LINUX 全系列從安裝到架站管理教學文件 共197個教學文件,包含: linux 208招 Linux Kemel 核心 Linux X Window應用問答 Linux 使用小技巧 Linux 指令大全 LINUX 文件系統介紹 Linux 系統設定 Linux 系統命令 Linux的安裝 Linux的快技法 Linux是什么 Linux常用軟體說明 Red Hat Linux SuSE Linux安裝 硬體Q&A 程式教學....
上傳時間: 2017-04-27
上傳用戶:小碼農lz
Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair Playfair Key Matrix 1.a 5X5 matrix of letters based on a keyword 2.fill in letters of keyword (sans duplicates) 3.fill rest of matrix with other letters Encrypting and Decrypting -plaintext is encrypted two letters at a time 1. if a pair is a repeated letter, insert filler like X’ 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end) 3. if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) 4. otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair
標簽: monoalphabetic Playfair provides security
上傳時間: 2017-05-25
上傳用戶:變形金剛
This program implements a PIC-based fuzzy inference engine for the Fudge fuzzy development system from Motorola. It works by taking the output from Fudge for the 68HC11 processor, and converting it to a MPASM compatible assembler file using the convert batch file. This file can then be incorporated with fuzzy.asm to create a fuzzy inference engine. Tool chain ---------- FUDGE -> Fuzzy Rules -> MC68HC11.ASM -> CONVERT.BAT -> RULES.ASM -> MPASM FUZZY.ASM -> INTEL HEX Fuzzy input registers --------------------- current_ins 1..8 x 8-bit raw inputs Fuzzy inference function ------------------------ FuzzyEngine Fuzzy output registers ---------------------- cog_outs 1..8 x 8-bit raw outputs
標簽: fuzzy development implements PIC-based
上傳時間: 2014-01-18
上傳用戶:caozhizhi
NN Functions a program in Lisp to demonstrate working of an artificial neuron. (Enter an input vector X and weight vector W. Calculate weighted sum XW. Transform this using signal or activation functions like logistic, threshold, hyperbolic-tangent, linear, exponential, sigmoid or some other functions (syntax provided) and display the output).
標簽: demonstrate artificial Functions program
上傳時間: 2013-12-30
上傳用戶:hfmm633
音樂演奏程序設計 看看是否可以通過利用通用發聲程序編寫演奏樂曲的程序。本程序是當從鍵盤上輸入歌曲的序號A,B或C時,計算機則演奏所選擇所選的歌曲,當從鍵盤上按下X鍵時,跳出。 music1為《瑪麗有只小羔羊》,music2為《太湖船》,music3為《祝福歌》。
上傳時間: 2014-01-01
上傳用戶:13188549192
This routine calls the glpk library to solve a LP/MIP problem. A typical LP problem has following structure: [min|max] C x s.t. Ax ["="|"<="|">="] b {x <= UB} {x >= LB} The calling syntax is: [XMIN,FMIN,STATUS,EXTRA]=glpkmex(SENSE,C,A,B,CTYPE,LB,UB,... VARTYPE,PARAM,LPSOLVER,SAVE)
標簽: problem following routine library
上傳時間: 2014-12-01
上傳用戶:changeboy
This program contains the iterative methods of finding solutions of the equation f(x)=0, which are also known as the roots of the equation f(x)=0 The methods are: -bisection -false position -newton raphson -secant
標簽: iterative the solutions contains
上傳時間: 2013-12-27
上傳用戶:jennyzai
g a w k或GNU awk是由Alfred V. A h o,Peter J.We i n b e rg e r和Brian W. K e r n i g h a n于1 9 7 7年為U N I X創建的a w k編程語言的較新版本之一。a w k出自創建者姓的首字母。a w k語言(在其所有的版本中)是一種具有很強能力的模式匹配和過程語言。a w k獲取一個文件(或多個文件)來查找匹配特定模式的記錄。當查到匹配后,即執行所指定的動作。作為一個程序員,你不必操心通過文件打開、循環讀每個記錄,控制文件的結束,或執行完后關閉文件。
上傳時間: 2014-01-02
上傳用戶:hwl453472107
Rotation tool, totates a single image contained in HANDLE.HANDLE can be a handle to figure, axes, or image object. This GUI is a pure imitation of ROTATEGUI from Birju Patel and uses some code from that function. However, it has extended functionalities and was re-writen using R13 syntax. Which means that it can be compiled with the V3.x compiler.
標簽: HANDLE contained Rotation totates
上傳時間: 2017-07-28
上傳用戶:han_zh
A certification path is an ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509 and further defined in Internet Engineering Task Force (IETF) Request for Comments (RFC) 3280. Certification path processing verifies the binding between the subject distinguished name and/or subject alternative name and the subject public key defined in the target certificate. The binding is limited by constraints, which are specified in the certificates that comprise the path, and inputs that are specified by the relying party. To ensure secure interoperation of PKI-enabled applications, the path validation must be done in accordance with the X.509 and RFC 3280 specifications. This document provides the test assertions and the test cases for testing path validation software against these specifications.
標簽: certification certificates certificate starting
上傳時間: 2017-07-31
上傳用戶:清風冷雨