Sponsored links

Top Source Codes

de2 practice source 2-2

2 the first part of the experiment FPGA de2 development boards VHDL hardware language source code Part II You are to design a circuit that converts a four-bit binary number V = v3v2v1v0 into its two-digit decimal equivalent D = d1d0. Table 1 shows the required output values. A par...
  Embeded      VHDL     

TComPort componente para delphi

Componente para comunicacao serial assincrono para delphi 7 - xe utilizando winapi, com thread, pego da pagina sourceforge.net, e colocado aqui para obter pontos....
  Delphi Development        Delphi     

Data Encryption Standard (deS) Key Schedule

This code provides an implementation of the key schedule in Data Encryption Standard (deS), which is the algorithm that generates the sub-keys. • Input:  any string (64-bits length). • Output: the 16 sub-keys produced by the deS (48-bits length each). How to use it: 1. >> K...
  Crypt_Decrypt algrithms        Matlab     

Jdeveloper App

Aplicacion de ejemplo para la implementacion de Webservices, JAX-WS, Store Procedures, SQL, XML, etc....
  Java Develop        Java     

Java code for 3deS

This is a java application will help encryption in 3 deS. It can be used in magnetic stripe card reader interfacing and reader development itself...
  Embeded        Java     

XE2 delForEX v2.5.4

델파이 자체 포매터도 있지만 delForEX 익숙한분을 위해서 올립니다....
  OS Develop        Delphi     

des multi-mode encryption and decryption, ECB/CBC/OFB

Realization of deS encryption and decryption, you can choose from a variety of patterns, such as CBC,OFB,CFB,CTR, and so on, there's 3deS encryption and decryption functions. Can be either a string encryption and decryption, also support for file encryption and decryption, the default path for...
  Crypt_Decrypt algrithms        C++     

pdf reader code in android

These codes were developed for android to open and read the pdf documents. These codes were developed for android to open and read the pdf documents. These codes were developed for android to open and read the pdf documents. These codes were developed for android to open and read...
  Java Development        Java     

epub reader on android iphone

These codes are for android iphon to open and read the epub documents. These codes are for android iphon to open and read the epub documents. These codes are for android iphon to open and read the epub documents. These codes are for android iphon to open and read the epub documen...
  Java Development        Java     

3 c language implementation of deS encryption algorithm

3 transition algorithm is deS encryption standard algorithm, in various areas of encryption at this stage there is still a wide range of applications, this file using c language 3-deS encryption algorithm, contain all the algorithm the encryption and decryption processes to the study of information...
  Crypt_Decrypt algrithms        C     

Ymodem code for embedded systems

Ymodem protocol code, very easy to use, YMOdeM protocols, YMOdeM protocols, Ymodem YMOdeM agreement agreement code, very easy to use, YMOdeM protocols, YMOdeM protocols, Ymodem YMOdeM agreement agreement code, very easy to use, YMOdeM protocols, YMOdeM protocols, Ymodem YMOdeM agreement agreement co...
  Embeded        C     

javademojavademojavademojavademojavademojavademo

demodemodemodemo...
  Java Development        Java     

deS algorithm

deS algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des algorithm des al...
  Java Development        Java     

ClassLoader-related code

JVM when the class is loaded, via ClassLoader loadClass () method to load class, loadClass (String name) method: Using parents entrust mode: When the JVM starts, the class loader in the boot JRE/RT.jar: bootstrap classloader, which loads the core Java API, and ExtClassLoader, and then start the ex...
  Java Development        Java     

de2 practice source 2-4

Part IV In part II we discussed the conVersion of binary numbers into decimal digits. It is sometimes useful to build circuits that use this method of representing decimal numbers, in which each decimal digit is represented using four bits. This scheme is known as the binary coded decimal (BCD) r...
  Embeded      VHDL     

deS encryption and decryption algorithm

Algorithm processes 1. replacement of the binary string to be processed for IP 2. will PC1 replacement key (64-bit to 56-bit), 3. held 16 rounds of operations, for I round operation: 1) received by the an on PC1 key (first level dropped out, others are shifted) result of left and right par...
  Crypt_Decrypt algrithms        C     

cadlib demo

NET applications with CadLib 4. CadLib makes it very easy to use C#,VB. NET or any other. NET language of DWG and DXF files. This is done by providing you with a complete type safety, integrated file and sample solution. CadLib renders is high quality and easy to integrate in your applications. Disp...
  cadlib demo        C#     

Necesito el fuente de Java

Por favor necesito bajar el fuente y ver de que se trata el mismo....ya que tengo que hace run elevador con arduino y java....
  Java Development        Java     

MD5 (supports Unicode code)

. Rar in the including two a file MD5.cpp and MD5.h, in MD5 of based Shang improved let its support Unicode of wide character, can on CString for 32 bit of encryption, using vs2010 for test had, in settlement programme "head file" "source file" respectively using added "has has items", will. h and....
  Crypt_Decrypt algrithms        C++     

delphi achieve access to the local machine name, IP, and the network card MAC address

delphi achieve access to the local machine name, IP, and the network card MAC address, in great detail, simple little programs, suitable for everybody to study the reference, what is not the perfect place, we can modify it yourself, I hope you share the best...
  Delphi开发        Delphi     

