These listed libraries are written in WTL. But it s really hard to mix both MFC & WTL together. Obviously, it s not reasonable to ask a developer or a team to giving up MFC and move to the WTL world just because there were some great controls or visual Frameworks written in WTL (there are many things that should be considered especially in a company with hundreds of developers like the company I work for). Unfortunately, there was no such good and free visual Framework in MFC until now. Whatever difficulties there are, I still desire to be able to use them and now my effort is here to be shared with you.
Under the Hood
北京大學ACM題
Here is a geometric problem. You have an angle and some squares in the first quadrant of the plane rectangular coordinates. The vertex of the angle is fixed on the origin O of the coordinates, and both of its radial lines are specified by the input. The sizes of the squares are also specified by the input, and the squares can shift vertically and horizontally. now your job is to use the squares and the radial lines of the angle to enclose the maximum area, which excludes the area of the squares (see Figure 1). You should note that the edges of the squares must be parallel to the axes.
北京大學ACM比賽題目
In 1742, Christian Goldbach, a German amateur mathematician, sent a letter to Leonhard Euler in which he made the following conjecture:
Every even number greater than 4 can be
written as the sum of two odd prime numbers.
For example:
8 = 3 + 5. Both 3 and 5 are odd prime numbers.
20 = 3 + 17 = 7 + 13.
42 = 5 + 37 = 11 + 31 = 13 + 29 = 19 + 23.
Today it is still unproven whether the conjecture is right. (Oh wait, I have the proof of course, but it is too long to write it on the margin of this page.)
Anyway, your task is now to verify Goldbach s conjecture for all even numbers less than a million.
北京大學ACM比賽題目
Consider an infinite full binary search tree (see the figure below), the numbers in the nodes are 1, 2, 3, .... In a subtree whose root node is X, we can get the minimum number in this subtree by repeating going down the left node until the last level, and we can also find the maximum number by going down the right node. now you are given some queries as "What are the minimum and maximum numbers in the subtree whose root node is X?" Please try to find answers for there queries.
WinChat was created in late 2000 by Spectre, DeMENted and Unique_T.
You can connect to WinChat.Net by pointing your IRC client at irc.winchat.net.
Or you can start a Java client right now.
There are two files in the zip folder. bpsk_spread.m and jakesmodel.m
Steps for simulation:
1] Run jakesmodel.m first
2] Then run bpsk_spread.m .
3] Note that during the first run bpsk_spread.m has no rayleigh fading.This is because the corresponding code has been commented
4] The resulting performance is stored in BER_awgn.
5] now uncomment the Rayleigh Fading code in bpsk_spread.m file.
6] Same time comment BER_awgn (line 112) and uncomment BER_ray variable.
7] Run the simulation.
To compare the perfromances of the receiver using DSSS plot the BER_awgn and BER_ray
This is the source code for encryption using the latest AES algorithm.
AES algorithm is also called Rijndael algorithm. AES algorithm is
recommended for non-classified use by the National Institute of Standards
and Technology(NIST), USA. now-a-days AES is being used for almost
all encryption applications all around the world.
Artistic Style is a reindenter and reformatter of C, C++, C# and Java source code.
When indenting source code, we as programmers have a tendency to use both spaces and tab characters to create the wanted indentation. Moreover, some editors by default insert spaces instead of tabs when pressing the tab key, and other editors (Emacs for example) have the ability to "pretty up" lines by automatically setting up the white space before the code on the line, possibly inserting spaces in a code that up to now used only tabs for indentation.
Also since the domain name--against which the retrieved domain name is to be matched--is currently hard coded.
Hence the hard coded name has to be change before compiling the user mode program
The .lib file which has been provided in \DD\DD folder is checked built using Win XP DDK as of now.
This program is a RADIUS RFC-compliant daemon, which is derived from
original Livingston Enterprise Inc. (now Lucent Inc.) RADIUS daemon
release 2.1. It adds a number of useful features to the LE daemon, i.e.