgrammingProfessional Access 2013 Programming
5 98浏览
会员免费 - VB二元线性插值方法.介绍了利用分段线性插值的理论在数据场中进行二元线性插值算法的设计及其在流量测量系统中的应用。并举例说明用VB语言实现的过程。
0 279浏览
会员免费 - Structured Computer Organization 4th ed - A. Tanenbaum (Prentiec-Hall, 1998)Structured Computer Organization is the fourth edition of this best-selling introduction to computer hardware and architecture. It has been heavily revised to reflect the latest changes in the rapidly changing computer industry. Professor Tanenbaum has maintained his popular method of presenting the computer as a hierarchy of levels, each with a well-defined function. The book is written in a style and level of detail that covers all the major areas, but is still accessible to a broad range of readers.
0 97浏览
会员免费 - Prentice Hall - Programming, Windows - Understanding DCOMThe goal of this book is to make COM and DCOM comprehendible to a normal person. If you have tried to learn COM and found its complexity to be totally unbelievable, or if you have ever tried to work with COM code and felt like you needed a Ph.D. in quantum physics just to get by, then you know exactly what this goal means. This book makes COM simple and accessible to the normal developer.
3 74浏览
会员免费 - A New Role-Based Access Control Model Using Attribute CertificateA New Role-Based Access Control Model Using Attribute Certificate.pdf
4 104浏览
会员免费 - MIL-STD-220-188link layer access controll,XNP using in narrow-band wireless network
0 133浏览
会员免费 - Building a Cisco Wireless LAN(syngress安全图书)Enable enterprise-wide information access using Cisco wireless networks Wireless networks are rapidly becoming a viable alternative to traditional wired LANs (Local Area Networks), mainly because of the convenience they provide. By implementing a wireless network, companies eliminate the need and expense of installing fixed cables, outlet ports or patch panels. Building a Cisco Wireless LAN is for individuals designing and supporting a Cisco wireless LAN. The book contains detailed information on the process for the thorough and accurate network design for the Cisco 340, 350, and UBR 7200 series. The contains detailed information on the configuration and troubleshooting of a Cisco WLAN installation. The book offers an introduction to wireless technology from the fundamental principles to the actual implementation. The first book for Cisco LAN users looking to upgrade to a wireless network Ideal for Network administrators looking into wireless network technology for the first time
5 72浏览
会员免费 - laBVIEW DAtabase 建库本文介绍了怎样在labview环境下建库,以及建库的时候的注意项等等
0 227浏览
会员免费 - Windows XP Professional Resource Kit:Managing Authorization and Access ControlWindows XP 权限设置英文版 The access control infrastructure of Windows XP Professional functions to balance the resource access and system security needs of an organization.
0 86浏览
会员免费 - ACCESS2003从入门到精通ACCESS2003从入门到精通,适合基础学习
5 174浏览
会员免费 - degital electronicsPreface xxi 1 Number Systems 1 1.1 Analogue Versus Digital 1 1.2 Introduction to Number Systems 2 1.3 Decimal Number System 2 1.4 Binary Number System 3 1.4.1 Advantages 3 1.5 Octal Number System 4 1.6 Hexadecimal Number System 4 1.7 Number Systems – Some Common Terms 4 1.7.1 Binary Number System 4 1.7.2 Decimal Number System 5 1.7.3 Octal Number System 5 1.7.4 Hexadecimal Number System 5 1.8 Number Representation in Binary 5 1.8.1 Sign-Bit Magnitude 5 1.8.2 1’s Complement 6 1.8.3 2’s Complement 6 1.9 Finding the Decimal Equivalent 6 1.9.1 Binary-to-Decimal Conversion 6 1.9.2 Octal-to-Decimal Conversion 6 1.9.3 Hexadecimal-to-Decimal Conversion 7 1.10 Decimal-to-Binary Conversion 7 1.11 Decimal-to-Octal Conversion 8 1.12 Decimal-to-Hexadecimal Conversion 9 1.13 Binary–Octal and Octal–Binary Conversions 9 1.14 Hex–Binary and Binary–Hex Conversions 10 1.15 Hex–Octal and Octal–Hex Conversions 10 1.16 The Four Axioms 11 1.17 Floating-Point Numbers 12 1.17.1 Range of Numbers and Precision 13 1.17.2 Floating-Point Number Formats 13 viii Contents Review Questions 17 Problems 17 Further Reading 18 2 Binary Codes 19 2.1 Binary Coded Decimal 19 2.1.1 BCD-to-Binary Conversion 20 2.1.2 Binary-to-BCD Conversion 20 2.1.3 Higher-Density BCD Encoding 21 2.1.4 Packed and Unpacked BCD Numbers 21 2.2 Excess-3 Code 21 2.3 Gray Code 23 2.3.1 Binary–Gray Code Conversion 24 2.3.2 Gray Code–Binary Conversion 25 2.3.3 n-ary Gray Code 25 2.3.4 Applications 25 2.4 Alphanumeric Codes 27 2.4.1 ASCII code 28 2.4.2 EBCDIC code 31 2.4.3 Unicode 37 2.5 Seven-segment Display Code 38 2.6 Error Detection and Correction Codes 40 2.6.1 Parity Code 41 2.6.2 Repetition Code 41 2.6.3 Cyclic Redundancy Check Code 41 2.6.4 Hamming Code 42 Review Questions 44 Problems 45 Further Reading 45 3 Digital Arithmetic 47 3.1 Basic Rules of Binary Addition and Subtraction 47 3.2 Addition of Larger-Bit Binary Numbers 49 3.2.1 Addition Using the 2’s Complement Method 49 3.3 Subtraction of Larger-Bit Binary Numbers 52 3.3.1 Subtraction Using 2’s Complement Arithmetic 53 3.4 BCD Addition and Subtraction in Excess-3 Code 57 3.4.1 Addition 57 3.4.2 Subtraction 57 3.5 Binary Multiplication 58 3.5.1 Repeated Left-Shift and Add Algorithm 59 3.5.2 Repeated Add and Right-Shift Algorithm 59 3.6 Binary Division 60 3.6.1 Repeated Right-Shift and Subtract Algorithm 61 3.6.2 Repeated Subtract and Left-Shift Algorithm 62 3.7 Floating-Point Arithmetic 64 3.7.1 Addition and Subtraction 65 3.7.2 Multiplication and Division 65 Contents ix Review Questions 67 Problems 68 Further Reading 68 4 Logic Gates and Related Devices 69 4.1 Positive and Negative Logic 69 4.2 Truth Table 70 4.3 Logic Gates 71 4.3.1 OR Gate 71 4.3.2 AND Gate 73 4.3.3 NOT Gate 75 4.3.4 EXCLUSIVE-OR Gate 76 4.3.5 NAND Gate 79 4.3.6 NOR Gate 79 4.3.7 EXCLUSIVE-NOR Gate 80 4.3.8 INHIBIT Gate 82 4.4 Universal Gates 85 4.5 Gates with Open Collector/Drain Outputs 85 4.6 Tristate Logic Gates 87 4.7 AND-OR-INVERT Gates 87 4.8 Schmitt Gates 88 4.9 Special Output Gates 91 4.10 Fan-Out of Logic Gates 95 4.11 Buffers and Transceivers 98 4.12 IEEE/ANSI Standard Symbols 100 4.12.1 IEEE/ANSI Standards – Salient Features 100 4.12.2 ANSI Symbols for Logic Gate ICs 101 4.13 Some Common Applications of Logic Gates 102 4.13.1 OR Gate 103 4.13.2 AND Gate 104 4.13.3 EX-OR/EX-NOR Gate 104 4.13.4 Inverter 105 4.14 Application-Relevant Information 107 Review Questions 109 Problems 110 Further Reading 114 5 Logic Families 115 5.1 Logic Families – Significance and Types 115 5.1.1 Significance 115 5.1.2 Types of Logic Family 116 5.2 Characteristic Parameters 118 5.3 Transistor Transistor Logic (TTL) 124 5.3.1 Standard TTL 125 5.3.2 Other Logic Gates in Standard TTL 127 5.3.3 Low-Power TTL 133 5.3.4 High-Power TTL (74H/54H) 134 5.3.5 Schottky TTL (74S/54S) 135 x Contents 5.3.6 Low-Power Schottky TTL (74LS/54LS) 136 5.3.7 Advanced Low-Power Schottky TTL (74ALS/54ALS) 137 5.3.8 Advanced Schottky TTL (74AS/54AS) 139 5.3.9 Fairchild Advanced Schottky TTL (74F/54F) 140 5.3.10 Floating and Unused Inputs 141 5.3.11 Current Transients and Power Supply Decoupling 142 5.4 Emitter Coupled Logic (ECL) 147 5.4.1 Different Subfamilies 147 5.4.2 Logic Gate Implementation in ECL 148 5.4.3 Salient Features of ECL 150 5.5 CMOS Logic Family 151 5.5.1 Circuit Implementation of Logic Functions 151 5.5.2 CMOS Subfamilies 165 5.6 BiCMOS Logic 170 5.6.1 BiCMOS Inverter 171 5.6.2 BiCMOS NAND 171 5.7 NMOS and PMOS Logic 172 5.7.1 PMOS Logic 173 5.7.2 NMOS Logic 174 5.8 Integrated Injection Logic (I2L) Family 174 5.9 Comparison of Different Logic Families 176 5.10 Guidelines to Using TTL Devices 176 5.11 Guidelines to Handling and Using CMOS Devices 179 5.12 Interfacing with Different Logic Families 179 5.12.1 CMOS-to-TTL Interface 179 5.12.2 TTL-to-CMOS Interface 180 5.12.3 TTL-to-ECL and ECL-to-TTL Interfaces 180 5.12.4 CMOS-to-ECL and ECL-to-CMOS Interfaces 183 5.13 Classification of Digital ICs 183 5.14 Application-Relevant Information 184 Review Questions 185 Problems 185 Further Reading 187 6 Boolean Algebra and Simplification Techniques 189 6.1 Introduction to Boolean Algebra 189 6.1.1 Variables, Literals and Terms in Boolean Expressions 190 6.1.2 Equivalent and Complement of Boolean Expressions 190 6.1.3 Dual of a Boolean Expression 191 6.2 Postulates of Boolean Algebra 192 6.3 Theorems of Boolean Algebra 192 6.3.1 Theorem 1 (Operations with ‘0’ and ‘1’) 192 6.3.2 Theorem 2 (Operations with ‘0’ and ‘1’) 193 6.3.3 Theorem 3 (Idempotent or Identity Laws) 193 6.3.4 Theorem 4 (Complementation Law) 193 6.3.5 Theorem 5 (Commutative Laws) 194 6.3.6 Theorem 6 (Associative Laws) 194 6.3.7 Theorem 7 (Distributive Laws) 195 Contents xi 6.3.8 Theorem 8 196 6.3.9 Theorem 9 197 6.3.10 Theorem 10 (Absorption Law or Redundancy Law) 197 6.3.11 Theorem 11 197 6.3.12 Theorem 12 (Consensus Theorem) 198 6.3.13 Theorem 13 (DeMorgan’s Theorem) 199 6.3.14 Theorem 14 (Transposition Theorem) 200 6.3.15 Theorem 15 201 6.3.16 Theorem 16 201 6.3.17 Theorem 17 (Involution Law) 202 6.4 Simplification Techniques 204 6.4.1 Sum-of-Products Boolean Expressions 204 6.4.2 Product-of-Sums Expressions 205 6.4.3 Expanded Forms of Boolean Expressions 206 6.4.4 Canonical Form of Boolean Expressions 206 6.4.5 and Nomenclature 207 6.5 Quine–McCluskey Tabular Method 208 6.5.1 Tabular Method for Multi-Output Functions 212 6.6 Karnaugh Map Method 216 6.6.1 Construction of a Karnaugh Map 216 6.6.2 Karnaugh Map for Boolean Expressions with a Larger Number of Variables 222 6.6.3 Karnaugh Maps for Multi-Output Functions 225 Review Questions 230 Problems 230 Further Reading 231 7 Arithmetic Circuits 233 7.1 Combinational Circuits 233 7.2 Implementing Combinational Logic 235 7.3 Arithmetic Circuits – Basic Building Blocks 236 7.3.1 Half-Adder 236 7.3.2 Full Adder 237 7.3.3 Half-Subtractor 240 7.3.4 Full Subtractor 242 7.3.5 Controlled Inverter 244 7.4 Adder–Subtractor 245 7.5 BCD Adder 246 7.6 Carry Propagation–Look-Ahead Carry Generator 254 7.7 Arithmetic Logic Unit (ALU) 260 7.8 Multipliers 260 7.9 Magnitude Comparator 261 7.9.1 Cascading Magnitude Comparators 263 7.10 Application-Relevant Information 266 Review Questions 266 Problems 267 Further Reading 268 xii Contents 8 Multiplexers and Demultiplexers 269 8.1 Multiplexer 269 8.1.1 Inside the Multiplexer 271 8.1.2 Implementing Boolean Functions with Multiplexers 273 8.1.3 Multiplexers for Parallel-to-Serial Data Conversion 277 8.1.4 Cascading Multiplexer Circuits 280 8.2 Encoders 280 8.2.1 Priority Encoder 281 8.3 Demultiplexers and Decoders 285 8.3.1 Implementing Boolean Functions with Decoders 286 8.3.2 Cascading Decoder Circuits 288 8.4 Application-Relevant Information 293 Review Questions 294 Problems 295 Further Reading 298 9 Programmable Logic Devices 299 9.1 Fixed Logic Versus Programmable Logic 299 9.1.1 Advantages and Disadvantages 301 9.2 Programmable Logic Devices – An Overview 302 9.2.1 Programmable ROMs 302 9.2.2 Programmable Logic Array 302 9.2.3 Programmable Array Logic 304 9.2.4 Generic Array Logic 305 9.2.5 Complex Programmable Logic Device 306 9.2.6 Field-Programmable Gate Array 307 9.3 Programmable ROMs 308 9.4 Programmable Logic Array 312 9.5 Programmable Array Logic 317 9.5.1 PAL Architecture 319 9.5.2 PAL Numbering System 320 9.6 Generic Array Logic 325 9.7 Complex Programmable Logic Devices 328 9.7.1 Internal Architecture 328 9.7.2 Applications 330 9.8 Field-Programmable Gate Arrays 331 9.8.1 Internal Architecture 331 9.8.2 Applications 333 9.9 Programmable Interconnect Technologies 333 9.9.1 Fuse 334 9.9.2 Floating-Gate Transistor Switch 334 9.9.3 Static RAM-Controlled Programmable Switches 335 9.9.4 Antifuse 335 9.10 Design and Development of Programmable Logic Hardware 337 9.11 Programming Languages 338 9.11.1 ABEL-Hardware Description Language 339 9.11.2 VHDL-VHSIC Hardware Description Language 339 Contents xiii 9.11.3 Verilog 339 9.11.4 Java HDL 340 9.12 Application Information on PLDs 340 9.12.1 SPLDs 340 9.12.2 CPLDs 343 9.12.3 FPGAs 349 Review Questions 352 Problems 353 Further Reading 355 10 Flip-Flops and Related Devices 357 10.1 Multivibrator 357 10.1.1 Bistable Multivibrator 357 10.1.2 Schmitt Trigger 358 10.1.3 Monostable Multivibrator 360 10.1.4 Astable Multivibrator 362 10.2 Integrated Circuit (IC) Multivibrators 363 10.2.1 Digital IC-Based Monostable Multivibrator 363 10.2.2 IC Timer-Based Multivibrators 363 10.3 R-S Flip-Flop 373 10.3.1 R-S Flip-Flop with Active LOW Inputs 374 10.3.2 R-S Flip-Flop with Active HIGH Inputs 375 10.3.3 Clocked R-S Flip-Flop 377 10.4 Level-Triggered and Edge-Triggered Flip-Flops 381 10.5 J-K Flip-Flop 382 10.5.1 J-K Flip-Flop with PRESET and CLEAR Inputs 382 10.5.2 Master–Slave Flip-Flops 382 10.6 Toggle Flip-Flop (T Flip-Flop) 390 10.6.1 J-K Flip-Flop as a Toggle Flip-Flop 391 10.7 D Flip-Flop 394 10.7.1 J-K Flip-Flop as D Flip-Flop 395 10.7.2 D Latch 395 10.8 Synchronous and Asynchronous Inputs 398 10.9 Flip-Flop Timing Parameters 399 10.9.1 Set-Up and Hold Times 399 10.9.2 Propagation Delay 399 10.9.3 Clock Pulse HIGH and LOW Times 401 10.9.4 Asynchronous Input Active Pulse Width 401 10.9.5 Clock Transition Times 402 10.9.6 Maximum Clock Frequency 402 10.10 Flip-Flop Applications 402 10.10.1 Switch Debouncing 402 10.10.2 Flip-Flop Synchronization 404 10.10.3 Detecting the Sequence of Edges 404 10.11 Application-Relevant Data 407 Review Questions 408 Problems 409 Further Reading 410 xiv Contents 11 Counters and Registers 411 11.1 Ripple (Asynchronous) Counter 411 11.1.1 Propagation Delay in Ripple Counters 412 11.2 Synchronous Counter 413 11.3 Modulus of a Counter 413 11.4 Binary Ripple Counter – Operational Basics 413 11.4.1 Binary Ripple Counters with a Modulus of Less than 2N 416 11.4.2 Ripple Counters in IC Form 418 11.5 Synchronous (or Parallel) Counters 423 11.6 UP/DOWN Counters 425 11.7 Decade and BCD Counters 426 11.8 Presettable Counters 426 11.8.1 Variable Modulus with Presettable Counters 428 11.9 Decoding a Counter 428 11.10 Cascading Counters 433 11.10.1 Cascading Binary Counters 433 11.10.2 Cascading BCD Counters 435 11.11 Designing Counters with Arbitrary Sequences 438 11.11.1 Excitation Table of a Flip-Flop 438 11.11.2 State Transition Diagram 439 11.11.3 Design Procedure 439 11.12 Shift Register 447 11.12.1 Serial-In Serial-Out Shift Register 449 11.12.2 Serial-In Parallel-Out Shift Register 452 11.12.3 Parallel-In Serial-Out Shift Register 452 11.12.4 Parallel-In Parallel-Out Shift Register 453 11.12.5 Bidirectional Shift Register 455 11.12.6 Universal Shift Register 455 11.13 Shift Register Counters 459 11.13.1 Ring Counter 459 11.13.2 Shift Counter 460 11.14 IEEE/ANSI Symbology for Registers and Counters 464 11.14.1 Counters 464 11.14.2 Registers 466 11.15 Application-Relevant Information 466 Review Questions 466 Problems 469 Further Reading 471 12 Data Conversion Circuits – D/A and A/D Converters 473 12.1 Digital-to-Analogue Converters 473 12.1.1 Simple Resistive Divider Network for D/A Conversion 474 12.1.2 Binary Ladder Network for D/A Conversion 475 12.2 D/A Converter Specifications 476 12.2.1 Resolution 476 12.2.2 Accuracy 477 12.2.3 Conversion Speed or Settling Time 477 12.2.4 Dynamic Range 478 Contents xv 12.2.5 Nonlinearity and Differential Nonlinearity 478 12.2.6 Monotonocity 478 12.3 Types of D/A Converter 479 12.3.1 Multiplying D/A Converters 479 12.3.2 Bipolar-Output D/A Converters 480 12.3.3 Companding D/A Converters 480 12.4 Modes of Operation 480 12.4.1 Current Steering Mode of Operation 480 12.4.2 Voltage Switching Mode of Operation 481 12.5 BCD-Input D/A Converter 482 12.6 Integrated Circuit D/A Converters 486 12.6.1 DAC-08 486 12.6.2 DAC-0808 487 12.6.3 DAC-80 487 12.6.4 AD 7524 489 12.6.5 DAC-1408/DAC-1508 489 12.7 D/A Converter Applications 490 12.7.1 D/A Converter as a Multiplier 490 12.7.2 D/A converter as a Divider 490 12.7.3 Programmable Integrator 491 12.7.4 Low-Frequency Function Generator 492 12.7.5 Digitally