What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is Over)
标签: Sometimes the contents desire
上传时间: 2013-12-25
上传用户:playboys0
Linux in a Nutshell, 5th Edition By Stephen Figgins, Robert Love, Arnold Robbins, Ellen Siever, Aaron Weber ... ... ... ... ... ... ... ..... Publisher: O Reilly Pub Date: July 2005 ISBN: 0-596-00930-5 Pages: 944 Over the last few years, Linux has grown both as an operating system and a tool for personal and business use. Simultaneously becoming more user friendly and more powerful as a back-end system, Linux has achieved new plateaus: the newer filesystems have solidified, new commands and tools have appeared and become standard, and the desktop--including new desktop environments--have proved to be viable, stable, and readily accessible to even those who don t consider themselves computer gurus.
标签: Nutshell Edition Figgins Stephen
上传时间: 2015-12-03
上传用户:frank1234
Abstract: By using gateway systems on large 32-bit platforms, networks of small, 8- and 16-bit microcontrollers can be monitored and controlled Over the Internet. With embedded Linux, these gateways are easily moved from full-blown host PCs to embedded platforms like the PC104. In this class you will learn about hardware platforms that support embedded Linux, Linux kernel configuration, feature selection, installation, booting and tuning.
标签: bit platforms Abstract networks
上传时间: 2014-01-05
上传用户:kytqcool
% Atomizer Main Directory, Version .802 里面信号含有分解去噪合成过程的代码 %--------------------------------------- -------------------------------- % This is the main directory of the Atomizer package the full package % contains Over 100 files, consisting of .m files, .mex files, and datasets.
标签: Directory Atomizer Version Main
上传时间: 2015-12-12
上传用户:youke111
celestia源代码,Celestia, a real-time 3D space simulation featuring a database of Over 100000 stars, nearly a hundred solar system, objects, and a complete catalog of extrasolar planets.
上传时间: 2013-12-26
上传用户:缥缈
In this article, we present an Overview of methods for sequential simulation from posterior distributions. These methods are of particular interest in Bayesian filtering for discrete time dynamic models that are typically nonlinear and non-Gaussian. A general importance sampling framework is developed that unifies many of the methods which have been proposed Over the last few decades in several different scientific disciplines. Novel extensions to the existing methods are also proposed.We showin particular how to incorporate local linearisation methods similar to those which have previously been employed in the deterministic filtering literature these lead to very effective importance distributions. Furthermore we describe a method which uses Rao-Blackwellisation in order to take advantage of the analytic structure present in some important classes of state-space models. In a final section we develop algorithms for prediction, smoothing and evaluation of the likelihood in dynamic models.
标签: sequential simulation posterior Overview
上传时间: 2015-12-31
上传用户:225588
Boosting is a meta-learning approach that aims at combining an ensemble of weak classifiers to form a strong classifier. Adaptive Boosting (Adaboost) implements this idea as a greedy search for a linear combination of classifiers by Overweighting the examples that are misclassified by each classifier. icsiboost implements Adaboost Over stumps (one-level decision trees) on discrete and continuous attributes (words and real values). See http://en.wikipedia.org/wiki/AdaBoost and the papers by Y. Freund and R. Schapire for more details [1]. This approach is one of most efficient and simple to combine continuous and nominal values. Our implementation is aimed at allowing training from millions of examples by hundreds of features in a reasonable time/memory.
标签: meta-learning classifiers combining Boosting
上传时间: 2016-01-30
上传用户:songnanhua
Patterns of Enterprise Application Architecture is written in direct response to the stiff challenges that face enterprise application developers. The author, noted object-oriented designer Martin Fowler, noticed that despite changes in technology--from Smalltalk to CORBA to Java to .NET--the same basic design ideas can be adapted and applied to solve common problems. With the help of an expert group of contributors, Martin distills Over forty recurring solutions into patterns. The result is an indispensable handbook of solutions that are applicable to any enterprise application platform
标签: Architecture Application Enterprise challenge
上传时间: 2013-12-12
上传用户:ywqaxiwang
16 relay output channels and 16 isolated digital input channels LED indicators to show activated relays Jumper selectable Form A/Form B-type relay output channel Output status read-back Keep relay output values when hot system reset High-voltage isolation on input channels(2,500 VDC) Hi ESD protection(2,00VDC) High Over-voltage protection(70VDC) Wide input range(10~50VDC) Interrupt handling capability High-density DB-62 connector Board ID
标签: channels indicators activated isolated
上传时间: 2016-02-15
上传用户:dongbaobao
The line echo canceller (LEC) is designed to provide the maximum attainable transparent voice quality for de-echoing of a PSTN or POTS connection in voice-Over-LAN systems with internal delays, or on a codec end of a telecom switch,基于TI 54X/55X平台
标签: transparent attainable canceller designed
上传时间: 2014-01-17
上传用户:qoovoop