可能是数据库上当前的连接数目已经超过了它能够处理的最大值.
查看当前的连接数
select count(*) from v$process;
数据库允许的最大连接数
select value from v$parameter where name='processes';
修改最大连接数:
alter system set processes=300 scope=spfile;
重启数据库:
shutdown immediate;
startup;
shutdown 默认的是normal.可以省略;
startup 默认的是open,也可以省略;
分享到:
相关推荐
Exploring the Representation Capabilities of the HOG Descriptor
有的时候在开发jsp时,需要使用jstl时,在jsp上面引用jstl却出现错误:Can not find the tag library descriptor for "http://java.sun.com/jsp/jstl/core,这是由于缺少两个jar包导致的。
Matlab implementation of the HOG descriptor for pedestrian detection
Matlab implementation of the HOG descriptor for pedestrian detection
The tool also supports a variety of output formats (.txt, .inc, .h, etc.). DT uses ASCII based Usage Tables and supports vendor defined pages as well. Included are Usage Table files for the HID Usage...
MyEclipse 出错提示 Can not find the tag library descriptor for "http://java.sun.com/jsp/jstl/core"
by learning a projection from descriptor space to a new Euclidean space in which standard clustering techniques are more likely to assign matching descriptors to the same cluster, and non-matching ...
we design a geometric descriptor, which computes the pair- wise relative locations and distances between body joints, as a new information source for the discriminator. The ef- ficacy of our ...
The image structure elements’ histogram (SEH) is computed by SED, and HSV color space is used (it has been quantized to 72 bins). SEH integrates the advantages of both statistical and structural ...
present a novel 3D shape descriptor that uses a set of panoramic views of a 3D object which describe the position and orientation of the object’s surface in 3D space.
There is a theoretical and experimental evidence that Fourier analysis is a powerful tool for tackling image...descriptor for outlining geographical profiles to be used in reconstruction and recognition.
特征提取,剪切变换对边缘检测的一种新的方法。
a file for descript PS2 HID descriptor and its asocitation with the keycode
plugin-descriptor.properties
Report Descriptor分析
∞ controllers, and coefficients of controllers are given by the solutions of LMIs (see, e.g., Masubuchi, Kamitane, Ohara, & Suda, 1997, Rehm & Allgöwer, 2001, Uezato & Ikeda, 1999 and Xu & Lam, 2006...
13 The Software Assembly Descriptor 243 13.1 Overview 243 PART III Building an SCA-Compliant System 251 14 The POSIX Operating System 253 14.1 An Operating Environment 253 14.2 Linux 2.6 Kernel 256 ...
hid descriptor tool USB 描述符生成工具
The doFilter method of the Filter is called by the container each time a request/response pair is passed through the chain due to a client request for a resource at the end of the chain. doGet...
Robust 3D Tracking with Descriptor Fields 论文 。