Controlled Filters 493 12.8 A/D Converters 495 12.9 A/D Converter Specifications 495 12.9.1 Resolution 495 12.9.2 Accuracy 496 12.9.3 Gain and Offset Errors 496 12.9.4 Gain and Offset Drifts 496 12.9.5 Sampling Frequency and Aliasing Phenomenon 496 12.9.6 Quantization Error 496 12.9.7 Nonlinearity 497 12.9.8 Differential Nonlinearity 497 12.9.9 Conversion Time 498 12.9.10 Aperture and Acquisition Times 498 12.9.11 Code Width 499 12.10 A/D Converter Terminology 499 12.10.1 Unipolar Mode Operation 499 12.10.2 Bipolar Mode Operation 499 12.10.3 Coding 499 12.10.4 Low Byte and High Byte 499 12.10.5 Right-Justified Data, Left-Justified Data 499 12.10.6 Command Register, Status Register 500 12.10.7 Control Lines 500 12.11 Types of A/D Converter 500 12.11.1 Simultaneous or Flash A/D Converters 500 12.11.2 Half-Flash A/D Converter 503 12.11.3 Counter-Type A/D Converter 504 12.11.4 Tracking-Type A/D Converter 505 xvi Contents 12.11.5 Successive Approximation Type A/D Converter 505 12.11.6 Single-, Dual- and Multislope A/D Converters 506 12.11.7 Sigma-Delta A/D Converter 509 12.12 Integrated Circuit A/D Converters 513 12.12.1 ADC-0800 513 12.12.2 ADC-0808 514 12.12.3 ADC-80/AD ADC-80 515 12.12.4 ADC-84/ADC-85/AD ADC-84/AD ADC-85/AD-5240 516 12.12.5 AD 7820 516 12.12.6 ICL 7106/ICL 7107 517 12.13 A/D Converter Applications 520 12.13.1 Data Acquisition 521 Review Questions 522 Problems 523 Further Reading 523 13 Microprocessors 525 13.1 Introduction to Microprocessors 525 13.2 Evolution of Microprocessors 527 13.3 Inside a Microprocessor 528 13.3.1 Arithmetic Logic Unit (ALU) 529 13.3.2 Register File 529 13.3.3 Control Unit 531 13.4 Basic Microprocessor Instructions 531 13.4.1 Data Transfer Instructions 531 13.4.2 Arithmetic Instructions 532 13.4.3 Logic Instructions 533 13.4.4 Control Transfer or Branch or Program Control Instructions 533 13.4.5 Machine Control Instructions 534 13.5 Addressing Modes 534 13.5.1 Absolute or Memory Direct Addressing Mode 534 13.5.2 Immediate Addressing Mode 535 13.5.3 Register Direct Addressing Mode 535 13.5.4 Register Indirect Addressing Mode 535 13.5.5 Indexed Addressing Mode 536 13.5.6 Implicit Addressing Mode and Relative Addressing Mode 537 13.6 Microprocessor Selection 537 13.6.1 Selection Criteria 537 13.6.2 Microprocessor Selection Table for Common Applications 539 13.7 Programming Microprocessors 540 13.8 RISC Versus CISC Processors 541 13.9 Eight-Bit Microprocessors 541 13.9.1 8085 Microprocessor 541 13.9.2 Motorola 6800 Microprocessor 544 13.9.3 Zilog Z80 Microprocessor 546 13.10 16-Bit Microprocessors 547 13.10.1 8086 Microprocessor 547 13.10.2 80186 Microprocessor 548 Contents xvii 13.10.3 80286 Microprocessor 548 13.10.4 MC68000 Microprocessor 549 13.11 32-Bit Microprocessors 551 13.11.1 80386 Microprocessor 551 13.11.2 MC68020 Microprocessor 553 13.11.3 MC68030 Microprocessor 554 13.11.4 80486 Microprocessor 555 13.11.5 PowerPC RISC Microprocessors 557 13.12 Pentium Series of Microprocessors 557 13.12.1 Salient Features 558 13.12.2 Pentium Pro Microprocessor 559 13.12.3 Pentium II Series 559 13.12.4 Pentium III and Pentium IV Microprocessors 559 13.12.5 Pentium M, D and Extreme Edition Processors 559 13.12.6 Celeron and Xeon Processors 560 13.13 Microprocessors for Embedded Applications 560 13.14 Peripheral Devices 560 13.14.1 Programmable Timer/Counter 561 13.14.2 Programmable Peripheral Interface 561 13.14.3 Programmable Interrupt Controller 561 13.14.4 DMA Controller 561 13.14.5 Programmable Communication Interface 562 13.14.6 Math Coprocessor 562 13.14.7 Programmable Keyboard/Display Interface 562 13.14.8 Programmable CRT Controller 562 13.14.9 Floppy Disk Controller 563 13.14.10 Clock Generator 563 13.14.11 Octal Bus Transceiver 563 Review Questions 563 Further Reading 564 14 Microcontrollers 565 14.1 Introduction to the Microcontroller 565 14.1.1 Applications 567 14.2 Inside the Microcontroller 567 14.2.1 Central Processing Unit (CPU) 568 14.2.2 Random Access Memory (RAM) 569 14.2.3 Read Only Memory (ROM) 569 14.2.4 Special-Function Registers 569 14.2.5 Peripheral Components 569 14.3 Microcontroller Architecture 574 14.3.1 Architecture to Access Memory 574 14.3.2 Mapping Special-Function Registers into Memory Space 576 14.3.3 Processor Architecture 577 14.4 Power-Saving Modes 579 14.5 Application-Relevant Information 580 14.5.1 Eight-Bit Microcontrollers 580 14.5.2 16-Bit Microcontrollers 588 xviii Contents 14.5.3 32-Bit Microcontrollers 590 14.6 Interfacing Peripheral Devices with a Microcontroller 592 14.6.1 Interfacing LEDs 592 14.6.2 Interfacing Electromechanical Relays 593 14.6.3 Interfacing Keyboards 594 14.6.4 Interfacing Seven-Segment Displays 596 14.6.5 Interfacing LCD Displays 598 14.6.6 Interfacing A/D Converters 600 14.6.7 Interfacing D/A Converters 600 Review Questions 602 Problems 602 Further Reading 603 15 Computer Fundamentals 605 15.1 Anatomy of a Computer 605 15.1.1 Central Processing Unit 605 15.1.2 Memory 606 15.1.3 Input/Output Ports 607 15.2 A Computer System 607 15.3 Types of Computer System 607 15.3.1 Classification of Computers on the Basis of Applications 607 15.3.2 Classification of Computers on the Basis of the Technology Used 608 15.3.3 Classification of Computers on the Basis of Size and Capacity 609 15.4 Computer Memory 610 15.4.1 Primary Memory 611 15.5 Random Access Memory 612 15.5.1 Static RAM 612 15.5.2 Dynamic RAM 619 15.5.3 RAM Applications 622 15.6 Read Only Memory 622 15.6.1 ROM Architecture 623 15.6.2 Types of ROM 624 15.6.3 Applications of ROMs 629 15.7 Expanding Memory Capacity 632 15.7.1 Word Size Expansion 632 15.7.2 Memory Location Expansion 634 15.8 Input and Output Ports 637 15.8.1 Serial Ports 638 15.8.2 Parallel Ports 640 15.8.3 Internal Buses 642 15.9 Input/Output Devices 642 15.9.1 Input Devices 643 15.9.2 Output Devices 643 15.10 Secondary Storage or Auxiliary Storage 645 15.10.1 Magnetic Storage Devices 645 15.10.2 Magneto-Optical Storage Devices 648 15.10.3 Optical Storage Devices 648 15.10.4 USB Flash Drive 650 Contents xix Review Questions 650 Problems 650 Further Reading 651 16 Troubleshooting Digital Circuits and Test Equipment 653 16.1 General Troubleshooting Guidelines 653 16.1.1 Faults Internal to Digital Integrated Circuits 654 16.1.2 Faults External to Digital Integrated Circuits 655 16.2 Troubleshooting Sequential Logic Circuits 659 16.3 Troubleshooting Arithmetic Circuits 663 16.4 Troubleshooting Memory Devices 664 16.4.1 Troubleshooting RAM Devices 664 16.4.2 Troubleshooting ROM Devices 664 16.5 Test and Measuring Equipment 665 16.6 Digital Multimeter 665 16.6.1 Advantages of Using a Digital Multimeter 666 16.6.2 Inside the Digital Meter 666 16.6.3 Significance of the Half-Digit 666 16.7 Oscilloscope 668 16.7.1 Importance of Specifications and Front-Panel Controls 668 16.7.2 Types of Oscilloscope 669 16.8 Analogue Oscilloscopes 669 16.9 CRT Storage Type Analogue Oscilloscopes 669 16.10 Digital Oscilloscopes 669 16.11 Analogue Versus Digital Oscilloscopes 672 16.12 Oscilloscope Specifications 672 16.12.1 Analogue Oscilloscopes 673 16.12.2 Analogue Storage Oscilloscope 674 16.12.3 Digital Storage Oscilloscope 674 16.13 Oscilloscope Probes 677 16.13.1 Probe Compensation 677 16.14 Frequency Counter 678 16.14.1 Universal Counters – Functional Modes 679 16.14.2 Basic Counter Architecture 679 16.14.3 Reciprocal Counters 681 16.14.4 Continuous-Count Counters 682 16.14.5 Counter Specifications 682 16.14.6 Microwave Counters 683 16.15 Frequency Synthesizers and Synthesized Function/Signal Generators 684 16.15.1 Direct Frequency Synthesis 684 16.15.2 Indirect Synthesis 685 16.15.3 Sampled Sine Synthesis (Direct Digital Synthesis) 687 16.15.4 Important Specifications 689 16.15.5 Synthesized Function Generators 689 16.15.6 Arbitrary Waveform Generator 690 16.16 Logic Probe 691 16.17 Logic Analyser 692 16.17.1 Operational Modes 692 xx Contents 16.17.2 Logic Analyser Architecture 692 16.17.3 Key Specifications 695 16.18 Computer–Instrument Interface Standards 696 16.18.1 IEEE-488 Interface 696 16.19 Virtual Instrumentation 697 16.19.1 Use of Virtual Instruments 698 16.19.2 Components of a Virtual Instrument 700 Review Questions 703 Problems 704 Further Reading 705 Index 707
