OFELI is an object oriented library of C++ classes for development of finite element codes. Its main features are : * Various storage schemes of matrices (dense, sparse, skyline). * Direct methods of solution of linear systems of equations as well as various combinations of iterative solvers and preconditioners. * Shape functions of most "popular" finite elements * Element arrays of most popular problems (Heat Transfer, Fluid Flow, Solid Mechanics, Electromagnetics, ...).
物流分析工具包。Facility location: Continuous minisum facility location, alternate location-allocation (ALA) procedure, discrete uncapacitated facility location
Vehicle routing: VRP, VRP with time windows, traveling salesman problem (TSP)
Networks: Shortest path, min cost network flow, minimum spanning tree problems
Geocoding: U.S. city or ZIP code to longitude and latitude, longitude and latitude to nearest city, Mercator projection plotting
Layout: Steepest descent pairwise interchange (SDPI) heuristic for QAP
Material handling: Equipment selection
General purpose: Linear programming using the revised simplex method, mixed-integer linear programming (MILP) branch and bound procedure
Data: U.S. cities with populations of at least 10,000, U.S. highway network (Oak Ridge National Highway Network), U.S. 3- and 5-digit ZIP codes
Easy to use SMS/MMS Messaging Gateway to develop Content Delivery Platforms by GSM Operators,Content Providers and even non-telecom guys. Uses file system for data flow.Written for .NET 2.0 in C#
Coriander is a GUI for controlling a Digital Camera (in the sense of
the IIDC specs issued by the 1394 Trade Association [1]). Due to the
properties of the IEEE1394 protocol, Coriander can control an IEEE1394
camera without interferring with the image flow from that camera. It
can thus be used to setup a camera with Coriander while the video flow
is used by another application
書名:基本商業(yè)程序的建模
Essential Business Process Modeling (Paperback)
作者: Mike Havey
出版商:O Reilly 1 edition (August 18, 2005)
內(nèi)容介紹:
Ten years ago, groupware bundled with email and calendar applications helped track the flow of work from person to person within an organization. Workflow in today s enterprise means more monitoring and orchestrating massive systems. A new technology called Business Process Management, or BPM, helps software architects and developers design, code, run, administer, and monitor complex network-based business processes.
BPM replaces those sketchy flowchart diagrams that business analysts draw on whiteboards with a precise model that uses standard graphical and XML representations, and an architecture that allows it converse with other services, systems, and users.
This paper presents an interactive technique that
produces static hairstyles by generating individual hair strands
of the desired shape and color, subject to the presence of gravity
and collisions. A variety of hairstyles can be generated by
adjusting the wisp parameters, while the deformation is solved
efficiently, accounting for the effects of gravity and collisions.
Wisps are generated employing statistical approaches. As for
hair deformation, we propose a method which is based on
physical simulation concepts but is simplified to efficiently
solve the static shape of hair. On top of the statistical wisp
model and the deformation solver, a constraint-based styler
is proposed to model artificial features that oppose the natural
flow of hair under gravity and hair elasticity, such as a hairpin.
Our technique spans a wider range of human hairstyles than
previously proposed methods, and the styles generated by this
technique are fairly realistic.
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)