虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Around

  • This is the source code for encryption using the latest AES algorithm. AES algorithm is also called

    This is the source code for encryption using the latest AES algorithm. AES algorithm is also called Rijndael algorithm. AES algorithm is recommended for non-classified use by the National Institute of Standards and Technology(NIST), USA. Now-a-days AES is being used for almost all encryption applications all Around the world.

    标签: algorithm encryption AES the

    上传时间: 2014-01-18

    上传用户:xc216

  • 非常好的优化算法的书

    非常好的优化算法的书,详细介绍了蚁群算法和粒子群算法以及相关的matlab工具箱,讲了理论和应用给出了工具箱的下载地址。 Swarm intelligence is an innovative computational way to solve hard problems. In particular, particle swarm optimization, also commonly known as PSO, mimics the behavior of a swarm of insects or a school of fish. If one of the particle discovers a good path to food the rest of the swarm will be able to follow instantly even if they are far away in the swarm. Swarm behavior is modeled by particles in multidimensional space that have two characteristics: a position and a velocity. These particles wander Around the hyperspace and remember the best position that they have discovered. They communicate good positions to each other and adjust their own position and velocity based on these good positions.

    标签: 优化算法

    上传时间: 2014-01-26

    上传用户:zgu489

  • The main file in this list of programs is "vblast.m". Type "help vblast" on the command line for det

    The main file in this list of programs is "vblast.m". Type "help vblast" on the command line for details.Study the coding by stepping through the program. These programs require Around 5000 packets for reasonable plotting accuracy.This has been implemented for a 2x2 system. The reader can program other variations. The program has been tested on MATLAB version 6.0 and above with signal processing toolbox and communication toolbox options.

    标签: vblast programs command main

    上传时间: 2016-08-24

    上传用户:wcl168881111111

  • Java MP3 Player, Here s a list of features: - Reads, creates, updates, and removes id3v2.3 and id3

    Java MP3 Player, Here s a list of features: - Reads, creates, updates, and removes id3v2.3 and id3v2.4 tags - Reads, creates, updates, and removes id3v1 tags - Extracts MPEG data such as bit rate, sample rate, channel mode, etc. - Calculates playing time of mp3 from mpeg information (no good w/VBR) - Can read and create Winamp styled playlists - Offers other utility classes such as MP3FileFilter and MP3Comparator - NullsoftID3GenreTable object keeps a list of genres for you and can automatically determine the id3v1 genre from an id3v2 string or the other way Around

    标签: and features creates updates

    上传时间: 2014-11-21

    上传用户:qq521

  • toolbox_dimreduc - a toolbox for dimension reduction methods This toolbox is an educational and rec

    toolbox_dimreduc - a toolbox for dimension reduction methods This toolbox is an educational and recreative toolbox Around recent ideas in the field of dimension reduction.

    标签: toolbox toolbox_dimreduc educational dimension

    上传时间: 2013-12-15

    上传用户:daoxiang126

  • This approach addresses two difficulties simultaneously: 1) the range limitation of mobile robot se

    This approach addresses two difficulties simultaneously: 1) the range limitation of mobile robot sensors and 2) the difficulty of detecting buildings in monocular aerial images. With the suggested method building outlines can be detected faster than the mobile robot can explore the area by itself, giving the robot an ability to “see” Around corners. At the same time, the approach can compensate for the absence of elevation data in segmentation of aerial images. Our experiments demonstrate that ground-level semantic information (wall estimates) allows to focus the segmentation of the aerial image to find buildings and produce a ground-level semantic map that covers a larger area than can be built using the onboard sensors.

    标签: simultaneously difficulties limitation addresses

    上传时间: 2014-06-11

    上传用户:waitingfy

  • The VGA example generates a 320x240 diffusion-limited-aggregation (DLA) on Altera DE2 board. A DLA i

    The VGA example generates a 320x240 diffusion-limited-aggregation (DLA) on Altera DE2 board. A DLA is a clump formed by sticky particles adhering to an existing structure. In this design, we start with one pixel at the center of the screen and allow a random walker to bounce Around the screen until it hits the pixel at the center. It then sticks and a new walker is started randomly at one of the 4 corners of the screen. The random number generators for x and y steps are XOR feedback shift registers (see also Hamblen, Appendix A). The VGA driver, PLL, and reset controller from the DE2 CDROM are necessary to compile this example. Note that you must push KEY0 to start the state machine.

    标签: diffusion-limited-aggregation DLA generates 320x240

    上传时间: 2014-01-16

    上传用户:225588

  • This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Page

    This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Pages environment, but most of the techniques discussed have equivalents in other database environments. It should be viewed as a "follow up", or perhaps an appendix, to the previous paper, "Advanced SQL Injection". The paper covers in more detail some of the points described in its predecessor, providing examples to clarify areas where the previous paper was perhaps unclear. An effective method for privilege escalation is described that makes use of the openrowset function to scan a network. A novel method for extracting information in the absence of helpful error messages is described the use of time delays as a transmission channel. Finally, a number of miscellaneous observations and useful hints are provided, collated from responses to the original paper, and various conversations Around the subject of SQL injection in a SQL Server environment.

    标签: Server SQL Injection Microsoft

    上传时间: 2014-07-28

    上传用户:xhz1993

  • An adaptive fuzzy integral sliding mode controller for mismatched time-varying linear systems is p

    An adaptive fuzzy integral sliding mode controller for mismatched time-varying linear systems is presented in this paper. The proposed fuzzy integral sliding mode controller is designed to have zero steady state system error under step inputs and alleviate the undesired chattering Around the sliding surface

    标签: time-varying controller mismatched adaptive

    上传时间: 2014-12-04

    上传用户:luopoguixiong

  • Reads/writes text as a character stream, buffering characters so as to provide for the efficient rea

    Reads/writes text as a character stream, buffering characters so as to provide for the efficient reading/writing of characters, arrays, and lines. The buffer size may be specified, or the default size may be used. The default is large enough for most purposes. In general, each read request made of a Reader causes a corresponding read request to be made of the underlying character or byte stream. It is therefore advisable to wrap a BufferedReader Around any Reader whose read() operations may be costly, such as FileReaders and InputStreamReaders.

    标签: characters character buffering efficient

    上传时间: 2017-02-20

    上传用户:cjl42111