XTHIDE is a GUI that allows the user to hide a text message in an image file. The user will be asked for a key that will be used to both encode and decode the text into an image. The key can be of length from 2 to 900 characters. The encryption pattern for a key hell is not a subset of the encryption pattern for hello . See help. Created with version 7.01.
标签: user message XTHIDE allows
上传时间: 2013-12-26
上传用户:erkuizhang
Abstract: Stuxnet, a sophisticated virus that damaged Iran's nuclear capability, should be an eye openerfor the world. We can choose to learn something very narrow (how to combat the Stuxnet virus) or wecan choose to focus on the larger goal of thwarting the next type of creative cyber attack. Unfortunately,critical industrial infrastructure is not currently designed with security as a key goal, leaving open multipleavenues for an educated and funded attacker to create massive problems. This tutorial outlines somebasic concepts that engineers and product definers should consider to make sure their new projects stayahead of future threats.
上传时间: 2013-11-17
上传用户:llwap
Handheld electronic devices play a key role in our everydaylives. Because dependability is paramount, handhelds arecarefully engineered with lightweight power sources forreliable use under normal conditions. But no amount ofcareful engineering can prevent the mistreatment theywill undergo at the hands of humans. For example, whathappens when a factory worker drops a bar code scanner,causing the battery to pop out? Such events areelectronically unpredictable, and important data storedin volatile memory would be lost without some form ofsafety net—namely a short-term power holdup systemthat stores suffi cient energy to supply standby power untilthe battery can be replaced or the data can be stored inpermanent memory.
上传时间: 2013-11-05
上传用户:coeus
The revolution of automation on factory floors is a key driver for the seemingly insatiable demand for higher productivity, lower total cost of ownership,and high safety. As a result, industrial applications drive an insatiable demand of higher data bandwidth and higher system-level performance. This white paper describes the trends and challenges seen by designers and how FPGAs enable solutions to meet their stringent design goals.
上传时间: 2013-11-08
上传用户:yan2267246
写号步骤: 1、将手机连通CDMA Workshop 2.7,在security选项卡里的 spc中点击读取,将000000填入spc里的方框,点击spc钮选择send, 于是显示spc解锁成功。 2、点击“nam”选项卡,将min填入10位码(就是imsi码去掉46003剩下的),将mcc填入460,mnc填入03,填入imsi15位码,banner填入你想填的字符(我填的中国电信),点击写入即可 3、这一步,就应该写入akey码了(如果不知道AKEY,可以通过电信机房关闭鉴权,但是不推荐这样做,有盗号风险),点击“cave”选项卡,在A-KEY后的方框 填入你的akey,点击写入即可。 4、重启6950,能够打电话了 针对白三角以及1X上网问题,请注意: 1、如果有白色三角漫游标记,通过将PRL由003升级到008解决方法是 :拨##778#,输入SPC码,即000000,点击VIEW 中PRI后点EDIT,将拷贝到机子中的prl文件浏览选到,点击OK升级 2、CDMA 1X无法上网的解决方法: 拨##778#,输入SPC码,即000000,点击VIEW 中M.IP后将“Mobile IP Only ”改为“simly IP only” SPC在内存中的地址:018E:0190(只要输入018E)
上传时间: 2013-12-29
上传用户:ainimao
Collection of key-value pairs. TDictionary represents a generic collection of key-value pairs. This class provides a mapping from a collection of keys to a collection of values. When you create a TDictionary object, you can specify various combinations of initial capacity, equality operation, and initial content. You can add a key that is associated with a corresponding value with the Add or AddOrSetValue methods. You can remove entries with Remove or Clear, which removes all key-value pairs. Adding or removing a key-value pair and looking up a key are efficient, close to O(1), because keys are hashed. A key must not be nil (though a value may be nil) and there must be an equality comparison operation for keys. You can test for the presence or keys and values with the TryGetValue, ContainsKey and ContainsValue methods. The Items property lists all Count dictionary entries. You can also set and get values by indexing the Items property. Setting the value this way overwrites any existing value. The class TObjectDictionary inherits from TDictionary and provides an automatic mechanism for freeing objects removed from dictionary entries.
标签: Delphi 泛型
上传时间: 2015-07-01
上传用户:mirage
An optical fiber amplifier is a key component for enabling efficient transmission of wavelength-divisionmultiplexed(WDM)signalsoverlongdistances.Eventhough many alternative technologies were available, erbium-doped fiber amplifiers won theraceduringtheearly1990sandbecameastandardcomponentforlong-haulopti- caltelecommunicationssystems.However,owingtotherecentsuccessinproducing low-cost, high-power, semiconductor lasers operating near 1450 nm, the Raman amplifiertechnologyhasalsogainedprominenceinthedeploymentofmodernlight- wavesystems.Moreover,becauseofthepushforintegratedoptoelectroniccircuits, semiconductor optical amplifiers, rare-earth-doped planar waveguide amplifiers, and silicon optical amplifiers are also gaining much interest these days.
标签: Propagation Light Media Gain in
上传时间: 2020-05-27
上传用户:shancjb
MIMO-OFDM is a key technology for next-generation cellular communications (3GPP-LTE, Mobile WiMAX, IMT-Advanced) as well as wireless LAN (IEEE 802.11a, IEEE 802.11n), wireless PAN (MB-OFDM), and broadcasting (DAB, DVB, DMB). This book provides a comprehensive introduction to the basic theory and practice of wireless channel modeling, OFDM, and MIMO, with MATLAB ? programs to simulate the underlying techniques on MIMO-OFDMsystems.Thisbookisprimarilydesignedforengineersandresearcherswhoare interested in learning various MIMO-OFDM techniques and applying them to wireless communications.
标签: Communications MIMO-OFDM Wireless MATLAB with
上传时间: 2020-05-28
上传用户:shancjb
Smartphones have become a key element in providing greater user access to the mobile Internet. Many complex applications which used to be limited to PCs, have been developed and operated on smartphones. These applications extend the functionalities of smartphones, making them more convenient for users to be connected. However, they also greatly increase the power consumption of smartphones, making users frustrated with long delays in Web browsing.
标签: Browsing Mobile Cloud Using Web the
上传时间: 2020-05-30
上传用户:shancjb
This book is about multipoint cooperative communication, a key technology to overcome the long-standing problem of limited transmission rate caused by inter- point interference. However, the multipoint cooperative communication is not an isolated technology. Instead, it covers a vast range of research areas such as the multiple-input multiple-outputsystem, the relay network, channel state information issues, inter-point radio resource management operations, coordinated or joint transmissions, etc. We suppose that any attempt trying to thoroughly analyze the multipoint cooperative communication technology might end up working on a cyclopedia for modern communication systems and easily get lost in discussing all kinds of cooperative communication schemes as well as the associated models and their variations.
标签: Communication Multi-point Cooperative Systems
上传时间: 2020-05-31
上传用户:shancjb