亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

First-Generation

  • Topics Practices: Programming and Numerical Methods Practice 1: Introduction to C Practice 2

    Topics Practices: Programming and Numerical Methods Practice 1: Introduction to C Practice 2: Cycles and functions First part cycles Part Two: Roles Practice 3 - Floating point arithmetic Practice 4 - Search for roots of functions Practice 5 - Numerical Integration Practice 6 - Arrangements and matrices Part One: Arrangements Part II: Matrices Practice 7 - Systems of linear equations Practice 8 - Interpolation Practice 9 - Algorithm Design Techniques

    標(biāo)簽: Practice Introduction Programming Practices

    上傳時間: 2013-12-16

    上傳用戶:R50974

  • a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded s

    a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES.

    標(biāo)簽: FPGA-based generator embedded hardware

    上傳時間: 2014-01-09

    上傳用戶:一諾88

  • The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at

    The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.

    標(biāo)簽: cryptographic applications attractive for

    上傳時間: 2013-12-07

    上傳用戶:zhuimenghuadie

  • This short paper will give you some VHDL code examples that will help you design synchronous circuit

    This short paper will give you some VHDL code examples that will help you design synchronous circuits that work first time.The philosophy behind Ten-Commandment code is that synthesizers are not to be trusted too much. Most of the code you will see is close to the structural level some more overtly than others.

    標(biāo)簽: will synchronous you examples

    上傳時間: 2014-12-01

    上傳用戶:sjyy1001

  • Implementation of Edmonds Karp algorithm that calculates maxFlow of graph. Input: For each test c

    Implementation of Edmonds Karp algorithm that calculates maxFlow of graph. Input: For each test case, the first line contains the number of vertices (n) and the number of arcs (m). Then, there exist m lines, one for each arc (source vertex, ending vertex and arc weight, separated by a space). The nodes are numbered from 1 to n. The node 1 and node n should be in different sets. There are no more than 30 arcs and 15 nodes. The arc weights vary between 1 and 1 000 000. Output: The output is a single line for each case, with the corresponding minimum size cut. Example: Input: 7 11 1 2 3 1 4 3 2 3 4 3 1 3 3 4 1 3 5 2 4 6 6 4 5 2 5 2 1 5 7 1 6 7 9 Output: 5

    標(biāo)簽: Implementation calculates algorithm Edmonds

    上傳時間: 2014-01-04

    上傳用戶:kiklkook

  • RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digit

    RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key. RSA was created by Rivest, Shamir, and Adleman in 1977. Every user have a pair of key, public key and private key. Public key (e) . You may choose any number for e with these requirements, 1< e <Æ (n), where Æ (n)= (p-1) (q-1) ( p and q are first-rate), gcd (e,Æ (n))=1 (gcd= greatest common divisor). Private key (d). d=(1/e) mod(Æ (n)) Encyption (C) . C=Mª mod(n), a = e (public key), n=pq Descryption (D) . D=C° mod(n), o = d (private key

    標(biāo)簽: crypthograph information Adleman Rivest

    上傳時間: 2017-09-01

    上傳用戶:chfanjiang

  • The target of the assignment is to familiarize the student with MIMO channel modeling. The work is

    The target of the assignment is to familiarize the student with MIMO channel modeling. The work is based on L. Schumacher’s MIMO channel model implementation, with added capacity analysis. First the channel model implementation is introduced, and thereafter analysis on MIMO channel with different parameters is done. Finally a short report on the results is written.

    標(biāo)簽: familiarize assignment The the

    上傳時間: 2014-01-01

    上傳用戶:jjj0202

  • This manual describes SAMSUNG s S3C2410X 16/32-bit RISC microprocessor. This product is designed to

    This manual describes SAMSUNG s S3C2410X 16/32-bit RISC microprocessor. This product is designed to provide hand-held devices and general applications with cost-effective, low-power, and high-performance microcontroller solution in small die size. To reduce total system cost, the S3C2410X includes the following components separate 16KB Instruction and 16KB Data Cache, MMU to handle virtual memory management, LCD Controller (STN & TFT), NAND Flash Boot Loader, System Manager (chip select logic and SDRAM Controller), 3-ch UART, 4-ch DMA, 4-ch Timers with PWM, I/O Ports, RTC, 8-ch 10-bit ADC and Touch Screen Interface, IIC-BUS Interface, IIS-BUS Interface, USB Host, USB Device, SD Host & Multi-Media Card Interface, 2-ch SPI and PLL for clock generation.

    標(biāo)簽: This microprocessor describes S3C2410X

    上傳時間: 2014-01-11

    上傳用戶:shizhanincc

  • The Java Platform, Enterprise Edition 5 (Java EE 5) has two different but complementary technologie

    The Java Platform, Enterprise Edition 5 (Java EE 5) has two different but complementary technologies for producing dynamic web content in the presentation tier—namely Java Servlet and JavaServer Pages (JSP). Java Servlet, the first of these technologies to appear, was initially described as extensions to a web server for producing dynamic web content. JSP, on the other hand, is a newer technology but is equally capable of generating the same dynamic content. However, the way in which a servlet and a JSP page produce their content is fundamentally different servlets embed content into logic, whereas JSP pages embed logic into content.

    標(biāo)簽: Java complementary technologie Enterprise

    上傳時間: 2017-09-04

    上傳用戶:李彥東

  • Like many of my colleagues in this industry, I learned Windows programming from Charles Petzold s Pr

    Like many of my colleagues in this industry, I learned Windows programming from Charles Petzold s Programming Windows—a classic programming text that is the bible to an entire generation of Windows programmers. When I set out to become an MFC programmer in 1994, I went shopping for an MFC equivalent to Programming Windows. After searching in vain for such a book and spending a year learning MFC the old-fashioned way, I decided to write one myself. It s the book you hold in your hands. And it s the book I would like to have had when I was learning to program Windows the MFC way.

    標(biāo)簽: programming colleagues industry Charles

    上傳時間: 2014-01-10

    上傳用戶:曹云鵬

主站蜘蛛池模板: 峨眉山市| 南皮县| 阜康市| 南昌市| 元阳县| 汪清县| 盖州市| 体育| 吉林省| 中山市| 泊头市| 济阳县| 蒙山县| 溆浦县| 柘城县| 吉水县| 长治市| 阿合奇县| 五指山市| 无锡市| 金沙县| 汉寿县| 松滋市| 调兵山市| 防城港市| 定结县| 苍南县| 若羌县| 敦化市| 岑溪市| 阿图什市| 沾化县| 东阿县| 孝昌县| 秭归县| 故城县| 普安县| 巴楚县| 灵璧县| 兴海县| 岑溪市|