虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

all-in-one

  • This project developed in java leads us to realize a flight reservation system in order to emulate d

    This project developed in java leads us to realize a flight reservation system in order to emulate databases containing the structures for the flight and for the booking. These bases extend the List interface and implements additional search鈥檚 methods. Two interfaces provide an access to this system. The first one reads and handles reservation request message from a terminal. The arguments are then processed throw a middleware interface that call the flight system methods. The second one, a Graphical User Interfaces (GUI) application using Swing Java Foundation Classes (JFC), offers a simpler access to the systems.

    标签: reservation developed project emulate

    上传时间: 2017-04-27

    上传用户:6546544

  • The advantages of automation can be exploited in order to solve or to minimize the needs of manual

    The advantages of automation can be exploited in order to solve or to minimize the needs of manual approach. In order to support the development of survey accurate cadastral system, an automatic programming approach will be adopted. Database selection system will conduct several outliers integrity checking, rebuild cadastral spatial topology (cadastral lot) and make selfcorrection procedures based on cadastral survey concepts and mathematical model respective to the cadastral lots selected. This is to ensure that all cadastral lots are kept in a closed polygon and provide accurate and "clean" cadastral information.. This system was developed in windows environment.

    标签: advantages automation exploited minimize

    上传时间: 2017-04-29

    上传用户:520

  • This algorithm is to count the dark colored pixels in the input image. This can be used in goods sor

    This algorithm is to count the dark colored pixels in the input image. This can be used in goods sorting like rice, paddy etc... in paddy or rice or other goods or products to sort out the bad or defect one we can use this algorithm. I had done this for my Masters Degree as a small part and now i am releasing for you. rajesh.f, Kanayakumari district, India. contact me: rajesh1983jan10@yahoo.com

    标签: This algorithm the colored

    上传时间: 2017-05-02

    上传用户:liglechongchong

  • Learn to model various modern communication systems with this book from one of the world s leading a

    Learn to model various modern communication systems with this book from one of the world s leading authors in communications, John G. Proakis. A very helpful reference to MATLAB users of various levels

    标签: communication leading systems various

    上传时间: 2017-05-07

    上传用户:jing911003

  • YFast is a PHP class developed to use on this blog, it gives you the possibility to use all modern t

    YFast is a PHP class developed to use on this blog, it gives you the possibility to use all modern technics of web development (etags, gzip, exipire headers) on your site in a very simple way -- and get A on YSlow.

    标签: possibility developed use modern

    上传时间: 2013-12-11

    上传用户:gut1234567

  • this document describes in details the freeman s chain code algorithm in regards to using for featur

    this document describes in details the freeman s chain code algorithm in regards to using for feature extraction in an OCR Application it also describes all the necessary phases to develop an ocr

    标签: describes algorithm document details

    上传时间: 2014-01-17

    上传用户:sy_jiadeyi

  • Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2

    Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair Playfair Key Matrix 1.a 5X5 matrix of letters based on a keyword 2.fill in letters of keyword (sans duplicates) 3.fill rest of matrix with other letters Encrypting and Decrypting -plaintext is encrypted two letters at a time 1. if a pair is a repeated letter, insert filler like X’ 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end) 3. if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) 4. otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair

    标签: monoalphabetic Playfair provides security

    上传时间: 2017-05-25

    上传用户:变形金刚

  • In C Algorithms for Real-Time DSP, author Paul M. Embree presents a complete guide to digital signal

    In C Algorithms for Real-Time DSP, author Paul M. Embree presents a complete guide to digital signal processing techniques in the C programming language. This book is structured in such a way that it will be most useful to the engineer who is familiar with DSP and the C language, but who is not necessarily an expert in both. All of the example programs in this book have been tested using standard C compilers in the UNIX and MS-DOS programming environments. In addition, the examples have been compiled using the real-time programing tools of specific real-time embedded DSP microprocessors (Analog Devices ADSP-21020 and ADSP-21062 Texas Instruments TMS320C30 and TMS320C40 and AT&T DSP32C) and then tested with real-time hardware using real-world signals.

    标签: M. Algorithms Real-Time complete

    上传时间: 2014-01-07

    上传用户:epson850

  • In the last decade the processing of polygonal meshes has emerged as an active and very productive

    In the last decade the processing of polygonal meshes has emerged as an active and very productive research area. This can basically be attributed to two developments:  Modern geometry acquisition devices, like laser scanners and MRT, easily produce raw polygonal meshes of ever growing complexity  Downstream applications like analysis tools (medical imaging), computer aided manufacturing, or numerical simulations all require high quality polygonal meshes as input. The need to bridge the gap between raw triangle soup data and high-quality polygon meshes has driven the research on ecient data structures and algorithms that directly operate on polygonal meshes rather than on a (most often not feasible) intermediate CAD representation.

    标签: processing productive the polygonal

    上传时间: 2017-06-03

    上传用户:TF2015

  • In engineering, compensation is planning for side effects or other unintended issues in a design. Th

    In engineering, compensation is planning for side effects or other unintended issues in a design. The design of an invention can itself also be to compensate for some other existing issue or exception. One example is in a voltage-controlled crystal oscillator (VCXO), which is normally affected not only by voltage, but to a lesser extent by temperature. A temperature-compensated version (a TCVCXO) is designed so that heat buildup within the enclosure of a transmitter or other such device will not alter the piezoelectric effect, thereby causing frequency drift. Another example is motion compensation on digital cameras and video cameras, which keep a picture steady and not blurry.

    标签: compensation engineering unintended planning

    上传时间: 2013-12-11

    上传用户:z754970244