Delphi for fun library v12, latest.
This is the library for manuplating list, combination-permutation, BigNumbers etc. i think it s a must library to use. give a try.
The most straightforward approximation is the standard Gaussian approximation, where the MAI is approximated by a Gaussian random variable. This approximation is simple, however it is not accurate in general. In situations where the number of users is not large, the Gaussian approximation is not app ...
BLOG HOSTER---PHP & MYSQL
Create Blogs in seconds
Installation of your
BlogHoster system is easy. Your server must meet these requirements:
- PHP version 4.2.0 or higher must be installed.
- You must have access to an available MySQL database.
Login Manager V3.0(LM3.0) is an authentication system which can integrate with any existing website that meets the requirements. LM3.0 provides a gatekeeper where user must be authorized before entering the membership secured areas.
Features:
1. Flexibility
LM3.0 allows administrator to integrate i ...
Microsoft Visual C++ is a programming environment used to create applications for the
Microsoft Windows operating systems . To use this ebook , you must have installed either
Microsoft Visual C++ 6.0 or Microsoft Visual Studio 6.0.
生成Trick文件工具
1.Open command line
2.input tricktest
Usage: TrickTest -f -o -i
-f source mpeg2 file to trick
-o trick output directory
-i output file id
-m max coding error, default 0
-b max bitrate for trick generate, default 0 mean no limit
-s trick buffer block size, must be n*188
-l lo ...
This application i made for handle simple finance
this project using VB 6.0, SQL Server 2000 with report using html page.
You should load this components:
-Kewlbuttonz
-Ms Rich Textbox Control
-Ms Windows Common COntrols 6.0
-Ms Windows Common COntrols-2 6.0
-VB 6 Resource Editor
All components ...
High volume USB 2.0 devices will be designed using ASIC technology with embedded USB 2.0 support.
For full-speed USB devices the operating frequency was low enough to allow data recovery to be handled
in a vendors VHDL code, with the ASIC vendor providing only a simple level translator to meet the U ...
High volume USB 2.0 devices will be designed using ASIC technology with embedded USB 2.0 support.
For full-speed USB devices the operating frequency was low enough to allow data recovery to be handled
in a vendors VHDL code, with the ASIC vendor providing only a simple level translator to meet the U ...
This m file hide an image jpeg,png in another jpeg,png image.
The height and width of the secret image is in LSB of 1st 32 pixels of 1st row of the cover image.This helps in the recovery of secret image.
The secret image must be smaller than cover image.A message box will appear with a numbe ...