This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues for architecture review, and as a catalog of designs to look for within a security product.
标签: application architects interested building
上传时间: 2014-01-24
上传用户:xwd2010
MATLAB-based program that generates plots of input power and shaft torque for variable-frequency operation of three-phase induction motors
标签: variable-frequency MATLAB-based generates program
上传时间: 2017-04-22
上传用户:ma1301115706
The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for firmware updating. The instruction set of the W78E58B is fully compatible with the standard 8052. The W78E58B contains a 32K bytes of main ROM and a 4K bytes of auxiliary ROM which allows the contents of the 32KB main ROM to be updated by the loader program located at the 4KB auxiliary ROM 512 bytes of on-chip RAM four 8-bit bi-directional and bit-addressable I/O ports an additional 4- bit port P4 three 16-bit timer/counters a serial port. These peripherals are supported by a eight sources two-level interrupt capability. To facilitate programming and verification, the ROM inside the W78E58B allows the program memory to be programmed and read electronically. Once the code is confirmed, the user can protect the code for security
标签: microcontroller programmable in-system W78E58B
上传时间: 2017-04-27
上传用户:yiwen213
Face Transfer is a method for mapping videorecorded perfor-mances of one individual to facial animations of another. It extracts visemes (speech-related mouth articulations), expressions, and three-dimensional (3D) pose from monocular video or 铿乴m footage.
标签: videorecorded perfor-mances individual Transfer
上传时间: 2014-01-11
上传用户:2467478207
Video-DVM is a very cheap DVM that shows how an output as complex as a videocomposite signal can be generated entirely in software: two I/O pins and three resistors are all the hardware required. Connected to any TV set it displays voltages, included max and min peaks, using both giant digits and an analog bar-display . A serial data output for computer data logging is provided, too.
标签: videocomposite Video-DVM complex output
上传时间: 2014-12-09
上传用户:xuan‘nian
If a tree falls in the forest, and there s nobody there to hear, does it make a sound? This classic conundrum was coined by George Berkeley (1685-1753), the Bishop and influential Irish philosopher whose primary philosophical achievement is the advancement of what has come to be called subjective idealism. He wrote a number of works, of which the most widely-read are Treatise Concerning the Principles of Human Knowledge (1710) and Three Dialogues between Hylas and Philonous (1713) (Philonous, the "lover of the mind," representing Berkeley himself).
标签: there classic forest nobody
上传时间: 2013-11-26
上传用户:stvnash
As I write this foreword, I am collaborating with four leading user interface (UI) component vendors on a presentation for the 2004 JavaOneSM conference. In our presentation, the vendors will show how they leverage JavaServerTM Faces technology in their products. While developing the presentation, I am learning some things about the work we’ve been doing on JavaServer Faces for the past three years. The vendors have their own set of concerns unique to adapting their product for JavaServer Faces, but they all voice one opinion loud and clear: they are very relieved to finally have a standard for web-based user interfaces.
标签: collaborating component interface foreword
上传时间: 2014-08-27
上传用户:时代电子小智
This book covers the fundamental concepts of data mining, to demonstrate the potential of gathering large sets of data, and analyzing these data sets to gain useful business understanding. The book is organized in three parts. Part I introduces concepts. Part II describes and demonstrates basic data mining algorithms. It also contains chapters on a number of different techniques often used in data mining. Part III focusses on business applications of data mining. Methods are presented with simple examples, applications are reviewed, and relativ advantages are evaluated.
标签: fundamental demonstrate the gathering
上传时间: 2014-12-02
上传用户:15736969615
Objectives The purpose of this notebook is to give you a brief introduction to the DiscreteWavelets Toolbox and show you how to use it to load images. Some basic image manipulation is illustrated as well. You will also learn how to use measures and tools such as cumulative energy, entropy, PSNR, and Huffman coding. Help on the DiscreteWavelets Toolbox Help for the toolbox is available by clicking on Help and then Product Help (or press F1) and then clicking on the DiscreteWavelets Toolbox. Several demos and examples are available as well by clicking on the Demos tab on the Help menu. Image Basics The DiscreteWavelets Toolbox comes with 18 grayscale images and 9 color images for you to use. There are three functions available to tell you more about these images. The first function is called |ImageList|. This function can tell you the names and sizes of the digital images in the Toolbox.
标签: introduction DiscreteWav Objectives notebook
上传时间: 2017-06-30
上传用户:康郎
KML 2.0介绍 KML全称是Keyhole Markup Language KML,是一个基于XML语法和文件格式的文件,用来描述和保存地理信息如点、线、图片、折线并在Google Earth客户端之中显示 The core of the project is the KMLCreator.cs. This has three classes, KMLCoordinates, KMLPoint and KMLLine
标签: KML Language Keyhole Markup
上传时间: 2017-07-25
上传用户:tzl1975