Hot Search Keywords


    Sponsored links
mediatek rom?mop=AddEntry&op=modload&name=Guestb hit 14 hit |  write segy?mop=AddEntry&op=modload&name=Guestb hit 1 hit 14 |  PSOC3?mop=AddEntry&op=modload&name=Guestboo h hit 14 href= s |  VOIP program java |  tcp ip通信模型 |  glcd ks0108 proton ide?name=G hit 1 href= hit hit 14 href= |  单片机usb通信 ch376 |  tcm 缂栫爜 powered by TPK Guestbook stylings&c?name=Gue |  affinity?mop=AddEntry&name=Guest hit 14 h hit 938&op=modload |  pic16f506 wdt |  lpc2014?mop=AddEntry&op=modload&name=Guestb? hit 14 href= |  ftdi stm32f4?mop=AddEntry&op=modload&name=Gue hit hit 14 h h |  IEC 870 5 102 |  channel estimation UTRAN?mop=AddEntry&op=modload&name=Guestb |  routing protocol for underlay cognitive radio ad hoc n etw |  spce061 sd |  wininet ftpcommand?mop=AddEntry&op=modload&name=guestbook h |  图片二进制?mop=AddEntry&op=modload&name=Guestb hit 14 h |  MPI4台机子快速排序 |  网络 摄像头 |  gaussian noise reduction |  rtsp delphi?cmd=sign |  strnchr?mop=AddEntry&op=modload&name=Guestb? hit 14 href= |  pbdecompile Ultimate Guestbook Version?action=sign Ultima |  host comment?mop=AddEntry?op=modload&name=Guestbook&file=ind |  PPM ns2 |  2842?mop=AddEntry&name=Guest h hit 1 hit 14 href&op=modload |  AM DSB MATLAB程序 |  windows? ? enter |  next generation network RK=0 RS=qqMtgrnuyXEb5kBAgBL0qqb7waI |  ADF?? powered by TPK Guestbook v belts?cmd=sign |  MLP神经网络?mop=AddEntry&op=modload&name=Guestb hit 14 h |  dXROptugTI?cmd=sign?mop=AddEntry&op=modload&name=hit 14 hit |  matlab code precision and recall for image retrieval |  solving queuing model in lingo |  schematic of temperature controller |  DIGITAL DOOR LOCK VHDL |  idocscript?mop=AddEntry&name=Guestboo hit 70 hre&op=modload |  guided missile simulation?name=Guestb hit 14 href= s 0 s7 |  2051 ?mop=AddEntry&op=modload&name=Guestb h hit 14 href hit |  modwt?mop=AddEntry&op=modload&name=Guestb hit 14 href= s 0 |  mfc?mop=AddEntry&op=modload&name=Guestboo hit hit 6 hit 14 h |  VSC7428?mop=AddEntry&op=modload&name=G hit hit 14 href hit h |  topology maker?name=Guestbo h hit 14 h hit 14 href= s 0 m |  wdt Fintek |  yss915?mop=AddEntry&name=G hit hit 14 h hit 1 hr&op=modload |  mobile anchor point in HMIPV6 |  OpenCV curve fit |  STM32F0?mop=AddEntry&name=Guestb hit 14 hit 1 hr&op=modload |  live5555?mop=AddEntry&op=modload&name=Guest hit 14 href= s |  s7 200 uss modbus?mop=AddEntry&name=guestbook hit&op=modload |  Teitz Bart?mop=AddEntry&op=modload&name=Gues hit 14 hit 1 h |  双三次插值?mop=AddEntry&op=modload&name=G hit 14 href= |  图片下载 vc |  测相程序 |  relogio 8051 |  jpeg2im?mop=AddEntry&op=modload&name=Guestb hit 14 href= s |  source code of Dynamic time warping in case of matrix |  playfair cipher?mop=AddEntry&name=G hit 14 href&op=modload |  JLK Report |  ?mop=AddEntry&op=modload&name=G hit 14 href= s hit 1 href= |  2051 ?mop=AddEntry&op=modload&name=Gues hit 73 hit 14 href= |  ?mop=AddEntry&name=hit 1 h hit 14 href= s 0 aes&op=modload |  susan detector c# |  matlab for real coded genetic algorithm |  TUN Powered by: Maian Guestbook fancy?cmd=sign |  LPC1768 USB HOST FAT32 |  TUN Powered by: Maian Guestbook fancy |  s 0 imaqt Powered by: Maian Guestbook their?cmd=sign |  RGB565 to RGB888 Powered by Easy Guestbook designation |  economic load dispatch matlab source |  s 0 imaqt Powered by: Maian Guestbook their?name=G hit 4 h |  upp resolution |  jbig2 image compression |  audio and video steganography project code in vb |  receiver usb matlab |  ffh sfh powered by TPK Guestbook widen&ct=clnk |  alphamaxx premium |  bubble shooter game source |  algoritmos en matlab |  nrz l nrz s |  fiege fiat shammir |  C# huffman |  ricart and agrawala MPI |  csharp ukf |  sst25vf |  3d curve fitting |  reed solomon code |  inurl:asp?id= A=0 and 1=1 and 1=1 |  Histogram Equalization image processing in Csharp |  udp bcb |  窗口随鼠标左键移动 |  mma8451Q |  3G Modem Dialer |  aplikasi sistem pakar dengan vb 6 |  Petrov–Galerkin method |  to calculate the rle of an image in matlab |  HAMMING DISTANCE MATLAB |  ucadpcb |  变形汽车 |