亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Regarding

  • 一款用JAVA制作開發的小型聊天軟件

    一款用JAVA制作開發的小型聊天軟件,里面附有安裝程序和JAVA源代碼。 Visual Chat 1.91 Developer Edition - Customize the Visual Chat code Regarding your own requirements - Use customchatdev.html for developing / testing - Create .jar and .cab-files containing client-specific .class-files and the images-folder (use zip and cabarc compressing tools) - Adapt the customchat.html file - Upload all the files to your webserver - Start the ChatServer by invoking java at.ac.uni_linz.tk.vchat.ChatServer [port [server-key]] from your commandline - I kindly ask you to leave copyright and credit information in the InfoPanel.class as it is - but you are invited to add your own text. In case of violations I will consider excluding this class from the source in the future.

    標簽: JAVA 軟件

    上傳時間: 2014-09-06

    上傳用戶:龍飛艇

  • NeC4.5 is a variant of C4.5 decision tree, which could generate decision trees more accurate than st

    NeC4.5 is a variant of C4.5 decision tree, which could generate decision trees more accurate than standard C4.5 decision trees, through Regarding a neural network ensemble as a pre-process of C4.5 decision tree.

    標簽: decision 4.5 accurate generate

    上傳時間: 2013-12-10

    上傳用戶:anng

  • Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features:

    Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information Regarding features of the software may be found in the:http://www.truecrypt.org/

    標簽: open-source encryption Features software

    上傳時間: 2013-12-20

    上傳用戶:123啊

  • SCSI Multimedia Commands 鈥?3 (MMC-3) T10/1363-D 5.16 READ CAPACITY Command The READ CAPACITY comm

    SCSI Multimedia Commands 鈥?3 (MMC-3) T10/1363-D 5.16 READ CAPACITY Command The READ CAPACITY command (Table 144) provides a means for the Initiator to request information Regarding the capacity of the Logical Unit. This command shall not report the correct capacity of the recorded data for CD-R, CD-RW and DVD-R/-RW media that does not have a Lead-out in the last Session or last Border-out. For CD-ROM, the returned logical block address is modified to allow returning a possibly inexact value (but one with a known error bound) based on the Table of Contents data

    標簽: CAPACITY READ Multimedia Commands

    上傳時間: 2017-04-17

    上傳用戶:liuchee

  • EMC/EMI design guidelines which would be of help to embedded designers . The are the basic ideas reg

    EMC/EMI design guidelines which would be of help to embedded designers . The are the basic ideas Regarding EMI/EMC

    標簽: guidelines designers embedded design

    上傳時間: 2017-05-06

    上傳用戶:xauthu

  • Designing a synchronous finite state machine (FSM) is a common task for a digital logic engineer. T

    Designing a synchronous finite state machine (FSM) is a common task for a digital logic engineer. This paper discusses a variety of issues Regarding FSM design using Synopsys Design Compiler. Verilog and VHDL coding styles are presented, and different methodologies are compared using real-world examples.

    標簽: synchronous Designing engineer digital

    上傳時間: 2014-01-17

    上傳用戶:dreamboy36

  • The potential of solving real-time demanding industrial applications, using vision-based algorithms

    The potential of solving real-time demanding industrial applications, using vision-based algorithms, drastically grew due to an increasing availability of computational power. In this thesis a novel real-time, vision-based Blackjack analysis system is presented. The embedding of the vision algorithms in a compound system of other information sources such as an electronic chip tray, reduces the vision task to detect cards and chips. Robust results are achieved by not just analyzing single frames but an image stream Regarding game-ß ow informations. The requirements for such a system are a highly robust and adaptive behav- ior. This is motivated by the vital interest of casino entrepreneurs in a 100 statistical analysis of their offered gambling in order to support the business plan, measuring table and dealer performance and give accurate player rating. Extensive experiments show the robustness and applicability of the proposed system.

    標簽: applications vision-based algorithms industrial

    上傳時間: 2017-08-20

    上傳用戶:liansi

  • Core+and+Metro+Networks

    It is commonly accepted today that optical fiber communications have revolutionized telecommunications. Indeed, dramatic changes have been induced in the way we interact with our relatives, friends, and colleagues: we retrieve information, we entertain and educate ourselves, we buy and sell, we organize our activities, and so on, in a long list of activities. Optical fiber systems initially allowed for a significant curb in the cost of transmission and later on they sparked the process of a major rethinking Regarding some, generation-old, telecommunication concepts like the (OSI)-layer definition, the lack of cross-layer dependency, the oversegmentation and overfragmentation of telecommunica- tions networks, and so on.

    標簽: Networks Metro Core and

    上傳時間: 2020-05-27

    上傳用戶:shancjb

  • Essentials+of+Radio+Wave+Propagation

    The objective of this book is to allow the reader to predict the received signal power produced by a particular radio transmitter. The first two chapters examine propagation in free space for point-to-point and point-to-area transmission, respectively. This is combined with a dis- cussion Regarding the characteristics of antennas for various purposes. In chapter 3, the effect of obstacles, whether buildings or mountains, is discussed and analytical methods, whereby the strength of a signal is the shadow of an obstacle can be predicted, are presented. 

    標簽: Propagation Essentials Radio Wave of

    上傳時間: 2020-05-27

    上傳用戶:shancjb

  • Ultra Wideband Signals and Systems 1st

    In this book we focus on the basic signal processing that underlies current and future ultra wideband systems. By looking at signal processing in this way we hope this text will be useful even as UWB applications mature and change or regulations Regarding ultra wideband systems are modified. The current UWB field is extremely dynamic, with new techniques and ideas being presented at every communications and signal-processing conference. The basic signal-processing techniques presented in this text though will not change for some time to come. Thus, we have taken a somewhat theoretical approach, which we believe is longer lasting and more useful to the reader in the long term than an up-to-the-minute summary that is out of date as soon as it is published.

    標簽: Wideband Signals Systems Ultra 1st

    上傳時間: 2020-06-01

    上傳用戶:shancjb

主站蜘蛛池模板: 闽清县| 施秉县| 孟州市| 壤塘县| 高平市| 舟曲县| 汉源县| 麻阳| 宜兰县| 伊金霍洛旗| 宁德市| 太湖县| 庆城县| 建湖县| 堆龙德庆县| 铜鼓县| 贵阳市| 汶川县| 华蓥市| 瑞昌市| 扶绥县| 奎屯市| 庄河市| 开江县| 淮滨县| 承德市| 明水县| 玛纳斯县| 外汇| 洪雅县| 桃园市| 六安市| 哈巴河县| 福鼎市| 周至县| 临泽县| 大新县| 南昌县| 汉寿县| 开平市| 盐池县|