0 348浏览
会员免费 - Computational Methods for Nanoscale Applications: Particles, Plasmons and WavesComputational Methods for Nanoscale Applications: Particles, Plasmons and Waves presents new perspectives on modern nanoscale problems where fundamental science meets technology and computer modeling. This book describes well-known computational techniques such as finite-difference schemes, finite element analysis and Ewald summation, as well as a new finite-difference calculus of Flexible Local Approximation MEthods (FLAME) that qualitatively improves the numerical accuracy in a variety of problems. Application areas in the book include long-range particle interactions in homogeneous and heterogeneous media, electrostatics of colloidal systems, wave propagation in photonic crystals, photonic band structure, plasmon field enhancement, and metamaterials with backward waves and negative refraction. Computational Methods for Nanoscale Applications is accessible to specialists and graduate students in diverse areas of nanoscale science and technology, including physics, engineering, chemistry, and applied mathematics. In addition, several advanced topics will be of particular interest to the expert reader.
0 131浏览
会员免费 - 一篇Mobile GIS的资料ABSTRACT Methods for land use inventory have been already trellised in the past within the frame of many EU projects (MARS, CORINE, FIRS). There are a technology based on an Earth remote sensing method issuing from data purchased in the past. The inventory is based particularly on the use of SPOT, Thematic Mapper (or another RS data) multi-temporary data analysis combined with the use of another spatial data. Basic tool, used for such analysis methods, is the Geographic Information System (GIS). In connection with on line wireless data access, it can bring new quality into interpretation and controlling process. Such systems enable to gather and analyse effectively all available data on the landscape and based on these analyses These are objective of the WirelessInfo project (IST 1999-21056 Wirelessinfo), which offer new possibilities of implementation of mobile communications into remote sensing data interpretation). The whole project is oriented on the connection of GIS platforms with wireless communication (GSM, GPRS). The solution will be based on using open GIS platforms and different sources of communication.
0 99浏览
会员免费 - dbaccess 工具的使用.pdfdbaccess 工具的使用.pdf dbaccess 工具的使用.pdf dbaccess 工具的使用.pdf
5 157浏览
会员免费 - 企业电话语音录音管理系统(PDF)PDF全程指导,教你实现该功能 可以学习到: 对话框的显示 将程序放置在系统托盘中 自绘按钮控件 开发语音卡 播放音频文件 里面有源代码,只是需要你自己去复制出来
5 154浏览
会员免费 - Wireless Cooperative NetworksThis special issue aims to collect cutting-edge research achievements in this area. We solicited papers that present original and unpublished work on topics including, but not limited to, the following: physical layer models, for example, channel models (statistics, fading, MIMO, feedback); device constraints (power, energy, multiple access, synchronization) and resource management; distributed processing for cooperative networks (e.g., distributed compression in wireless sensor networks, channel and network codes design); performance metrics (e.g., capacity, cost,outage, delay, energy, scaling laws); cross-layer issues, for example, PHY/MAC/NET interactions, joint source-channel coding, separation theorems; multiterminal information theory; multihop communications; integration of wireless heterogeneous (long- and short-range) systems.
4 144浏览
会员免费 - WDM-PON关键技术Key Technologies of WDM-PON for Future Converged Optical Broadband Access Networks J.Lightwave technology 1(4),209
0 124浏览
会员免费 - Bluetooth Application Developer’s Guide The Short Range Interconnect Solution(syngress安全图书)"Bluetooth (enabled devices) will ship in the billions of units once it gains momentum." - Martin Reynolds, Gartner Group Bluetooth is the most exciting development in wireless computing this decade! Bluetooth enabled devices can include everything from network servers, laptop computers and PDAs, to stereos and home security systems. Most Bluetooth products to hit the market in 2001 will be PC cards for laptop computers and access points, which allow up to seven Bluetooth devices to connect to a network. Reports indicate that by the end of 2003 there will be over 2 billion Bluetooth-enabled devices. Bluetooth-enabled devices communicate with each other through embedded software applications. Bluetooth Developer's Guide to Embedded Applications will provide embedded applications developers with advanced tutorials and code listings written to the latest Bluetooth's latest specification, version 1.1. Written by Bluetooth pioneers from market leaders in Bluetooth software development, Extended Systems and Cambridge Silicon Radio, this is the first advanced level Bluetooth developer title on the market. White Hot Topic!.While other books introduce readers to the possibilities of Bluetooth, this is the first comprehensive, advanced level programming book written specifically for embedded application developers Authors are responsible for SDK, the market-leading development tool for Bluetooth Comes with Syngress' revolutionary Credit Card CD containing a printable HTML version of the book, all of the source code and sample applications from Extended Systems and Cambridge Silicon Radio
4 82浏览
会员免费 - OPC接口技术规范(下)中文版的OPC Data Access 规范
4 137浏览
会员免费 - CAD电气图中常用符号CAD电气图中常用符号,表1 电气图中常用的双字母符号辅助文字符号
4 229浏览
会员免费 - 微分几何EguchiHanson微分几何经典著作,作者是该领域知名学者专家,该书系统
0 123浏览
会员免费 - symantec 管理员应用手册中文版赛门铁克中文版管理员手册,Symantec™ Endpoint Protection 及 Symantec Network Access Control 管理指南
0 144浏览
会员免费 - 《数据挖掘实用机器学习技术》(原书第2版) [高清ebook,非扫描, ]《数据挖掘实用机器学习技术》(原书第2版)介绍数据挖掘的基本理论与实践方法。主要内容包括:各种模型(决策树、关联规则、线性模型、聚类、贝叶斯网以及神经网络)以及在实践中的运用,所存在缺陷的分析。安全地清理数据集、建立以及评估模型的预测质量的方法,并且提供了一个公开的数据挖掘工作平台Weka。Weka系统拥有进行数据挖掘任务的图形用户界面,有助于理解模型,是一个实用并且深受欢迎的工具。 编辑推荐 正如所有受到商业注目的新兴技术一样,数据挖掘的运用也是极其多样化的。言过其实的报导声称可以建立算法,在数据的海洋里发现秘密。但事实上机器学习中没有魔术,没有隐藏的力量,没有炼金术。有的只是一些可以将有用的信息从原始数据中提炼出来的清晰明了的实用技术。《数据挖掘实用机器学习技术》(原书第2版)叙述了这些技术并展示了它们是如何工作的。 《数据挖掘实用机器学习技术》(原书第2版)对1999年的初版做了重大的改动。虽说核心概念没有变化,但《数据挖掘实用机器学习技术》(原书第2版)做了更新,反映出过去五年的变化。《数据挖掘实用机器学习技术》(原书第2版)提供了机器学习理论概念的完整基础,此外还对实际工作中应用的相关工具和技术提了一些建议。 《数据挖掘实用机器学习技术》(原书第2版)逻辑严密、内容翔实、极富实践性,适合作为高等学校本科生或研究生的教材,也可供相关技术人员参考。 作者简介 作者:(新西兰)威滕 弗兰克 Ian H.Witten,新西兰怀卡托大学计算机科学系教授,ACM和新西兰皇家学会成员,曾荣获2004年国际信息处理研究协会(IFIP)颁发的Namur奖项。他的著作包括《Managing Gigabytes:Compressirlg and Indexing Documents and Images》、《How to Build a Digital Library》以及众多的期刊和学会文章。 