忘不了密码小管家(分类管理各种密码的小工具[包括上网密码,CD-KEY及游戏密技等])
上传时间: 2013-11-29
上传用户:frank1234
The aim of this application note is to show to scan the 4x4 matrix keypad multiplexed with a four 7-segment display. The software attached to this application note scans the pressed key and displays it on the multiplexed 7- segment LEDs. This application note makes obvious Interrupt capability of the STR710 device to offer a better key scan .
标签: application multiplexed matrix keypad
上传时间: 2015-09-13
上传用户:thuyenvinh
this m file can Find a (near) optimal solution to the Traveling Salesman Problem (TSP) by setting up a Genetic Algorithm (GA) to search for the shortest path (least distance needed to travel to each city exactly once) Notes: 1. Input error checking included 2. Inputs can be specified in any order, so long as the parameter pairs are specified as a parameter , value
标签: Traveling Salesman solution Problem
上传时间: 2013-12-22
上传用户:ruixue198909
VC技术内幕第五版(英文)The 6.0 release of Visual C++ shows Microsoft s continued focus on Internet technologies and COM, which are key components of the new Windows Distributed interNet Application Architecture (DNA). In addition to supporting these platform initiatives, Visual C++ 6.0 also adds an amazing number of productivity-boosting features such as Edit And Continue, IntelliSense, AutoComplete, and code tips. These features take Visual C++ to a new level. We have tried to make sure that this book keeps you up to speed on the latest technologies being introduced into Visual C++.
标签: technologie Microsoft continued Internet
上传时间: 2014-11-22
上传用户:ggwz258
Robustnesstochangesinilluminationconditionsaswellas viewing perspectives is an important requirement formany computer vision applications. One of the key fac-ors in enhancing the robustness of dynamic scene analy-sis that of accurate and reliable means for shadow de-ection. Shadowdetectioniscriticalforcorrectobjectde-ection in image sequences. Many algorithms have beenproposed in the literature that deal with shadows. How-ever,acomparativeevaluationoftheexistingapproachesisstill lacking. In this paper, the full range of problems un-derlyingtheshadowdetectionareidenti?edanddiscussed.Weclassifytheproposedsolutionstothisproblemusingaaxonomyoffourmainclasses, calleddeterministicmodeland non-model based and statistical parametric and non-parametric. Novelquantitative(detectionanddiscrimina-ionaccuracy)andqualitativemetrics(sceneandobjectin-dependence,?exibilitytoshadowsituationsandrobustnesso noise) are proposed to evaluate these classes of algo-rithms on a benchmark suite of indoor and outdoor videosequences.
标签: Robustnesstochangesinillumination conditionsaswellas perspectives requirement
上传时间: 2014-01-23
上传用户:whenfly
This book presents an insightful view of XML that places this emerging technology in the context of the ongoing Web revolution. Written for business and technical professionals, this book revals the true value of XML for distributed information systems. It explains how XML is transforming the way organizations manage data and build software systems details the opportunities the language offers for organizatoins that understand tis significance and potential impact and explains how XML and Web services reflect a fundamental shift in software construction-from monolithic applications to software based on the composition of simple parts.
标签: insightful technology presents emerging
上传时间: 2015-09-24
上传用户:思琦琦
Dropbear is an SSH 2 server, designed to be usable in small memory environments. It supports: * Main features of SSH 2 protocol * Implements X11 forwarding, and authentication-agent forwarding for OpenSSH clients * Compatible with OpenSSH ~/.ssh/authorized_keys public key authentication
标签: environments Dropbear designed supports
上传时间: 2014-01-16
上传用户:skhlm
About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only one crypted packet is enough to start cracking - Has its own key generator. - Can crack a dumpfile over a network. - Can act as a server and client. - Also works in windows. - Has an fltk gui.
标签: WepDecrypt Wepdecrypt Wireless guesses
上传时间: 2013-12-25
上传用户:6546544
Embest Arm EduKit II Evaluation Board External Interrupt Test Example Please Select the trigger: 1 - Falling trigger 2 - Rising trigger 3 - Both Edge trigger 4 - Low level trigger 5 - High level trigger any key to exit... Press the buttons push buttons may have glitch noise problem EINT6 had been occured... LED1 (D1204) on
标签: Evaluation Interrupt External Example
上传时间: 2015-10-08
上传用户:Altman
前几天刚下的一个ASP的AES源码 输入keySize密钥长度(128、192、256),Src明文字符串,Key密钥字符串, 明文字符串不能超过 &HFFFF长度,输出:密文十六进制字符串
上传时间: 2013-12-30
上传用户:561596