Code was successfully implemented within ALtera FPGA with Quartus 6.0. It presents two polish own female names: ULA and ALA whose are scrolling on the 4-columns crystal LED. When you press the switch it will turn from ULA into ALA and continue scrolling.
标签: successfully implemented presents Quartus
上传时间: 2013-12-09
上传用户:zjf3110
在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.
上传时间: 2017-04-04
上传用户:xaijhqx
Symbolic Representations of Time Series... SAX is just as good as other representations, or working on the raw data for most problems (Slides shown at the end of this presentation)
标签: Representations representations Symbolic working
上传时间: 2014-01-16
上传用户:dongqiangqiang
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.
标签: perceptual implementation algorithms fingerpr
上传时间: 2013-12-08
上传用户:星仔
Java has become a confusing world. Five years ago, there were few decisions to make once you started programming in Java—you used AWT for graphical user interfaces, sockets for network programming, and hacked together everything else you needed. Since then, though, the APIs available for the Java language have grown, and grown. . . and grown. Now you can dabble in Swing, servlets, Enterprise JavaBeans (EJB), JavaMail, and more. Additionally, there are now packages of APIs, like the Java 2 Micro Edition (J2ME) and Java 2 Enterprise Edition (J2EE). While these packages seem to be nicely wrapped bundles of useful APIs, they don t help the average developer figure out how to piece together the APIs contained in these packages. Though it s simple to find documentation on the individual APIs, getting the "big picture" is difficult, at best. One of the most interesting, but difficult, aspects of Java today is building Java enterprise applications using the J2EE package.
标签: confusing decisions become world
上传时间: 2013-12-30
上传用户:haoxiyizhong
This SPI-mode SD Card controller is a free SOPC Builder component that can be used in any SOPC Builder system. The included example design runs on the Nios II Embedded Evaluation Kit, Cyclone III edition (NEEK).
标签: SOPC controller component SPI-mode
上传时间: 2013-12-18
上传用户:jing911003
This SPI-mode SD Card controller is a free SOPC Builder component that can be used in any SOPC Builder system. The included example design runs on the Nios II Embedded Evaluation Kit, Cyclone III edition (NEEK).
标签: SOPC controller component SPI-mode
上传时间: 2017-05-14
上传用户:LouieWu
在J2ME中实现虚拟代理,然后过滤user-agent ,用于突破广东移动等的cmwap限制使用方法,启动后将相应软件(如Opera)的代理设成localhost 8080,即可-J2ME virtual agents, then filter user-agent, Guangdong Mobile breakthrough for the restrictions on the use of SMS, will start corresponding software (such as the Opera), the agent set to localhost 8080 can be
上传时间: 2017-05-22
上传用户:wuyuying
one of video tool Skype only in windows mobile5.0 more than running, but my task is to let it run Skype in WINCE only in windows mobile5.0 more than running, but my task is to let it run in WINCE . Leave no stone unturned when I can not get windows mobile, they thought would be needed for skype all library files to my WINCE, so perhaps will be able to run skype. 1. Used depend Show skype depends on which files. In fact, not many documents, I can remember only under the following: core.dllcommctr.dllaygeshell.dllhtmlview.dll In addition to htmlview.dll, the other documents in WINCE have (if your system does not, please IMAGE Canada on the corresponding module). Therefore, I find on the Internet htmlview.dll, the results really find
标签: running windows mobile Skype
上传时间: 2014-01-17
上传用户:miaochun888
) Compression using huffman code -with a number of bits k per code word -provide huffman table Huffman coding is optimal for a symbol-by-symbol coding with a known input probability distribution.This technique uses a variable-length code table for encoding a source symbol. The table is derived in a particular way based on the estimated probability of occurrence for each possible value of the source symbol .Huffman coding uses a specific method for representing each symbol, resulting in a prefix code that expresses the most common characters using shorter strings of bits than those used for less common source symbols.The Huffman coding is a procedure to generate a binary code tree.
标签: code Compression huffman provide
上传时间: 2017-05-30
上传用户:yuchunhai1990