目录 出版者的话 专家指导委员会 译者序 中文版前言 序 前言 第一部分 机器学习工具与技术 第1章 绪论 1.1数据挖掘和机器学习 1.1.1描述结构模式 1.1.2机器学习 1.1.3数据挖掘 1.2简单的例子:天气问题和其他 1.2.1天气问题 1.2.2隐形眼镜:一个理想化的问题 1.2.3鸢尾花:一个经典的数值型数据集 1.2.4CPU性能:介绍数值预测 1.2.5劳资协商:一个更真实的例子 1.2.6大豆分类:一个经典的机器学习的成功例子 1.3应用领域 1.3.1决策包含评判 1.3.2图像筛选 1.3.3负载预测 1.3.4诊断 1.3.5市场和销售 1.3.6其他应用 1.4机器学习和统计学 1.5用于搜索的概括 1.5.1枚举概念空间 1.5.2偏差 1.6数据挖掘和道德 1.7补充读物 第2章 输入:概念、实例和属性 2.1概念 2.2样本 2.3属性 2.4输入准备 2.4.1数据收集 2.4.2 ARFF格式 2.4.3稀疏数据 2.4.4属性类型 2.4.5残缺值 2.4.6不正确的值 2.4.7了解数据 2.5补充读物 第3章 输出:知识表达 3.1决策表 3.2决策树 3.3分类规则 3.4关联规则 3.5包含例外的规则 3.6包含关系的规则 3.7数值预测树 3.8基于实例的表达 3.9聚类 3.10补充读物 第4章 算法:基本方法 4.1推断基本规则 4.1.1残缺值和数值属性 4.1.2讨论 4.2统计建模 4.2.1残缺值和数值属性 4.2.2用于文档分类的贝叶斯模型 4.2.3讨论 4.3分治法:创建决策树 4.3.1计算信息量 4.3.2高度分支属性 4.3.3讨论 …… 第5章 可信度:评估机器学习结果 第6章 实现:真正的机器学习方案 第7章 转换:处理输入和输出 第8章 继续:扩展和应用 第二部分 Weka机器学习平台 第9章 weka简介 第10章 Explorer界面 第11章 Knowledge Flow界面 第12章 Experimenter界面 第13章 命令行界面 第14章 嵌入式机器学习 第15章 编写新学习方案 参考文献 索引 Editorial Reviews Review "This book presents this new discipline in a very accessible form: both as a text to train the next generation of practitioners and researchers, and to inform lifelong learners like myself. Witten and Frank have a passion for simple and elegant solutions. They approach each topic with this mindset, grounding all concepts in concrete examples, and urging the reader to consider the simple techniques first, and then progress to the more sophisticated ones if the simple ones prove inadequate. If you have data that you want to analyze and understand, this book and the associated Weka toolkit are an excellent way to start." - From the foreword by Jim Gray, Microsoft Research "It covers cutting-edge, data mining technology that forward-looking organizations use to successfully tackle problems that are complex, highly dimensional, chaotic, non-stationary (changing over time), or plagued by. The writing style is well-rounded and engaging without subjectivity, hyperbole, or ambiguity. I consider this book a classic already!" - Dr. Tilmann Bruckhaus, StickyMinds.com Book Description Highly anticipated second edition of the highly-acclaimed reference on data mining and machine learning. Product Description As with any burgeoning technology that enjoys commercial attention, the use of data mining is surrounded by a great deal of hype. Exaggerated reports tell of secrets that can be uncovered by setting algorithms loose on oceans of data. But there is no magic in machine learning, no hidden power, no alchemy. Instead there is an identifiable body of practical techniques that can extract useful information from raw data. This book describes these techniques and shows how they work. The book is a major revision of the first edition that appeared in 1999. While the basic core remains the same, it has been updated to reflect the changes that have taken place over five years, and now has nearly double the references. The highlights for the new edition include thirty new technique sections; an enhanced Weka machine learning workbench, which now features an interactive interface; comprehensive information on neural networks; a new section on Bayesian networks; plus much more. * Algorithmic methods at the heart of successful data mining-including tried and true techniques as well as leading edge methods * Performance improvement techniques that work by transforming the input or output * Downloadable Weka, a collection of machine learning algorithms for data mining tasks, including tools for data pre-processing, classification, regression, clustering, association rules, and visualization-in a new, interactive interface From the Back Cover This book presents this new discipline in a very accessible form: both as a text to train the next generation of practitioners and researchers, and to inform lifelong learners like myself. Witten and Frank have a passion for simple and elegant solutions. They approach each topic with this mindset, grounding all concepts in concrete examples, and urging the reader to consider the simple techniques first, and then progress to the more sophisticated ones if the simple ones prove inadequate. If you have data that you want to analyze and understand, this book and the associated Weka toolkit are an excellent way to start. --From the foreword by Jim Gray, Microsoft Research As with any burgeoning technology that enjoys commercial attention, the use of data mining is surrounded by a great deal of hype. Exaggerated reports tell of secrets that can be uncovered by setting algorithms loose on oceans of data. But there is no magic in machine learning, no hidden power, no alchemy. Instead there is an identifiable body of practical techniques that can extract useful information from raw data. This book describes these techniques and shows how they work. The book is a major revision of the first edition that appeared in 1999. While the basic core remains the same, it has been updated to reflect the changes that have taken place over five years, and now has nearly double the references. The highlights for the new edition include thirty new technique sections; an enhanced Weka machine learning workbench, which now features an interactive interface; comprehensive information on neural networks; a new section on Bayesian networks; plus much more. Offering a thorough grounding in machine learning concepts as well as practical advice on applying the tools and techniques, inside you'll find: + Algorithmic methods at the heart of successful data mining-including tried and true techniques as well as leading edge methods; + Performance improvement techniques that work by transforming the input or output; + Downloadable Weka, a collection of machine learning algorithms for data mining tasks, including tools for data pre-processing, classification, regression, clustering, association rules, and visualization-in a new, interactive interface. About the Author Ian H. Witten is a professor of computer science at the University of Waikato in New Zealand. He directs the New Zealand Digital Library research project. His research interests include information retrieval, machine learning, text compression, and programming by demonstration. He received an MA in Mathematics from Cambridge University, England; an MSc in Computer Science from the University of Calgary, Canada; and a PhD in Electrical Engineering from Essex University, England. He is a fellow of the ACM and of the Royal Society of New Zealand. He has published widely on digital libraries, machine learning, text compression, hypertext, speech synthesis and signal processing, and computer typography. He has written several books, the latest being Managing Gigabytes (1999) and Data Mining (2000), both from Morgan Kaufmann. Eibe Frank is a researcher in the Machine Learning group at the University of Waikato. He holds a degree in computer science from the University of Karlsruhe in Germany and is the author of several papers, both presented at machine learning conferences and published in machine learning journals. http://www.amazon.com/Data-Mining-Practical-Techniques-Management/dp/0120884070/ref=sr_1_1?ie=UTF8&s=books&qid=1277222917&sr=8-1 http://www.amazon.cn/gp/product/B00114B30K?ver=gp&qid=1277222740&ref_=sr_1_3&sr=8-3&s=books
0 0浏览
会员免费 - Microsoft Access 2013 for DommiesMicrosoft Access 2013 for Dommies, PDF电子书
5 94浏览
会员免费 - An Access Control Model of Web-based Collaborative Design SystemAn Access Control Model of Web-based Collaborative Design System.pdf
3 65浏览
会员免费 - 汇川MD380矢量变频器本文主要讲述汇川MD320系列矢量变频器在共直流母线上的应用,在传动系统中,由于某些机械件的惯量也较大,负荷间会互相影响和干扰,使得系统的扰动大大增加,从而使得有些传动工作方式在电动和发电之间变化。共直流母线技术则是使能量通过母线流动供其它传动使用,以达到节能、提高设备运行可靠性、减少设备维护量和设备的占地面积等目的。
0 809浏览
会员免费 - OPC UA Part 11 - Historical Access 1.00 SpecificationOPC UA Part 11 这是第11篇。 是英文资料来着哈。
0 74浏览
会员免费 - GUI实验数据处理利用GUI处理实验数据,是个能是实验简化的系统工具
0 84浏览
会员免费 - Broadband Cable Access Networks, Volume 5 The HFC Plant关于HFC双向网的国外教材 This book focuses broadband distribution systems architecture concentrates practical concepts that will allow reader do ir own design, improvement, troubleshooting work. The objective is enhance skill sets a large population that designs builds broadband cable plants, well those maintaining troubleshooting it. A large cross-section technical personnel who need learn se skills design, maintain, service HFC systems from signal creation through transmission reception processing at customer end point. In addition, data/voice video specialists need master reference basics HFC design distribution before contending with intricacies of ir own unique services. This book serves an essential reference all cable engineers-those who specifically design maintain HFC distribution plant well those primarily concerned data/voice technology well video technology. Included an online component consisting spreadsheets that were used developing material presented in book.
5 82浏览
会员免费 - EPON Ethernet Passive Optical NetworkEthernet passive optical networks are an emerging access network technology that provides a low-cost method of deploying optical access link between a carrier's office and a customer sit.
