Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - 64.bit.R
Search - 64.bit.R - List
DL : 0
The Disk sample is used with Classpnp.sys as disk driver. The sample supports Plug and Play, Power Management, WMI, and failure prediction (S.M.A.R.T.), and it is 64-bit compliant.
Update : 2008-10-13 Size : 87087 Publisher : zhang

DL : 0
The Disk sample is used with Classpnp.sys as disk driver. The sample supports Plug and Play, Power Management, WMI, and failure prediction (S.M.A.R.T.), and it is 64-bit compliant.
Update : 2008-10-13 Size : 397014 Publisher : zzj

The basic parts of the BFSK transmitter are the preamble and the data input circuit. The preamble sequence is positioned in front of each packet of 122 bits for a total of 128 bits packet. The main purpose of the preamble is to facilitate the reception, providing both bit and packet synchronization. The data input circuit mainly consists from memory elements and a convolutional encoder with r=1/2. Thus, the input bits must be stored in a temporary memory and be partitioned in blocks of 61 bits. Then the convolutional encoder doubles the bits and adds two more trail bits at the end of the message. A multiplexer makes sure that that the correct sequence, choosing between preamble and encoded bit, is propagating to the next stage. The next stage of the transmitter consists of two direct digital synthesizers (DDS), and a multiplexer that is fed with zeros and ones to choose between the two frequencies. For each bit, we allow 64 samples of the respective frequency to be transmitted. Although the implementation of the selection between the two frequencies is strait forward, the enable port of the multiplexer should be used along with a Matlab Code (MCode) block in order to prevent the propagation of some initial undefined states during initialization. The only functionality of the MCode block is to enable the multiplexer after the first bit of the preamble is detected. Finally, pulse shaping is not used and the addition of a single filter after the last multiplexer would suffice to implement this functionality.
Update : 2011-03-18 Size : 31381 Publisher : publicxz

DL : 0
Program In VB
Update : 2024-04-26 Size : 24576 Publisher : 林菁明

DL : 0
The Disk sample is used with Classpnp.sys as disk driver. The sample supports Plug and Play, Power Management, WMI, and failure prediction (S.M.A.R.T.), and it is 64-bit compliant.
Update : 2024-04-26 Size : 87040 Publisher : zhang

DL : 0
在程序中,利用imshow(I,[127 128])实现第七位灰度切割:imshow(I,[127 128])表示当灰度值为0到127时,T(r)=0,全黑;当灰度值为128到255时,T(r)=255,全白。 利用位与实现第n(n<7)位的灰度切割。64表示0100 0000,与原图像相与,实现第六位的灰度切割;32表示0010 0000,实现对第五位的灰度切割,以此类推。-In the procedure, using imshow (I, [127 128]) to achieve the seventh cutting gray: imshow (I, [127 128]) that when the grayscale value of 0-127 when, T (r) = 0, the whole black when the gray value of 128-255 hours, T (r) = 255, all-white. The use of spaces and Implementation of the first n (n <7)-bit gray-scale cutting. 64 said that 01 million, with the original phase image and achieve the sixth place of the gray-cutting 32, said 0010 0000, to achieve the fifth cutting of gray, and so on.
Update : 2024-04-26 Size : 3072 Publisher : 张雨辰

DL : 0
The Disk sample is used with Classpnp.sys as disk driver. The sample supports Plug and Play, Power Management, WMI, and failure prediction (S.M.A.R.T.), and it is 64-bit compliant.
Update : 2024-04-26 Size : 396288 Publisher : zzj

This my last Vbscript and i want to share it with you for testing on your machines and of course you should give me your feedback to improve it So This Vbscript show you How to create a folder and protect it by password,so he creates a folder named "Protection" then he gives permission access denied, so you can not rename or open, or write, or read or delete this folder. This Script changes the folder s attributes to "+r +s +h" and revokes permissions for COMPUTERNAME and the administrators group after prompting for a password. And reverts those changes after the same password was provided. Tested on Windows 7 64-bit French version-This is my last Vbscript and i want to share it with you for testing on your machines and of course you should give me your feedback to improve it So This Vbscript show you How to create a folder and protect it by password,so he creates a folder named "Protection" then he gives permission access denied, so you can not rename or open, or write, or read or delete this folder. This Script changes the folder s attributes to "+r +s +h" and revokes permissions for COMPUTERNAME and the administrators group after prompting for a password. And reverts those changes after the same password was provided. Tested on Windows 7 64-bit French version
Update : 2024-04-26 Size : 9216 Publisher : Hackoo

