Fingerprint Verification System an easy to use library that allows programmers to integrate fingerprint technology into their software without specific know-how. Fast, easy to use, and small great for embedded systems.
标签: Verification Fingerprint programmers integrate
上传时间: 2017-03-03
上传用户:plsee
This is GMS down upper converter and down converter in simulink. you may understand the structure in here, believe is useful to those who interested in telecommunication
标签: converter down understand structure
上传时间: 2017-03-04
上传用户:朗朗乾坤
Java technology is both a programming language and a platform. The Java programming language originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time operating platform. When the project started, C++ was the language of choice. But over time the difficulties encountered with C++ grew to the point where the problems could best be addressed by creating an entirely new language platform. Design and architecture decisions drew from a variety of languages such as Eiffel, SmallTalk, Objective C, and Cedar/Mesa. The result is a language platform that has proven ideal for developing secure, distributed, network-based end-user applications in environments ranging from network-embedded devices to the World-Wide Web and the desktop
标签: programming language Java technology
上传时间: 2014-01-03
上传用户:huangld
This contains the following topics and more ADA versus C and Cplus plus Ada_training ADA 2005 for High Integrity Systems ada_language_notes Sample programs
标签: Ada_training ADA and following
上传时间: 2013-12-28
上传用户:zhuoying119
Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits. It has proved to be an extremely versatile tool on the unix platform. So why should NT always be unix s poor cousin when it comes to tcp/ip testing and exploration? I bet many NT admins out there keep a unix box around to use tools such as Netcat or to test their systems with the unix version of an NT vulnerability exploit. With Netcat for NT part of that feeling disempowerment is over.
上传时间: 2017-04-02
上传用户:onewq
Embedded System Design using 8031 microcontroller defines many steps in development of embedded systems using the most popular 8-bit microcontroller using various examples. I hope this would be useful to everyone.
标签: microcontroller development Embedded embedded
上传时间: 2017-04-02
上传用户:lnnn30
The second edition of WiMax Operator鈥檚 Manual includes most of the material from the first edition, plus new discussions of 鈥?The ultra-high-speed mobile telephone standard, HSDPA 鈥?Ultrawideband (UWB) 鈥?Changes to DSL technologies 鈥?Mobile voice 鈥?Mobile entertainment 鈥?New backup systems The new edition also reflects the changes that have occurred in the industry over the last year and half, including the emergence of restandards wireless broadband equipment with fully developed mobile capabilities, ignificant alterations in the competitive landscape, and he opening of valuable new spectrum for roadband wireless operators.
标签: edition the Operator includes
上传时间: 2014-01-02
上传用户:xiaodu1124
In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessary in order to be able to compare or integrate the data obtained from different measurements. Image registration is the process of transforming the different sets of data into one coordinate system. To be precise it involves finding transformations that relate spatial information conveyed in one image to that in another or in physical space. Image registration is performed on a series of at least two images, where one of these images is the reference image to which all the others will be registered. The other images are referred to as target images.
标签: different computer acquired sampling
上传时间: 2013-12-28
上传用户:来茴
在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.
上传时间: 2017-04-04
上传用户:xaijhqx
Organized in a practical problem-and-solution format, More Exceptional C++ picks up where the widely acclaimed Exceptional C++ leaves off, providing successful strategies for solving real-world problems in C++. Drawing from years of in-the-trenches experience, Herb Sutter provides tested techniques and practical solutions for programmers designing modern software systems with C++, from small projects to enterprise applications.
标签: problem-and-solution Exceptional Organized practical
上传时间: 2017-04-08
上传用户:zhuyibin