Sponsored links

Top Source Codes

PHPEXCEL PHPEXCEL PHPEXCEL PHPEXCEL

PHPEXCEL PHPEXCEL PHPEXCEL PHPEXCEL PHPEXCEL PHPEXCEL PHPEXCEL PHPEXCEL PHPEXCEL PHPEXCEL PHPEXCEL PHPEXCEL PHPEXCELPHPEXCEL V V V V PHPEXCEL PHPEXCEL PHPEXCEL...
  Document        PHP     

PLX pcipcie interface IC WDM driver program

PLX chip WDM pcipcie interface driver source, suitable for Plx8000;Plx6000;Plx9050;Plx9030;Plx9080;Plx9054;Plx9056;Plx9656 Plx8311. -PLX pci pcie interface chip WDM driver source code for Plx8000 Plx6000 Plx9050 Plx9030 Plx9080 Plx9054 Plx9056 Plx9656 Plx8311....
  Driver Development        C     

Sparse Concept Coding for Visual Analysis

Code is Sparse Concept Coding for Visual simulation experiment Analysis of this article, the effect is very good, and can be used directly. Accuracy compared to other algorithms, headroom is very large, you can quickly run, hoping to help after the upload. Procedures in the main program and the call...
  Matlab        Matlab     

UDP/TCP CHATROOM MFC

With VC++MFC achieved of Visual of chat tools, main with has UDP agreement and TCP agreement, is divided into client and server, through test, can in LAN in for communications, is cannot across network, hope to you useful..................................................................................
  chat        Visual C++     

simple encrypt decrypt functions with python

This is a simple cryptography algorithm that build on the concept that substitute the letters of the massage according to a pre-defined pattern In that algorithm we must notice that the two patterns of true and false alphabts must be in the same lenght...
  Crypt_Decrypt algrithms        Python     

Open source honeypot capture HPC

Capture is a high interaction client honeypot (also called honeyclient). A client honeypot or honeyclient is a security technology that allows one to find malicious servers on a network. Capture identifies malicious servers by interacting with potentially malicious servers using a dedicated virtu...
  Java Development        Java     

Phyton Capcha decoder

Captcha decoder 80% accuracy - Get softer image - Select image - Display text...
  Algorithm        Python     

Build a HVDC transmission model in PSCAD compensation capacity calculation

Is mainly calculated PSCAD in building model of HVDC calculation of compensating capacity. Reactive.m is used to calculate the HVDC rectifier and inverter side reactive power compensation capacity, this program is based on DC transmission design laboratories and related parameters, for additional c...
  Algorithm        Matlab     

PIC PCC process

Talk more, share more I need enc28j60+PIC program right now, but the integration is not enough. Thank you, I'm a rookie, everyone can contain...
  Arm        C     

update.cupdate.c

update.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupdate.cupda...
  Image Processing        C     

Planet Computer Graphics Open GL

Has different objects, perspectives, rotation, revolution When the human eye looks at a scene, objects in the distance appear smaller than objects close by. Orthographic projection ignores this effect to allow the creation of to-scale drawings for construction and engineering....
  Computer Graphics        C++     

This is a text redactor on WinApi C++

This is a text redactor on Win Api C++. Options: 1)Open file 2)Save file 3)Save as... 4)Information about programm 5)Exit...
  Win API C++        C++     

Using the ARP protocol active hosts within the local network physical address

Ethernet For our extensive use Ethernet Equipment is to 48 位 MAC Address transmitting data frame and, therefore, must have a protocol maintenance IP The correspondence between addresses and physical addresses. Host system maintains a table used to store dynamic or static mappings between two addre...
  Sniffer Package capture        C++     

Implementing XOR cipher encryption / decryption in C#

Implementing XOR cipher encryption / decryption in C# A theoretical and practical implementation of the XOR encryption technology in C# which is extended from the Vernam cipher   Introduction XOFT is an encryption algorithm using a key to mash it up with the cipher string....
  Crypt_Decrypt algrithms        C#     

DEVELOPMENT ENCRYPTION -SECURE COMMUNICATION USING PUBLIC KEY AND SYMMETRICKEY

Encryption is the conversion of data into a form, called a cipher text that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood. The use of encryption/decryption is as old as the ar...
  Crypt_Decrypt algrithms        C#     

Tôi đang gặp vấn đề liên quan đến Encryption.Decryption sử dụng thuật toán mã hóa DES

Mình đang gặp khó khăn phần tạo key cho giải thuật mã hóa sử dụng DES. Minh cần source code C, bạn nào có mong cho mình tham khảo. Làm ơn gửi vào địa chỉ sau giúp mình: vuquangbk0612@gmail.com...
  Crypt_Decrypt algrithms        C     

Delphi COM introduction to programming

Software reuse is the goal of the industry, people have wanted to be like building blocks like "assemble" applications, role of component object acts as a building block. So-called component object is actually good and can complete a certain predefined functionality of services or interfaces....
  book        Delphi     

