一個socks5的開發庫 contains implementation of the TCP Tunneling technique for connection through Socks 4, 4a, 5, and HTTPS Proxy Servers.
標簽: implementation connection Tunneling technique
上傳時間: 2013-12-26
上傳用戶:iswlkje
a sample of the Ajax technique.
上傳時間: 2016-04-19
上傳用戶:com1com2
AC Induction Motor Control Using Constant V/Hz Principle and Space Vector PWM technique with TMS320C240
標簽: Induction Principle technique Constant
上傳時間: 2013-12-25
上傳用戶:baitouyu
a kind converts a technique according to the simple speech A_D of ADM principle
標簽: according technique principle converts
上傳時間: 2014-01-07
上傳用戶:whenfly
AntColony Optimization --- Artificial Ants a Computational Intelligence technique 蟻群算法大牛編寫的書籍,對于想了解蟻群算法的人有很大幫助
標簽: Computational Optimization Intelligence Artificial
上傳時間: 2014-01-02
上傳用戶:zjf3110
sinusoidal PWM technique for three voltage source Inverter
標簽: sinusoidal technique Inverter voltage
上傳時間: 2014-06-21
上傳用戶:sxdtlqqjl
Application and Researching of the 3G technique Used In Managed of the Embeded Vehicle System
標簽: Application Researching technique the
上傳時間: 2013-11-26
上傳用戶:coeus
PID Control and Tuning technique
標簽: technique Control Tuning PID
上傳時間: 2013-12-04
上傳用戶:aysyzxzm
We propose a technique that allows a person to design a new photograph with substantially less effort. This paper presents a method that generates a composite image when a user types in nouns, such as “boat” and “sand.” The artist can optionally design an intended image by specifying other constraints. Our algorithm formulates the constraints as queries to search an automatically annotated image database. The desired photograph, not a collage, is then synthesized using graph-cut optimization, optionally allowing for further user interaction to edit or choose among alternative generated photos. An implementation of our approach, shown in the associated video, demonstrates our contributions of (1) a method for creating specific images with minimal human effort, and (2) a combined algorithm for automatically building an image library with semantic annotations from any photo collection.
標簽: substantially photograph technique propose
上傳時間: 2016-11-24
上傳用戶:三人用菜
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
標簽: demonstrates encryption functions implement
上傳時間: 2017-03-08
上傳用戶:xuanchangri