DSP2407比較全的源程序 包括SPI設計,AD,DA,ramtest, SCI,CAN,PWM,key,EXINT,24C02,VECTOR等
上傳時間: 2017-08-13
上傳用戶:aa54
The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of classified examples a decision tree is induced, biased by the information gain measure, which heuristically leads to small trees. The examples are given in attribute-value representation. The set of possible classes is finite. Only tests, that split the set of instances of the underlying example languages depending on the value of a single attribute are supported.
標簽: algorithm induction decision top-down
上傳時間: 2017-08-20
上傳用戶:hzy5825468
a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES.
標簽: FPGA-based generator embedded hardware
上傳時間: 2014-01-09
上傳用戶:一諾88
/* * tesswind.c * This program demonstrates the winding rule polygon * tessellation property. Four tessellated objects are drawn, * each with very different contours. When the w key is pressed, * the objects are drawn with a different winding rule. */
標簽: demonstrates tessellation tesswind program
上傳時間: 2013-12-10
上傳用戶:星仔
密鑰擴展模塊的接口如圖4.4。clk為系統時鐘,kld為輸入的加載信號,key為輸入的128位密鑰數據,wo_0, wo_1, wo_2, wo_3分別為輸出的密鑰列
上傳時間: 2014-01-14
上傳用戶:royzhangsz
RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key. RSA was created by Rivest, Shamir, and Adleman in 1977. Every user have a pair of key, public key and private key. Public key (e) . You may choose any number for e with these requirements, 1< e <Æ (n), where Æ (n)= (p-1) (q-1) ( p and q are first-rate), gcd (e,Æ (n))=1 (gcd= greatest common divisor). Private key (d). d=(1/e) mod(Æ (n)) Encyption (C) . C=Mª mod(n), a = e (public key), n=pq Descryption (D) . D=C° mod(n), o = d (private key
標簽: crypthograph information Adleman Rivest
上傳時間: 2017-09-01
上傳用戶:chfanjiang
給定一批的樣本,當然這些樣本間必須相互獨立。如果Q > chi2(p, nu),假設拒絕,否則通過。 ARGUMENTS: x Absolut numbers. p The prob ability value, calculated from Q. Q The resulting Q-value.
標簽: 樣本
上傳時間: 2017-09-06
上傳用戶:yoleeson
The 6.0 release of Visual C++ shows Microsoft s continued focus on Internet technologies and COM, which are key components of the new Windows Distributed interNet Application Architecture (DNA). In addition to supporting these platform initiatives, Visual C++ 6.0 also adds an amazing number of productivity-boosting features such as Edit And Continue, IntelliSense, AutoComplete, and code tips. These features take Visual C++ to a new level. We have tried to make sure that this book keeps you up to speed on the latest technologies being introduced into Visual C++.
標簽: technologies Microsoft continued Internet
上傳時間: 2017-09-07
上傳用戶:wsf950131
While there are many textbooks about the European Union (EU), Clive Archer covers the essential elements of the EU clearly and con- cisely, outlining the key debates and issues it faces today
標簽: essential textbooks the European
上傳時間: 2013-12-17
上傳用戶:aig85
While there are many textbooks about the European Union (EU), Clive Archer covers the essential elements of the EU clearly and con- cisely, outlining the key debates and issues it faces today
標簽: essential textbooks the European
上傳時間: 2013-12-18
上傳用戶:498732662