0 70浏览
会员免费 - EXCEL_PIVOT_TABLE数据透视资料。。数据透视图资料。数据组合方法。。
4 164浏览
会员免费 - Novell Access Manager 产品介绍Novell Access Manager 产品介绍
0 205浏览
会员免费 - Designing role-based access control policies with UML.pdfRBAC UML实现。一个英文文章,想研究的可以看看。
4 79浏览
会员免费 - 基于直接配点法的再入轨迹优化设计一篇关于轨迹优化的论文,用的是直接配点法
0 382浏览
会员免费 - IDES使用ABAP设置N久前与了一篇Access Key破解的文章,与上网相关的破解文章多有雷同,但有论叙破解的深层原理,这些并不高深的东西,一点就破,最终没有发表。 因为学习业务的缘故从SAP NetWeaver 7.0 ABAP Trial Version再度改用R/3 4.71,Access Key真是个讨人厌的东西,以前的破解方式使用起来还是不太方便,如果操作失败了会是件很上火的事情。
4 81浏览
会员免费 - Mastering.Microsoft.Office.Access.2007.Development.May.2007经典的Access入门书籍,也覆盖了很多Access高级应用技术,英文原版
5 53浏览
会员免费 - 关于Microsoft_Office_Access的使用方法该文档描述了Access 2007的一些基本用法,简洁明了,介绍清晰!
0 697浏览
会员免费 - Springer.Learning.from.Data.Streams.Processing.Techniques.in.Sensor.Networks.Nov.2007.pdfData streams are everywhere these days. Look around and you will find sources of information that are continuously generating data. Our everyday life is now getting stuffed with devices that are emanating many data streams. Cell-phones, cars, security sensors, and televisions are just some examples. More are on their way. Smart houses of the future are likely to have many different types of sensors for sensing and adapting the domestic services to the changing needs of the inhabitants. For example, artificial motion, audio, and visual sensory systems are already being used to revolutionize the face of assisted at-home living for senior citizens. Cars are also increasingly becoming rich sources of data. The vehicle data bus and onboard GPS devices are tapped for extracting vehicle-health, fuel consumption, driver behavior, and location-dependent data. Data streams are common in many commercial and law-enforcement-related surveillance applications. Many of the public places that we often visit (e.g. airports, metros) and places where we work are monitored round the clock using various types of sensors. Perimeters of secured establishments and borders of countries are getting monitored using sensors. Wearable computers embedded in clothes and accessories for measuring our body parameters are increasingly getting popular among sport enthusiasts, patients, military, and researchers studying human computer interaction. In short, data streams are widely prevalent and in fact these days it is somewhat hard to find any source of information that does not generate continuous streams of data.
0 99浏览
会员免费 - OPC_DA_Auto_2.02_Specificationthe OPC DataAccess Automation Specification 2.02 opcda自动接口手册
5 117浏览
会员免费 - VC++使用ADO开发ACCESS数据库VC++使用ADO开发ACCESS数据库 不错的资料 也感谢作者的奉献
5 55浏览
会员免费 - OPC DA 2.01 版OPC Data Access Automation Interface Standard Version 2.01
5 112浏览
会员免费 - ARMA模型及其应用ARMA模型和应用,关于数据分析的理论
4 551浏览
会员免费 - A Temporal Role-Based Access Control ModelA Temporal Role-Based Access Control Model.pdf
0 83浏览
会员免费 - SFF-8472 V9.4协议光纤通讯用协议 This document defines an enhanced digital diagnostic monitoring interface for optical transceivers that allows real time access to device operating parameters. It also adds new options to the previously defined serial ID memory map that accommodate new transceiver types that were not considered in the SFP MSA or GBIC documents. The interface is an extension of the serial ID interface defined in the GBIC specification as well as the SFP MSA. Both specifications define a 256 byte memory map in EEPROM which is accessible over a 2 wire serial interface at the 8 bit address 1010000X (A0h). The digital diagnostic monitoring interface makes use of the 8 bit address 1010001X (A2h), so the originally defined serial ID memory map remains unchanged. The interface is backward compatible with both the GBIC specification and the SFP MSA.
5 184浏览
会员免费 - PIM管理配置向导Before you start the process, you may want to start with your options. Funambol server installers<br>come in two distinct packages:<br>•A server-only package for use on an operational application server<br>•An all-components-included package for use on a previously unused host<br>Why two packages? Each package allows you to download and install just what you need. If you are managing an extensive network and want to add a Funambol Data Synchronization server to an operational application server, you’ll choose the server-only package. This allows you to install just the DS server, and then efficiently set it up for real-world use—including links to existing databases (Oracle, Domino, Exchange) for user information and data.<br>However, if you want to evaluate the Funambol server’s operations before committing, and you have a local host that isn’t in use already, you’ll choose the full “bundle”. This package includes all the required software resources and a set of accessorie
0 82浏览
会员免费 - 红外、拉曼原理与分析(英文版)英文格式的检测方法分析,帮助你更好的全面的理解现代测试方法
5 178浏览
会员免费 - YDT 1822-2008 信息无障碍 身体机能差异人群 网站设计无障碍评级测试方法网站无障碍检测办法 国家标准 信息无障碍 WCAG
5 298浏览
会员免费 - mmap and DMAmmap and DMA:This chapter delves into the area of Linux memory management, with an emphasis on techniques that are useful to the device driver writer. The material in this chapter is somewhat advanced, and not everybody will need a grasp of it. Nonetheless, many tasks can only be done through digging more deeply into the memory management subsystem; it also provides an interesting look into how an important part of the kernel works. The material in this chapter is divided into three sections. The first covers the implementation of the mmap system call, which allows the mapping of device memory directly into a user process’s address space. We then cover the kernel kiobuf mechanism, which provides direct access to user memory from kernel space. The kiobuf system may be used to implement ‘‘raw I/O’’ for certain kinds of devices. The final section covers direct memory access (DMA) I/O operations, which essentially provide peripherals with direct access to system memory. Of course, all of these techniques requir e an understanding of how Linux memory management works, so we start with an overview of that subsystem.
0 95浏览
会员免费 - 中文Access.2003案例经典中文Access.2003案例经典 中文Access.2003案例经典
4 146浏览
会员免费 - lm331说明书介绍lm331芯片工作原理,外围电路,作用及参数
1 263浏览
会员免费 - 重装系统后必做的六件事.pdf该书介绍了系统重装之后应该注意的事项,可以让初级者也学会装系统!
0 96浏览
会员免费 - The KDE User GuideThe KDE User Guide<br><br>I Introduction 1<br>1 Welcometothe KDEUserGuide 2<br>1.1 What this book aims to be . . . . . . . . . . . . . . . . . . . . . . 2<br>1.2 What this book isnot . . . . . . . . . . . . . . . . . . . . . . . . . 2<br>1.3 Conventionsused inthis book . . . . . . . . . . . . . . . . . . . . 3<br>1.4 SystemLocations . . . . . . . . . . . . . . . . . . . . . . . . . . . 3<br>1.5 Overview,or‘Wheretolook in the User Guide’ . . . . . . . . . . 4<br>II TheDesktop 5<br>2 TheBasics 6<br>2.1 LoggingInandLoggingOut . . . . . . . . . . . . . . . . . . . . 7<br>2.1.1 Loggingin Graphically . . . . . . . . . . . . . . . . . . . 7<br>2.1.2 Loggingin viatheCommandLine . . . . . . . . . . . . . 7<br>2.1.3 LoggingOut . . . . . . . . . . . . . . . . . . . . . . . . . . 7<br>2.2 GettingHelp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8<br>2.2.1 UserManuals . . . . . . . . . . . . . . . . . . . . . . . . . 8<br>2.2.2 Contextand‘What’s This’ Help . . . . . . . . . . . . . . . 8<br>2.2.2.1 Tooltips . . . . . . . . . . . . . . . . . . . . . . . 8<br>2.2.2.2 ‘What’s This?’ . . . . . . . . . . . . . . . . . . . 9<br>2.2.3 MailingLists, NewsgroupsandIRC . . . . . . . . . . . . 9<br>2.2.3.1 MailingLists . . . . . . . . . . . . . . . . . . . . 9<br>2.2.3.2 IRC . . . . . . . . . . . . . . . . . . . . . . . . . 10<br>2.2.4 MoreResources . . . . . . . . . . . . . . . . . . . . . . . . 10<br>2.3 Windows,HowToWorkThem . . . . . . . . . . . . . . . . . . . 10<br>2.3.1 BasicWindowManagement . . . . . . . . . . . . . . . . . 10<br><br>TheKDEUser Guide<br>2.3.1.1 Switching BetweenWindows . . . . . . . . . . 11<br>2.3.1.2 MovingWindows . . . . . . . . . . . . . . . . . 11<br>2.3.1.3 Resizing Windows . . . . . . . . . . . . . . . . . 12<br>2.3.1.4 HidingWindows . . . . . . . . . . . . . . . . . . 13<br>2.3.1.5 CascadingWindows . . . . . . . . . . . . . . . . 13<br>2.3.1.6 UnclutteringWindows . . . . . . . . . . . . . . 13<br>2.3.1.7 Closing Windows . . . . . . . . . . . . . . . . . 14<br>2.3.2 AdvancedWindow Management . . . . . . . . . . . . . . 14<br>2.3.2.1 kstart . . . . . . . . . . . . . . . . . . . . . . . . 14<br>2.3.2.2 Other SpecialWindowSettings . . . . . . . . . 15<br>2.3.2.3 The System Tray . . . . . . . . . . . . . . . . . . 15<br>2.3.2.4 More ComplexUsesof ksystraycmd . . . . . . 16<br>2.3.2.5 ImprovingReliability . . . . . . . . . . . . . . . 17<br>2.3.3 Using MultipleDesktops . . . . . . . . . . . . . . . . . . 17<br>2.3.3.1 Switching VirtualDesktops . . . . . . . . . . . . 17<br>2.3.3.2 Windows and Virtual Desktops . . . . . . . . . 17<br>2.4 TheFileManager . . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br>2.4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br>2.4.2 Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19<br>2.4.3 The NavigationPanel(aka‘TheSidebar’) . . . . . . . . . 