-
EncryptDecrypt
说明: Sample Code for encryption and decription
- 2019-02-03 20:09:05下载
- 积分:1
-
Java实现的简单网络电话,可以实现局域网内的通话,但通话时延较明显...
Java实现的简单网络电话,可以实现局域网内的通话,但通话时延较明显-Java simple telephone network can be achieved within the local area network calls, but more significantly delay calls
- 2022-01-21 03:01:05下载
- 积分:1
-
wdgl
本软件对文档进行管理,功能包括添加、修改、删除、报表打印等.(This program is a document manager, the function includes adding, revising , deletion, report print etc.. )
- 2005-08-10 09:24:59下载
- 积分:1
-
Microsoft VC++7.0 Change
具体使用解压后即可得知
Microsoft VC++7.0 Change
具体使用解压后即可得知-Microsoft VC 7.0 Change specific use to get unpacked
- 2022-10-31 14:55:03下载
- 积分:1
-
Tetris
说明: 大概在最近两天之内编码完成,但此前一天开始构思。第一天晚上主要完成了方块旋转算法,第二天也就是今天加了消方块的处理算法。但是可能还有一些考虑不周的地方,比如,没有采用定时中断,而是图方便采用了和cpu频率有关的delay()函数来模拟时间间隔,这是需要改进的地方。(Probably within the last two days to complete coding, but the idea of the day before the beginning. Completed the first night the main box rotation algorithm, the next day that is today' s consumer box added processing algorithms. However, there may be some places where ill-considered, for example, does not use timer interrupt, but rather seek convenience and the cpu frequency of using the delay () function to simulate the time interval, and that needs improvement.)
- 2009-08-28 17:14:12下载
- 积分:1
-
chain
probabilistic interference using markov chain using Monte carlo method
- 2016-01-22 01:26:29下载
- 积分:1
-
recsrh-fsush
提供了许多vc上的界面的类库,使得大家用vc做界面时不太辛苦()
- 2017-09-17 15:00:24下载
- 积分:1
-
GroupPlocyConfig
windows系统组策略操作封装.............(windows grouppolicy operator......................)
- 2013-11-13 21:57:02下载
- 积分:1
-
窗体 控件透明 鼠标穿透
vb 窗体控件透明 鼠标穿透 vb 窗体控件透明 鼠标穿透(sorry i dont know english sorry i dont know english)
- 2018-01-19 11:46:18下载
- 积分:1
-
us_apgxy
zemax源码:
This DLL models a standard ZEMAX surface type, either plane, sphere, or conic
The surface also demonstrates a user-defined apodization filter
The filter is defined as part of the real ray trace, case 5
The filter can be used at the stop to produce x-y Gaussian apodization similar to the Gaussian pupil apodization in ZEMAX but separate in x and y.
The amplitude apodization is of the form EXP[-(Gx(x/R)^2 + Gy(y/R)^2)]
The transmission is of the form EXP[-2(Gx(x/R)^2 + Gy(y/R)^2)]
where
x^2 + y^2 = r^2
R = semi-diameter
The tranmitted intensity is maximum in the center.
T is set to 0 if semi-diameter < 1e-10 to avoid division by zero. (ZEMAX source: This DLL models a standard ZEMAX surface type, either plane, sphere, or conic The surface also demonstrates a user-defined apodization filter The filter is defined as part of the real ray trace, case 5 The filter can be used at the stop to produce xy Gaussian apodization similar to the Gaussian pupil apodization in ZEMAX but separate in x and y. The amplitude apodization is of the form EXP [- (Gx (x/R) ^ 2+ Gy (y/R) ^ 2)] The transmission is of the form EXP [-2 (Gx (x/R) ^ 2+ Gy (y/R) ^ 2)] where x ^ 2+ y ^ 2 = r ^ 2 R = semi-diameter The tranmitted intensity is maximum in the center.T is set to 0 if semi-diameter <1e-10 to avoid division by zero.)
- 2006-11-10 17:25:16下载
- 积分:1