XTHIDE is a GUI that allows the user to hide a text message in an image file. The user will be asked for a key that will be used to both encode and decode the text into an image. The key can be of length from 2 to 900 characters. The encryption pattern for a key hell is not a subset of the encryption pattern for hello . See help. Created with version 7.01.
標簽: user message XTHIDE allows
上傳時間: 2013-12-26
上傳用戶:erkuizhang
Abstract: Stuxnet, a sophisticated virus that damaged Iran's nuclear capability, should be an eye openerfor the world. We can choose to learn something very narrow (how to combat the Stuxnet virus) or wecan choose to focus on the larger goal of thwarting the next type of creative cyber attack. Unfortunately,critical industrial infrastructure is not currently designed with security as a key goal, leaving open multipleavenues for an educated and funded attacker to create massive problems. This tutorial outlines somebasic concepts that engineers and product definers should consider to make sure their new projects stayahead of future threats.
上傳時間: 2013-11-17
上傳用戶:llwap
Handheld electronic devices play a key role in our everydaylives. Because dependability is paramount, handhelds arecarefully engineered with lightweight power sources forreliable use under normal conditions. But no amount ofcareful engineering can prevent the mistreatment theywill undergo at the hands of humans. For example, whathappens when a factory worker drops a bar code scanner,causing the battery to pop out? Such events areelectronically unpredictable, and important data storedin volatile memory would be lost without some form ofsafety net—namely a short-term power holdup systemthat stores suffi cient energy to supply standby power untilthe battery can be replaced or the data can be stored inpermanent memory.
上傳時間: 2013-11-05
上傳用戶:coeus
The revolution of automation on factory floors is a key driver for the seemingly insatiable demand for higher productivity, lower total cost of ownership,and high safety. As a result, industrial applications drive an insatiable demand of higher data bandwidth and higher system-level performance. This white paper describes the trends and challenges seen by designers and how FPGAs enable solutions to meet their stringent design goals.
上傳時間: 2013-11-08
上傳用戶:yan2267246
寫號步驟: 1、將手機連通CDMA Workshop 2.7,在security選項卡里的 spc中點擊讀取,將000000填入spc里的方框,點擊spc鈕選擇send, 于是顯示spc解鎖成功。 2、點擊“nam”選項卡,將min填入10位碼(就是imsi碼去掉46003剩下的),將mcc填入460,mnc填入03,填入imsi15位碼,banner填入你想填的字符(我填的中國電信),點擊寫入即可 3、這一步,就應該寫入akey碼了(如果不知道AKEY,可以通過電信機房關閉鑒權,但是不推薦這樣做,有盜號風險),點擊“cave”選項卡,在A-Key后的方框 填入你的akey,點擊寫入即可。 4、重啟6950,能夠打電話了 針對白三角以及1X上網問題,請注意: 1、如果有白色三角漫游標記,通過將PRL由003升級到008解決方法是 :撥##778#,輸入SPC碼,即000000,點擊VIEW 中PRI后點EDIT,將拷貝到機子中的prl文件瀏覽選到,點擊OK升級 2、CDMA 1X無法上網的解決方法: 撥##778#,輸入SPC碼,即000000,點擊VIEW 中M.IP后將“Mobile IP Only ”改為“simly IP only” SPC在內存中的地址:018E:0190(只要輸入018E)
上傳時間: 2013-12-29
上傳用戶:ainimao
Collection of key-value pairs. TDictionary represents a generic collection of key-value pairs. This class provides a mapping from a collection of keys to a collection of values. When you create a TDictionary object, you can specify various combinations of initial capacity, equality operation, and initial content. You can add a key that is associated with a corresponding value with the Add or AddOrSetValue methods. You can remove entries with Remove or Clear, which removes all key-value pairs. Adding or removing a key-value pair and looking up a key are efficient, close to O(1), because keys are hashed. A key must not be nil (though a value may be nil) and there must be an equality comparison operation for keys. You can test for the presence or keys and values with the TryGetValue, ContainsKey and ContainsValue methods. The Items property lists all Count dictionary entries. You can also set and get values by indexing the Items property. Setting the value this way overwrites any existing value. The class TObjectDictionary inherits from TDictionary and provides an automatic mechanism for freeing objects removed from dictionary entries.
標簽: Delphi 泛型
上傳時間: 2015-07-01
上傳用戶:mirage
An optical fiber amplifier is a key component for enabling efficient transmission of wavelength-divisionmultiplexed(WDM)signalsoverlongdistances.Eventhough many alternative technologies were available, erbium-doped fiber amplifiers won theraceduringtheearly1990sandbecameastandardcomponentforlong-haulopti- caltelecommunicationssystems.However,owingtotherecentsuccessinproducing low-cost, high-power, semiconductor lasers operating near 1450 nm, the Raman amplifiertechnologyhasalsogainedprominenceinthedeploymentofmodernlight- wavesystems.Moreover,becauseofthepushforintegratedoptoelectroniccircuits, semiconductor optical amplifiers, rare-earth-doped planar waveguide amplifiers, and silicon optical amplifiers are also gaining much interest these days.
標簽: Propagation Light Media Gain in
上傳時間: 2020-05-27
上傳用戶:shancjb
MIMO-OFDM is a key technology for next-generation cellular communications (3GPP-LTE, Mobile WiMAX, IMT-Advanced) as well as wireless LAN (IEEE 802.11a, IEEE 802.11n), wireless PAN (MB-OFDM), and broadcasting (DAB, DVB, DMB). This book provides a comprehensive introduction to the basic theory and practice of wireless channel modeling, OFDM, and MIMO, with MATLAB ? programs to simulate the underlying techniques on MIMO-OFDMsystems.Thisbookisprimarilydesignedforengineersandresearcherswhoare interested in learning various MIMO-OFDM techniques and applying them to wireless communications.
標簽: Communications MIMO-OFDM Wireless MATLAB with
上傳時間: 2020-05-28
上傳用戶:shancjb
Smartphones have become a key element in providing greater user access to the mobile Internet. Many complex applications which used to be limited to PCs, have been developed and operated on smartphones. These applications extend the functionalities of smartphones, making them more convenient for users to be connected. However, they also greatly increase the power consumption of smartphones, making users frustrated with long delays in Web browsing.
標簽: Browsing Mobile Cloud Using Web the
上傳時間: 2020-05-30
上傳用戶:shancjb
This book is about multipoint cooperative communication, a key technology to overcome the long-standing problem of limited transmission rate caused by inter- point interference. However, the multipoint cooperative communication is not an isolated technology. Instead, it covers a vast range of research areas such as the multiple-input multiple-outputsystem, the relay network, channel state information issues, inter-point radio resource management operations, coordinated or joint transmissions, etc. We suppose that any attempt trying to thoroughly analyze the multipoint cooperative communication technology might end up working on a cyclopedia for modern communication systems and easily get lost in discussing all kinds of cooperative communication schemes as well as the associated models and their variations.
標簽: Communication Multi-point Cooperative Systems
上傳時間: 2020-05-31
上傳用戶:shancjb