Welcome![Sign In][Sign Up]
Location:
Search - bit to character conversion

Search list

[Crack HackEncryDeCry

Description: 我在字符串加密时的处理是每次取字符串的三个字节,再把三个字符连成一个24位的整型,前8位存放第一个字符,中间8位存放第二个字符,最后8位存放第三个字符。再取这个整型数的前6位对应的数值去差用户提供对应表,转化成相应的字符,再取第二个6位,第三个6位,第四个六位进行字符的转换。再重复前面相同的操作值到整个字符串转换完毕。在解密的过程就是根据用户提供的表进行查找和移位换原字符串。 这种算法比通常的直接根据用户提供的表进行转换有更高的安全性,且加密解密的效率很高。-string encryption is the handling each from the three-byte string. then three characters together into a 24-bit integer, the former eight store one character, intermediate storage of the second eight characters, the last eight characters placed third. This takes the number of cosmetic six, the numerical difference to users correspondence table, into the corresponding characters, then take the second six months, six third, fourth six characters for the conversion. Repeat the same as before the operation value of the entire string conversion completed. The decryption process is the basis for the user to find and scale displacement for the original strings. This algorithm than usual under the direct users of the conversion table for a higher level of security and encryption and decryption of
Platform: | Size: 1553 | Author: 伍孝秉 | Hits:

[OtherThe C Programming Language-C语言详解英文版

Description: 这是一本讲解C语言的书,是英文编写,十分经典,是大部分公司的新职员入职之前必须要看的书籍之一,很多公司都以它作为培训教材,帮助你更快了解C语言的奥妙。 Contents l Preface l Preface to the first edition l Introduction 1. Chapter 1: A Tutorial Introduction 1. Getting Started 2. Variables and Arithmetic Expressions 3. The for statement 4. Symbolic Constants 5. Character Input and Output 1. File Copying 2. Character Counting 3. Line Counting 4. Word Counting 6. Arrays 7. Functions 8. Arguments - Call by Value 9. Character Arrays 10. External Variables and Scope 2. Chapter 2: Types, Operators and Expressions 1. Variable Names 2. Data Types and Sizes 3. Constants 4. Declarations 5. Arithmetic Operators 6. Relational and Logical Operators 7. Type Conversions 8. Increment and Decrement Operators 9. Bitwise Operators 10. Assignment Operators and Expressions 11. Conditional Expressions 12. Precedence and Order of Evaluation 3. Chapter 3: Control Flow 1. Statements and Blocks 2. If-Else 3. Else-If 4. Switch 5. Loops - While and For 6. Loops - Do-While 7. Break and Continue 8. Goto and labels 4. Chapter 4: Functions and Program Structure 1. Basics of Functions 2. Functions Returning Non-integers 3. External Variables 4. Scope Rules 5. Header Files 6. Static Variables 7. Register Variables 8. Block Structure 9. Initialization 10. Recursion 11. The C Preprocessor 1. File Inclusion 2. Macro Substitution 3. Conditional Inclusion 5. Chapter 5: Pointers and Arrays 1. Pointers and Addresses 2. Pointers and Function Arguments 3. Pointers and Arrays 4. Address Arithmetic 5. Character Pointers and Functions 6. Pointer Arrays; Pointers to Pointers 7. Multi-dimensional Arrays 8. Initialization of Pointer Arrays 9. Pointers vs. Multi-dimensional Arrays 10. Command-line Arguments 11. Pointers to Functions 12. Complicated Declarations 6. Chapter 6: Structures 1. Basics of Structures 2. Structures and Functions 3. Arrays of Structures 4. Pointers to Structures 5. Self-referential Structures 6. Table Lookup 7. Typedef 8. Unions 9. Bit-fields 7. Chapter 7: Input and Output 1. Standard Input and Output 2. Formatted Output - printf 3. Variable-length Argument Lists 4. Formatted Input - Scanf 5. File Access 6. Error Handling - Stderr and Exit 7. Line Input and Output 8. Miscellaneous Functions 1. String Operations 2. Character Class Testing and Conversion 3. Ungetc 4. Command Execution 5. Storage Management 6. Mathematical Functions 7. Random Number generation 8. Chapter 8: The UNIX System Interface 1. File Descriptors 2. Low Level I/O - Read and Write 3. Open, Creat, Close, Unlink 4. Random Access - Lseek 5. Example - An implementation of Fopen and Getc 6. Example - Listing Directories 7. Example - A Storage Allocator l Appendix A: Reference Manual 1. Introduction 2. Lexical Conventions 3. Syntax Notation 4. Meaning of Identifiers 5. Objects and Lvalues 6. Conversions 7. Expressions 8. Declarations 9. Statements 10. External Declarations 11. Scope and Linkage 12. Preprocessor 13. Grammar l Appendix B: Standard Library 1. Input and Output: 1. File Operations 2. Formatted Output 3. Formatted Input 4. Character Input and Output Functions 5. Direct Input and Output Functions 6. File Positioning Functions 7. Error Functions 2. Character Class Tests: 3. String Functions: 4. Mathematical Functions: 5. Utility Functions: 6. Diagnostics: 7. Variable Argument Lists: 8. Non-local Jumps: 9. Signals: 10. Date and Time Functions: 11. Implementation-defined Limits: and l Appendix C: Summary of Changes
Platform: | Size: 570630 | Author: wukoo0901@qq.com | Hits:

