it-e-65 Convert a Graphics Format

Why change vectors to bitmaps?
Most of the clip art gallery is vector-based and will need to be converted into bitmap formats
(GIF) prior to putting it on the Web.
Why change bitmaps to vectors?
You will need to change vectors to bitmaps to perform tasks from the Drawing toolbar on a
bitmap picture (such as animate parts of a bitmap picture) you will need to convert it into a vector
format. You can then e.g. ungroup it and apply animations to only parts of it.
Which graphic converter to use?
To change your graphics format, you need to use a graphics converter. A popular graphics
editor you can use for this is Paint Shop Pro. Another graphics editor you can use is Adobe
PhotoShop, which is said to be the best one for this kind of conversion.
How to use your graphic converter?
Open your file in the graphics editor chosen: Select File | Open.
Select File | Save As.
Rename your file and choose a new format. For a bitmap to vectors conversion select the
WMF format. For the opposite conversion, select the GIF format if you have PowerPoint 97,
otherwise select JPEG or TIFF.
Unfortunately, some of the quality may be lost in the switch. MS office also provides
graphics converters.

Continue reading it-e-65 Convert a Graphics Format



java只有源代码,不过包含了个make.bat运行后就生成了三个jar包,服务端只需要phprpc.jar,客户端需要phprpc_client.jar,不需要别的依赖包,very nice,那个phprpc_spring.jar的包尚不知是做什么用的。


>package kzg.phprpc.hello.api;

Continue reading phprpc初步

it-3-64 Course Description

This course is an introduction to the basic concepts as well as applications of the rapidly
emerging field of digital image processing. It familiarizes the audience with the understanding,
design, and implementation of algorithms in the various subareas of digital image processing
such as image enhancement, image deblurring, image understanding, image security, and image
compression. Over 200 image examples complement the technical descriptions.
Benefits/Learning Objectives
This course will enable you to
explain the fundamental concepts and terminologies employed in digital imaging such as
sampling and aliasing, perceptual quantization; filtering, look-up tables, image histogram,

explain the various techniques used in image enhancement for contrast manipulation (e.g.,
histogram equalization), sharpening (e.g., unsharp masking) and noise removal (e.g.,
selective averaging, median filtering);
briefly demonstrate the performance of image deblurring algorithms such as inverse filtering
and Wiener filtering by using image examples;
briefly demonstrate the concepts behind digital signatures for image authentication and
invisible watermarking for image copyright protection;
briefly describe the current research topics in image understanding and demonstrate related
algorithm performances using image examples;
explain the basic technologies that serve the existing JPEG and the emerging JPEG2000
Intended Audience
Scientists, engineers, and managers who need to understand and/or apply the fundamental
concepts and techniques employed in digital image processing. Although no particular background is
needed, some prior knowledge of linear system theory (e.g., Fourier transforms) would be helpful.

1, deblurring  
n. [计] 去模糊
v. 由模糊变清晰;擦掉…的污点(deblur的ing形式)

2, histogram  ['histəugræm]
n. 柱状图
[计算机] 直方图

3, perceptual  [pə'septjuəl]
a. 感性的,知觉的

4, quantization  [,kwɔntai'zeiʃən]

5, Fourier  ['furiei]
n. 傅里叶

Continue reading it-3-64 Course Description

phprpc,xml,json,hessian 协议?








在我的观点来看,phprpc还需要在推广上加把力,一般正规项目的技术选型,都愿意选择有强大支持的组织。这一点上,phprpc(似乎由国内的一家公司开发)和hessian(由开发resin的公司caucho 开发)相比较那还要见仁见智了。







Continue reading phprpc,xml,json,hessian 协议?

