虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

user-Agent

  • 一个repastJ的例子

    一个repastJ的例子,加入agent,并使得agent移动

    标签: repastJ

    上传时间: 2017-08-07

    上传用户:钓鳌牧马

  • 一个repasts的例子

    一个repasts的例子,在gis环境加入agent,并使得agent移动

    标签: repasts

    上传时间: 2017-08-07

    上传用户:zhuyibin

  • 在JADE平台上实现ACL语言通信

    在JADE平台上实现ACL语言通信,创建一个Agent,然后等待消息到来,要是有消息到来,则自动回复

    标签: JADE ACL 语言通信

    上传时间: 2017-08-12

    上传用户:xiaoxiang

  • 本程序的开发环境为VS2005

    本程序的开发环境为VS2005,数据库为SQLSever2005 默认的连接字符串为:"DataSource=125.216.227.147 Initial Catalog=msdb Persist Security Info=True User ID=sa Password=111111" 管理系统为一个简单的人事管理系统,帮助初学者尽快的掌握这种语言,进而有助于系统改进,对初学者来说是很不错的选择。

    标签: 2005 VS 程序 开发环境

    上传时间: 2013-12-30

    上传用户:lyy1234

  • In the planning stage of a GNSS-measurement campaign it is useful to compute several design para-met

    In the planning stage of a GNSS-measurement campaign it is useful to compute several design para-meters in order to decide how, when and where to carry out the measurements. The MATLAB user interface VISUAL.M enables you to compute the design parameters for any system design.

    标签: GNSS-measurement planning campaign para-met

    上传时间: 2014-01-23

    上传用户:tuilp1a

  • Professional MFC. Chapter 1: The Microsoft Developer Studio Chapter 2: The Wizards and The Gallery

    Professional MFC. Chapter 1: The Microsoft Developer Studio Chapter 2: The Wizards and The Gallery Chapter 3: The Application Architecture Hierarchy Chapter 4: The Document/View Architecture Chapter 5: Using Dialogs and Controls in MFC Chapter 6: User Interface Issues Chapter 7: Advanced User Interface Programming Chapter 8: Using the Windows Common Controls Chapter 9: Writing Programs for the Windows Shell Chapter 10: Utility and Exception Classes Chapter 11: Writing Multithreaded Applications with MFC Chapter 12: Creating Dynamic-link Libraries Chapter 13: Writing Database Applications Chapter 14: Writing OLE Containers Chapter 15: Writing OLE Servers Chapter 16: ActiveX Controls Chapter 17: ActiveX Control Containers Chapter 18: Internet Client Programming Chapter 19: Internet Server Programming Appendix A: Installing Visual C++

    标签: Chapter The Professional Developer

    上传时间: 2017-08-20

    上传用户:dragonhaixm

  • The Open Radar Data Acquisition (ORDA) subsystem replaces the current WSR-88D Radar Data Acquisiti

    The Open Radar Data Acquisition (ORDA) subsystem replaces the current WSR-88D Radar Data Acquisition subsystem with improved receiver and signal processing hardware and with improved user interface, signal processing and diagnostics software. This paper will discuss the input data from the digital receiver, the ORDA signal processing, and the data output from the ORDA hardware. Specifications of the ORDA digital receiver will be presented. The paper outlines the critical radar signal processing flow and provides analysis of new spectrum width computations and clutter filtering schemes used in the ORDA system. Where appropriate, ORDA performance enhancements, data quality improvements and reliability and maintenance improvements will be highlighted.

    标签: Radar Data Acquisition Acquisiti

    上传时间: 2017-08-25

    上传用户:leixinzhuo

  • PURPOSE OF THE PROJECT: This Application would facilitate the huge process of managing the Ad detai

    PURPOSE OF THE PROJECT: This Application would facilitate the huge process of managing the Ad details along with the Preview of the Ad (Audio storage and retrieval). The Application has the following functions User Validation. Viewing Advertisement details. Registration of New User. Reviewing Advertisement details. Saving data to the Database generating Unique records.

    标签: Application facilitate the managing

    上传时间: 2017-09-01

    上传用户:fxf126@126.com

  • RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digit

    RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key. RSA was created by Rivest, Shamir, and Adleman in 1977. Every user have a pair of key, public key and private key. Public key (e) . You may choose any number for e with these requirements, 1< e <Æ (n), where Æ (n)= (p-1) (q-1) ( p and q are first-rate), gcd (e,Æ (n))=1 (gcd= greatest common divisor). Private key (d). d=(1/e) mod(Æ (n)) Encyption (C) . C=Mª mod(n), a = e (public key), n=pq Descryption (D) . D=C° mod(n), o = d (private key

    标签: crypthograph information Adleman Rivest

    上传时间: 2017-09-01

    上传用户:chfanjiang

  • The many variants of the Unix operating system require use of a mode of thought that s significantly

    The many variants of the Unix operating system require use of a mode of thought that s significantly different from the one that s required by simpler operating systems. Think Unix introduces readers to important fundamental and intermediate Unix commands and, in the process, inculcates them in the Unix way of thinking. It s a worthy goal in a world with more Linux users than ever, and author Jon Lasser accomplishes it. He s both a capable writer and a knowledgeable user of Unix shell commands. Lasser uses bash under Red Hat Linux in most examples--which usually apply equally well to other Unix variants--and makes asides about other shells and environments, as needed.

    标签: significantly operating variants of

    上传时间: 2017-09-04

    上传用户:qq521