Sponsored links

Top Source Codes

Introduction to nodeJS program

Introduction to nodeJS simplest programs, teach you an example, a product of Baidu using nodeJS statistical graphs, learn to nodeJS...
  Java Development        JavaScript     

de2 practice source 2-2

2 the first part of the experiment FPGA de2 development boards VhDL hardware language source code Part II You are to design a circuit that converts a four-bit binary number V = v3v2v1v0 into its two-digit decimal equivalent D = d1d0. Table 1 shows the required output values. A par...
  Embeded      VHDL     

Shirodemo authority management tools

Shirodemo simple use case of Shiro. Shiro is the right management tool. Permission management can be controlled in several ways, here is a simple use case of Shiro....
  Java Development        Java     

TComPort componente para delphi

Componente para comunicacao serial assincrono para delphi 7 - xe utilizando winapi, com thread, pego da pagina sourceforge.net, e colocado aqui para obter pontos....
  Delphi Development        Delphi     

Data Encryption Standard (deS) Key Schedule

This code provides an implementation of the key schedule in Data Encryption Standard (deS), which is the algorithm that generates the sub-keys. • Input:  any string (64-bits length). • Output: the 16 sub-keys produced by the deS (48-bits length each). how to use it: 1. >> K...
  Crypt_Decrypt algrithms        Matlab     

TS demux to the ES stream and ES packages to PES and TS

TS demux to the ES stream and ES packages to PES and TS Good understanding of TS, ES, PES...
  video        C++     

PhP deS Implementation

encrypt using single deS (with an 8 byte key) in CBC mode with the given input vector and PKCS7 padding des ("8bytekey", "This is the message.", 1, 1, "inputvec", 1); encrypt using triple deS (with a 24 byte key) in ECB mode des ("this is a 24 byte key !!", "This is the message.", 1); decrypt u...
  Crypt_Decrypt algrithms        PHP     

3deS,MAC algorithm for encryption and decryption tests source code

3deS,MAC algorithm for encryption and decryption tests source code, suitable for beginners. MAC algorithm (Message Authentication Codes) keyed hash functions: the hash value of the message is known by only two key k to control....
  Crypt_Decrypt algrithms        C     

pdf reader code in android

These codes were developed for android to open and read the pdf documents. These codes were developed for android to open and read the pdf documents. These codes were developed for android to open and read the pdf documents. These codes were developed for android to open and read...
  Java Development        Java     

Jdeveloper App

Aplicacion de ejemplo para la implementacion de Webservices, JAX-WS, Store Procedures, SQL, XML, etc....
  Java Develop        Java     

des multi-mode encryption and decryption, ECB/CBC/OFB

Realization of deS encryption and decryption, you can choose from a variety of patterns, such as CBC,OFB,CFB,CTR, and so on, there's 3deS encryption and decryption functions. Can be either a string encryption and decryption, also support for file encryption and decryption, the default path for...
  Crypt_Decrypt algrithms        C++     

Java code for 3deS

This is a java application will help encryption in 3 deS. It can be used in magnetic stripe card reader interfacing and reader development itself...
  Embeded        Java     

epub reader on android iphone

These codes are for android iphon to open and read the epub documents. These codes are for android iphon to open and read the epub documents. These codes are for android iphon to open and read the epub documents. These codes are for android iphon to open and read the epub documen...
  Java Development        Java     

3 c language implementation of deS encryption algorithm

3 transition algorithm is deS encryption standard algorithm, in various areas of encryption at this stage there is still a wide range of applications, this file using c language 3-deS encryption algorithm, contain all the algorithm the encryption and decryption processes to the study of information...
  Crypt_Decrypt algrithms        C     

Ymodem code for embedded systems

Ymodem protocol code, very easy to use, YMOdeM protocols, YMOdeM protocols, Ymodem YMOdeM agreement agreement code, very easy to use, YMOdeM protocols, YMOdeM protocols, Ymodem YMOdeM agreement agreement code, very easy to use, YMOdeM protocols, YMOdeM protocols, Ymodem YMOdeM agreement agreement co...
  Embeded        C     

javademojavademojavademojavademojavademojavademo

demodemodemodemo...
  Java Development        Java     

deS algorithm

deS algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des al...
  Java Development        Java     

XE2 delForEX v2.5.4

델파이 자체 포매터도 있지만 delForEX 익숙한분을 위해서 올립니다....
  OS Develop        Delphi     

ClassLoader-related code

JVM when the class is loaded, via ClassLoader loadClass () method to load class, loadClass (String name) method: Using parents entrust mode: When the JVM starts, the class loader in the boot JRE/RT.jar: bootstrap classloader, which loads the core Java API, and ExtClassLoader, and then start the ex...
  Java Development        Java     

Weight LeaderRank algorithm, the compute node importance ranking

Weighted LeaderRank algorithm belongs to based on random walk of node importance sort algorithm, it is on LeaderRank algorithm of improved and strengthened, can accurate and quickly of on network in the of node for importance sort, on errors data has is strong of anti-interference capacity, entered...
  Java Development        Java     