Boolean.class 和 boolean.class

Boolean.class 和 boolean.class是一样的吗?答案是大大的NO:

Boolean.class.getCanonicalName()  -> “java.lang.Boolean”

boolean.class.getCanonicalName()  -> “boolean”




Continue reading Boolean.class 和 boolean.class



1:一个connection是为之一个状态的,在未关闭它之前,前面的操作会影响后面的操作。例如,使用use语句,即使是不同的两个事务,前一个事务use abc;那么后面的事务是运行在数据库abc上。





Continue reading JDBC基础

it-e-63 Concept of Graphics and Images

Image or Graphic? Technically, neither.[1]If you really want to be strict, computer pictures
are files, the same way WORD documents or solitaire games are files. They're all a bunch of ones
and zeros all in a row. But we do have to communicate with one another so let's decide.
Image. We'll use "image". That seems to cover a wide enough topic range.
"Graphic" is more of an adjective, as in "graphic format." we denote images on the Internet
by their graphic format. GIF is not the name of the image. GIF is the compression factors used to
create the raster format set up by CompuServe.
So, they're all images unless you're talking about something specific.
The images produced in Drawing programs (CorelDraw, Illustrator, Freehand, Designer etc)
are called vectorised graphics. [2]That is, all of the objects shown on the computer monitor are
representations of points and their relationship to each other on the work area, each of which is
stored in the computer as simple values and mathematical equations depicting: the relationship
between each point and the next point referenced to it, and the position (vector) of each point
referenced to a starting corner of the work area.
Bitmap pictures are stored as a vertical and horizontal array of Pixels and stored information
represents the colour of each of these pixels. The resolution of a bitmap picture describes how
many of these pixels exist over a set distance, usually horizontally: ie pixels per inch or pixels per
centimetre. An unaltered bitmap picture of 300 pixels / inch enlarged by 1000% will therefore
still have the same number of pixels across the actual picture area but each represented pixel will
cover a larger area.
[3]At such an enlargement, the picture would be of little use for reproduction unless viewed
from quite a long distance.
Bitmap or Photo-retouching programs are correctly called PAINTING PROGRAMS.
Vectorised drawings on the other hand can be enlarged as much as desired because, although the
above mentioned points on a drawing would be further apart, the relationship of any described line between
the points would always be the same. A single company logo file produced in a Drawing program could be
used for a business card, any brochure or poster, or plotting out to a Screen Print stencil 3 metres (9 feet)
wide, where as bitmap files would have to be created for every size used if practicable.
What is raster, vector, metafile, PDL, VRML, and so forth?
These terms are used to classify the type of data a graphics file contains.
Raster files (also called bitmapped files) contain graphics information described as pixels,
such as photographic images. Vector files contain data described as mathematical equations and

are typically used to store line art and CAD information. Metafiles are formats that may contain
either raster or vector graphics data. Page Description Languages (PDL) are used to describe the
layout of a printed page of graphics and text.
Animation formats are usually collections of raster data that is displayed in a sequence.
Multi-dimensional object formats store graphics data as a collection of objects (data and the code
that manipulates it) that may be rendered (displayed) in a variety of perspectives. Virtual Reality
Modeling Language (VRML) is a 3D, object-oriented language used for describing "virtual
worlds" networked via the Internet and hyperlinked within the World Wide Web. Multimedia file
formats are capable of storing any of the previously mentioned types of data, including sound and
video information.

1, deem  [di:m]
vt. 认为,视作;相信
vi. 认为,持某种看法;作某种评价

2, stems 
n. 茎(stem的复数);树管;阻挡物
v. 起源于(stem的三单形式);除去…的茎;给…装杆;止住
3, wiretap  ['waiə,tæp]
v.&n. 窃听或偷录,窃听情报,窃听装置
4, solitaire  ['sɔlitεə, ,sɔli'tεə]
n. 纸牌

5, denote  [di'nəut]
vt. 表示,指示

6, depict  [di'pikt]
vt. 描述;描画

7, brochure  [bro'ʃur]
n. 手册,小册子

8, plotting  ['plɔtiŋ]
n. 测绘;标图
v. [测] 绘图;密谋(plot的ing形式)

9, stencil  ['stensəl]
n. 模版,蜡纸
vt. 用蜡纸印刷;用模板印刷

10, raster  ['ræstə]

