虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

regarding

  • 一款用JAVA制作开发的小型聊天软件

    一款用JAVA制作开发的小型聊天软件,里面附有安装程序和JAVA源代码。 Visual Chat 1.91 Developer Edition - Customize the Visual Chat code regarding your own requirements - Use customchatdev.html for developing / testing - Create .jar and .cab-files containing client-specific .class-files and the images-folder (use zip and cabarc compressing tools) - Adapt the customchat.html file - Upload all the files to your webserver - Start the ChatServer by invoking java at.ac.uni_linz.tk.vchat.ChatServer [port [server-key]] from your commandline - I kindly ask you to leave copyright and credit information in the InfoPanel.class as it is - but you are invited to add your own text. In case of violations I will consider excluding this class from the source in the future.

    标签: JAVA 软件

    上传时间: 2014-09-06

    上传用户:龙飞艇

  • NeC4.5 is a variant of C4.5 decision tree, which could generate decision trees more accurate than st

    NeC4.5 is a variant of C4.5 decision tree, which could generate decision trees more accurate than standard C4.5 decision trees, through regarding a neural network ensemble as a pre-process of C4.5 decision tree.

    标签: decision 4.5 accurate generate

    上传时间: 2013-12-10

    上传用户:anng

  • Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features:

    Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/

    标签: open-source encryption Features software

    上传时间: 2013-12-20

    上传用户:123啊

  • SCSI Multimedia Commands 鈥?3 (MMC-3) T10/1363-D 5.16 READ CAPACITY Command The READ CAPACITY comm

    SCSI Multimedia Commands 鈥?3 (MMC-3) T10/1363-D 5.16 READ CAPACITY Command The READ CAPACITY command (Table 144) provides a means for the Initiator to request information regarding the capacity of the Logical Unit. This command shall not report the correct capacity of the recorded data for CD-R, CD-RW and DVD-R/-RW media that does not have a Lead-out in the last Session or last Border-out. For CD-ROM, the returned logical block address is modified to allow returning a possibly inexact value (but one with a known error bound) based on the Table of Contents data

    标签: CAPACITY READ Multimedia Commands

    上传时间: 2017-04-17

    上传用户:liuchee

  • EMC/EMI design guidelines which would be of help to embedded designers . The are the basic ideas reg

    EMC/EMI design guidelines which would be of help to embedded designers . The are the basic ideas regarding EMI/EMC

    标签: guidelines designers embedded design

    上传时间: 2017-05-06

    上传用户:xauthu

  • Designing a synchronous finite state machine (FSM) is a common task for a digital logic engineer. T

    Designing a synchronous finite state machine (FSM) is a common task for a digital logic engineer. This paper discusses a variety of issues regarding FSM design using Synopsys Design Compiler. Verilog and VHDL coding styles are presented, and different methodologies are compared using real-world examples.

    标签: synchronous Designing engineer digital

    上传时间: 2014-01-17

    上传用户:dreamboy36

  • The potential of solving real-time demanding industrial applications, using vision-based algorithms

    The potential of solving real-time demanding industrial applications, using vision-based algorithms, drastically grew due to an increasing availability of computational power. In this thesis a novel real-time, vision-based Blackjack analysis system is presented. The embedding of the vision algorithms in a compound system of other information sources such as an electronic chip tray, reduces the vision task to detect cards and chips. Robust results are achieved by not just analyzing single frames but an image stream regarding game-ß ow informations. The requirements for such a system are a highly robust and adaptive behav- ior. This is motivated by the vital interest of casino entrepreneurs in a 100 statistical analysis of their offered gambling in order to support the business plan, measuring table and dealer performance and give accurate player rating. Extensive experiments show the robustness and applicability of the proposed system.

    标签: applications vision-based algorithms industrial

    上传时间: 2017-08-20

    上传用户:liansi

  • Core+and+Metro+Networks

    It is commonly accepted today that optical fiber communications have revolutionized telecommunications. Indeed, dramatic changes have been induced in the way we interact with our relatives, friends, and colleagues: we retrieve information, we entertain and educate ourselves, we buy and sell, we organize our activities, and so on, in a long list of activities. Optical fiber systems initially allowed for a significant curb in the cost of transmission and later on they sparked the process of a major rethinking regarding some, generation-old, telecommunication concepts like the (OSI)-layer definition, the lack of cross-layer dependency, the oversegmentation and overfragmentation of telecommunica- tions networks, and so on.

    标签: Networks Metro Core and

    上传时间: 2020-05-27

    上传用户:shancjb

  • Essentials+of+Radio+Wave+Propagation

    The objective of this book is to allow the reader to predict the received signal power produced by a particular radio transmitter. The first two chapters examine propagation in free space for point-to-point and point-to-area transmission, respectively. This is combined with a dis- cussion regarding the characteristics of antennas for various purposes. In chapter 3, the effect of obstacles, whether buildings or mountains, is discussed and analytical methods, whereby the strength of a signal is the shadow of an obstacle can be predicted, are presented. 

    标签: Propagation Essentials Radio Wave of

    上传时间: 2020-05-27

    上传用户:shancjb

  • Ultra Wideband Signals and Systems 1st

    In this book we focus on the basic signal processing that underlies current and future ultra wideband systems. By looking at signal processing in this way we hope this text will be useful even as UWB applications mature and change or regulations regarding ultra wideband systems are modified. The current UWB field is extremely dynamic, with new techniques and ideas being presented at every communications and signal-processing conference. The basic signal-processing techniques presented in this text though will not change for some time to come. Thus, we have taken a somewhat theoretical approach, which we believe is longer lasting and more useful to the reader in the long term than an up-to-the-minute summary that is out of date as soon as it is published.

    标签: Wideband Signals Systems Ultra 1st

    上传时间: 2020-06-01

    上传用户:shancjb