虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

free-of-<b>Charge</b>

  • UrJTAG package is free software, covered by the GNU General Public License, and you are welcome to

    UrJTAG package is free software, covered by the GNU General Public License, and you are welcome to change it and/or distribute copies of it under certain conditions. There is absolutely no warranty for UrJTAG. Please read COPYING file for more info.

    标签: software General License package

    上传时间: 2013-11-29

    上传用户:lanjisu111

  • This document provides guidelines and describes how to easily port S60 2nd Edition C++ application

    This document provides guidelines and describes how to easily port S60 2nd Edition C++ applications to S60 3rd Edition. The document has been written based on experiences of porting regular S60 2nd Edition applications, such as the S60 Platform: POP/IMAP Example [4] that can be downloaded from Forum Nokia. Code snippets from the example are shown in Chapter 8, “Application build changes,” and in Appendix A, “Code example." In addition, Appendix B, "Commonly used functions that require capabilities," and Appendix C, "Commonly used interfaces that have been changed or removed," provide useful information on some frequently used functions and interfaces in third-party applications.

    标签: application guidelines describes document

    上传时间: 2017-01-29

    上传用户:wang5829

  • Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features:

    Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/

    标签: open-source encryption Features software

    上传时间: 2013-12-20

    上传用户:123啊

  • It can be argued that the current free-software movement is the most important thing happening in c

    It can be argued that the current free-software movement is the most important thing happening in computing today. We are in the midst of a major shift from all software being proprietary and closely held by individual companies to a large body of software that can be freely acquired and used by anyone for any purpose. Free software now includes not only programming language compilers and linkers, but numerous utilities, graphical user interface environments, and even entire operating systems.

    标签: free-software important happening the

    上传时间: 2014-01-04

    上传用户:aix008

  • Neural Networks at your Fingertips.rar =============== Network: Adaline Network ==============

    Neural Networks at your Fingertips.rar =============== Network: Adaline Network =============== Application: Pattern Recognition Classification of Digits 0-9 Author: Karsten Kutza Date: 15.4.96 Reference: B. Widrow, M.E. Hoff Adaptive Switching Circuits 1960 IRE WESCON Convention Record, IRE, New York, NY, pp. 96-104, 1960

    标签: Network Fingertips Networks Adaline

    上传时间: 2014-12-22

    上传用户:lizhizheng88

  • random number generator,随机数产生器

    random number generator,随机数产生器,可以产生均匀分布的随机数,有Mersenne twister, RANROT-B,RANROT-W, Mother-of-all等

    标签: generator random number 随机数

    上传时间: 2017-02-16

    上传用户:hphh

  • 复接入

    复接入,B/W双用户使用直接扩频序列 % >>>multiple access b/w 2 users using DS CDMA % >>>format is : cdmamodem(user1,user2,snr_in_dbs) % >>>user1 and user2 are vectors and they should be of equal length % >>>e.g. user1=[1 0 1 0 1 0 1] , user2=[1 1 0 0 0 1 1],snr_in_dbs=-50 % >>>or snr_in_dbs=50 just any number wud do % Waqas Mansoor % NUST , Pakistan

    标签:

    上传时间: 2014-11-22

    上传用户:zl5712176

  • Creating barcodes in Microsoft庐 Office has never been easier. With BarCodeWiz Toolbar you can add b

    Creating barcodes in Microsoft庐 Office has never been easier. With BarCodeWiz Toolbar you can add barcodes to Microsoft庐 Office applications with a click of a button. In Microsoft庐 Word, create single barcodes, pages of labels, or mail merge documents. In Microsoft庐 Excel庐, select a range of cells and automatically convert each cell to a barcode. In Microsoft庐 Access庐, create reports with barcodes based on your data tables.

    标签: BarCodeWiz Microsoft Creating barcodes

    上传时间: 2013-12-18

    上传用户:asddsd

  • Program Description: The program asks the user to choice from the menu an option

    Program Description: The program asks the user to choice from the menu an option A. Check to see if a number is prime. B. Count the number of vowels in a line. X. Exit the program.

    标签: Description the Program program

    上传时间: 2017-04-08

    上传用户:磊子226

  • The aip file contains few Matlab routines for 1D line scan analysis, 1D scaling, 2D scaling, image b

    The aip file contains few Matlab routines for 1D line scan analysis, 1D scaling, 2D scaling, image brightness or contrast variation routine and rouitne for finding area between zero cossings of 1D times series.

    标签: scaling contains analysis routines

    上传时间: 2014-01-19

    上传用户:xmsmh