[Crack HackEncryDeCry

Description: 我在字符串加密时的处理是每次取字符串的三个字节,再把三个字符连成一个24位的整型,前8位存放第一个字符,中间8位存放第二个字符,最后8位存放第三个字符。再取这个整型数的前6位对应的数值去差用户提供对应表,转化成相应的字符,再取第二个6位,第三个6位,第四个六位进行字符的转换。再重复前面相同的操作值到整个字符串转换完毕。在解密的过程就是根据用户提供的表进行查找和移位换原字符串。 这种算法比通常的直接根据用户提供的表进行转换有更高的安全性,且加密解密的效率很高。-string encryption is the handling each from the three-byte string. then three characters together into a 24-bit integer, the former eight store one character, intermediate storage of the second eight characters, the last eight characters placed third. This takes the number of cosmetic six, the numerical difference to users correspondence table, into the corresponding characters, then take the second six months, six third, fourth six characters for the conversion. Repeat the same as before the operation value of the entire string conversion completed. The decryption process is the basis for the user to find and scale displacement for the original strings. This algorithm than usual under the direct users of the conversion table for a higher level of security and encryption and decryption of
Platform: | Size: 1024 | Author: 伍孝秉 | Hits:

[Otherhz

Description: 一个能够转换汉字内码的软件,我想对大家会有点用-A Chinese character code conversion software, I would like to be a bit with everyone
Platform: | Size: 3072 | Author: JANY | Hits:

[assembly languageshizhijisuan

Description: 设计数值计算及显示系统,程序运行要有显示界面。提示系统所使用的方法,若输入字符不是“1”,“Q”时提示输入错误,请重新输入。可以用英文或汉语拼音显示界面。 设计要求如下: 1.按“1”,本程序能从键盘读入二个五位十进制数(1为符号+4位数位),并将这个十进制数分别转换位二进制数。然后求其和再将和以十进制数形式进行显示 2.按“Q”键,退出。 -Design of numerical calculation and display systems, display interface should be run. Tip of the methods used by the system, if the input character is not " 1" , " Q" when prompted to enter an error, please re-enter. Can display in English or Pinyin. Design requirements are as follows: 1. Press " 1" , the program read from the keyboard into two five decimal number (1 for the symbol-digit+4 bit), and the number of decimal places, respectively, binary number conversion. And then seek and then and show the form of a decimal number 2. By " Q" button, exit.
Platform: | Size: 2048 | Author: Excell889 | Hits:

