Program helping you to remember the route.
It cab be route from Conference room to coffee-room, it can be tourist trip, it can be pathway in labyrinth. during first traversal you make notes in you phone, specifying direction of movement and target of each step. Phone remembers how much time each steps takes. Then you can just inspect information about this trip and check duration of each stage and the whole trip. You can also replay it in forward and backward direction. So if somebody show you the shortest way to coffee machine, you can easily find the way back and can repeat this trip in future.
Make and answer phone calls
Detect tone and pulse digit from the phone line
Capture Caller ID
Support blind transfer, single-step transfer/Conference, consultation transfer/Conference, hold, unhold.
Control of the local phone handset, microphone and speaker of the modem
Send and receive faxes
Play and record on the phone line or sound card
Play music in background mode
Silence detection
VU Meter
Wave sound editor that allows your end-users to edit their own sound files.
Voice recognition and voice synthesis.
Full control over the serial port device
ZModem file transfer utility
File compression and encryption utility
我用matlab寫的一個corner detector, 效果比現(xiàn)在流行的harris,susan,CSS等效果要好。
Algorithm is derived from:
X.C. He and N.H.C. Yung, Curvature Scale Space Corner Detector with Adaptive Threshold and Dynamic Region of Support , Proceedings of the 17th International Conference on Pattern Recognition, 2:791-794, August 2004.
Improved algorithm has been included in A Corner Detector based on Global and Local Curvature Properties and submitted to Optical Engineering.
采用3D Bresenham算法在兩點間劃一直線
% This program is ported to MATLAB from:
% B.Pendleton. line3d - 3D Bresenham s (a 3D line drawing algorithm)
% ftp://ftp.isc.org/pub/usenet/comp.sources.unix/volume26/line3d, 1992
%
% Which is referenced by:
% Fischer, J., A. del Rio (2004). A Fast Method for Applying Rigid
% Transformations to Volume Data, WSCG2004 Conference.
% http://wscg.zcu.cz/wscg2004/Papers_2004_Short/M19.pdf
fwknop stands for "Firewall Knock Operator" and is an upcoming piece of software that will be released at the DEFCON 12 Conference in July, 2004 in Las Vegas.
fwknop implements network access controls (via iptables) based on a flexible port knocking mini-language, but with a twist it combines port knocking and passive operating system fingerprinting to make it possible to do things like only allow, say, Linux-2.4/2.6 systems to connect to your SSH daemon.
fwknop supports shared, multi-protocol port knock sequences along with both relative and absolute timeouts, and coded port knock sequences encrypted with the Rijndael block cipher.
As I write this foreword, I am collaborating with four leading user interface
(UI) component vendors on a presentation for the 2004 JavaOneSM Conference.
In our presentation, the vendors will show how they leverage JavaServerTM
Faces technology in their products. While developing the presentation, I am
learning some things about the work we’ve been doing on JavaServer Faces for
the past three years. The vendors have their own set of concerns unique to
adapting their product for JavaServer Faces, but they all voice one opinion
loud and clear: they are very relieved to finally have a standard for web-based
user interfaces.
FERRET - a broadcast analysis tool
This tool is designed to demonstrate the problem of "data seapage".
The average machine broadcasts a lot of information about itself
on open networks. This tool captures and organizes this information.
This code is extremely low quality, hacked together in order to
demonstrate the problem at the BlackHat Federal 2007 Conference.
Higher quality code should be available around May 2007 on our
website at http://www.erratasec.com.