采用3D Bresenham算法在兩點間劃一直線
% This program is ported to MATLAB from:
% B.Pendleton. line3d - 3D Bresenham s (a 3D line drawing algorithm)
% ftp://ftp.isc.org/pub/usenet/comp.sources.unix/Volume26/line3d, 1992
%
% Which is referenced by:
% Fischer, J., A. del Rio (2004). A Fast Method for Applying Rigid
% Transformations to Volume Data, WSCG2004 Conference.
% http://wscg.zcu.cz/wscg2004/Papers_2004_Short/M19.pdf
MTOOLS
version 2.0
Mtools is a public domain collection of programs to allow Unix systems
to read, write, and manipulate files on an MSDOS filesystem (typically a
diskette).
The following MSDOS commands are emulated:
Mtool MSDOS
name equivalent Description
----- ---- -----------
mattrib ATTRIB change MSDOS file attribute flags
mcd CD change MSDOS directory
mcopy COPY copy MSDOS files to/from Unix
mdel DEL/ERASE delete an MSDOS file
mdir DIR display an MSDOS directory
mformat FORMAT add MSDOS filesystem to a low-level format
mlabel LABEL make an MSDOS Volume label.
mmd MD/MKDIR make an MSDOS subdirectory
mrd RD/RMDIR remove an MSDOS subdirectory
mread COPY low level read (copy) an MSDOS file to Unix
mren REN/RENAME rename an existing MSDOS file
mtype TYPE display contents of an MSDOS file
mwrite COPY low level write (copy) a Unix file to MSDOS
"The GRAPHICS GEMS Series" was started in 1990 by Andrew Glassner. The vision and purpose of the Series was - and still is - to provide tips, techniques, and algorithms for graphics programmers. All of the gems are written by programmers who work in the field and are motivated by a common desire to share interesting ideas and tools with their colleagues. Each Volume provides a new set of innovative solutions to a variety of programming problems.
Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux
Main Features:
* Creates a virtual encrypted disk within a file and mounts it as a real disk.
* Encrypts an entire partition or storage device such as USB flash drive or hard drive.
* Encrypts a partition or drive where Windows is installed (pre-boot authentication).
* Encryption is automatic, real-time (on-the-fly) and transparent.
* Provides two levels of plausible deniability, in case an adversary forces you to reveal the password:
1) Hidden Volume (steganography) and hidden operating system.
2) No TrueCrypt Volume can be identified (Volumes cannot be distinguished from random data).
* Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS.
Further information regarding features of the software may be found in the:http://www.truecrypt.org/
Very low cost, low component count charger/adapter – replaces linear transformer based solutions
• Extremely simple circuit configuration designed for high Volume, low cost manufacturing
Very low cost, low component count charger/adapter – replaces linear transformer based solutions
• Extremely simple circuit configuration designed for high Volume, low cost manufacturing
DESCRIPTION
The DCP0105 family is a series of high efficiency, 5V
input isolated DC/DC converters. In addition to 1W
nominal galvanically isolated output power capability,
the range of DC/DCs are also fully synchronizable.
The devices feature thermal shutdown, and overload
protection is implemented via watchdog circuitry.
Advanced power-on reset techniques give superior
reset performance and the devices will start into any
capacitive load up to full power output.
The DCP0105 family is implemented in standard-
molded IC packaging, giving outlines suitable for high
Volume assembly.
Fortran 90 versions of all the Numerical Recipes routines appear in the following
Chapters B1 through B20, numbered in correspondence with Chapters 1 through 20
in Volume 1. Within each chapter, the routines appear in the same order as in Volume
1, but not broken out separately by section number within Volume 1鈥檚 chapters.
There are commentaries accompanying many of the routines, generally following
the printed listing of the routine to which they apply. These are of two kinds:
issues related to parallelizing the algorithm in question, and issues related to the
Fortran 90 implementation. To distinguish between these two, rather different, kind
his procedure is the power spectral density of the simulation, 3 signal source on the specific circumstances, see the "modern digital signal processing" Introduction to the first Volume, P202, Exercise 5. Experimental Methods