算法流程 1.将要处理的二进制串进行IP置换 2.将密钥进行PC1置换(64位转为56位), 3.进行16轮操作,对于第i轮操作: 1)将上一次得到的PC1密钥(级除去第一次外,其他的都经过移位处理)的结果左右部分(各28位)分别循环左移1位或2位,然后将移位后的密钥进行PC2[i]置换. 2)将处理串均等分为左右两串Li,Ri(各32位),然后将右串Ri通过E盒拓展为新的右串R (48位),R 与上一步得到的PC2[i]子密钥进行异或操作,结果通过S盒输出(48为转为32位),然后通过P盒直接置换,再与Li异或. 3)将Ri赋给作出Li,R 赋值给Ri. 4)合并处理串StrText=Li+Ri. 4.将最新的处理串进行IP_1置换,置换结果即为所求的加密串或解密串 加密解密的区别 在每轮操作中,加密使用的PC2密钥顺序为0~15,解密使用的PC2密钥顺序为15~0. 更多0-The algorithm flow would have to deal with the binary string replacement IP key PC1 replacement (64 into 56), 3. Conducted 16 operations, for the i-th round operation: 1) the last PC1 key (removal of the first, the other after shift processing), about (28), respectively, rotate left one or two, then the shift key PC2 [i] replacement. 2) will handle the string equalization is divided into right and left bunches Li, Ri (32), and then the right string Ri develop new right string R ' (48-bit), R' is obtained in the previous step through the E box PC2 [i] subkey XOR operation results through the S-box output (48 into 32), and then through the P box direct replacement, with Li the XOR. 3) Ri is assigned to make Li, R ' assignment to Ri. 4) the combined processing string StrText = Li+Ri, 4. latest processing string for IP_1 replacement, replacement result is encrypted string or ask the the decrypted string encryption and decryption difference in each round operation, encryption use
Update : 2024-04-26 Size : 2048 Publisher : 温维山

DL : 0
算法流程 1.将要处理的二进制串进行IP置换 2.将密钥进行PC1置换(64位转为56位), 3.进行16轮操作,对于第i轮操作: 1)将上一次得到的PC1密钥(级除去第一次外,其他的都经过移位处理)的结果左右部分(各28位)分别循环左移1位或2位,然后将移位后的密钥进行PC2[i]置换. 2)将处理串均等分为左右两串Li,Ri(各32位),然后将右串Ri通过E盒拓展为新的右串R (48位),R 与上一步得到的PC2[i]子密钥进行异或操作,结果通过S盒输出(48为转为32位),然后通过P盒直接置换,再与Li异或. 3)将Ri赋给作出Li,R 赋值给Ri. 4)合并处理串StrText=Li+Ri. 4.将最新的处理串进行IP_1置换,置换结果即为所求的加密串或解密串 加密解密的区别 在每轮操作中,加密使用的PC2密钥顺序为0~15,解密使用的PC2密钥顺序为15~0. -Algorithm flow A binary string to be processed is substituted for IP 2 key the PC1 replacement (64 into 56) 16 operation, the operation for the i-th round: 1) about the results of the last PC1 key (remove the first time, the others have been shifting processing) (28) rotate left one or two, and then will shift key PC2 [i] replacement. 2) is divided into the equal treatment string around two bunches of Li, Ri (32), and then expand the right string Ri E box (48-bit), the right string R R​ ​ and the previous step PC2 i] subkey XOR operation result is output via the S-box (48 to 32 conversion), and then directly through the P box replacement and XOR with Li. 3) the Ri to make Li, R is assigned to Ri. 4) merger deal with string StrText Ri = Li+. 4. Latest processing string IP_1 replacement, replacement results shall request string encryption or decryption string Encryption and decryption of difference In each round of operations, PC2 key e
Update : 2024-04-26 Size : 2048 Publisher : zhusiyi

DL : 0
汇编配置教程 教你如何在64位WIN7系统下配置汇编软件和运行汇编程序-Assembler tutorial to teach you how to 64 bit WIN7 system configuration software and running assembler assembler
Update : 2024-04-26 Size : 283648 Publisher : 二喵
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.