OPAL Architecture

c'est un fichier qui décrit les détails du projet opal qui décrit le fonctionnement du driver de la societe ST avec le hard ainsi que le Middle Ware de SagemCom Opal...
  book        PDF     

lpc2 can examples

The following Philips LPC2k CAN examples are provided: LPC2_CANAll_V110: Receives all CAN messages in a receive queue. LPC2_CANFull_V110: Uses Full-CAN-like reception filtering. LPC2_CANBlinky_V130: Minimal example of MicroCANopen, uses Full-CAN-like  reception filtering and...
  Embeded        C     

ICMP VC code

Using ICMP Traceroute program, ICMP protocol is often used in the network, like the Ping command network blocked or not, this is actually work of the ICMP protocol. The program is to use ICMP messages to implement traceroute functionality....
  Socket        Visual C++     

Hot Search Keywords


    Sponsored links
scattered plots |  bi cubic interpolation delphi |  18153 MGB OpenSource Guestbook outsource?name=guestb hit 6 |  sunplus SPHE8202 datasheet |  A3 A8 algorithm implementation |  pngdec |  ?C Building Blocks powered by TPK Guestbook procur |  步进电机细分程序下载 |  stationary wavelet transform |  using ode 45 matlab code |  c 串口调试工具 |  haffman decoding code in matlab |  edge orientation histogram |  短信 猫 |  60870 5 english |  LPC i2C?cmd=sign |  ps2 keyboard intefacing to led matrix display 8x8 |  ecg signals feature extraction |  cad arx ? |  spectral subtraction method speech enhancement program |  scheduling shortest job first round robin |  nexys 3 keyboard |  OCR arab |  imaqt Powered by: Maian Guestbook It? tbs=qdr:w?mop=AddEnt |  CAD shp |  arabic ocr |  vb6 qrcode |  android snake and ladder powered by PHP Weby Die&ct=clnk |  srtf scheduling in vb6 |  unicornviewer 英文版 |  KAKADU SDK |  tc74 avr Powered by: Maian Guestbook county?cmd=sign |  keil sim300 sms |  sse2? Powered by Advanced Guestbook Power|4 |  波形 显示 dll |  xml parser VC |  tcpmp 081 MGB OpenSource Guestbook flew |  cad nurbs |  Jquery TreeGrid |  exponential backoff algorithm |  online movie ticket booking using netbeans |  ec1602j datasheet |  SPI nios ii |  poker ocr |  ??RSA?????????? |  JCOP smartcard |  ICM 300 sankyo |  hilditch algorithm for skeletonization |  4DyuchiGX Powered by Advanced Guestbook forma?ct=clnk |  c code single link hierarchical clustering |  EPSON M150 Designed by: PHPLD Your Site Add Article sp?m |  particle filter in auditory brainstem response signal proces |  c code for Lee’s algorithm |  Jarvis Patrick Clustering |  Other |  spce061 sd |  DSP2833x |  4G LTE |  Radar scr |  rx12864 powered by TPK Guestbook the?cmd=sign&mop=AddEnt |  430F149 iic?mop=AddEntry&name=Guest hit 43 href=&op=modload |  ATmega1280 ADC |  transl Powered by Advanced Guestbook bilingual&ct=clnk?cmd |  hummingbird encryption decryption algorithm |  GPS based Route Discovery Algorithms for On demand Routing P |  VMATLAB Programs: OSIC Detection Methods blast MMSE OSIC m |  dibcom |  Iclass |  image to pixel conversion in verilog |  渭C Building Blocks powered by TPK Guestbook procured |  vhdl ad9744 powered by advanced guestbook interior?name=Gu |  criminisi Designer: Free PHPLD Templates Submit Article?c |  HY mini STM32V arm board |  simulation model for perturb and observe method |  fingerprint image quality estimation matlab code |  Rectangle Detection based on aWindowed Hough Transform |  koch curve in c |  SMACOF algorithm |  algorithm 2opt Powered by: Maian Guestbook More>>Snowden: |  100151 100035 : php Link Directory Add Article |  a trous wavelet transform |  ?mop=AddEntry&name=G hit 26 href= s 0 Local ter&op=modload |  clistctrl自绘 |  region splitting and merging based segmentation |  8255 with proteus design |  cepstrum |  beamforming ultrasound |  coding for RIP protocol using ns2 |  friendly arm mini 2440 based projects |  ? php link directory submit article &cmd=sig&prev= se |  Flying Capacitor Multilevel Inverter |  preisach model matlab powered by PHP Weby tire?tbs=qd |  direct3D 9 |  Mathematics delphi |  qdhq cn |  Scock5 |  space vector pwm ppt |  Assmbler |  edge betweenness clustering algorithm |  hidden surface removal algorithm z buffer algorithm in c |