KML 2 SHP Converter for points, lines and polygons Extension for ArcView 3.x will convert KML files from Google Earth to ShapeFiles, adding a new field called “Name” in the shapefile attribute table, automatically storing the name entered on the “Google Earth – New” window.
标签: KML Converter Extension for
上传时间: 2014-12-09
上传用户:星仔
When working with mathematical simulations or engineering problems, it is not unusual to handle curves that contains thousands of points. Usually, displaying all the points is not useful, a number of them will be rendered on the same pixel since the screen precision is finite. Hence, you use a lot of resource for nothing! This article presents a fast 2D-line approximation algorithm based on the Douglas-Peucker algorithm (see [1]), well-known in the cartography community. It computes a hull, scaled by a tolerance factor, around the curve by choosing a minimum of key points. This algorithm has several advantages: 这是一个基于Douglas-Peucker算法的二维估值算法。
标签: mathematical engineering simulations problems
上传时间: 2013-12-20
上传用户:changeboy
ami_snake算法源代码,ami_snake is an implementationof the 2D snake technique proposedin . It is alevel set method based on the partial di¡ èerential equation.
上传时间: 2016-04-09
上传用户:wangyi39
Squaring circuits are an important building block for impulse-radio UWB non-coherent receivers. This work proposes a squarer, based on the quadratic law of saturated transistors. Such a circuit has already been proposed for lower frequency applications, therefore this work focuses on the extension to ultra wide bandwidth, with particular care to the consequences related to the deviation from the ideal quadratic law of 0.18μm CMOS transistors.
标签: impulse-radio non-coherent important receivers
上传时间: 2013-12-24
上传用户:kikye
北京大学ACM比赛题目 In 1742, Christian Goldbach, a German amateur mathematician, sent a letter to Leonhard Euler in which he made the following conjecture: Every even number greater than 4 can be written as the sum of two odd prime numbers. For example: 8 = 3 + 5. Both 3 and 5 are odd prime numbers. 20 = 3 + 17 = 7 + 13. 42 = 5 + 37 = 11 + 31 = 13 + 29 = 19 + 23. Today it is still unproven whether the conjecture is right. (Oh wait, I have the proof of course, but it is too long to write it on the margin of this page.) Anyway, your task is now to verify Goldbach s conjecture for all even numbers less than a million.
标签: mathematician Christian Goldbach Leonhard
上传时间: 2016-04-22
上传用户:wangchong
* Explains process algebra and protocol specification using µ CRL, a language developed to combine process algebra and abstract data types * Text is supported throughout with examples and exercises * Full solutions are provided in an appendix, while exercise sheets, lab exercises, example specifications and lecturer slides are available on the author s website
标签: specification developed Explains language
上传时间: 2016-04-27
上传用户:笨小孩
a screen handling program to provide a flashing message. You will have to design a screen layout for where messages are placed on the screen. You will also have to consider when to delay the program in order to give the user time to read the messages. That is, the program will use the curses library, signals and the sleep function.
标签: screen handling flashing program
上传时间: 2016-05-04
上传用户:chongcongying
Addfilter is a command-line application which adds and removes filter drivers for a given drive or volume. It is intended to demonstrate how to insert a filter driver into the driver stack of a device. The sample illustrates how to do this by using the SetupDi APIs. The sample works on the x86 platform. It has only been tested in a 32-bit environment. Since Addfilter is not a driver, it does not deal with Plug and Play or Power Management.
标签: command-line application Addfilter drivers
上传时间: 2016-05-17
上传用户:xzt
This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared secret key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. The HMAC specification in this standard is a generalization of Internet RFC 2104, HMAC, Keyed-Hashing for Message Authentication, and ANSI X9.71, Keyed Hash Message Authentication Code.
标签: message authentication keyed-hash describes
上传时间: 2014-01-07
上传用户:凤临西北
Addfilter is a command-line application which adds and removes filter drivers for a given drive or volume. It is intended to demonstrate how to insert a filter driver into the driver stack of a device. The sample illustrates how to do this by using the SetupDi APIs. The sample works on the x86 platform. It has only been tested in a 32-bit environment. Since Addfilter is not a driver, it does not deal with Plug and Play or Power Management. No INF file is needed to install this application.
标签: command-line application Addfilter drivers
上传时间: 2016-06-28
上传用户:源码3