The VGA example generates a 320x240 diffusion-limited-aggregation (DLA) on Altera DE2 board. A DLA is a clump formed by sticky particles adhering to an existing structure. In this design, we start with one pixel at the center of the screen and allow a random walker to bounce around the screen until it hits the pixel at the center. It then sticks and a new walker is started randomly at one of the 4 corners of the screen. The random number generators for x and y steps are XOR feedback shift registers (see also Hamblen, Appendix A). The VGA driver, PLL, and reset controller from the DE2 CDROM are necessary to compile this example. Note that you must push KEY0 to start the state machine.
標簽: diffusion-limited-aggregation DLA generates 320x240
上傳時間: 2014-01-16
上傳用戶:225588
The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.
標簽: cryptography literature has Secrecy
上傳時間: 2016-12-08
上傳用戶:fxf126@126.com
Please read this document before attempting to compile and run the libraries and applications! The projects must be compiled in a particular order. Standard support questions are about compiler and/or linker errors that are generated when users try to compile the projects in the wrong order. Other information of interest is available here, so read the entire document fi rst. Wild Magic Version 2.1 is what ships with the fi rst printing of the Game Physics book. Some of the applications that are referenced in the book did not make it onto the CD–ROM for the book. Version 2.2 contains those applications, plus more
標簽: applications attempting and libraries
上傳時間: 2014-01-16
上傳用戶:Late_Li
本人大二學習匯編語言程序設計時的全部源代碼,均已經編譯通過生成可執行文件,每個目錄是一個程序。希望對學習匯編語言的同志有所幫助。-my sophomore year learning assembly language programming at all the source code, have already generated by compiler executable files, each directory is a process. Want to learn assembly language comrades help.
上傳時間: 2013-12-17
上傳用戶:zmy123
虛擬機設計與實現——C/C++,即Virtual Machine Design and Implementation in C/C++ ,隨書光盤源碼,HEC虛擬機的源代碼
標簽: 虛擬機
上傳時間: 2016-12-22
上傳用戶:洛木卓
數據加密算法(Data Encryption Algorithm,DEA)的數據加密標準(Data Encryption Standard,DES)是規范的描述,它出自 IBM 的研究工作,并在 1997 年被美國政府正式采納。它很可能是使用最廣泛的秘鑰系統,特別是在保護金融數據的安全中,最初開發的 DES 是嵌入硬 件中的。通常,自動取款機(Automated Teller Machine,ATM)都使用 DES。文件是DES代碼的VHDL描述
標簽: Encryption Algorithm Data 數據加密
上傳時間: 2014-09-07
上傳用戶:ztj182002
state of art language modeling methods: An Empirical Study of Smoothing Techniques for Language Modeling.pdf BLEU, a Method for Automatic Evaluation of Machine Translation.pdf Class-based n-gram models of natural language.pdf Distributed Language Modeling for N-best List Re-ranking.pdf Distributed Word Clustering for Large Scale Class-Based Language Modeling in.pdf
標簽: Techniques Empirical Smoothing Language
上傳時間: 2016-12-26
上傳用戶:zhuoying119
This function calculates Akaike s final prediction error % estimate of the average generalization error for network % models generated by NNARX, NNOE, NNARMAX1+2, or their recursive % counterparts. % % [FPE,deff,varest,H] = nnfpe(method,NetDef,W1,W2,U,Y,NN,trparms,skip,Chat) % produces the final prediction error estimate (fpe), the effective number % of weights in the network if it has been trained with weight decay, % an estimate of the noise variance, and the Gauss-Newton Hessian. %
標簽: generalization calculates prediction function
上傳時間: 2016-12-27
上傳用戶:腳趾頭
基于C++闡述虛擬機編程原理 This guide provides an in-depth look at the construction and underlying theory of a fully functional virtual machine and an entire suite of related development tools.
標簽: construction underlying provides in-depth
上傳時間: 2017-02-12
上傳用戶:nanxia
In this paper, we describe the development of a rapidly reconfigurable system in which the users’ tacit knowledge and requirements are elicited via a process of Interactive Evolution, finding the image processing parameters to achieve the required goals without any need for specialised knowledge of the machine vision system. We show that the resulting segmentation can be quickly and easily evolved from scratch, and achieves detection rates comparable to those of a hand-tuned system on a hot-rolled steel defect recognition problem.
標簽: reconfigurable development the describe
上傳時間: 2014-01-05
上傳用戶:hopy