亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Symmetric

  • A 2D homogeneous Helmholtz case (u=sin(x)cos(y) with a square) with % two Dirichlet edges (x=1,y=1

    A 2D homogeneous Helmholtz case (u=sin(x)cos(y) with a square) with % two Dirichlet edges (x=1,y=1) and two Neumann edges (x=0,y=0) % by indirect Symmetric BKM

    標簽: with homogeneous Helmholtz Dirichlet

    上傳時間: 2016-01-03

    上傳用戶:xjz632

  • An object-oriented C++ implementation of Davidson method for finding a few selected extreme eigenpai

    An object-oriented C++ implementation of Davidson method for finding a few selected extreme eigenpairs of a large, sparse, real, Symmetric matrix

    標簽: object-oriented implementation Davidson eigenpai

    上傳時間: 2014-01-09

    上傳用戶:TRIFCT

  • This file contains a C++Builder 4 project called SimplyChaos-X ver 3.1 (SCX31). SCX31 is an encry

    This file contains a C++Builder 4 project called SimplyChaos-X ver 3.1 (SCX31). SCX31 is an encryption tool. I designed it as my graduation paper work. SCX31 is a Symmetric stream cipher built on chaos function, one time pad cipher and inspiration from Ground Effect (aviation). The key length can be up to 40 characters (320 bits).

    標簽: SimplyChaos-X SCX contains Builder

    上傳時間: 2016-06-07

    上傳用戶:nanshan

  • An optimal neuron evolution algorithm for the restoration of linearly distorted images is presented

    An optimal neuron evolution algorithm for the restoration of linearly distorted images is presented in this paper. The proposed algorithm is motivated by the Symmetric positive-definite quadratic programming structure inherent in restoration. Theoretical analysis and experimental results show that the algorithm not only significantly increases the convergence rate of processing, hut also produces good restoration results. In addition, the algorithm provides a genuine parallel processing structure which ensures computationally feasible spatial domain image restoration

    標簽: restoration evolution algorithm distorted

    上傳時間: 2013-12-21

    上傳用戶:yy541071797

  • 摘 要 基于IP的語音、數據、視頻等業務在NGN網絡中所面臨的一個實際困難就是如何有效地穿透各種NAT/FW的問題。對此

    摘 要 基于IP的語音、數據、視頻等業務在NGN網絡中所面臨的一個實際困難就是如何有效地穿透各種NAT/FW的問題。對此,會話初始化協議SIP以往的解決方法有ALGs,STUN,TURN等方式。本文探討了一種新的媒體會話信令穿透NAT/FW的解決方案—交互式連通建立方式(ICE)。它通過綜合利用現有協議,以一種更有效的方式來組織會話建立過程,使之在不增加任何延遲同時比STUN等單一協議更具有健壯性、靈活性。本文詳細介紹了ICE算法,并設計一個實例針對SIP信令協議穿透Symmetric NAT流程進行了描述,最后總結了ICE的優勢及應用前景。

    標簽: NGN NAT FW 語音

    上傳時間: 2016-08-14

    上傳用戶:trepb001

  • this directory contains the following: * The acdc algorithm for finding the approximate general

    this directory contains the following: * The acdc algorithm for finding the approximate general (non-orthogonal) joint diagonalizer (in the direct Least Squares sense) of a set of Hermitian matrices. [acdc.m] * The acdc algorithm for finding the same for a set of Symmetric matrices. [acdc_sym.m](note that for real-valued matrices the Hermitian and Symmetric cases are similar however, in such cases the Hermitian version [acdc.m], rather than the Symmetric version[acdc_sym] is preferable. * A function that finds an initial guess for acdc by applying hard-whitening followed by Cardoso s orthogonal joint diagonalizer. Note that acdc may also be called without an initial guess, in which case the initial guess is set by default to the identity matrix. The m-file includes the joint_diag function (by Cardoso) for performing the orthogonal part. [init4acdc.m]

    標簽: approximate directory algorithm the

    上傳時間: 2014-01-17

    上傳用戶:hanli8870

  • The applet illustrates the behaviour of binary search trees, Searching and Sorting Algorithms, Self-

    The applet illustrates the behaviour of binary search trees, Searching and Sorting Algorithms, Self-adjusting Binary Search Trees, Symmetric binary B-trees,聽Data structure and maintenance algorithms

    標簽: illustrates Algorithms Searching behaviour

    上傳時間: 2017-04-10

    上傳用戶:helmos

  • a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded s

    a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for aSymmetric algorithm such as RSA and Symmetric algorithm such as AES.

    標簽: FPGA-based generator embedded hardware

    上傳時間: 2014-01-09

    上傳用戶:一諾88

  • 計算本征值程序

    Computes all eigenvalues and eigenvectors of a real Symmetric matrix a, ! which is of size n by n, stored in a physical np by np array. ! On output, elements of a above the diagonal are destroyed. ! d returns the eigenvalues of a in its first n elements. ! v is a matrix with the same logical and physical dimensions as a, ! whose columns contain, on output, the normalized eigenvectors of a. ! nrot returns the number of Jacobi rotations that were required. ! Please notice that the eigenvalues are not ordered on output. ! If the sorting is desired, the addintioal routine "eigsrt" ! can be invoked to reorder the output of jacobi.

    標簽: 計算 程序

    上傳時間: 2016-06-04

    上傳用戶:1512313

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the aSymmetric MDCS (AMDCS), which include the Symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure Symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    標簽: Fundamental Limits Secure Class on of

    上傳時間: 2020-01-04

    上傳用戶:kddlas

主站蜘蛛池模板: 景泰县| 岚皋县| 广饶县| 息烽县| 阿瓦提县| 肃北| 万全县| 文昌市| 镇平县| 德令哈市| 比如县| 宁武县| 阿拉善右旗| 米易县| 乌审旗| 钦州市| 梁平县| 和龙市| 库伦旗| 昌平区| 乐昌市| 河南省| 临邑县| 扎赉特旗| 邵东县| 莱州市| 平利县| 滨海县| 得荣县| 巴马| 通化市| 高雄县| 清新县| 长宁区| 颍上县| 武功县| 电白县| 吴江市| 米泉市| 论坛| 小金县|