The Microsoft(R) Guide for Assembly Language and C Programmers By Ray Duncan PROGRAMMING FOR MS-DOS Genealogy of MS-DOS MS-DOS in Operation Structure of MS-DOS Application Programs MS-DOS Programming Tools Keyboard and Mouse Input Video Display Printer and Serial Port File Management Volumes and Directories Disk Internals Memory Management The EXEC Function Interrupt Handlers Installable Device Drivers Filters Compatibility and Portability MS-DOS FUNCTIONS REFERENCE IBM ROM BIOS AND MOUSE FUNCTIONS REFERENCE LOTUS/INTEL/MICROSOFT EMS FUNCTIONS REFERENCE
标签: Programmers PROGRAMMING Microsoft Assembly
上传时间: 2017-05-05
上传用户:xuanjie
Each exploration in this book is a mixture of text and interactive exercises. The exercises are unlike anything you鈥檝e seen in other books. Instead of multiple choice, fill-in-the-blank, or simple Q&A exercises, lessons are interactive explorations of key C++ features.
标签: exercises exploration interactive mixture
上传时间: 2017-05-14
上传用户:whenfly
As a programming language, C is rather like Pascal or Fortran.. Values are stored in variables. Programs are structured by defining and calling functions. Program flow is controlled using loops, if statements and function calls. Input and output can be directed to the terminal or to files. Related data can be stored together in arrays or structures.
标签: programming variables language Fortran
上传时间: 2017-05-18
上传用户:hongmo
This is a Switch simulation... with 4 types of switches... and also we have average simulation time over these 4 switches 1. No Queue 2. Input Queue 3. Input Queue with iterative 4. Output QUeue
标签: simulation switches average Switch
上传时间: 2017-05-20
上传用户:徐孺
Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair Playfair Key Matrix 1.a 5X5 matrix of letters based on a keyword 2.fill in letters of keyword (sans duplicates) 3.fill rest of matrix with other letters Encrypting and Decrypting -plaintext is encrypted two letters at a time 1. if a pair is a repeated letter, insert filler like X’ 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end) 3. if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) 4. otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair
标签: monoalphabetic Playfair provides security
上传时间: 2017-05-25
上传用户:变形金刚
) Compression using huffman code -with a number of bits k per code word -provide huffman table Huffman coding is optimal for a symbol-by-symbol coding with a known input probability distribution.This technique uses a variable-length code table for encoding a source symbol. The table is derived in a particular way based on the estimated probability of occurrence for each possible value of the source symbol .Huffman coding uses a specific method for representing each symbol, resulting in a prefix code that expresses the most common characters using shorter strings of bits than those used for less common source symbols.The Huffman coding is a procedure to generate a binary code tree.
标签: code Compression huffman provide
上传时间: 2017-05-30
上传用户:yuchunhai1990
In the last decade the processing of polygonal meshes has emerged as an active and very productive research area. This can basically be attributed to two developments: Modern geometry acquisition devices, like laser scanners and MRT, easily produce raw polygonal meshes of ever growing complexity Downstream applications like analysis tools (medical imaging), computer aided manufacturing, or numerical simulations all require high quality polygonal meshes as input. The need to bridge the gap between raw triangle soup data and high-quality polygon meshes has driven the research on ecient data structures and algorithms that directly operate on polygonal meshes rather than on a (most often not feasible) intermediate CAD representation.
标签: processing productive the polygonal
上传时间: 2017-06-03
上传用户:TF2015
一个sms格式的PPC端短信备份的还原工具。原备份软件BkGenuis包含在rar文件内。 PPC上有个绿色的单独的短信备份还原工具,备份的格式是sms,但是还原是直接还原至手机短信中,在PC端不可以直接阅读。故编写了这个java程序来实现sms格式的解码。输入是input.sms。输出是txt文本格式。
上传时间: 2013-12-19
上传用户:小码农lz
This is program with source code to convert ascii text files to the maxicode barcode standard. The input file consists of two columns. The first column represents a code and the second column is a string enclosed in quotes. The codes for the first column are as follows: PM, SM, CC, MO, SC, and PC.
标签: maxicode standard barcode convert
上传时间: 2017-06-07
上传用户:ardager
This program implements a PIC-based fuzzy inference engine for the Fudge fuzzy development system from Motorola. It works by taking the output from Fudge for the 68HC11 processor, and converting it to a MPASM compatible assembler file using the convert batch file. This file can then be incorporated with fuzzy.asm to create a fuzzy inference engine. Tool chain ---------- FUDGE -> Fuzzy Rules -> MC68HC11.ASM -> CONVERT.BAT -> RULES.ASM -> MPASM FUZZY.ASM -> INTEL HEX Fuzzy input registers --------------------- current_ins 1..8 x 8-bit raw inputs Fuzzy inference function ------------------------ FuzzyEngine Fuzzy output registers ---------------------- cog_outs 1..8 x 8-bit raw outputs
标签: fuzzy development implements PIC-based
上传时间: 2014-01-18
上传用户:caozhizhi