Code is Sparse Concept Coding for Visual simulation experiment Analysis of this article, the effect is very good, and can be used directly. Accuracy compared to other algorithms, headroom is very large, you can quickly run, hoping to help after the upload. Procedures in the main program and the call... MatlabMatlab
With VC++MFC achieved of Visual of chat tools, main with has UDP agreement and TCP agreement, is divided into client and server, through test, can in LAN in for communications, is cannot across network, hope to you useful.................................................................................. chatVisual C++
This is a simple cryptography algorithm that build on the concept
that substitute the letters of the massage according to a pre-defined pattern
In that algorithm we must notice that the two patterns of true and false
alphabts must be in the same lenght... Crypt_Decrypt algrithmsPython
Is mainly calculated PSCAD in building model of HVDC calculation of compensating capacity.
Reactive.m is used to calculate the HVDC rectifier and inverter side reactive power compensation capacity, this program is based on DC transmission design laboratories and related parameters, for additional c... AlgorithmMatlab
Has different objects, perspectives, rotation, revolution
When the human eye looks at a scene, objects in the distance appear smaller than objects close by. Orthographic projection ignores this effect to allow the creation of to-scale drawings for construction and engineering.... Computer GraphicsC++
Ethernet For our extensive use Ethernet Equipment is to 48 位 MAC Address transmitting data frame and, therefore, must have a protocol maintenance IP The correspondence between addresses and physical addresses. Host system maintains a table used to store dynamic or static mappings between two addre... Sniffer Package captureC++
Implementing XOR cipher encryption / decryption in C#
A theoretical and practical implementation of the XOR encryption technology in C# which is extended from the Vernam cipher
is an encryption algorithm using a key to mash it up with the cipher
string.... Crypt_Decrypt algrithmsC#
Mình đang gặp khó khăn phần tạo key cho giải thuật mã hóa sử dụng DES.
Minh cần source code C, bạn nào có mong cho mình tham khảo.
Làm ơn gửi vào địa chỉ sau giúp mình: email@example.com... Crypt_Decrypt algrithmsC
Perfect realization IOCP source, rookie learning is essential, in addition there is also a pleasant surprise //IOCPS.cpp:implementation of the IOCPS class.
LWIP LPC2378 port implement UDP functionality, interrupt trigger
This project details how to use the LWIP networking stack with supported NXP LPC devices and boards. The LWIP stack provides low level networking support and is ideal for networking applications that require a low memory footpri... Driver DevelopmentC
JeefuseMDA is based on MDA javaEE platform for enterprise application development.
Integrates popular open source frameworks like Ibatis, and Hibernateand the Spring Framework, andSpring Security, andStruts2, andehcache, andLucene, andSOLR , Built as a basis for stable general framework. Defi... Web FrameworkJava
KPCA basic thought is the first low-dimensional nonlinear relationships between the variables in the input space by non-linear Mapping in the high-dimensional feature space, and take place in a high-dimensional feature space principal components analysis, evaluating data in non-
On the linear princ... MatlabMatlab