Continue reading it-e-63 Concept of Graphics and Images

it-e-62 Security Policy Design Issues

When designing a firewall system and its corresponding security policy, a number of
questions should be answered. The first question involves the company's expected level of
security. Is the company trying to restrict all access to services not deemed essential to the
business? Or does the company wish to allow all or most types of transactions, thus asking the
firewall system only to audit transactions and create an orderly request for transactions?
Restricting all access to services not deemed essential requires a more elaborate firewall system
and thus more work and expense. Allowing most types of transactions requires a simpler system
that only performs queue management operations and creates an audit trail.
A second question stems from the first decision: How much money is the company willing
to invest in a firewall system? Commercially-purchased firewall systems can be powerful,
complex, and expensive. It is possible, however, to construct a home-grown firewall system that
takes advantage of the capabilities of existing equipment, such as routers and network operating
systems. As we saw earlier, it is possible to restrict access into a system based on time of day,
day of week, and location. It is also possible to use existing software to create an audit trail of all
incoming and outgoing transactions. Depending on the detail of auditing required, additional
software can be purchased and installed that will work in concert with network operating system
software to provide any desired level of audits.
Similarly, many routers can be programmed to restrict access to certain kinds of traffic. A router
can be programmed to accept and reject requests with specific IP addresses or a range of IP addresses.
Routers can also be programmed to deny access to certain port addresses at the TCP level.
A third question relates to the company's commitment to security. If the company is serious
about restricting access to the corporate network through a link such as the Internet, will the

company be equally serious about supporting security on any and all other links into the
corporate network environment? Dial-up modem access, wireless network access, and other
telecommunication links should also be considered when making security decisions. Fax
machines, both stand alone and computer based, as well as removable disk media are two more
examples of how data may enter or leave a corporation. Any security policy must take these
entrance and exit points, as well as the Internet, into consideration.
Having a well-designed security policy in place will make the jobs of network support staff
clearer. The staff employees will know what the network users can and cannot access and where
they can and cannot go. A well-designed security policy will make enforcement more
straightforward, and it will allow the staff to react properly to specific security requests. The
policy will also make clear the goals and duties of network employees in enforcing security with
respect to requests from the outside. If there is a good security policy, the users themselves will
have a better understanding of what they can and cannot do. This understanding will hopefully
assist the network staff in conducting their jobs and will allow the company to maintain security
in an increasingly insecure world.
Perhaps because companies have well-designed security policies in place, many people who
use the Internet to purchase items online are growing comfortable with the fact that, if they
transfer credit card information during a secure session, their data is safe from hackers and other
eavesdroppers. This sense of security may change, however, because the Internet Engineering
Task Force is considering whether to allow a backdoor entry into all Internet traffic. This
backdoor entry would allow authorized persons to intercept any data traffic on the Internet. Since
this proposal appears to be a violation of privacy, why would anyone want to create such a
At the core of the argument is the fact that standard telephone systems currently allow
agencies of the U.S. government to wiretap communications. This wiretap occurs at the
telephone central office and is built into central office telephone switches.
The act that allows wiretapping (the Communications Assistance for Law Enforcement Act)
has been in existence since 1994. Now that the Internet is beginning to carry voice traffic, should
it also be possible for the U.S. government to wiretap voice transactions on the Internet? As one
critic of the proposal states, if they can tap voice, then they can tap data. Furthermore, if the
designers of the Internet create such a backdoor, it is also possible that this knowledge could fall
into the wrong hands and be used for criminal intent.
This issue is further complicated by the fact that many businesses presently encrypt all data
leaving the corporate network. Most encryption techniques used by businesses are so effective
that virtually no one, including the government, can crack them. If the network does the
encryption just before the data leaves corporate boundaries, then it would be the responsibility of
the corporate network support personnel to provide the U.S. government, if asked, with
unencrypted data. If, on the other hand, the encryption is applied at the user workstation before it
is inserted onto the corporate network, who will supply the U.S. government with the

unencrypted data? Clearly, this issue will be hotly debated for some time to come.
Despite the fact that a company may have a well-designed security policy in place, external
events are making this area more complex all the time.

1, deem  [di:m]
vt. 认为,视作;相信
vi. 认为,持某种看法;作某种评价

2, stems 
n. 茎(stem的复数);树管;阻挡物
v. 起源于(stem的三单形式);除去…的茎;给…装杆;止住
3, wiretap  ['waiə,tæp]
v.&n. 窃听或偷录,窃听情报,窃听装置

Continue reading it-e-62 Security Policy Design Issues


Total views.

© 2013 - 2022. All rights reserved.

Powered by Hydejack v6.6.1