Hot Search Keywords


    Sponsored links
stock market prediction using svm algorithm?cmd=sign |  huawei mobile partner& sa=U& ei= rUNU7WMB6S1iQfYqIDoCg |  ATM NDC Host |  lzw dictionary code |  image segmentation using sobel edge detection delphi |  AD7730 C� |  BetterADODataSet?mop=AddEntry&op=modload&name=G hit hit 1 h |  infrared image processing using matlab |  wifidog Powered by Advanced Guestbook parse?name=Gue hit 8 |  GBKToBig5 powered by TPK Guestbook Crop&amp ct=clnk?name=g |  SIFT Cuda |  c language pseudocode for dsdv protocol |  source code for kbc game |  平台 直方图 均衡 |  embedded c code for pwm generation for 8051 |  libusb qt?name=Guestbook |  NNC |  ir2104 proteus powered by advanced guestbook bilingual&ct= |  lee maze router |  c program to find Nth prime number in a given range inclusi |  huawei mobile partner? sa=U& ei= rUNU7WMB6S1iQfYqIDoCg |  绮惧搧璇剧▼鏁欏缃戠珯 |  SIFT Cuda?cmd=sign |  quadtree segmentation opencv |  nds logger Powered by Discuz! X recording account index 1 |  grub 源码 分析 |  PIC CCS C DS1307 with 7 segment display clock code |  SNMP MIB Handbook |  100151 100035 : php Link Directory Add Article |  resorts management system project source code |  方程组 matlab |  asm人�?cmd=sign |  algorithm book |  CTabCtrl owner Draw?mop=AddEntry&name=Guestb hit?&op=modload |  jsteg steganography?mop=AddEntry&name=guestb hit&op=modload |  renesas cubesuite?mop=AddEntry&name=Guestb h hit&op=modload |  c coding for inverted pendulum |  online shopping mall in jsp and mysql?name=guestbook hit hit |  SET鍗忚 |  car parking management system vhdl |  keshab parhi solution manual for vlsi dsp systems powered |  conversion y4m to yuv video |  chameleon cluster |  none |  hisϵͳ Powered by Easy Guestbook sensitif?c=?cmd=sign |  URG 04LX UG01? sa=U& ei=CNTuUMmdGIuhigfU34BQ& ved=0 |  zebra 分析 |  ? Powered by Advanced Guestbook=?action=add RK=0 RS=aKHwQn |  OCR 版面 分析 |  mixim wsn LEACH omnet |  Image Enhancement via Adaptive Unsharp Masking |  leach and pegasis |  srs on online gas booking system |  Motion Blur Powered by Burning Book blurred&prev= search?q |  chipman mifare |  zkfpengx fingerprint vb |  lyapunov exponent time series |  c8051f340 PWM调节占空比 |  project on E Learning Environment?cmd=sign |  淇¢亾鏄犲皠 |  histogram equalization?mop=AddEntry&name=Guestboo&op=modload |  inertial navigation?mop=AddEntry&op=modload&name=Guestbook h |  MQ7 AVR GAS SENSOR |  GM1 1滾動建模 |  force player?mode=register&agreed=true&iscanyesno=yeswecan |  matlab code for Kaczmarz’s Method |  qrmaker 控件 powered by burning book data |  BFS DFS A 娑 Powered by Easy Guestbook Hal?name=g hit 1 h |  defective chess board |  MFRC 522 sdk?mop=AddEntry&name=G hit&op=modload |  16f639 Powered by Easy Guestbook airy?ct=clnk?cmd=sign |  opc C |  CC2540 bootloader?mop=AddEntry&name=Guestbo h hit&op=modload |  aSYCHRONOUS sample rate conversion?cmd=sign?name=Guestbook h |  Clibusb powered by TPK Guestbook the |  getipinterfaceentry?mop=AddEntry&name=Guestb hit&op=modload |  BCGDialogBar?mop=AddEntry&name=guestbook hi hit 8&op=modload |  I2S 椹卞姩绋嬪簭 |  LWIP mikroc |  OpenGL 鐢诲浘 |  fitting cylinder?mop=AddEntry&op=modload&name=Guestbook hit |  TMS320C 67?mop=AddEntry&op=modload&name=guestbook h h h h hi |  sparse src |  网上订货系统 stru |  wolf largest lyapunov?mop=AddEntry&name=Gues? hit&op=modload |  answer phone usb powered by advanced guestbook interior&ct |  16PU M301 G1 STEPPER MOTOR?mop=AddEntry&name=hit&op=modload |  GNC code?mop=AddEntry&name=Guestb hit 1 hr hit 11&op=modload |  midpoint parabola?mop=AddEntry&name=Guestboo hit&op=modload |  getRotationMatrix Android?mop=AddEntry&name=G hit&op=modload |  GN algorithm Designed by One Way Links Submit Article bi |  璐﹀彿瀵嗙爜?mop=AddEntry&name=Guestboo hit&op=modload |  sgu 425 |  invasive weeds optimization?mop=AddEntry&name=hit&op=modload |  adpcm decoder c powered by TPK Guestbook its?name=Guestboo |  ? Powered By: Article Friendly Ultimate ??mop=AddEntry&op=mo |  leader follower 模式?mop=AddEntry&name=G h hit&op=modload |  ?mop=AddEntry&op=modload&name=Guestbook&file=index |  ????????? Ultimate Guestbook Version |  ?cmd=sign |