21<br>2.4.4 Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23<br>2.4.5 Links andShortcuts . . . . . . . . . . . . . . . . . . . . . 23<br>2.4.6 The Trash . . . . . . . . . . . . . . . . . . . . . . . . . . . 23<br>3 ThePanelandtheDesktop 24<br>3.1 Kicker,theKDEPanel . . . . . . . . . . . . . . . . . . . . . . . . 24<br>3.2 ConfiguringKicker . . . . . . . . . . . . . . . . . . . . . . . . . . 24<br>3.2.1 Customizingtheicons on the panel . . . . . . . . . . . . 24<br>3.2.2 Addingextras and applets . . . . . . . . . . . . . . . . . . 25<br>3.2.3 The System Tray . . . . . . . . . . . . . . . . . . . . . . . 25<br>3.2.4 Removing PanelItems . . . . . . . . . . . . . . . . . . . . 25<br>3.3 TheTaskbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26<br>3.4 UsingtheClipboard . . . . . . . . . . . . . . . . . . . . . . . . . 26<br>3.4.1 The Selection . . . . . . . . . . . . . . . . . . . . . . . . . 26<br>3.4.2 The Clipboard . . . . . . . . . . . . . . . . . . . . . . . . . 26<br>3.4.3 MoreAdvanced ClipboardUse . . . . . . . . . . . . . . . 27<br>3.5 Related Information . . . . . . . . . . . . . . . . . . . . . . . . . . 27<br>4<br><br>TheKDEUser Guide<br>4 ProgramsandDocuments 28<br>4.1 LaunchingPrograms . . . . . . . . . . . . . . . . . . . . . . . . . 28<br>4.2 ControllingPrograms . . . . . . . . . . . . . . . . . . . . . . . . . 29<br>4.3 OpeningandSaving Files . . . . . . . . . . . . . . . . . . . . . . 29<br>4.3.1 The FileDialog . . . . . . . . . . . . . . . . . . . . . . . . 30<br>4.4 ConfiguringPrograms . . . . . . . . . . . . . . . . . . . . . . . . 31<br>4.4.1 ApplicationConfiguration . . . . . . . . . . . . . . . . . . 31<br>4.4.2 Configuring KeyboardShortcuts . . . . . . . . . . . . . . 32<br>4.4.3 Configuring Notifications . . . . . . . . . . . . . . . . . . 32<br>4.4.4 Configuring Toolbars . . . . . . . . . . . . . . . . . . . . . 32<br>4.4.4.1 CustomizingToolbar Displays . . . . . . . . . . 33<br>4.4.4.2 CustomizingtheIcons on the Toolbar . . . . . . 33<br>III KDEComponents 35<br>5 TheKDEControlCenter 36<br>5.1 Appearance&Themes . . . . . . . . . . . . . . . . . . . . . . . . 37<br>5.2 Desktop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38<br>5.3 Internet &Network . . . . . . . . . . . . . . . . . . . . . . . . . . 39<br>5.4 KDE Components . . . . . . . . . . . . . . . . . . . . . . . . . . . 40<br>5.5 Peripherals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41<br>5.6 PowerControl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42<br>5.7 Regional & Accessibility . . . . . . . . . . . . . . . . . . . . . . . 42<br>5.8 Security&Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . 43<br>5.9 SystemAdministration . . . . . . . . . . . . . . . . . . . . . . . . 44<br>6 TheBaseKDE Applications 45<br>6.1 Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45<br>6.2 PersonalInformation Management . . . . . . . . . . . . . . . . . 47<br>6.3 Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48<br>6.4 Office . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49<br>6.5 Graphics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49<br>6.6 Multimedia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50<br>5<br><br>TheKDEUser Guide<br>7 KDEExtragearApplications 52<br>7.1 AvailableintheKDE Extragear . . . . . . . . . . . . . . . . . . . 52<br>7.1.1 Multimedia . . . . . . . . . . . . . . . . . . . . . . . . . . 52<br>7.1.2 Graphics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53<br>7.1.3 Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54<br>7.1.4 Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54<br>7.2 Related Information . . . . . . . . . . . . . . . . . . . . . . . . . . 54<br>8 MultimediaWithKDE 56<br>8.1 RemovableDisks . . . . . . . . . . . . . . . . . . . . . . . . . . . 56<br>8.1.1 Automount . . . . . . . . . . . . . . . . . . . . . . . . . . 57<br>8.1.2 Mounting . . . . . . . . . . . . . . . . . . . . . . . . . . . 57<br>8.2 PlayingMusic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57<br>8.2.1 MusicPlayers . . . . . . . . . . . . . . . . . . . . . . . . . 57<br>8.3 AudioCD RippinginKDE . . . . . . . . . . . . . . . . . . . . . . 59<br>8.3.1 Ingredients . . . . . . . . . . . . . . . . . . . . . . . . . . 60<br>8.3.2 Recipe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60<br>8.4 PlayingMovies . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63<br>9 KDEtheMultiuserDesktop 64<br>9.1 AboutYourKDEAccount . . . . . . . . . . . . . . . . . . . . . . 64<br>9.2 UsingKDEas Root . . . . . . . . . . . . . . . . . . . . . . . . . . 64<br>9.3 SwitchingSessions . . . . . . . . . . . . . . . . . . . . . . . . . . 65<br>10 NetworkingwithKDE 67<br>10.1 FileSharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67<br>10.1.1 Howtoshare fileswithkpf . . . . . . . . . . . . . . . . . 67<br>10.2 Networking With Windows . . . . . . . . . . . . . . . . . . . . . 68<br>10.2.1 HowItWorks . . . . . . . . . . . . . . . . . . . . . . . . . 68<br>10.2.2 resLISa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69<br>10.2.3 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . 69<br>10.3 SharedSessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70<br>11 Graphics,Printing,and Fonts 71<br>11.1 SettingUp aPrinter . . . . . . . . . . . . . . . . . . . . . . . . . . 71<br>11.2 Printing From Applications . . . . . . . . . . . . . . . . . . . . . 71<br>11.3 PDFFiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71<br>11.4 Fonts-InstallingandConfiguring . . . . . . . . . . . . . . . . . 71<br>11.5 CreatingGraphics . . . . . . . . . . . . . . . . . . . . . . . . . . . 72<br>6<br><br>TheKDEUser Guide<br>12 CustomizingtheAppearance ofyour KDEDesktop 73<br>12.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73<br>12.2 Colors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73<br>12.3 Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74<br>12.4 Splash Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75<br>12.5 WindowDecorations . . . . . . . . . . . . . . . . . . . . . . . . . 76<br>12.6 Style . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77<br>12.7 KDE Theme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77<br>12.8 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78<br>13 KonsoleIntroduction 79<br>14 KDEEdutainment 81<br>14.1 Improveyourlanguageskills . . . . . . . . . . . . . . . . . . . . 81<br>14.2 Mathematics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82<br>14.3 Science . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83<br>14.4 Teaching Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84<br>14.5 Miscellaneous . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84<br>14.6 Related Information . . . . . . . . . . . . . . . . . . . . . . . . . . 85<br>15 Accessibility 86<br>15.1 KMouseTool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86<br>15.2 KMagnifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87<br>15.3 KMouth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88<br>15.4 KTTS-Text-to-Speech . . . . . . . . . . . . . . . . . . . . . . . . 92<br>16 TinkeringUnder theHoodof KDE 93<br>16.1 Hand-Editing Configuration Files . . . . . . . . . . . . . . . . . . 93<br>16.1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 93<br>16.1.2 Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94<br>16.1.3 Editing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94<br>16.2 ScriptingtheDesktop . . . . . . . . . . . . . . . . . . . . . . . . . 94<br>16.3 Adding ExtraKeybindings to KDE . . . . . . . . . . . . . . . . . 97<br>16.4 Adding Keybindings forNew Actions . . . . . . . . . . . . . . . 98<br>16.5 KDebugDialog-ControllingKDE’sDebugging Output . . . . . 99<br>16.5.1 BasicUsage . . . . . . . . . . . . . . . . . . . . . . . . . . 99<br>16.5.2 KDebugDialog in full mode . . . . . . . . . . . . . . . . . 99<br>7<br><br>TheKDEUser Guide<br>IV KDEandtheInternet 101<br>17 Setting upanInternetConnection 102<br>17.1 Gettingonlinetheeasyway . . . . . . . . . . . . . . . . . . . . . 102<br>17.1.1 Afewthings youshould havereadybefore you start . . 102<br>17.2 TheKPPPwizard . . . . . . . . . . . . . . . . . . . . . . . . . . . 103<br>17.2.1 Starting the Wizard. . . . . . . . . . . . . . . . . . . . . . 103<br>17.2.2 The Restofthe Wizard . . . . . . . . . . . . . . . . . . . . 105<br>18 Getting Startedwith Email 106<br>18.1 Information youwill needbefore you start . . . . . . . . . . . . 106<br>18.2 SettingyourIdentity . . . . . . . . . . . . . . . . . . . . . . . . . 107<br>18.3 SettingupyourAccount . . . . . . . . . . . . . . . . . . . . . . . 107<br>18.3.1 Sending Messages . . . . . . . . . . . . . . . . . . . . . . 107<br>18.3.2 ReceivingMessages . . . . . . . . . . . . . . . . . . . . . 107<br>18.4 TestingyourSetup . . . . . . . . . . . . . . . . . . . . . . . . . . 108<br>19 Konqueror 109<br>19.1 Internet Shortcuts . . . . . . . . . . . . . . . . . . . . . . . . . . . 109<br>19.2 FineTuningyourBrowsing Experience . . . . . . . . . . . . . . 110<br>20 UsenetNews 111<br>20.1 Personalsettings . . . . . . . . . . . . . . . . . . . . . . . . . . . 112<br>20.2 Configuringthenewsaccount . . . . . . . . . . . . . . . . . . . . 