这个存储过程是计算 MD5 值的,可以用来进行密码认证加密等。 SQL Server 的扩展存储过程 (Extended stored Procedure, 简称 XP) 是通过在 MSSQL 数据库注册封装在 .dll 里面的函数实现的, 而这个 .dll 应该按照 M$ 提供的规则, 并且要连接 MSSQL 的库文件。由于 C++ Builder 自带的 MSSQL 库文件 OPENDS60.LIB 比较旧, 本文提供新版本的 OPENDS60.LIB 库文件, 支持 MSSQL 2000 版本的
上传时间: 2014-01-14
上传用户:pompey
The Hopfield model is a distributed model of an associative memory. Neurons are pixels and can take the values of -1 (off) or +1 (on). The network has stored a certain number of pixel patterns. During a retrieval phase, the network is started with some initial configuration and the network dynamics evolves towards the stored pattern which is closest to the initial configuration.
标签: model distributed associative Hopfield
上传时间: 2015-06-17
上传用户:l254587896
A dynamic-link library (DLL) contains one or more subprogram procedures (functions or subroutines) that are compiled, linked, and stored separately from the applications using them. Because the functions or subroutines are separate from the applications using them, they can be shared or replaced easily.
标签: dynamic-link subroutines subprogram procedures
上传时间: 2014-01-15
上传用户:yyyyyyyyyy
These files contain all of the code listings in Java: The Complete Reference, J2SE 5 Edition The source code is organized into files by chapter. For example, the file Chap7.code contains the programs shown in Chapter 7. Within each chapter file, the listings are stored in the same order as they appear in the book. Simply edit the appropriate file to extract the listing in which you are interested.
标签: Reference Complete listings Edition
上传时间: 2013-12-18
上传用户:diets
This code was used for making the practical measurements in section 2.3 of my thesis. This Matlab code allows an OFDM signal to be generated based on an input data file. The data can be random data, a grey scale image, a wave file, or any type of file. The generated OFDM signal is stored as a windows wave file, allowing it to be viewed, listened to and manipulated in other programs. The modified wave file can then be decoded by the receiver software to extract the original data. This code was developed for the experiments that I performed in my honours thesis, and thus has not been fully debugged. This is the original code developed for the thesis and so has several problems with it. The BER performance given by the simulations is infact Symbol Error Rate.
标签: This measurements practical section
上传时间: 2015-09-20
上传用户:tedo811
Web technology is not evolving in comfortable and incremental steps, but i s turbulent, erratic, and often rather uncomfortable. It is estimated that the Internet, arguably the most important part of the new technological environment, has expanded by about 2000 % and that is doubling in size every six to ten months. In recent years, the advance in computer and web technologies and the decrease in their cost have expanded the means available to collect and store data. As an intermediate consequence, the amount of information (Meaningful data) stored has been increasing at a very fast pace.
标签: comfortable incremental technology and
上传时间: 2015-11-05
上传用户:Shaikh
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)
标签: Sometimes the contents desire
上传时间: 2013-12-25
上传用户:playboys0
Techniques for storing and processing data are at the heart of all programs. The term data structure is used to describe the way data is stored, and the term algorithm is used to describe the way data is processed.
标签: data Techniques processing structure
上传时间: 2014-03-10
上传用户:cc1
This a naive implementation of BOOTP/TFTPBOOT, the protocols to use to bootstrap a computer through a TCP/IP network. The goal was to design a small footprint implementation to allow the code to be integrated into a monitor program stored in a ROM/FLASH, the footprint is about 7 KBytes for the test program. This code has not been yet tested in many environment. It should be seen at your starting point to integrate the network boot function to your board.
标签: implementation bootstrap protocols TFTPBOOT
上传时间: 2013-12-18
上传用户:极客
Using Gaussian elimination to solve linear equations. // In this version, we allow matrix of any size. This is done by treating // the name of a 2-dimensional array as pointer to the beginning of the // array. This makes use of the fact that arrays in C are stored in // row-major order.
标签: elimination equations Gaussian version
上传时间: 2016-02-14
上传用户:hxy200501