This document represents the first stage in a process of taking the National Strategy for Police Information Systems (NSPIS) forward. It defines the mechanisms to ensure that we (and our partners) have access to the right information, in the right form, in the right time at an appropriate cost. The Strategy will ensure the Police Service has a collective understanding of the value of information and that we are able to exploit National Information Assets in support of local policing.
资源简介:This document represents the first stage in a process of taking the National Strategy for Police Information Systems (NSPIS) forward. It defines the mechanisms to ensure that we (and our partners) have access to the right information, in th...
上传时间: 2016-03-08
上传用户:wangdean1101
资源简介:This is the first ever open source implementation of Dynamic Host Configuration Protocol for IPv6 (DHCPv6) server and client on Linux Operating System. the server provides leases (durations or lifetimes) on IPv6 addresses to the clients who...
上传时间: 2015-02-28
上传用户:希酱大魔王
资源简介:learning English the following appeared in a memorandum written by the vice president of Nature s Way, a chain of stores selling health food and other health-related products. "Previous experience has shown that our stores are most profitab...
上传时间: 2017-03-06
上传用户:youth25
资源简介:THis is a web framework that use to do text parsing and extraction and update the text extract in a notepad file into the website. Using Django and mysql.
上传时间: 2013-12-25
上传用户:vodssv
资源简介:this document is from workshop held in manit for web development and is related to joomla a emerging tool for web site development
上传时间: 2017-03-30
上传用户:gxf2016
资源简介:This program demonstrates how to draw lines in a picture box using the GDI, controlling background color and line color. It also includes a simple animation using a timer.
上传时间: 2014-01-16
上传用户:小眼睛LSL
资源简介:This mambot adds to the external links in a content the text “ target="_blank"” . Thus, all the links pointing to external sites will be opened in a new window.
上传时间: 2013-12-17
上传用户:zhaiyanzhong
资源简介:This a set of notes I put together for my Computer Architecture class in 1990. Students had a project in which they had to model a microprocessor architecture of their choice. they used these notes to learn VHDL. the notes cover the VHDL...
上传时间: 2014-01-15
上传用户:wxhwjf
资源简介:This is a set of notes I put together for my Computer Architecture class in 1990. Students had a project in which they had to model a microprocessor architecture of their choice. they used these notes to learn VHDL. the notes cover the V...
上传时间: 2013-12-26
上传用户:kelimu
资源简介:In addition to all the people who contributed to the first edition, we would like to thank the following individuals for their generous help in writing this edition. Very special thanks go to Jory Prather for verifying the code samples as w...
上传时间: 2015-12-17
上传用户:dongqiangqiang
资源简介:f your application uses MFC in a shared DLL, and your application is in a language other than the operating system s current language, you will need to copy the corresponding localized resources MFC42XXX.DLL from the Microsoft Visual C+...
上传时间: 2013-12-24
上传用户:thuyenvinh
资源简介:If your application uses MFC in a shared DLL, and your application is in a language other than the operating system s current language, you will need to copy the corresponding localized resources MFC42XXX.DLL from the Microsoft Visual C...
上传时间: 2014-01-02
上传用户:iswlkje
资源简介:This the first release (version 0.0) of the Peersim high level P2P network simulator. This archive contains the javadoc generated documentation, and a java archive containing the simulator source and bytecode and some examples.
上传时间: 2013-12-10
上传用户:mikesering
资源简介:This guide is an attempt to compile a lot of that information in here and dummy it down. Perhaps it s a fairly common show, perhaps not. It might have even been a show that you taped. Whatever the case, you want to share it with others bur ...
上传时间: 2013-12-19
上传用户:zsjzc
资源简介:ImageJ Conebeam Filtered Back Projection Plug-in. To use this plug-in, a stack of projection images need to be opened first.
上传时间: 2013-12-25
上传用户:z1191176801
资源简介:the book consists of three sections. the first, foundations, provides a tutorial overview of the principles underlying data mining algorithms and their application. the presentation emphasizes intuition rather than rigor. the second section...
上传时间: 2017-06-22
上传用户:lps11188
资源简介:Pattern Analysis is the process of fi nding general relations in a set of data, and forms the core of many disciplines, from neural networks to so-called syn- tactical pattern recognition, from statistical pattern recognition to mach...
上传时间: 2017-09-07
上传用户:SimonQQ
资源简介:the source code in a tutorial.
上传时间: 2015-01-25
上传用户:坏天使kk
资源简介:Lachesis an IRCRPG combat engine written in a combination of C and C++. the combat engine is being written for a specific RPG, but most of the project should be useful to IRCRPGs in general. It includes a native interface to the IRC protoco...
上传时间: 2014-01-26
上传用户:firstbyte
资源简介:Enter what day the first letter to a judgment as of the week, if the first letter, continue to judge the second letter.
上传时间: 2015-10-06
上传用户:gdgzhym
资源简介:to search a character in a string and print the addre
上传时间: 2016-07-29
上传用户:shanml
资源简介:We address the problem of predicting a word from previous words in a sample of text. In particular, we discuss n-gram models based on classes of words. We also discuss several statistical algorithms for assigning words to classes based on...
上传时间: 2016-12-26
上传用户:xfbs821
资源简介:This document represents timing diagrams of MMC and SD bus interfaces.
上传时间: 2013-12-21
上传用户:dancnc
资源简介:Shortest Paths with Multiplicative Cost. In a given undirected graph, the path cost is measured as a product of all the edges in the path. the weights are rational numbers (e.g., 0.25, 0.75, 3.75 etc) or integers (2, 3). there are no negati...
上传时间: 2017-04-08
上传用户:邶刖
资源简介:Basic function to locate and measure the positive peaks in a noisy data sets. Detects peaks by looking for downward zero-crossings in the smoothed third derivative that exceed SlopeThreshold and peak amplitudes that exceed AmpThresho...
上传时间: 2017-04-26
上传用户:彭玖华
资源简介:GSM Security and the protocols involves in a mobile environment authentication process
上传时间: 2017-05-01
上传用户:417313137
资源简介:This program sorts words in a line of text by length.
上传时间: 2014-01-25
上传用户:变形金刚
资源简介:This java program is a guessing number game were player will guessing number in a range of 1 to 100...have fun... :)
上传时间: 2014-08-22
上传用户:zm7516678
资源简介:This C++ example demonstrates how to play (a maximum of 16) simultaneous voices. the example has eight blocks moving on the screen and playing sounds when they collide with a wall or with each other. the updated example has been tested to s...
上传时间: 2014-11-17
上传用户:yt1993410
资源简介:Implementations of a queue in C with algoritmo BFS, that calculates the minimum distance in a graph.
上传时间: 2017-08-26
上传用户:z754970244