112<br>20.3 Settingupthemail account . . . . . . . . . . . . . . . . . . . . . 114<br>21 Introductiontomessaging 116<br>21.1 Howtoget started . . . . . . . . . . . . . . . . . . . . . . . . . . 117<br>21.2 Meta-contacts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118<br>21.3 IRC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118<br>21.4 Linkingemailandmessaging . . . . . . . . . . . . . . . . . . . . 118<br>V Office 120<br>22 IntroductiontoKOffice 122<br>22.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122<br>22.2 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122<br>22.3 OASISOpenDocumentfileformat . . . . . . . . . . . . . . . . . 123<br>8<br><br>TheKDEUser Guide<br>23 KOffice ComponentsOverview 124<br>24 FurtherInformation 126<br>24.1 Application Manuals . . . . . . . . . . . . . . . . . . . . . . . . . 126<br>24.2 Internet Resources . . . . . . . . . . . . . . . . . . . . . . . . . . 126<br>24.3 Plugindevelopment . . . . . . . . . . . . . . . . . . . . . . . . . 126<br>VI KDEforAdministrators 127<br>25 KDEInternals 129<br>25.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129<br>25.2 DirectoryLayout . . . . . . . . . . . . . . . . . . . . . . . . . . . 129<br>25.3 SpecifyingDirectories . . . . . . . . . . . . . . . . . . . . . . . . 130<br>25.4 User Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131<br>25.5 DirectoryLayoutRevisited . . . . . . . . . . . . . . . . . . . . . 132<br>25.6 Architecture-specificDirectories . . . . . . . . . . . . . . . . . . 132<br>25.7 SharedDirectories . . . . . . . . . . . . . . . . . . . . . . . . . . . 132<br>25.8 Host-specificDirectories . . . . . . . . . . . . . . . . . . . . . . . 133<br>25.9 Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . 134<br>25.10KDE StartupSequence . . . . . . . . . . . . . . . . . . . . . . . . 138<br>25.10.1kdm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138<br>25.10.2The KDE StartupScript: startkde . . . . . . . . . . . . . . 139<br>25.11BackgroundProcesses . . . . . . . . . . . . . . . . . . . . . . . . 139<br>25.11.1kdeinit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140<br>25.11.2dcopserver . . . . . . . . . . . . . . . . . . . . . . . . . . 140<br>25.11.3kcminit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141<br>25.11.4klauncher . . . . . . . . . . . . . . . . . . . . . . . . . . . 141<br>25.11.5knotify . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141<br>25.12KSMServer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142<br>25.13Environmentvariables . . . . . . . . . . . . . . . . . . . . . . . . 142<br>25.14ThekdeinitMystery . . . . . . . . . . . . . . . . . . . . . . . . . 144<br>9<br><br>TheKDEUser Guide<br>26 CustomizingKDE 146<br>26.1 Desktop Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146<br>26.1.1 Websites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146<br>26.1.2 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . 147<br>26.1.3 TheExecoptionin.desktopfiles . . . . . . . . . . . . . . 148<br>26.1.4 Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148<br>26.1.5 Where to Define . . . . . . . . . . . . . . . . . . . . . . . . 149<br>26.2 KDE Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149<br>26.2.1 HowitWorks . . . . . . . . . . . . . . . . . . . . . . . . . 149<br>26.2.2 StoredWhere? . . . . . . . . . . . . . . . . . . . . . . . . . 150<br>26.2.3 CommonPitfalls . . . . . . . . . . . . . . . . . . . . . . . 151<br>26.2.4 EssentialMenus . . . . . . . . . . . . . . . . . . . . . . . . 151<br>26.2.5 Old-Style Menus . . . . . . . . . . . . . . . . . . . . . . . 151<br>26.2.6 KSycoca . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152<br>26.2.7 kmenuedit . . . . . . . . . . . . . . . . . . . . . . . . . . . 152<br>26.3 KDE Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152<br>26.4 FileAssociations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153<br>27 LockingDownKDE 154<br>27.1 HowItWorks- The Basics . . . . . . . . . . . . . . . . . . . . . . 154<br>27.2 Immutable Configuration Options . . . . . . . . . . . . . . . . . 154<br>27.3 Action Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . 155<br>27.4 URLRestrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . 156<br>27.5 Configuration Modules . . . . . . . . . . . . . . . . . . . . . . . . 158<br>28 TheLazyAdmin 160<br>28.1 RemoteDesktopSharing . . . . . . . . . . . . . . . . . . . . . . . 160<br>28.2 KDE DIY-BuildingYourOwnTools . . . . . . . . . . . . . . . . 160<br>28.2.1 DCOP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160<br>28.2.2 KDialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163<br>29 Sharingdatawith Kontact viaIMAP 165<br>29.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165<br>29.2 What isIMAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165<br>29.3 KolaborIMAP? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166<br>29.4 Howtoset upIMAPserver Cyrus . . . . . . . . . . . . . . . . . 166<br>29.5 HowtosetupKontact clients . . . . . . . . . . . . . . . . . . . . 168<br>29.6 HowtohaveReadOnly Access . . . . . . . . . . . . . . . . . . . 171<br>29.7 Credits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172<br>29.8 FurtherReading . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173<br>10<br><br>TheKDEUser Guide<br>VII MoreTools 174<br>30 ApplicationGuideforMigrates 175<br>31 Dictionaryfor Migrators 177<br>32 TheStandardMenuEntries 178<br>33 GlossaryofTerms 181<br>34 TroubleshootingProblems 182<br>34.1 Networking and X . . . . . . . . . . . . . . . . . . . . . . . . . . 182<br>34.2 WhenAnApplicationWillNot Open . . . . . . . . . . . . . . . 183<br>35 ContributingtoKDE 184<br>A Credits andLicenses 185<br>A.1 Credits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185<br>A.2 License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187<br>B Index 188
0 106浏览
会员免费 - 西门子安装步骤适合没一位朋友,能够给你们极大的帮助,赶紧下载看看就知道了
0 970浏览
会员免费 - IEEE1609.3IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE)—Networking Services
5 81浏览
会员免费 - 很不错的基于WLAN安全方面的资料Wireless communications are becoming ubiquitous in homes, offices, and enterprises with the popular IEEE 802.11 wireless LAN technology and the up-andcoming IEEE 802.16 wireless MAN technology. The wireless nature of communications defined in these standards makes it possible for an attacker to snoop on confidential communications or modify them to gain access to home or enterprise networks much more easily than with wired networks.
0 52浏览
会员免费 - 数据库原理(第5版)(样章)数据库原理(第5版)介绍了关系模型,定义了基本的关系术语,还介绍了规范化 原则的基本概念,并描述了规范化过程
0 53浏览
会员免费 - Microsoft.Press.Windows.Internals.5th.Edition.Jun.2009Get the architectural perspectives and inside details you need to understand how Windows operates. See how the core components of the Windows operating system work behind the scenes—guided by a team of internationally renowned internals experts. Fully updated for Windows Server 2008 and Windows Vista, this classic guide delivers key architectural insights on system design, debugging, performance, and support—along with hands-on experiments to experience Windows internal behavior firsthand. Delve inside Windows architecture and internals: Understand how the core system and management mechanisms work—from the object manager to services to the registry Explore internal system data structures using tools like the kernel debugger Grasp the scheduler's priority and CPU placement algorithms Go inside the Windows security model to see how it authorizes access to data Understand how Windows manages physical and virtual memory Tour the Windows networking stack from top to bottom—including APIs, protocol drivers, and network adapter drivers Troubleshoot file-system access problems and system boot problems Learn how to analyze crashes
5 83浏览
会员免费 - ASF-Alert Standard Format Specification 2.0ASF Alert Standard Format Specification The term “system manageability” represents a wide range of technologies that enable remote system access and control in both OS-present and OS-absent environments. These technologies are primarily focused on minimizing on-site I/T maintenance, maximizing system availability and performance to the local user, maximizing remote visibility of (and access to) local systems by I/T managers, and minimizing the system power consumption required to keep this remote connection intact. The Distributed Management Task Force (DMTF) defines Desktop Management Interface (DMI) and Common Information Model (CIM) interfaces that operate when the managed client is fully operational in its OS-present environment. This specification defines remote control and alerting interfaces that best serve the clients’ OS-absent environments.
2 155浏览
会员免费 - XACML Profile for Role Based AccessOASIS XACML TC, Committee Draft. Version 01. 13-February-2004. Document identifier: 'cs-xacml-rbac-profile-01'. Edited by Anne Anderson (Sun Microsystems). Produced by the OASIS Extensible Access Control Markup Language TC. See the Minutes of the 5 February 2004 XACML TC Meeting at which the TC voted to make the XACML RBAC Profile a Committee Draft.
0 91浏览
会员免费