虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

A-Key

  • YSS915 (KP2V2) is an LSI for processing Karaoke voice signals. This LSI has an A/D converter (1 cha

    YSS915 (KP2V2) is an LSI for processing Karaoke voice signals. This LSI has an A/D converter (1 channel) for the microphone echo, and a memory for the microphone echo and key control. These features allow achieving the functions needed for the Karaoke system by using only one LSI chip. As for the microphone echoes, many other types of echoes are available in addition to ordinary ones so that YSS915 is applicable to various uses. In addition to these Karaoke programs, YSS915 is able to provide the Movie & Music programs, with which the surround effect is applied to the movie and music sources for giving the users more enjoyment. YSS915 is pin compatible with and register compatible with YSS903 (KP2V).

    标签: processing LSI converter Karaoke

    上传时间: 2015-06-23

    上传用户:lijianyu172

  • 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an

    加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]

    标签: Cryptographic Primitives generate Library

    上传时间: 2015-07-16

    上传用户:wqxstar

  • not use Java API to produce two simple java implementation of a dictionary interface, LinkedListDict

    not use Java API to produce two simple java implementation of a dictionary interface, LinkedListDictionary and HashDictionary, that maps a String key to an Object value

    标签: implementation LinkedListDict dictionary interface

    上传时间: 2015-07-25

    上传用户:黄华强

  • A six people s rushing replies an implement, use some s switches in toggle switch K0 ~ K5 is that ON

    A six people s rushing replies an implement, use some s switches in toggle switch K0 ~ K5 is that ON accomplishes when rushing to reply button , nobody rush to answer, 6 numerical code circulation takes turns at demonstrating 1 ~ 6 (horse races) , who rushes to reply the numerical code stops having a ride on a horse , first, whose serial number, has simultaneous light of 6 numerical codes again afterwards the key presses down. System denies responding to, until this place is OFF batch , the wheel restoring 1 ~ 6 horse races starting time as soon as rushes to answer.

    标签: implement switches rushing replies

    上传时间: 2013-12-27

    上传用户:l254587896

  • The aim of this application note is to show to scan the 4x4 matrix keypad multiplexed with a four

    The aim of this application note is to show to scan the 4x4 matrix keypad multiplexed with a four 7-segment display. The software attached to this application note scans the pressed key and displays it on the multiplexed 7- segment LEDs. This application note makes obvious Interrupt capability of the STR710 device to offer a better key scan .

    标签: application multiplexed matrix keypad

    上传时间: 2015-09-13

    上传用户:thuyenvinh

  • This note describes some key aspects of what C++ is and of how C++ has developed over the years. The

    This note describes some key aspects of what C++ is and of how C++ has developed over the years. The spective is that of an experienced C++ user looking at C++ as a practical tool. No attempts are made to compare C++ to other languages, though I have tried to answer some questions that I have often heard asked by Lisp programmers.

    标签: describes developed aspects years

    上传时间: 2015-09-15

    上传用户:haoxiyizhong

  • This code is a cipher which takes in a plaintext or ciphertext string and encrypts / decrypts accord

    This code is a cipher which takes in a plaintext or ciphertext string and encrypts / decrypts according to a user defined key value.

    标签: ciphertext plaintext encrypts decrypts

    上传时间: 2014-01-05

    上传用户:181992417

  • About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based o

    About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only one crypted packet is enough to start cracking - Has its own key generator. - Can crack a dumpfile over a network. - Can act as a server and client. - Also works in windows. - Has an fltk gui.

    标签: WepDecrypt Wepdecrypt Wireless guesses

    上传时间: 2013-12-25

    上传用户:6546544

  • C++/CLI in Action is a practical guide that will help you breathe new life into your legacy C++ prog

    C++/CLI in Action is a practical guide that will help you breathe new life into your legacy C++ programs. The book begins with a concise C++/CLI tutorial. It then quickly moves to the key themes of native/managed code interop and mixed-mode programming. You抣l learn to take advantage of GUI frameworks like Windows Forms and WPF while keeping your native C++ business logic. The book also covers methods for accessing C# or VB.NET components and libraries. Written for readers with a working knowledge of C++.

    标签: practical breathe Action legacy

    上传时间: 2015-10-17

    上传用户:wendy15

  • In recent years, the UNIX operating system has seen a huge boost in its popularity, especially with

    In recent years, the UNIX operating system has seen a huge boost in its popularity, especially with the emergence of Linux. For programmers and users of UNIX, this comes as no surprise: UNIX was designed to provide an environment that s powerful yet easy to use. One of the main strengths of UNIX is that it comes with a large collection of standard programs. These programs perform a wide variety of tasks from listing your files to reading email. Unlike other operating systems, one of the key features of UNIX is that these programs can be combined to perform complicated tasks and solve your problems. One of the most powerful standard programs available in UNIX is the shell. The shell is a program that provides you with a consistent and easy-to-use environment for executing programs in UNIX. If you have ever used a UNIX system, you have interacted with the shell.

    标签: especially popularity operating recent

    上传时间: 2014-11-26

    上传用户:gaojiao1999