Flash记数器, Pack : flash_asp在线计数器.zip flash_counter/ flash_counter/FLASH_COUNTER/ flash_counter/FLASH_COUNTER/SK_JSQ.fla flash_counter/FLASH_COUNTER/SK_JSQ.swf flash_counter/FLASH_COUNTER/readme.txt flash_counter/FLASH_COUNTER/COUNTER.ASP
上传时间: 2017-03-14
上传用户:xinzhch
ATM on the principle, details of their development and application of principles! Documents in PDF format!
标签: application development principles Documents
上传时间: 2014-01-04
上传用户:star_in_rain
S60V2版短信漏洞补丁ortiCleanUp_CurseSMS_103这条不到10个字符短信成功利用了SymbianOS的漏洞,使用者收到这条短信后,就再也无法打开短信收件箱功能,并可能频繁死机。由于这条短信谁都能发,所以诺基亚所有N系列智能手机、E系列智能手机都将遭遇有史以来最严重的安全威胁。目前还没有发布相关的补丁。如果你尚未中招,建议安装诺基亚和F-Secure推出的保护程序,直到诺基亚推出新固件为止
标签: ortiCleanUp_CurseSMS SymbianOS S60V2 103
上传时间: 2017-03-15
上传用户:qunquan
La designaci贸n Modbus Modicon corresponde a una marca registrada por Gould Inc. Como en tantos otros casos, la designaci贸n no corresponde propiamente al est谩ndar de red, incluyendo todos los aspectos desde el nivel f铆sico hasta el de aplicaci贸n, sino a un protocolo de enlace [nivel OSI 2]. Puede, por tanto, implementarse con diversos tipos de conexi贸n f铆sica y cada fabricante suele suministrar un software de aplicaci贸n propio, que permite parametrizar sus producto
标签: corresponde registrada designaci Modicon
上传时间: 2014-12-01
上传用户:梧桐
龙格-库塔(Runge-Kutta)法是一种不同的处理,作为多级方法为人们所知。 它要求对于一个简单的校正计算多个 f 的值。 这里是变步长四阶龙格库塔法的c程序
标签: Runge-Kutta
上传时间: 2014-01-01
上传用户:skhlm
本程序是ARM7系列下LPC2148的例程,通过K7I开发板实现的数码管显示 1-2-3-4-5-6-7-8-9-0-A-b-C-d-E-F
上传时间: 2017-03-30
上传用户:1966640071
We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.
标签: effectiveness analytically numerically cloaking
上传时间: 2017-03-30
上传用户:zxc23456789
Here are the functions for Hamming code 7.4 and Extended Hamming code 8.4 encoding and decoding. For 7.4 code, one error per 7-bit codeword can be corrected. For 8.4 code, one error per 8-bit codeword can be corrected and not less than 2 errors can be detected.
标签: Hamming code and functions
上传时间: 2014-01-05
上传用户:Amygdala
Study Guide to Accompany Shari Lawrence Pfleeger s Software Engineering: Theory and Practice By Forrest Shull and Roseanne Tesoriero (very usefull book form student who study Software Engeneering)
标签: Engineering Accompany Lawrence Pfleeger
上传时间: 2017-04-10
上传用户:koulian
为 了提高用户身份认证和授权管理的灵活性,从We b 应用系统的安全性角度出发,讨论了 一 种在. N E T F r a me w o r k下保证应用程序安全性的身份验证和授权模型,并给出了模型的具体实现方法。 该模型利用 F o r ms身份验证方法对用户的身份进行鉴别。在授权处理上,模型结合统一资源定位( u . J f o r m R e s o u r c e L o c a t o r , U R L ) 授权模式和用户所具有的系统角色,分别从页面级和页面操作级对用户的访问进行 控制。该模型在企业局域网环境内能够提供比较灵活的身份认证和基于角色的授权服务。实际应用表明, 基于该模型的We b应用系统能够对用户的访问进行有效的控制,从而保证了系统的安全性
上传时间: 2013-12-31
上传用户:VRMMO