[Special Effects30836eaee806

Description: 图像处理系统是一个典型的图像处理软件,主要用gdi+完成。它由图像显示、图像转换、图像处理、字符识别、其他和帮助等几部分组成。 图像显示模块 该模块主要包括显示位图、显示JPEG、显示GIF 3个部分。 图像转换模块 该模块主要包括位图转换为JPEG、JPEG转换为位图、位图转换为GIF,GIF转换为位图4个部分。 图像处理模块 该模块主要包括图像旋转、图像锐化处理、图像反色处理、灰度化处理、线性变换5个部分。 字符识别模块 该模块主要包含手写数字识别。-Image processing system is a typical image processing software, the main use gdi+ to complete. It consists of image display, image conversion, image processing, character recognition, and help a few other components. Image display module includes the module display a bitmap, display JPEG, GIF 3-part show. Image conversion module The module includes a bitmap into JPEG, JPEG convert a bitmap, the bitmap is converted to GIF, GIF converted to bit-part in Figure 4. Image processing module The module includes image rotation, image sharpening, image anti-color processing, grayscale processing, linear transformations five parts. Character recognition module This module contains the handwritten numeral recognition.
Platform: | Size: 1213440 | Author: 韦福敏 | Hits:

[GDI-Bitmaptuxiangchulixitong

Description: 主要功能 图像处理系统是一个典型的图像处理软件,它由图像显示、图像转换、图像处理、字符识别、其他和帮助等几部分组成。  图像显示模块 该模块主要包括显示位图、显示JPEG、显示GIF 3个部分。  图像转换模块 该模块主要包括位图转换为JPEG、JPEG转换为位图、位图转换为GIF,GIF转换为位图4个部分。  图像处理模块 该模块主要包括图像旋转、图像锐化处理、图像反色处理、灰度化处理、线性变换5个部分。  字符识别模块 该模块主要包含手写数字识别。  其他 该模块主要包括设置菜单的固定颜色和随机颜色两个部分。  帮助模块 该模块主要包括软件的版本、开发单位等信息。 -Main function Image processing system is a typical image processing software, which consists of image display, image conversion, image processing, character recognition, and help a few other components.  image display module The module includes display a bitmap, display JPEG, GIF 3-part show.  image conversion module The module includes a bitmap into JPEG, JPEG convert a bitmap, the bitmap is converted to GIF, GIF converted to a bit-part in Figure 4.  image processing module The module includes image rotation, image sharpening, image anti-color processing, gray scale processing, linear transformations five parts.  character recognition module This module contains the handwritten numeral recognition.  Other The module includes a fixed set menu colors and random colors in two parts.  Help Module The module includes the software version, the developer and other information.
Platform: | Size: 8664064 | Author: 张成 | Hits:

[Windows DevelopChecksum

Description: 校验和的计算过程主要分位三个步骤:数据文件的输入,校验和的计算和校验结果的输出。输入数据可能是以字符形式存储的 ,而校验和的计算则要采用数据形式,所以在从文件读取数据时,都要进行字符到数据的相互转换. 使用C++编程时直接使用16进制的方式打开输入文件。待校验的数据按16位位一个单位相加,采用端循环进位,最后对所得16位的数据取反码。因为待校验的数据时以字节方式分隔的 ,所以为了方便,将16位的数据分成高8位和 低8位处理。-Checksum calculation process is divided into bits of three steps: the input data file, the checksum calculation and verification results of the output. Input data may be stored in characters, and checksum calculation will have to use the data in the form, so read the data from the file, should be carried out to the data conversion between the character. Using C++ programming directly using 16 hex way to open the input file. The data to be verified by adding a flat 16-bit bit by bit into the side loop, the last 16 bits of data on income inversion code. Because the data to be verified by a byte-delimited, so for convenience, the 16-bit 8-bit data into high and low 8-bit processing.
Platform: | Size: 7168 | Author: 刘俊涛 | Hits:

