Location:
Search - holder
Search list
Description: The Holder object for Embedded Linux.
Platform: |
Size: 2048 |
Author: qetaiyu |
Hits:
Description: Acts as a holder for a transformation result tree in the form of a Document Object Model (DOM) tree.
Platform: |
Size: 2048 |
Author: zekieqen |
Hits:
Description: ASN.1 and some other constants holder interface Source Code for Linux.
Platform: |
Size: 2048 |
Author: ibiibill |
Hits:
Description: 一个C8051F02x的SMBus总线,从模式,一个字节传输的例子。-// Example software to demonstrate the C8051F02x SMBus interface in Slave mode
//- Interrupt-driven SMBus implementation
//- Only slave states defined
//- 1-byte SMBus data holder used for both transmit and receive
//- Timer3 used by SMBus for SCL low timeout detection
//- ARBLOST support included
Platform: |
Size: 3072 |
Author: 黄高玮 |
Hits:
Description: Fallback per-CPU frame pointer holder for Linux v2.13.6.
Platform: |
Size: 4096 |
Author: jengqiuwiu |
Hits:
Description: Implementation of House Holder method
Platform: |
Size: 1881088 |
Author: satyadeep |
Hits:
Description: ASN.1 and some other constants holder interface Source Code for Linux.
Platform: |
Size: 2048 |
Author: tprjkhtsec |
Hits:
Description: ASN.1 and some other constants holder interface Source Code for Linux.
Platform: |
Size: 1024 |
Author: onrjkhtonn |
Hits:
Description: Base Surface Holder for Linux v2.13.6.
Platform: |
Size: 2048 |
Author: isofibnrhtdne |
Hits:
Description: CNC machine config files.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS AS
IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR
PROFITS OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.-CNC machine config files.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS AS
IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR
PROFITS OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Platform: |
Size: 2048 |
Author: praveenofpersia |
Hits:
Description: Another benefit of storing the encrypted multimedia
data and facilitating encrypted domain watermark detection in
the cloud is that those encrypted data can be reused if the
image data holder (or the cloud) needs to work with other
watermark owners later for secure watermark detection.
Platform: |
Size: 1272832 |
Author: rasul |
Hits:
Description: place holder for contiguous memory for Linux v2.13.6.
Platform: |
Size: 3072 |
Author: baizzfun |
Hits:
Description: Speech Based Watermarking for Digital Images
This paper presents a novel scheme of
watermarking of digital images for copyright protection and
authentication. In this paper we proposed a method of
embedding owner’s speech signal. Speech being a biometric data,
the watermark signal in this method is expected to be more
meaningful and has closer correlation with copyright holder.
The main issue of concern here is the capacity because the speech
data has large number of samples. Linear predictive coding is
used to encode the audio data. Here, speech samples are
imperceptibly inserted using spread spectrum technique into the
mid frequency band of wavelet transform of image which makes
it robust to lossy compression. Applications for such a speechhiding
scheme include copy protection, authentication and covert
communication.
Platform: |
Size: 195584 |
Author: Nayan Patel |
Hits:
Description: In this paper we proposed a method of
embedding owner’s speech signal. Speech being a biometric data,
the watermark signal in this method is expected to be more
meaningful and has closer correlation with copyright holder.
The main issue of concern here is the capacity because the speech
data has large number of samples. Linear predictive coding is
used to encode the audio data. Here, speech samples are
imperceptibly inserted using spread spectrum technique into the
mid frequency band of wavelet transform of image which makes
it robust to lossy compression. Applications for such a speechhiding
scheme include copy protection, authentication and covert
communication.
Platform: |
Size: 1614848 |
Author: Nayan Patel |
Hits:
Description: place holder for contiguous memory for Linux v2.13.6.
Platform: |
Size: 3072 |
Author: kmcouhong |
Hits:
Description: Fallback per-CPU frame pointer holder.
Platform: |
Size: 2048 |
Author: dienengjeng |
Hits:
Description: A place holder for time base interrupts, if they are ever enabled.
Platform: |
Size: 3072 |
Author: plvaihan |
Hits:
Description: 此方案使用20路PWM控制伺服马达。其中18路PWM用于控制机器人的6根爪子,每根爪子具有3个伺服马达。调整PWM输出的占空比,我们可以控制伺服马达转动的角度,就能够操作机器人做出各种的动作。另外2路PWM用于控制机器人前方的夹持器,可以操作夹持器的张合。-This scheme USES 20 road PWM control servo motor.18 road PWM is used to control the robot s 6 claws, each paw has three servo motors.Adjust the PWM duty cycle of output, we can control the servo motor rotation Angle, will be able to do all kinds of operating robot.The other 2 road PWM is used to control the robot gripper ahead, can operate on the holder.
Platform: |
Size: 8334336 |
Author: song |
Hits:
Description: old lock syscall holder.
Platform: |
Size: 5120 |
Author: dongvpwer |
Hits:
Description: 1. Create new account by clicking on New Account link:
2. Leaving any field blank:
On submitting the form with correct information:
If you have already an account you can check balance, deposit, with-draw, money transfer and can close your account by clicking on respective link.
2. Account holder can check balance:
On filling Incorrect Detail:
3. Can deposit money:
4. Can withdraw money:
5. Can transfer Money:
6. Can close Account:
This is all about banking project……..
Platform: |
Size: 4326400 |
Author: amit |
Hits: