虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

F-counter

  • Flash记数器

    Flash记数器, Pack : flash_asp在线计数器.zip flash_counter/ flash_counter/FLASH_COUNTER/ flash_counter/FLASH_COUNTER/SK_JSQ.fla flash_counter/FLASH_COUNTER/SK_JSQ.swf flash_counter/FLASH_COUNTER/readme.txt flash_counter/FLASH_COUNTER/COUNTER.ASP

    标签: Flash 记数

    上传时间: 2017-03-14

    上传用户:xinzhch

  • ATM on the principle, details of their development and application of principles! Documents in PDF f

    ATM on the principle, details of their development and application of principles! Documents in PDF format!

    标签: application development principles Documents

    上传时间: 2014-01-04

    上传用户:star_in_rain

  • S60V2版短信漏洞补丁ortiCleanUp_CurseSMS_103这条不到10个字符短信成功利用了SymbianOS的漏洞

    S60V2版短信漏洞补丁ortiCleanUp_CurseSMS_103这条不到10个字符短信成功利用了SymbianOS的漏洞,使用者收到这条短信后,就再也无法打开短信收件箱功能,并可能频繁死机。由于这条短信谁都能发,所以诺基亚所有N系列智能手机、E系列智能手机都将遭遇有史以来最严重的安全威胁。目前还没有发布相关的补丁。如果你尚未中招,建议安装诺基亚和F-Secure推出的保护程序,直到诺基亚推出新固件为止

    标签: ortiCleanUp_CurseSMS SymbianOS S60V2 103

    上传时间: 2017-03-15

    上传用户:qunquan

  • La designaci贸n Modbus Modicon corresponde a una marca registrada por Gould Inc. Como en tantos otro

    La designaci贸n Modbus Modicon corresponde a una marca registrada por Gould Inc. Como en tantos otros casos, la designaci贸n no corresponde propiamente al est谩ndar de red, incluyendo todos los aspectos desde el nivel f铆sico hasta el de aplicaci贸n, sino a un protocolo de enlace [nivel OSI 2]. Puede, por tanto, implementarse con diversos tipos de conexi贸n f铆sica y cada fabricante suele suministrar un software de aplicaci贸n propio, que permite parametrizar sus producto

    标签: corresponde registrada designaci Modicon

    上传时间: 2014-12-01

    上传用户:梧桐

  • 龙格-库塔(Runge-Kutta)法是一种不同的处理

    龙格-库塔(Runge-Kutta)法是一种不同的处理,作为多级方法为人们所知。 它要求对于一个简单的校正计算多个 f 的值。 这里是变步长四阶龙格库塔法的c程序

    标签: Runge-Kutta

    上传时间: 2014-01-01

    上传用户:skhlm

  • 本程序是ARM7系列下LPC2148的例程

    本程序是ARM7系列下LPC2148的例程,通过K7I开发板实现的数码管显示 1-2-3-4-5-6-7-8-9-0-A-b-C-d-E-F

    标签: ARM7 2148 LPC 程序

    上传时间: 2017-03-30

    上传用户:1966640071

  • We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f

    We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.

    标签: effectiveness analytically numerically cloaking

    上传时间: 2017-03-30

    上传用户:zxc23456789

  • Here are the functions for Hamming code 7.4 and Extended Hamming code 8.4 encoding and decoding. F

    Here are the functions for Hamming code 7.4 and Extended Hamming code 8.4 encoding and decoding. For 7.4 code, one error per 7-bit codeword can be corrected. For 8.4 code, one error per 8-bit codeword can be corrected and not less than 2 errors can be detected.

    标签: Hamming code and functions

    上传时间: 2014-01-05

    上传用户:Amygdala

  • Study Guide to Accompany Shari Lawrence Pfleeger s Software Engineering: Theory and Practice By F

    Study Guide to Accompany Shari Lawrence Pfleeger s Software Engineering: Theory and Practice By Forrest Shull and Roseanne Tesoriero (very usefull book form student who study Software Engeneering)

    标签: Engineering Accompany Lawrence Pfleeger

    上传时间: 2017-04-10

    上传用户:koulian

  • 为 了提高用户身份认证和授权管理的灵活性

    为 了提高用户身份认证和授权管理的灵活性,从We b 应用系统的安全性角度出发,讨论了 一 种在. N E T F r a me w o r k下保证应用程序安全性的身份验证和授权模型,并给出了模型的具体实现方法。 该模型利用 F o r ms身份验证方法对用户的身份进行鉴别。在授权处理上,模型结合统一资源定位( u . J f o r m R e s o u r c e L o c a t o r , U R L ) 授权模式和用户所具有的系统角色,分别从页面级和页面操作级对用户的访问进行 控制。该模型在企业局域网环境内能够提供比较灵活的身份认证和基于角色的授权服务。实际应用表明, 基于该模型的We b应用系统能够对用户的访问进行有效的控制,从而保证了系统的安全性

    标签: 用户 授权 身份认证

    上传时间: 2013-12-31

    上传用户:VRMMO