[OtherZKTQmbzh

Description: 码表转换法读取字库 内含小字库创建方法、对应的字模提取方式和字库使用源代码。 原理:借助表来定位。首先,建立一个94*94的索引表,对应94个区码和位码。再建立一个数组用于储存字模。建立小字库的时候,把字模在数组中位置写入索引表对应的区位。读取的时候直接定位到索引表得到重新编排的字库位置码,所以我姑且称之为码表转换法。这是一种以空间换取时间的方法。 优点: 完全不用查找或者判断,定位效率很高。 可以支持汉字数量仅受内存限制。 字模位置和区位码相关,使用方便。 缺点: 索引表会占用额外内存。这个可以说是最致命的也是唯一的缺点。- Conversion method reads the character code table Contains a small font creation method, the corresponding matrix extraction methods and fonts to use source code. Principle: With the table to locate. First, create a 94* 94 of the index table, area code and the corresponding 94-bit code. Then create an array to store the matrix. Establishment of small font when the font is written in the array position index table corresponding location. When reading the index table to be directly targeted to rearrange the location of the font code, so I call this code table conversion method. This is a space for time approach. Advantages: We did not find, or determine, locate high efficiency. Can support the number of characters limited only by memory. Matrix related to the location and area code, easy to use. Disadvantages: Index table will take up additional memory. This is arguably the most deadly is the only drawback.
Platform: | Size: 62464 | Author: | Hits:

[File Operatevbhan-zi-

Description: 汉字拼音的首字符,可以在数据库中作为某一关键字段(如:商品的名称、客户单位的名称等)的辅助查询字段来简化查询过程中的输入问题。也就是说,用户只要输入需要查找的汉字拼音的首字符,就能很快定位到要查找的记录,当要查找的字数在4、5个以上时,其重码率还是很低的。提起将汉字转化为拼音,大家可能以为这是一个复杂的问题,比如将拼音输入法的码表文件进行逆转换,再根据汉字来查询拼音等等。其实我们需要的只是汉字拼音的首字符,其实用 VB6 实现这一功能问题远没有这样复杂。下面把用 VB6 实现这一功能的方法介绍如下。-Pinyin character, as a key field (such as: the product name, the name of the client units, etc.), auxiliary database query field, enter the query process to simplify the problem. That is, the user can enter the first character of the need to find Pinyin, can quickly locate the records you want to find, when you want to find the number of words in more than four or five, the heavy bit rate is still very low. Lift the Chinese characters into pinyin, we may think that this is a complex issue, such as Pinyin input method of inverse conversion code table file, characters to query Pinyin. In fact, we need only the first character of the Pinyin fact, using VB6 to achieve this function far from such a complex problem. The following method to achieve this function with VB6 described below.
Platform: | Size: 45056 | Author: liuyan | Hits:

[Delphi VCL15zhuan18

Description: Delphi源码,字符处理,身份证号转换   15位身份证升级18位身份证号的Delphi程序,15位身份证号转换为18位数字的转换程序,基于Delphi创建,压缩包为程序源码,欢迎参考。 -Delphi program convert Delphi source code, character handling, ID number ID card upgrade 18 ID number 15, 15 ID number conversion to 18-bit digital conversion program, created based on Delphi, compressed package for the program source code, welcome .
Platform: | Size: 7168 | Author: 王飞 | Hits:

