虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

On-the-Go

  • Purpose: --- -- This component is used for capturing staff from AVI to BMP. Installation:

    Purpose: --- -- This component is used for capturing staff from AVI to BMP. Installation: ------------- Extract the compiled units into your Lib directory or into another directory that is listed in the Library path in your Delphi options. Choose file AVIcap.dcu for register. description: ------------ AVIcap V2.0 used for capturing frame from AVI without drawing on the screen, that is essentially fast. It can be reached by using of avifil32.dll from MS Video For Windows. New property: number of bits per pixel of bitmap.Now you can save BMP using next formats: pf1bit, pf4bit, pf8bit, pf8bitGray, pf15bit, pf16bit, pf24bit, pf32bit, pfDevice. See example to detail.

    标签: Installation component capturing Purpose

    上传时间: 2016-12-13

    上传用户:TF2015

  • Open C++: Memory Game Example This Open C++ example application demonstrates a simple memory game

    Open C++: Memory Game Example This Open C++ example application demonstrates a simple memory game. The game engine part has been written in Open C++ and the UI part has been written in Symbian C++. The application supports S60 3rd Edition and S60 5th Edition devices. Keypad and Touch UI are supported depending on the device.

    标签: Open demonstrates application Example

    上传时间: 2013-12-20

    上传用户:lunshaomo

  • These routines model tropospheric radiowave propagation over variable terrain and calculates propaga

    These routines model tropospheric radiowave propagation over variable terrain and calculates propagation loss vs. height and range. Propagation loss is displayed in dB contours on a height vs. range plot. TPEM is based on the split-step Fourier PE method and was originally developed from an early PE model called PEPC, written by Fred Tappert. Propagation loss over variable terrain is modeled by shifting the field an appropriate number of bin widths correspondc ing to the height of the ground. The field is determined using the smooth earth PE method.

    标签: tropospheric propagation calculates radiowave

    上传时间: 2017-01-01

    上传用户:225588

  • Distributed applications, devices, and services appear in many different arrangements in an enterpr

    Distributed applications, devices, and services appear in many different arrangements in an enterprise. At your company, you probably access data from your intranet services, from computers distributed throughout the company network, and from services across the firewall out on the Web. For example, you might access a calendar-sharing application or a financial application to fill out expense sheets. Someone must maintain all these applications. Not only the applications, but also the hardware that supports them must be maintained. Resource management encompasses both applications and hardware. In fact, both application and hardware management can be supported through the development of Java Management Extensions (JMX) resource management software. This book will show how you can use JMX to manage and monitor all your resources across an enterprise—both software and hardware.

    标签: applications arrangements Distributed different

    上传时间: 2014-01-05

    上传用户:330402686

  • In this computer arriving and infecting through MIRC disseminates and duplicates worm s noumenonn of

    In this computer arriving and infecting through MIRC disseminates and duplicates worm s noumenonn of worm file, in mirc catalogue , will produce a script.ini file , will let the worm be disseminated through Mirc communication software by this. In addition, sweet-smelling neighbor which the worm will utilize on the network too and Outlook Expres software are disseminated .

    标签: disseminates duplicates and infecting

    上传时间: 2017-01-13

    上传用户:fhzm5658

  • CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data o

    CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data on a CAN network, and how to move information to and from CAN RAM message objects. Each C8051F040-TB CAN node is configured to send a message when it s P3.7 button is depressed/released, with a 0x11 to indicate the button is pushed, and 0x00 when released. Each node also has a message object configured to receive messages. The C8051 tests the received data and will turn on/off the target board s LED. When one target is loaded with CAN2.c and the other is loaded with CAN1.c, one target board s push-button will control the other target board s LED, establishing a simple control link via the CAN bus and can be observed directly on the target boards.

    标签: CAN configuring and transmit

    上传时间: 2013-12-11

    上传用户:weiwolkt

  • Samsung S3C2440A SOC RISC Microprocessor test program that demonstrates how to code most peripherals

    Samsung S3C2440A SOC RISC Microprocessor test program that demonstrates how to code most peripherals on the chip.

    标签: Microprocessor demonstrates peripherals S3C2440A

    上传时间: 2013-12-20

    上传用户:yulg

  • KML is an XML grammar used to encode and transport representations of geographic data for display in

    KML is an XML grammar used to encode and transport representations of geographic data for display in an earth browser. Put simply: KML encodes what to show in an earth browser, and how to show it. KML uses a tag-based structure with nested elements and attributes and is based on the XML standard.

    标签: representations geographic transport grammar

    上传时间: 2014-01-12

    上传用户:thesk123

  • OFDM通信系统的仿真。PDF文件

    OFDM通信系统的仿真。PDF文件,包括OFDM原理、程序讲解及运行结果。-OFDM communications system simulation. PDF documents, including OFDM principles, procedures and operations on the results.

    标签: OFDM 通信系统 仿真

    上传时间: 2014-01-23

    上传用户:66666

  • Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features:

    Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/

    标签: open-source encryption Features software

    上传时间: 2013-12-20

    上传用户:123啊