text within noisy code extraction
標簽: extraction within noisy text
上傳時間: 2015-11-30
上傳用戶:hongmo
The source code for this package is located in src/gov/nist/sip/proxy. The proxy is a pure JAIN-SIP application: it does not need proprietary nist-sip classes in addition of those defined in JAIN-SIP 1.1, you can substitute the NIST-SIP stack by another JAIN-SIP-1.1 compliant stack and it should interoperate. he proxy can act as presence server and be able to process NOTIFY and SUBSCRIBE requests. If this parameter is disabled, the proxy will simply forward those kind of requests following the appropriate routing decision.
標簽: proxy The JAIN-SIP package
上傳時間: 2015-11-30
上傳用戶:ippler8
he source code for this package is located in src/ directory. The JAIN-SIP-SERVICES is a JAIN-SIP application: it does not need proprietary nist-sip classes in addition of those defined in JAIN-SIP 1.1, you can substitute the NIST-SIP stack by another JAIN-SIP-1.1 compliant stack and it should interoperate.
標簽: JAIN-SIP-SERVICES directory JAIN-SIP package
上傳時間: 2013-12-30
上傳用戶:caiiicc
Viterbi Decoding Techniques in the TMS320C54x Family code 即是TMS320C54x實現VIterbi譯碼,是C與匯編混合編程,相信學習通信的又要用DSP來實現的人,一定會驚喜的
標簽: 320C Techniques 320 C54
上傳時間: 2014-10-27
上傳用戶:shinesyh
Hey. This some pid code for the atmega88 that I once used to control a heater. It s purpose is pretty specific, and I only wrote it to work on the mega88, so the code itself won t be too useful. It is a good place to start if you re trying to use or figure out pid though.
標簽: control purpose atmega heater
上傳時間: 2013-12-19
上傳用戶:天誠24
C procedures commonly used algorithm sets. Common C language code link. Contact enhancement of the C language code capacity.
標簽: enhancement procedures algorithm commonly
上傳時間: 2013-12-23
上傳用戶:變形金剛
wimax BS simulation code,implemented under linux.
標簽: implemented simulation wimax linux
上傳時間: 2014-08-03
上傳用戶:笨小孩
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)
標簽: Sometimes the contents desire
上傳時間: 2013-12-25
上傳用戶:playboys0
8051AD,use keil to program this code.
上傳時間: 2015-12-02
上傳用戶:aa54
51DEVTest use keil to program this code.
上傳時間: 2015-12-02
上傳用戶:jing911003