SA Encryption and Decryption using Matlab
The program set contains thirteen files listed below.
errormeg.fig
errormsg.m
helpmsg.fig
helpmsg.m
inputmsg.fig
inputmsg.m
mesgcut.m
pro2.fig
pro2.m
rsacore.m
readme.txt
screenshot.gif
In order to run the program please call pro2.m under Matlab 6.0 Environment.
System Requirement
Matlab version 6.0 and if necessary, Maple version 6.0 on any platform
PentiumII 300 MHz or equivalent.
1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click on Security button
in order to Add/Remove users and set user rights. Once you entered Security dialog you may select your Supervisor password.
2. Click OK when finished configuring users. Don t forget to disable some features in order to see what
happens with GUI elements - menus, and buttons.
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths. Note that, these paths are not vertex-disjoint i.e., the vertices may repeat but they are all edge-disjoint i.e., no two paths have the same edges. The input is the adjacency matrix of a directed acyclic graph and a pair(s) of source and destination vertices and the output should be the number of such disjoint paths and the paths themselves on separate lines. In case of multiple paths the output should be in order of paths with minimum vertices first. In case of tie the vertex number should be taken in consideration for ordering.
Fortran 90 versions of all the Numerical Recipes routines appear in the following
Chapters B1 through B20, numbered in correspondence with Chapters 1 through 20
in Volume 1. Within each chapter, the routines appear in the same order as in Volume
1, but not broken out separately by section number within Volume 1鈥檚 chapters.
There are commentaries accompanying many of the routines, generally following
the printed listing of the routine to which they apply. These are of two kinds:
issues related to parallelizing the algorithm in question, and issues related to the
Fortran 90 implementation. To distinguish between these two, rather different, kind
The files adi_ssl_init.h and adi_ssl_init.c are used to define the functions
adi_ssl_Init() and 慳di_ssl_Terminate()?which initialize and terminate all the
Blackfin System Services in the appropriate order, for a particular EZ-Kit, depending
on the Blackfin processor used.
The purpose of this project is to explore the issues and implementation of a multiple instruction stream, single data stream processor. We are running two instruction streams on two CPUs which share an address space. The processors share a second level cache, and maintain coherence at the L1 cache with a write-invalidate policy. The L2 cache is two-way set associative, with a block size of 8 words, and a total capacity of 512 words.
This is an interface program for flip flop emulation. At first pulse at the input pin the apropriate output will latch and at the second pulse will release. Very short and efficient program
This project features a complete JPEG Hardware Compressor (standard Baseline DCT, JFIF header) with 2:1:1 subsampling, able to compress at a rate of up to 24 images per second (on XC2V1000-4 @ 40 MHz with resolution 352x288).
Image resolution is not limited. It takes an RGB input (row-wise) and outputs to a memory the compressed JPEG image. Its quality is comparable to software solutions.
C280x C/C++ Header Files and Peripheral Examples
The DSP28xx C/C++ peripheral header files and example projects files facilitate writing C/C++ Code for the TI鈥檚 28xx MCUs. The code can be used as a learning tool or as the basis for a development platform depending on the current needs of the user. We suggest that you immediately download these header files in order for an easier transition to understanding the 28xx peripherals.
java3D game engine design of the source
[three-dimensionalvirtualrealitynetworkprogram] - "virtual reality 3D network programming language VRML -- second-generation network programming language" CD Distribution