Code is Sparse Concept Coding for Visual simulation experiment Analysis of this Article, the effect is very good, and can be used directly. Accuracy compared to other algorithms, headroom is very large, you can quickly run, hoping to help after the upload. Procedures in the main program and the call... MatlabMatlab
With VC++MFC achieved of Visual of chat tools, main with has UDP agreement and TCP agreement, is divided into client and server, through test, can in LAN in for communications, is cannot across network, hope to you useful.................................................................................. chatVisual C++
This is a simple cryptography algorithm that build on the concept
that substitute the letters of the massage according to a pre-defined pattern
In that algorithm we must notice that the two patterns of true and false
alphabts must be in the same lenght... Crypt_Decrypt algrithmsPython
Capture is a high interaction client honeypot (also called honeyclient). A client honeypot or honeyclient is a security technology that allows one to find malicious servers on a network. Capture identifies malicious servers by interacting with potentially malicious servers using a dedicated virtu... Java DevelopmentJava
Is mainly calculated PSCAD in building model of HVDC calculation of compensating capacity.
Reactive.m is used to calculate the HVDC rectifier and inverter side reactive power compensation capacity, this program is based on DC transmission design laboratories and related parameters, for Additional c... AlgorithmMatlab
Has different objects, perspectives, rotation, revolution
When the human eye looks at a scene, objects in the distance appear smaller than objects close by. Orthographic projection ignores this effect to allow the creation of to-scale drawings for construction and engineering.... Computer GraphicsC++
Ethernet For our extensive use Ethernet Equipment is to 48 位 MAC Address transmitting data frame and, therefore, must have a protocol maintenance IP The correspondence between Addresses and physical Addresses. Host system maintains a table used to store dynamic or static mappings between two Addre... Sniffer Package captureC++
Implementing XOR cipher encryption / decryption in C#
A theoretical and practical implementation of the XOR encryption technology in C# which is extended from the Vernam cipher
is an encryption algorithm using a key to mash it up with the cipher
string.... Crypt_Decrypt algrithmsC#
Encryption is the conversion of data
into a form, called a cipher text that cannot be easily understood by
unauthorized people. Decryption is the process of converting encrypted data
back into its original form, so it can be understood.
The use of encryption/decryption is
as old as the ar... Crypt_Decrypt algrithmsC#
Mình đang gặp khó khăn phần tạo key cho giải thuật mã hóa sử dụng DES.
Minh cần source code C, bạn nào có mong cho mình tham khảo.
Làm ơn gửi vào địa chỉ sau giúp mình: firstname.lastname@example.org... Crypt_Decrypt algrithmsC
LWIP LPC2378 port implement UDP functionality, interrupt trigger
This project details how to use the LWIP networking stack with supported NXP LPC devices and boards. The LWIP stack provides low level networking support and is ideal for networking applications that require a low memory footpri... Driver DevelopmentC
Perfect realization IOCP source, rookie learning is essential, in Addition there is also a pleasant surprise //IOCPS.cpp:implementation of the IOCPS class.
Using ICMP Traceroute program, ICMP protocol is often used in the network, like the Ping command network blocked or not, this is actually work of the ICMP protocol. The program is to use ICMP messages to implement traceroute functionality.... SocketVisual C++
JeefuseMDA is based on MDA javaEE platform for enterprise application development.
Integrates popular open source frameworks like Ibatis, and Hibernateand the Spring Framework, andSpring Security, andStruts2, andehcache, andLucene, andSOLR , Built as a basis for stable general framework. Defi... Web FrameworkJava