一个socks5的开发库 contains implementation of the TCP Tunneling technique for connection through Socks 4, 4a, 5, and HTTPS Proxy Servers.
标签: implementation connection Tunneling technique
上传时间: 2013-12-26
上传用户:iswlkje
a sample of the Ajax technique.
上传时间: 2016-04-19
上传用户:com1com2
AC Induction Motor Control Using Constant V/Hz Principle and Space Vector PWM technique with TMS320C240
标签: Induction Principle technique Constant
上传时间: 2013-12-25
上传用户:baitouyu
a kind converts a technique according to the simple speech A_D of ADM principle
标签: according technique principle converts
上传时间: 2014-01-07
上传用户:whenfly
AntColony Optimization --- Artificial Ants a Computational Intelligence technique 蚁群算法大牛编写的书籍,对于想了解蚁群算法的人有很大帮助
标签: Computational Optimization Intelligence Artificial
上传时间: 2014-01-02
上传用户:zjf3110
sinusoidal PWM technique for three voltage source Inverter
标签: sinusoidal technique Inverter voltage
上传时间: 2014-06-21
上传用户:sxdtlqqjl
Application and Researching of the 3G technique Used In Managed of the Embeded Vehicle System
标签: Application Researching technique the
上传时间: 2013-11-26
上传用户:coeus
PID Control and Tuning technique
标签: technique Control Tuning PID
上传时间: 2013-12-04
上传用户:aysyzxzm
We propose a technique that allows a person to design a new photograph with substantially less effort. This paper presents a method that generates a composite image when a user types in nouns, such as “boat” and “sand.” The artist can optionally design an intended image by specifying other constraints. Our algorithm formulates the constraints as queries to search an automatically annotated image database. The desired photograph, not a collage, is then synthesized using graph-cut optimization, optionally allowing for further user interaction to edit or choose among alternative generated photos. An implementation of our approach, shown in the associated video, demonstrates our contributions of (1) a method for creating specific images with minimal human effort, and (2) a combined algorithm for automatically building an image library with semantic annotations from any photo collection.
标签: substantially photograph technique propose
上传时间: 2016-11-24
上传用户:三人用菜
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
标签: demonstrates encryption functions implement
上传时间: 2017-03-08
上传用户:xuanchangri