Open Flash Chart is a program for creating charts in Flash to display in Web pages. You can create bar, line, area, and pie charts. It also includes server side classes to help generate the data file used as input. At the moment, there are classes for PHP, Perl, .NET, Java, Ruby (and Rails), and Python
标签: Flash creating display program
上传时间: 2014-01-15
上传用户:fandeshun
The AVRcam source files were built using the WinAVR distribution (version 3.3.1 of GCC). I haven t tested other versions of GCC, but they should compile without too much difficulty. * The source files for the AVRcam had the author name and copyright information added back into them after the judging of the project, since it states in the competition rules that the author s name can not be present during their inspection. * The included source files are the ones that were submitted for the entry into the Circuit Cellar contest. I have continued to develop the AVRcam, and have added several new features (such as ignoring objects that aren t larger than a minimum size, removing tracked objects that overlap with each, and some general optimizations). If you are interested in the latest source, email me at john@jrobot.net * For more info about the AVRcam, check out http://www.jrobot.net John Orlando August 20, 2004
标签: distribution version AVRcam source
上传时间: 2016-12-30
上传用户:GavinNeko
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
标签: vulnerabilities Introduction discovered undeniably
上传时间: 2014-01-05
上传用户:yph853211
一个基于GTK+的单词数值计算器,1、 按照规则计算单词的值,如果 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 26个字母(全部用大写)的值分别为 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26,如: WINJACK这个单词的值就为:W+I+N+J+A+C+K=23+9+14+1+3+11=71% HARDWORK=H+A+R+D+W+O+R+D=8+1+18+4+23+15+18+11=98% LOVE=L+O+V+E=12+15+22+5=54% LUCK=L+U+C+K=12+21+3+11=47% ATTITUDE= A+T+T+I+T+U+D+E=1+20+20+9+20+24+4+5=100% 2、对程序的界面布局参考如下图所示,在第一个单行文本框输入一个单词,点击“计算”按钮,按照以上算法计算出该单词的值。 3、如果在最下面的单行文本框输入一个文件路径,此文件每行记录一个单词,那么经过程序计算出各个单词的值,并把结果输出到当前目录下result.txt文件中。如果文件不存在,应该提示错误。
上传时间: 2014-01-11
上传用户:康郎
This document provides guidelines and describes how to easily port S60 2nd Edition C++ applications to S60 3rd Edition. The document has been written based on experiences of porting regular S60 2nd Edition applications, such as the S60 Platform: POP/IMAP Example [4] that can be downloaded from Forum Nokia. Code snippets from the example are shown in Chapter 8, “Application build changes,” and in Appendix A, “Code example." In addition, Appendix B, "Commonly used functions that require capabilities," and Appendix C, "Commonly used interfaces that have been changed or removed," provide useful information on some frequently used functions and interfaces in third-party applications.
标签: application guidelines describes document
上传时间: 2017-01-29
上传用户:wang5829
tensor 向量的推广。在一个坐标系下,由若干个数(称为分量)来表示,而在不同坐标系下的分量之间应满足一定的变换规则,如矩阵、多变量线性形式等。一些物理量如弹性体的应力、应变以及运动物体的能量动量等都需用张量来表示。在微分几何的发展中,C.F.高斯、B.黎曼、E.B.克里斯托费尔等人在19世纪就导入了张量的概念,随后由G.里奇及其学生T.列维齐维塔发展成张量分析,A.爱因斯坦在其广义相对论中广泛地利用了张量。
上传时间: 2014-01-20
上传用户:silenthink
c语言编程宝典,C 语言是1972年由美国的Dennis Ritchie设计发明的, 并首次在UNIX操作系统 的 DEC PDP-11 计算机上使用。 它由早期的编程语言 BCPL( Basic Combind Programming Language) 发展演变而来。在1970年, AT&T 贝尔实验室的 Ken Thompson根据BCPL语言设计出较先进的并取名为 B的语言, 最后导了C 语言的问世。 随着微型计算机的日益普及, 出现了许多C 语言版本。由于没有统一的标准, 使得这些C 语言之间出现了一些不一致的地方。为了改变这种情况, 美国国家标准 研究所(ANSI)为C 语言制定了一套ANSI标准, 成为现行的C语言标准。
上传时间: 2017-02-27
上传用户:dongbaobao
一般来说,瞬时频率和群延迟在时频平面内定义了两条不同的曲线,但是在时宽(T)和频宽(B)的乘积值逐渐变大时,这两条曲线会慢慢逼近。为了说明这一点,下面计算了信号的瞬时频率和群延迟,T*B值大。
标签:
上传时间: 2014-01-11
上传用户:lht618
一般来说,瞬时频率和群延迟在时频平面内定义了两条不同的曲线,但是在时宽(T)和频宽(B)的乘积值逐渐变大时,这两条曲线会慢慢逼近。为了说明这一点,下面计算了信号的瞬时频率和群延迟,T*B值小。
标签:
上传时间: 2017-03-09
上传用户:gxrui1991
We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.
标签: effectiveness analytically numerically cloaking
上传时间: 2017-03-30
上传用户:zxc23456789