An adaptive fuzzy sliding mode control algorithm is proposed for a class of continuous time unknown nonlinear systems. In contrast to the existing sliding mode control (SMC) design, where the presence of hitting control may introduce problems to con
Smart and Gets Things Done: Joel Spolsky's Concise Guide to Finding the Best Technical Talent Introduction Chapter 1: "Hitting the High Notes" Chapter 2: "Finding Great Developers" Chapter 3: "A Field Guide to Developers" Chapter 4: "Sorting Resumes
该资料很详细的讲述了在Windows环境下Java进程的内存分配问题,包括内核空间和用户空间内存分配,为什么Java堆的实际最大内存分配为1.5G,为什么需要同时配置xms和xmx以及如何扩大用户空间等。 1. How is the space in a basic Win32 process allocated ? The 32-bit Windows secret ! Structure of a standard Win32 process 2. What are the Win32 j
总共有4个,都能运行,是逐渐加深内容的,希望能帮到大家。 1.% Ex and Hy field components propagating in the z direction. 2.% Ex and Hy field components propagating in the z direction with % absorbing boundary conditions (ABC) 3.% Simulation of a pulse hitting a dielectric mediu
B orn in the ice-blue waters of the festooned Norwegian coast; amplified (by an aberration of world currents, for which marine geographers have yet to find a suitable explanation) along the much grayer range of the Californian Pacific; viewed by som
The ShellBrowser component set gives a Delphi programmer easy access to the Windows Shell functionality. The TJamShellList, TJamShellTree and TJamShellCombo components look and behave exactly like the corresponding parts of the Explorer. The non-vis
nce Launchy has been started, it hides in the background. You bring it forward by holding the alt key (apple on Mac, and ctrl on Linux) and tapping the space key. You can then type in a few keys of the program you are searching for and hit enter onc
-What I will be Going Over- In this article, I don't plan on giving you any bullshit. I don't plan on hinting towards how to break into a wifi network, I will show you how to break into a wifi network. I will do it simple steps, and only break them
Sucop virus analysis tool(File Format Identifier) v1.4 unnoo-dswlab products It is an auxiliary tool for virus analysis, which includes various file format recognition engine code, sniffing packers, unpacking by virtual machine, editing PE file, reb
配置共享磁盘 待补充 配置raw设备存放CRS的注册信息和表决信息(在所有节点执行) # vi etc sysconfig rawdevices dev raw raw1 dev sda6 dev raw raw2 dev sda7 dev raw raw3 dev sda8 dev raw raw4 dev sda9 dev raw raw5 dev sda10 设置raw设备权限 # vi etc udev permissions d 50 udev permissions # raw d
the Lunar Lander game works as follows; the pilot is given control of a small rocket and attempts to land the rocket on a safe landing pad, without crashing into any obstacles. Success is achieved if the rocket lands safely; that is, it touches down
Managing Your Outsourced IT Services Provider teaches executives and managers of organizations how to unleash the full potential of their outsourced IT services workforce and IT-enabled business processes safely and profitably. Drawing on two decade
This book demonstrates the inevitability of a continuously growing role of data in our society and it stresses that this role does not need to be threatening: to the contrary, collection and analysis of data can help us prevent traffic jams, suppres
This book is about tuning Oracle databases. Three areas of Oracle Database tuning are data model tuning, SQL code tuning plus physical, and configuration tuning. The author began his career as an applications developer and not a systems or network a