[Otherjinzhizhuanhuan

Description: 【问题描述】编写函数itob(n,s,b),用于把整数n转换成以b为基的字符串并存储到s中. 编写程序,使用函数itob(n,s,b)将输入的整数n,转换成字符串s,将s输出.转换后的字符串从最高的非零位开始输出。如果n为负数,则输出的字符串的第一个字符为’-’。b为大于1小于37的任意自然数值。当b=2时,输出字符只可能是’0’和’1’;当b=16时,输出字符串中可能含有字符为’0’-’9’,’a’-’f’(字母以小写输出)。b还可以是其它数值。比如输入n=33,b=17,则输出33的17进制值为"1g"。 【输入形式】控制台输入整数n和b,其中n可以为负数。n和b以空格分隔. 【输出形式】控制台输出转化后的字符串s. 【样例输入】5 2 【样例输出】101 【样例说明】5的二进制就是101 【评分标准】结果完全正确得20分,每个测试点4分。提交程序名为:itob.c-[Problem Description] Write a function itob (n, s, b), is used to convert the integer n base b string and stored in s. Written procedures, use the function itob (n, s, b) the input integer n, converted to a string s, the s output. strings converted from the highest non-zero bit to start output. If n is negative, the first character of the output is - . b is greater than a value of less than 37 of any nature. When b = 2, the output character can only be 0 and 1 When b = 16, the output string may contain characters 0 - 9 , a - f (letter in lower output). b may also be other values​ ​ . For example, enter n = 33, b = 17, the output 17 hex value "1g" 33 s. [Form] input console input integer n and b, where n can be negative. n and b separated by a space. [Output format] console output after conversion string s. Sample input [52] Sample output] 101 [Description] binary sample 5 is 101 [Standard] results entirely correct score 20 points, 4 points for each test poin
Platform: | Size: 362496 | Author: 服部半藏 | Hits:

[SCMText2Bin

Description: stm32数组转二进制工具,在Keil下运行 1.输入文件内容必须包含类似于{0xff,0xff}这样的c语言数组格式,才能正常转换。大括号和前导符“x”是必须的。 2.支持8位和16位数据。 3.支持4个字节的长宽信息,方便Image2Lcd程序输出的图片转换成Bin。 4.支持成对“/”符号包含注释信息,若文件内容只有单个“/”,后果自负。 5.支持头四个字节的宽高信息互换存储位置。-stm32 array to binary tools, running in Keil 1 input file must contain similar {0xff, 0xff} c language such array format to normal conversion. Braces and leading character "x" is a must. 2 supports 8-bit and 16-bit data. 3 supports 4-byte length and width information to facilitate Image2Lcd program output image into Bin. 4 support paired "/" symbol contains annotation information, if only a single file contents "/" peril. 5 support the first four bytes wide exchange of information stored in a high position.
Platform: | Size: 319488 | Author: 颖颖 | Hits:

[Embeded-SCM Developct1642原理图及驱动代码

Description: ct1642原理图及驱动代码 修改参考步骤: * 1、修改"硬件资源操作定义"的常量LED_BIT_COUNT定义,确定LED数码管的位数。 * *  2、完成"硬件资源操作定义"的宏GPIO_CLOCK_SET(val)、GPIO_DATA_SET(val)、GPIO_KEY_GET(val)。 * *  3、修改"全局变量定义"的INT8U,确保INT8U为8位无符号整型。 * *  4、确定调用函数fp_led_data_translate()位置,完成频道到显示代码的转换。 * *  5、确定调用函数fp_led_string_translate()位置,完成显示字符到显示代码的转换。 * *  6、制作一个TASK,按要求调用fp_ct1642_manage(),并将得到的按键值v_KeyValue传回给系统。(This file is a reference driver for CT1642 * 1, modify the constant LED_BIT_COUNT definition of "hardware resource operation definition", and determine the number of LED digital tubes. * * 2, macro GPIO_CLOCK_SET (VAL), GPIO_DATA_SET (VAL) and GPIO_KEY_GET (VAL) that complete "hardware resource operation definition". * * 3, modify the "global variable definition" INT8U, to ensure that INT8U is 8 bit unsigned integer. * * 4, determine the calling function fp_led_data_translate () position, complete the conversion of channel to display code. * * 5, determine the call function fp_led_string_translate () position, complete the display character to display code conversion. * * 6, make a TASK, call fp_ct1642_manage () according to the requirement, and return the key value v_KeyValue to the system.)
Platform: | Size: 454656 | Author: 孤枪侠 | Hits:

CodeBus www.codebus.net