虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Fuzzy-Set-Theory

  • Use the crypto module to encrypt sensitive data using a key you generated yourself... This is quite

    Use the crypto module to encrypt sensitive data using a key you generated yourself... This is quite handy with INI files which you can use to get and set data for you applications. You can also check out some dates related to passwords and expiry dates. Send emails using Microsoft Email client. No need to cater for SMTP nor Exchange mail accounts. If you can send email with your outlook, you can send email with your application. Get some windows info with the sysinfoctrls member.

    标签: generated sensitive yourself encrypt

    上传时间: 2017-04-04

    上传用户:yuanyuan123

  • 1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click

    1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click on Security button in order to Add/Remove users and set user rights. Once you entered Security dialog you may select your Supervisor password. 2. Click OK when finished configuring users. Don t forget to disable some features in order to see what happens with GUI elements - menus, and buttons.

    标签: SecurityBuilderDemo directory password located

    上传时间: 2014-01-23

    上传用户:chongcongying

  • Java Media APIs: Cross-Platform Imaging, Media, and Visualization presents integrated Java media sol

    Java Media APIs: Cross-Platform Imaging, Media, and Visualization presents integrated Java media solutions that demonstrate the best practices for using this diverse collection. According to Sun MicroSystems, "This set of APIs supports the integration of audio and video clips, animated presentations, 2D fonts, graphics, and images, as well as speech input/output and 3D models." By presenting each API in the context of its appropriate use within an integrated media application, the authors both illustrate the potential of the APIs and offer the architectural guidance necessary to build compelling programs.

    标签: Media Java Cross-Platform Visualization

    上传时间: 2013-12-04

    上传用户:hanli8870

  • FIBPlus is a component suite intended for work with InterBase. It is direct, fast and flexible Inter

    FIBPlus is a component suite intended for work with InterBase. It is direct, fast and flexible InterBase connectivity for Delphi, C++ Builder, Ada and Kylix. FIBPlus supports Delphi 5-7, Delphi 2005, Delphi 2006, Delphi 2007, C++ Builder 5-6, C++ Builder 2006, C++ Builder 2007, Kylix 3, gnat-3.15p, gnat2006 GPL, and all versions of InterBase 4.x-7.x, InterBase 2007 and Firebird 1.x-2.x. Using FIBPlus in your applications you do not need to install any additional software except for InterBase Client Software. FIBPlus supports all special InterBase features such as array-fields, event alerters, BLOB-fields, etc. FIBPlus is a native component set and its evaluation versions are distributed partially in sources. Registering FIBPlus you get full sources of components and technical support

    标签: component InterBase intended flexible

    上传时间: 2013-12-01

    上传用户:xuan‘nian

  • Use a one-dimensional array of primitive type boolean to represent the seating chart of the plane.

    Use a one-dimensional array of primitive type boolean to represent the seating chart of the plane. Initialize all the elements of the array to false to indicate that all the seats are empty. As each seat is assigned, set the corresponding elements of the array to true to indicate that the seat is no longer available.

    标签: one-dimensional primitive represent the

    上传时间: 2013-12-22

    上传用户:zhichenglu

  • The purpose of this project is to explore the issues and implementation of a multiple instruction st

    The purpose of this project is to explore the issues and implementation of a multiple instruction stream, single data stream processor. We are running two instruction streams on two CPUs which share an address space. The processors share a second level cache, and maintain coherence at the L1 cache with a write-invalidate policy. The L2 cache is two-way set associative, with a block size of 8 words, and a total capacity of 512 words.

    标签: implementation instruction multiple purpose

    上传时间: 2017-04-18

    上传用户:731140412

  • The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for firmwa

    The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for firmware updating. The instruction set of the W78E58B is fully compatible with the standard 8052. The W78E58B contains a 32K bytes of main ROM and a 4K bytes of auxiliary ROM which allows the contents of the 32KB main ROM to be updated by the loader program located at the 4KB auxiliary ROM 512 bytes of on-chip RAM four 8-bit bi-directional and bit-addressable I/O ports an additional 4- bit port P4 three 16-bit timer/counters a serial port. These peripherals are supported by a eight sources two-level interrupt capability. To facilitate programming and verification, the ROM inside the W78E58B allows the program memory to be programmed and read electronically. Once the code is confirmed, the user can protect the code for security

    标签: microcontroller programmable in-system W78E58B

    上传时间: 2017-04-27

    上传用户:yiwen213

  • 最小生成树 MST的四种算法实现。 包括普通的Kruskal算法和Prim算法

    最小生成树 MST的四种算法实现。 包括普通的Kruskal算法和Prim算法,用Disjoint-Set优化的Kruskal算法和用Heap优化的堆算法。 复杂度分别为O(mn), O(n^2), O(m log n), O(m log n)

    标签: Kruskal Prim 算法 MST

    上传时间: 2013-12-10

    上传用户:stewart·

  • 这是一篇英文文献

    这是一篇英文文献,文章题目是Claude Shannon and "A Mathematical Theory of Communication".是香农的《通信的数学理论》一文的读书报告。内容包括:香农的生平背景、消息、信息、熵函数、信源编码、信道编码等。

    标签: 英文

    上传时间: 2017-05-05

    上传用户:plsee

  • Learn how to: * Tokenize a null-terminated string * Create a search and re

    Learn how to: * Tokenize a null-terminated string * Create a search and replace function for strings * Implement subtraction for string objects * Use the vector, deque, and list sequence containers * Use the container adaptors stack, queue, and priority_queue * Use the map, multimap, set, and multiset associative containers * Reverse, rotate, and shuffle a sequence * Create a function object * Use binders, negators, and iterator adapters * Read and write files * Use stream iterators to handle file I/O * Use exceptions to handle I/O errors * Create custom inserters and extractors * Format date, time, and numeric data * Use facets and the localization library * Overload the [ ], ( ), and -> operators * Create an explicit constructor * And much, much more

    标签: null-terminated Tokenize Create string

    上传时间: 2014-01-18

    上传用户:yph853211