虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

commons-pool-current

  • In the bank all the activities are being done manually .As the bank widens its services & it finds d

    In the bank all the activities are being done manually .As the bank widens its services & it finds difficult to manage its operations manually and hence this leads to the automation of some of its operations. Banking Information system is a windows based applications. This project mainly deals with managing there types of account such as Saving Account, Current Account and Recurring Deposits . In this project bank is seeking to manage these account through computer based system. Tasks involved in this project are opening the user accounts , recording the account holders transactions , modify, the user records and generating the reports . This project is having three module: ] 1. Bank Master Module 2. Transaction Module 3. Reports module

    标签: the bank activities manually

    上传时间: 2013-12-13

    上传用户:LouieWu

  • The file contains a demo of how tabbed content is organized in a web page.Its highly useful as curre

    The file contains a demo of how tabbed content is organized in a web page.Its highly useful as current day websites the information is organized in to sets of data.Each information can be grouped under each tab

    标签: organized contains content highly

    上传时间: 2017-04-14

    上传用户:xsnjzljj

  • C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and exam

    C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and example projects files facilitate writing C/C++ Code for the TI鈥檚 28xx MCUs. The code can be used as a learning tool or as the basis for a development platform depending on the current needs of the user. We suggest that you immediately download these header files in order for an easier transition to understanding the 28xx peripherals.

    标签: Peripheral peripheral and Examples

    上传时间: 2014-01-24

    上传用户:fandeshun

  • A Design and Implementation of The Online Shopping System Abstract: Along with the development

    A Design and Implementation of The Online Shopping System Abstract: Along with the development of the computer ,the database technique is widespread in the application of Internet, more and more , providing more thoughtful and humanized service for the large network customer. Characteristic services have already become gradually the current as the application of Wed nowadays. This text studied a method of project which composed of characteristic page and dynamic state of technical customer according to the data connection rule, compared with some projects that adopt already on present nets, this project have the advantage of providing customers more simple ,reflective obvious meticulous use and so on..

    标签: Implementation development Abstract Shopping

    上传时间: 2014-12-04

    上传用户:410805624

  • Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to c

    Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two main problems seriously darken the future of this technology though. Firstly, the large number of attacks and weaknesses which appear as fast as new algorithms are proposed, emphasizes the limits of this technology and in particu-lar the fact that it may not match users expectations. Secondly, the requirements, tools and methodologies to assess the current technologies are almost non-existent. The lack of benchmarking of current algorithms is bla-tant. This confuses rights holders as well as software and hardware manufacturers and prevents them from using the solution appropriate to their needs. Indeed basing long-lived protection schemes on badly tested watermarking technology does not make sense.

    标签: Watermarking watermarking evaluation presented

    上传时间: 2013-12-04

    上传用户:thinode

  • Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/

    Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/e)x] step3:Slove x=1/F(u) step4:Repeat Step1~Step3 by using different u,you can get x1,x2,x3,...,xn step5:If the first packet was generated at time [0], than the second packet will be generated at time [0+x1],The third packet will be generated at time [0+x1+x2], and so on …. Random-number generation 1.static method random from class Math -Returns doubles in the range 0.0 <= x < 1.0 2.class Random from package java.util -Can produce pseudorandom boolean, byte, float, double, int, long and Gaussian values -Is seeded with the current time of day to generate different sequences of numbers each time the program executes

    标签: Generate Possion between random

    上传时间: 2017-05-25

    上传用户:bibirnovis

  • 在实际项目项目开发中

    在实际项目项目开发中,很多时候需要用到邮件,比如论坛注册需要用邮件激活。 一般用Javamail发送,目前最新的版本是1.4.2 可以在http://java.sun.com/products/javamail/index.jsp 下载最新版本 如果使用的不是J2SE6,那么需要把 JavaBeans Activation Framework加到环境变量 可以在http://java.sun.com/javase/technologies/desktop/javabeans/jaf/index.jsp 下载 不过为了简化开发,可以直接使用apache common项目的mail 官方网站为: http://commons.apache.org/email/

    标签: 项目

    上传时间: 2014-02-13

    上传用户:龙飞艇

  • Login Manager V3.0(LM3.0) is an authentication system which can integrate with any existing website

    Login Manager V3.0(LM3.0) is an authentication system which can integrate with any existing website that meets the requirements. LM3.0 provides a gatekeeper where user must be authorized before entering the membership secured areas. Features: 1. Flexibility LM3.0 allows administrator to integrate it with the current unprotected website. This is especially useful if major changes are going to be painful. With LM3.0, you re just one step towards getting the security you needed most. 2. Speed LM3.0 uses PHP and MySQL which enables fast data transactions.

    标签: authentication 3.0 integrate existing

    上传时间: 2017-06-06

    上传用户:hullow

  • Text mining tries to solve the crisis of information overload by combining techniques from data mini

    Text mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth examination of core text mining and link detection algorithms and operations, this book examines advanced pre-processing techniques, knowledge representation considerations, and visualization approaches. Finally, it explores current real-world, mission-critical applications of text mining and link detection in such varied fields as M&A business intelligence, genomics research and counter-terrorism activities.

    标签: information techniques combining overload

    上传时间: 2014-01-02

    上传用户:Late_Li

  • This project features a full-hardware sound compressor using the well known algorithm: IMA ADPCM.

    This project features a full-hardware sound compressor using the well known algorithm: IMA ADPCM. The core acts as a slave WISHBONE device. The output is perfectly compatible with any sound player with the IMA ADPCM codec (included by default in every Windows). Includes a testbench that takes an uncompressed PCM 16 bits Mono WAV file and outputs an IMA ADPCM compressed WAV file. Compression ratio is fixed for IMA-ADPCM, being 4:1. PLEASE NOTICE THAT THIS CORE IS LICENSED UNDER http://creativecommons.org/licenses/by-nc-sa/3.0/ (Creative Commons Attribution-Noncommercial-Share Alike 3.0 Unported). That means you may use it only for NON-COMMERCIAL purposes.

    标签: full-hardware compressor algorithm features

    上传时间: 2014-01-14

    上传用户:Shaikh