-
-
CAESARCI.rar
... by D, B would become E, and so on. The method is named after Julius Caesar, who used it to communicate with his generals. The encryption step performed by a Caesar cipher is often incorporated as part of more complex schemes, such as the Vigenà ¨re ...
-
PM_proposal(pdf).rar
proposal for project managent under certain constaraints by waleed iqbal awan and his poor fellows once upon a time.
-
-
rtu.rar
... a male between 15 and 40 who is confident, individual and has varied interests and passions. 4D man is not as tribal as his predecessors, the metrosexual and the lad, where you either were one or you weren’t. He is also increasingly interested in culture ...
-
mdi_dll.zip
his example shows how to use the dll with delphi
-
PIDSystem.rar
his first control design case study implements the Stewart platform
control system with the standard preoptimized proportional-integral-derivative
(PID) controller. It introduces you to the overall model and the uncontrolled
Stewart platform motion. It ...
-
-
DateEdit.rar
... user of the computer on which the SOFTWARE COMPONENT PRODUCT(S) COMPONENT PRODUCT(S) is installed may make a second copy for his or her exclusive use on a portable computer. You acknowledge and agree that the SOFTWARE COMPONENT PRODUCT(S) in source code ...
-
C4_5.m.zip
his algorithm was proposed by Quinlan (1993). The C4.5 algorithm generates a classification-decision tree for the given data-set by recursive partitioning of data. The decision is grown using Depth-first strategy. The algorithm considers all the possible ...
-
-