-
dcraw-9.20.tar
命令行界面 raw 影像解码工具,dcraw 解码原始影像档案,显示图档之元数据 (metadata) 以及产生预览图片。(Command Line Interface raw image decoding tools, dcraw decode the original image file, display the drawing of metadata (metadata) and generate a preview image.)
- 2014-01-17 09:30:02下载
- 积分:1
-
GPS
只对未知点设立未知参数的高程网与GPS基线网平差(Only the establishment of unknown parameters elevation network and GPS baseline network adjustment of the unknown point)
- 2017-01-09 13:48:51下载
- 积分:1
-
GPSCSharp
GPS采集,GPS信息读取,内容很全,用C#开发的,适用于window mobile、window ce设备上使用。(GPS acquisition, GPS information is read, the content is very wide, with a C # development for window mobile, using the window ce device.)
- 2014-03-03 04:51:21下载
- 积分:1
-
zuhedaohang
捷联惯导和GPS组合导航程序,包含初始对准和滤波算法(SINS and GPS navigation program, including the initial alignment and filtering algorithms)
- 2020-09-23 21:17:52下载
- 积分:1
-
RLS
这是关于RLS算法的,它应用于GPS中抗干扰效果明显(This is about the RLS algorithm, and apply it to the GPS anti-jamming effect)
- 2012-08-08 19:09:51下载
- 积分:1
-
Gprs-receiving-location
车载设备向网络中心发送当前位置信息,网络中心收到数据后将数据保存到动态位置数据表中。(devices in car send current position data to network center,network center recieve these data and store it in database.)
- 2011-04-25 14:24:02下载
- 积分:1
-
GPS和INS联合导航matlab程序
应用于GPS/IMU组合导航系统的MATLAB代码。(The MATLAB code is applied to GPS/IMU integrated navigation system.)
- 2021-04-01 22:59:08下载
- 积分:1
-
feijishugongji
《菜鸟也能防黑客之非技术攻击》就是向大家介绍这种方法。正如书名所述,这些方法并不是多么高深的技米,你也一样可以做到。看过《菜鸟也能防黑客之非技术攻击》之后,你会发现在非技术攻击面前,那些所谓的高科技设备是多么的脆弱。想知道黑客怎样从电脑中获取数据而不留痕迹吗?如何不用碰键盘就能侵入邮件服务器吗?这不是魔幻大片,而是真真正正发生在我们身边。
我们都知道信息的重要性。随着计算机时代的来临,大量的信息以电子的形式存储。而用高科技的电子保护系统来保护信息也就是自然而然的事情。作为一名职业黑客,作者的主要工作就是发现这些系统的弱点。在一次又一次的入侵后,作者发现了可以绕开那些所谓高科技防御系统的方法。
你和你身边的人很可能现在就正在受到此种攻击,你准备好了吗?("Rookie also can prevent unskilled hackers attack" is to introduce this method. As the title said, these methods are not rocket technology meters, you can do it too. Read the "rookie can prevent unskilled hackers attack" after, you will find in front of non-technical attacks, how fragile is the so-called high-tech equipment. Want to know how to get data from hackers computer without leaving traces of it? How not to touch the keyboard can invade the mail server? It s not magic movies, but really in our midst.
We all know the importance of information. With the advent of the computer age, a lot of information stored in electronic form. And with high-tech electronic protection systems to protect information that is a natural thing. As a professional hacker, author of the main job is to find weaknesses in these systems. Again and again after the invasion, the authors found that can bypass the so-called high-tech defense systems.
You and the people around you are likely to suffer such att)
- 2013-12-06 14:56:44下载
- 积分:1
-
GPS_receiver
自已做的关于GPS数字中频处理,包括信号源的生成,捕获跟踪,用M文件写的(To do their own on the GPS digital IF processing, including the signal source generation, acquisition and tracking, using documents written in M)
- 2009-12-07 23:02:26下载
- 积分:1
-
four constellations
对于不同GNSS星历生成ARAIM性能,并完成多星历双接收机时钟偏差的故障假设。在GPS星历中计算“普通地表”坐标系中的卫星位置。(For different GNSS ephemeris generation ARAIM performance, fault hypothesis and complete calendar double satellite receiver clock bias. In the GPS ephemeris, the position of the satellite in the "normal surface" coordinate system is calculated.)
- 2020-12-11 11:29:17下载
- 积分:1