搜索资源列表
Vbdemo题目
- 大学生生活普查程序,用vb开发的,调查大学生生活情况,并做出评价,给出建议,做出统计-census procedures, with vb development and the investigation of the life of college students, and to assess the new proposals and make statistics
200622023581079975
- 银行资金评估预警咨询系统,希望对大家能有所帮助-bank funds assess warning advisory system, we can hope for help
routesystem
- 如何评价和衡量网络设备性能是否达到了设计的要求,如何最佳的规划和优化一个网络,不仅需要技术,还必须有工具来辅助实现。路测是网络优化的重要手段,它对反映网络状况,体现网络性能指标起到直接的测量评估作用,并能指出网络问题所在。建网初期,使用路测进行网络情况的掌握和了解是最主要的。路测数据有小区导频的强度和信号质量等,通过分析,产生有关诊断网络问题,体现网络性能的最终报告。-how to appraise and assess the performance of network equipment
A_Synthetic_Evaluation_fo_Antijamming_Ability_of_t
- 摘要:实战条件下如何评价短波跳频通信系统的抗干扰性能是构建短波跳频通信系统的重要环rr-}J。由于不 能得到精确的指标评价值,采川组合赋权法给出了系统抗干扰性能的评价算法已经不能适川。给出了一种模糊综 合评价方法,该方法有如下优点:为避兔专家赋指标权值的卞观随意性,将德尔菲(Delphi)法和层次分析法(AHP)相结合来确定指标权值 为了便于专家较准确地作出评判,给出了指标评价等级,并利川模糊评价法给出指标评价矩 阵,最后得到评价结果。评价实例表明了该方法的有效性。 -Abst
zhangyong_jun-shi-duan-bo-tong-xi-kang-gan-rao-xin
- 摘 要:建立了几个军事短波通信系统仿真模型,并简要叙述了军事短波通信系统中跳频、扩频的干扰方程。文章给出了仿真物理结构图以及功能模块图,也给出了军事短波通信抗干扰性能仿真评估的指标,提出了利用云模型及云不确定性推理对仿真结果进行评估,并给出了干扰和无干扰条件下军事短波通信的抗干扰性能评估结果。-Abstract: A number of military HF communications system simulation model, and a brief descr iption of
Security.Evaluation
- 在分析影响服务可用性网络攻击导致网络流量异常改变的基础上,提出了一种主机网络实 时流量的安全状况评估方法. -Analysis of the impact of service availability in the network attacks lead to abnormal changes in network traffic, based on a host of real-time network flow method to assess the security situat
SJTU_2812
- 上海交通大学与TI联合试验室于2008年制作的综合2812评估学习板PCB原理图、丝印图及主要芯片的PDF资料。该板历经7个版本修正,设计合理,运行稳定,配有大量资料。-Shanghai Jiaotong University Joint Laboratory with TI in 2008 to assess the production of a comprehensive 2812 study PCB board schematics, screen printing maps and i
Sineax_Cam
- Sineax_Cam_技术数据说明书,SINEAX CAM用于测量和监测电力分配系统或工厂供电系统的各种电参量。测量系统能够准确监测电流网络状态、非线性负载的状况以及对整个供电系统是否过载进行评估。-Sineax_Cam_ technical data specifications, SINEAX CAM for measuring and monitoring the electrical distribution system or plant a variety of electrical
cmd
- 1.《软件测试计划》(STP)描述对计算机软件配置项CSCI,系统或子系统进行合格性测试的计划安排。内容包括进行测试的环境、测试工作的标识及测试工作的时间安排等。 2.通常每个项目只有一个STP,使得需方能够对合格性测试计划的充分性作出评估 -1. " Software Test Plan" (STP) describes the computer software configuration item CSCI, system or subsystem qualifi
electric-power-information-systems
- 提出一种用于电力信』息系统安全设计的建模语言和定量化评估方法。设计了安全体系设计 迹语言, 统一描述系统结构、系统业务、安全策略、攻击行为和安全措施等: 构造了风险自动分析算 法, 以获得电力信息系统的攻击迹: 基于攻击迹提出相对安全度概念, 用于定量评估安全体系的安 全性: 通过实例验证了所述方法的有效性。该方法可用于定量评估各类安全措施的控制效果, 如增 加新的安全功能、调整系统自身结构和用户业务需求等, 减少了选择安全措施的主观性-Information is propos
MosaickingTutorial
- The big picture problem is to mosaic them together correctly. Solving this partially or completely is important because it will allow command and control (C2) teams to assess a disaster situation more accurately and quickly
Engineering---Matlab-Programming
- The problem-solving process for a computational problem can be outlined as follows: 1. Define the problem. 2. Create a mathematical model. 3. Develop a computational method for solving the problem. 4. Implement the computational method. 5.
AJAX_Framework_Assessment
- This pdf file introduces how to assess the ajax framework.
Face-Question1
- 如果你是某事的负责人的话,你很容易让他人听你的;但是,当你不是负责人时,让别人听自己的话是非常难的事。想要培养自己影响他人的能力的话,得通过与他人的共同的理想和目标来建立个人关 系。那些拥有影响力并能感召他人的应聘者通常能够使同事和客户支持自己的观点和目标。下面的一些问题能够考核出应聘者在这方面的能力。 -If you are the person in charge of something, you make it easy for others to listen to you
1
- 为评估电力电子装置对电网产生的危害和影响,为相应补偿装置的具体设计提供数值依据。以阻感负载的三相 桥式全控整流电路为例,理论分析并计算了其交流侧电流的谐波和功率因数;基于 Matlab/Simulink 建立的电力电子变流电 路模型,对三相桥式全控整流电路交流侧功率因数及其产生的谐波进行仿真分析。仿真使复杂的计算变得非常简便、直观, 且仿真结果与理论计算结果相差无几,从而证明了仿真研究的有效性和精确性。-To assess the risks and effects of power
3Dlimitequilibrium
- 3D limit equilibrium to assess face stability of shield tunnel
ANDROID-APPLICATION-PROJECT-LIST
- heart rate produced by algorithms embedded in the commercially available optical heart rate sensor. An analysis of the raw PPG signal is necessary to fully assess the usability of PPG for heart rate detection in epilepsy, for instance, by also
DNV-OS-J101_2014-05
- DNV is a global provider of knowledge for managing risk. Today, safe and responsible business conduct is both a license to operate and a competitive advantage. Our core competence is to identify, assess, and advise on risk management. From our le
web-malware
- Vulnerability detection tools are frequently considered the silver-bullet for detecting vulnerabilities in web services. However, research shows that the effectiveness of most of those tools is very low and that using the wrong tool may lead
