نتایج جستجو برای: user manual

تعداد نتایج: 306369  

پایان نامه :0 1369

هدف ازاجرای این پروژه پیاده سازی واحد کنترل سیستم فرز emco cnc روی یک کامپیوتر at و اضافه کردن تسهیلات گرافیکی جهت سهولت کار user و داشتن اطلاعا کافی از شکل قطعه مطلوب و مسیر حرکت ابزار می باشد. دراین پروژه الگوریتم حرکت که متضمن حرکت محورها بر روی منحنی مورد نظر خواهد بود، الگوریتم dda که در پروژه طراحی و ساخت واحد کنترل ماشینهای cnc است بکار گرفته می شود و سعی می شود دقیقا بجای واحد کنترل این...

1994
Mark Addison Harold W. Thimbleby

The importance of manuals certainly extends beyond their use in training and reference. In some sense (whether this is explicit or implicit) a user must ‘know’ what they are doing to use a system, and the manual is a representation of what they could know. Whether a user could in practice verbalise their knowledge as a system manual is unlikely — it may not even be necessary to be able to do so...

2006
Tom Saint Denis Greg Rose

bignum math implementing cryptographic multiple precision bignum math implementing cryptographic multiple precision bignum math implementing cryptographic multiple precision dbebooks free books & magazines mathematics and physics for programmers second edition arma 3 community guide zeus dlccc mn louduk yaesu vx8r user manual fbtest answers for mp3444 milliken publishing company answers test a ...

2006
Jürgen Börstler Jerry Eriksson

Manual regression testing of graphical user interfaces is a time consuming task that a family of tools known as capture/replay tools seeks to automate. This paper presents a case study that compares the costs and benefits of a state of the art capture/replay tool (Rational Functional Tester) to the costs and benefits of manual regression testing. Our findings suggest that, for projects with inf...

2006

computer vision eccv 2006 9th european conference on computer vision eccv 2006 9th european conference on free ebooks computer vision eccv 2006 9th european document about computer vision eccv 2006 9th european computer vision eccv 2006 part iii 9th european conference document about computer vision eccv 2006 9th european public key cryptography pkc 2006: 9th international lecture notes in comp...

1999
PIA HONOLD

INTRODUCTION According to the literature of cross-cultural and intercultural psychology, German and Chinese people organize their actions along different cultural norms (Bond 1992; Thomas 1996a). The objective of this study was to examine whether these differences—mainly differences of social interaction—also influence the use of typical daily products—in this case, cellular phones. One point o...

2009
Roel Peeters Markulf Kohlweiss Bart Preneel

As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید