搜索资源列表
v7695_i263bbs31
- 1.地址缩短,同时加密(更有利存取数据库之间的数据) 2.图片上传功能,使用了保密上传目录功能,就算被上传*而不知道实际路径,*就不起作用了,还有就是上传使用了会员积分上传,积分的数目由管理员在后台设置 3.图片使用了防盗链功能,外部连接图片也使用了简单的防盗功能,本地图片使用了流方式防盗链功能 4.增加了在线邮件发送功能,(该功能目前只应用两个地方,斑竹申请和举报贴吧,只要有会员提交了信息,系统会自动发提醒邮件给管理员,该功能可以在后台实现关闭或启用,要正常使用该功能,服务器必须安装jma
光子晶体带边附近的大色散效应
- We have used phase-sensitive ultrashort-pulse interferometry to study the modifi cation of optical pulse propagation near the photonic band edges in colloidal crystals consisting of polystyrene spheres in water. A strong suppression of the group
paper01
- A FFT-based partial matched filter (PMF) acquisition threshold setting method for fast GPS acquisition is presented. Normal distribution and numerical fitting technique instead of real decision variable (DV) distribution are used in derivatio
sift5
- :研究了一种多目标识别算法,该算法用SUSAN角点形成SIFT特征点,采用阶梯图像金字塔结构实现尺度不变,为所有匹配点建立统一的超定线性方程组并对该方程组系数矩阵进行简 化使其维数降低一半,得到增广矩阵.对增广矩阵进行列变换,依据坐标转换的特性可从中提取多目标的稳定正常点,实现了快速分离多目标的匹配点. -: Study of a multi-target recognition algorithm using SUSAN corner formed SIFT feature point
www.msgeologist.com-TLEV16No8
- Outcrop interpretation of seismic-scale normal faults in southern Oregon:Descr iption of structural styles and evaluation of subsurface interpretation methods
AnAnomalyBasedApproachforIntrusion
- A new system for web attack detection is presented. It follows the anomaly-based approach, therefore known and unknown attacks can be detected. The system relies on a XML file to classify the incoming requests as normal or anomalous. The XML
source-code
- All instructions are executed in one single instruction cycle, unless a conditional test is true or the program counter is changed as a result of an instruction. In these cases, the execution takes two instruction cycles with the second cycle exe
Rated-power-of
- 现代汽车全部采用电力起动机,起动机的功能就是迅速、可靠地起动发动机,使发动机正常工作。所以在选择发动机,必须确定好与之配套的起动机;当然还必须选择好起动机与发动机的最佳传动比及适配的蓄电池的电荷量等。为了使发动机能迅速、可靠地起,起动机必须具有足够的功率,否则就有可能起动不了发动机,或出现重复起动的次数增多,起动时间延长,烧毁起动机,消耗过多的燃料等-Hyundai Motor starters all the electricity used, the function of starter
ROAD-EXTRACTION-IN-SUBURBAN-AREAS-BASED-ON-NORMAL
- It is a classic paper in road extraction. It uses NCut methods
Comparing-the-real-time-scheduling-policies-of-th
- By Le Trung Thang,April 2012 By default, the Linux kernel build used in the many open source distributions is the normal/default kernel which doesn’t support real time scheduling. If an embedded developer wants to compare the scheduling policies
Temperature-Compensation-for-LCDs
- The optimal contrast setting for LCDs varies with ambient temperature. For most applications this variation in contrast is tolerable over the "normal" temperature range of 0℃ to +50℃. Most LCD modules are available with an extended temperature range
Load-Flow
- Load flow analysis for normal system
Propagation-of-Intersheath-Modes-on-Underground-C
- This paper investigates wave propagation and transients associated with intersheath modes on normal-bonded and cross-bonded underground cables. Circuits for exciting intersheath modes are analyzed based on simulation and propagation char
