虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

done

  • ARP test mode. According to the idea we design the arithmetic for the key part, first the system sen

    ARP test mode. According to the idea we design the arithmetic for the key part, first the system sends a message to the target machine, and then system wait for the response. Once system receives a message, it starts to analyze the message, according to the message s parameter system judges whether the message satisfies the conditions. Once the message satisfies all the conditions, the system thinks the machine is sniffing, and adds this machine into the list of sniffing machines. On this basis the detection has done well, and at the same time we insert the result into the log database for inquire and analyze later.

    标签: the arithmetic According design

    上传时间: 2016-10-06

    上传用户:chongcongying

  • Pango is a library for layout and rendering of text, with an emphasis on internationalization. Pang

    Pango is a library for layout and rendering of text, with an emphasis on internationalization. Pango can be used anywhere that text layout is needed however, most of the work on Pango so far has been done using the GTK+ widget toolkit as a test platform. Pango forms the core of text and font handling for GTK+-2.x.

    标签: internationalization rendering emphasis library

    上传时间: 2013-12-28

    上传用户:dancnc

  • Flex chip implementation File: UP2FLEX JTAG jumper settings: down, down, up, up Input: Reset -

    Flex chip implementation File: UP2FLEX JTAG jumper settings: down, down, up, up Input: Reset - FLEX_PB1 Input n - FLEX_SW switches 1 to 8 Output: Countdown - two 7-segment LEDs. done light - decimal point on Digit1. Operation: Setup the binary input n number. Press the Reset switch. See the countdown from n down to 0 on the 7-segment LEDs. done light lit when program terminates.

    标签: down implementation settings UP2FLEX

    上传时间: 2014-01-21

    上传用户:sclyutian

  • The literature of cryptography has a curious history. Secrecy, of course, has always played a centra

    The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.

    标签: cryptography literature has Secrecy

    上传时间: 2016-12-08

    上传用户:fxf126@126.com

  • anb 版的LBM程序 This code was written to show beginners in a simple and c short way the relevant proce

    anb 版的LBM程序 This code was written to show beginners in a simple and c short way the relevant procedures of a lattice Boltzmann solver, c pointing on how everything works "in principle". Nearly all c procedures could be implemented other (and better) as it is done c here, and even the algorithms used here could be changed to c save memory and increase performance. But the code works correct, c and we hope it will be good starting point for the first steps c in the lattice Boltzmann field. Good luck !

    标签: beginners relevant written simple

    上传时间: 2017-02-11

    上传用户:wlcaption

  • This sample is a simple example on how to perform a glow effect by rendering into an arbitrary size

    This sample is a simple example on how to perform a glow effect by rendering into an arbitrary size Frame Buffer Object (FBO). The Glow effect is performed on a specific part of the screen and can be done only on specific objects of the scene. You can imagine using such a postprocessing effect in CAD/DCC to emphasize some items from a selection or picking for example.

    标签: arbitrary rendering example perform

    上传时间: 2014-01-03

    上传用户:liuchee

  • Custom Visual Basic Packager and Installer for Visual Basic Developers. This is a group of standard

    Custom Visual Basic Packager and Installer for Visual Basic Developers. This is a group of standard exe projects 1. Packager 2. Setup1 The packager works like Visual basic Application deployment Wizard. And the setup1 project is used for the installation of the package. This project demonstrates how to compile visual basic project without launching the Vb6 kit and retrieving the dependency Files of any Visual basic project (although roughly done without any specific algorithm), Somebody can help me with this. I don’ t have time for the project, so I don’ t want any comment on the code indentation or arrangement and variable scoping. Comments are in the code therefore it would not be a problem to understand the code. If anyone wants to vote, I will like it Oh! I found some of the setup1 code and modify it with new features, so i have no or less credit for the setup1 project I felt like sharing code with PSCites. Thats why I made it

    标签: Visual Basic Developers Installer

    上传时间: 2017-02-26

    上传用户:FreeSky

  • The existence of numerous imaging modalities makes it possible to present different data present in

    The existence of numerous imaging modalities makes it possible to present different data present in different modalities together thus forming multimodal images. Component images forming multimodal images should be aligned, or registered so that all the data, coming from the different modalities, are displayed in proper locations. The term image registration is most commonly used to denote the process of alignment of images , that is of transforming them to the common coordinate system. This is done by optimizing a similarity measure between the two images. A widely used measure is Mutual Information (MI). This method requires estimating joint histogram of the two images. Experiments are presented that demonstrate the approach. The technique is intensity-based rather than feature-based. As a comparative assessment the performance based on normalized mutual information and cross correlation as metric have also been presented.

    标签: present modalities existence different

    上传时间: 2017-04-03

    上传用户:qunquan

  • SPIHT coding implementation. using wavelet transforms as a key tool. compression and decoding is don

    SPIHT coding implementation. using wavelet transforms as a key tool. compression and decoding is done using SPIHT algorithm.

    标签: implementation compression transforms decoding

    上传时间: 2014-11-26

    上传用户:asdfasdfd

  • if the method is to be made void, then it cannot have a return statement, all it can do is set the v

    if the method is to be made void, then it cannot have a return statement, all it can do is set the value. Your SeatReserved variable is already a global variable, so what you have in the last post will work, it is known as a set or setter method. All it does is set a value, usually these are done accross classes.

    标签: the statement cannot method

    上传时间: 2013-12-22

    上传用户:xaijhqx