亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

above

  • this is the MUL routine for the prime field and large numbers for ECC or RSA algorithms. with IAR v

    this is the MUL routine for the prime field and large numbers for ECC or RSA algorithms. with IAR version 5 or above.

    標(biāo)簽: algorithms for the routine

    上傳時(shí)間: 2013-12-20

    上傳用戶:zxc23456789

  • this is the PRNG routine for the prime field and large numbers for ECC or RSA algorithms. with IAR

    this is the PRNG routine for the prime field and large numbers for ECC or RSA algorithms. with IAR version 5 or above.

    標(biāo)簽: algorithms for the routine

    上傳時(shí)間: 2017-07-25

    上傳用戶:戀天使569

  • The C++ version of the IQmath librray requires the C header file and is built on top of the C funct

    The C++ version of the IQmath librray requires the C header file and is built on top of the C functions and definitions. See "Building A Project" section of this Read Me file on how to include the above files in a user C++ program/project.

    標(biāo)簽: the requires version librray

    上傳時(shí)間: 2013-12-18

    上傳用戶:yxgi5

  • The C++ version of the IQmath librray requires the C header file and is built on top of the C funct

    The C++ version of the IQmath librray requires the C header file and is built on top of the C functions and definitions. See "Building A Project" section of this Read Me file on how to include the above files in a user C++ program/project.

    標(biāo)簽: the requires version librray

    上傳時(shí)間: 2017-07-26

    上傳用戶:杜瑩12345

  • 計(jì)算本征值程序

    Computes all eigenvalues and eigenvectors of a real symmetric matrix a, ! which is of size n by n, stored in a physical np by np array. ! On output, elements of a above the diagonal are destroyed. ! d returns the eigenvalues of a in its first n elements. ! v is a matrix with the same logical and physical dimensions as a, ! whose columns contain, on output, the normalized eigenvectors of a. ! nrot returns the number of Jacobi rotations that were required. ! Please notice that the eigenvalues are not ordered on output. ! If the sorting is desired, the addintioal routine "eigsrt" ! can be invoked to reorder the output of jacobi.

    標(biāo)簽: 計(jì)算 程序

    上傳時(shí)間: 2016-06-04

    上傳用戶:1512313

  • 32feet.NET 3.5 Bluetooth coding

    32feet.NET is a shared-source project to make personal area networking technologies such as Bluetooth, Infrared (IrDA) and more, easily accessible from .NET code. Supports desktop, mobile or embedded systems. 32feet.NET is free for commercial or non-commercial use. If you use the binaries you can just use the library as-is, if you make modifications to the source you need to include the 32feet.NET License.txt document and ensure the file headers are not modified/removed. The project currently consists of the following libraries:- Bluetooth IrDA Object Exchange Bluetooth support requires a device with either the Microsoft, Widcomm, BlueSoleil, or Stonestreet One Bluetopia Bluetooth stack. Requires .NET Compact Framework v3.5 or above and Windows CE.NET 4.2 or above, or .NET Framework v3.5 for desktop Windows XP, Vista, 7 and 8. A subset of functionality is available for Windows Phone 8 and Windows Embedded Handheld 8 in the InTheHand.Phone.Bluetooth.dll library.

    標(biāo)簽: feet 3.5 NET 32

    上傳時(shí)間: 2016-07-06

    上傳用戶:magister2016

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    標(biāo)簽: Fundamental Limits Secure Class on of

    上傳時(shí)間: 2020-01-04

    上傳用戶:kddlas

  • Distributed+Quality-of-Service+Support

    This thesis is about wireless communication in shared radio spectrum. Its origin and motivation is ideally represented by the two quotations from above. In this thesis, the support of Quality-of-Service (QoS) in cognitive radio networks is analyzed. New approaches to distributed coordination of cognitive radios are developed in different spectrum sharing scenarios. The Wireless Local Area Network (WLAN) 802.11 proto- col of the Institute of Electrical and Electronics Engineers (IEEE) (IEEE, 2003) with its enhancement for QoS support (IEEE, 2005d) is taken as basis. The Medium Access Control (MAC) of 801.11(e) is modified to realize flexible and dynamic spectrum assignment within a liberalized regulation framework.

    標(biāo)簽: Quality-of-Service Distributed Support

    上傳時(shí)間: 2020-05-27

    上傳用戶:shancjb

  • Sharing+RF+Spectrum

    This book was born from the perception that there is much more to spectrum use and sharing than one sees reflected in publications, whether academic, commercial or political. the former – in good research style – tend towards reductionism and concentrate on specific, detailed aspects. commercial publications tend to empha- size the positive aspects and they tend to put promise above practice. Given the ever increasing pace of technology development and recent successes of new wireless technologies, some pundits predict large-scale spectrum scarcity, potentially lead- ing to economic catastrophe. Although economic theory has a hard time explaining recent events that shook the world economy, the notion of spectrum scarcity is intui- tively acceptable, even if not correct or immediately relevant.

    標(biāo)簽: Spectrum Sharing RF

    上傳時(shí)間: 2020-06-01

    上傳用戶:shancjb

  • Wireless Communication Technology

    This is a book on wireless communication. That usually means communica- tion by radio, though ultrasound and infrared light are also used occasion- ally. The term “wireless” has come to mean nonbroadcast communication, usually between individuals who very often use portable or mobile equip- ment. The term is rather vague, of course, and there are certainly borderline applications that are called wireless without falling exactly into the above definition.

    標(biāo)簽: Communication Technology Wireless

    上傳時(shí)間: 2020-06-01

    上傳用戶:shancjb

主站蜘蛛池模板: 延吉市| 江川县| 惠州市| 镇坪县| 黑龙江省| 布尔津县| 台东县| 临高县| 开封县| 宁德市| 望奎县| 谷城县| 甘德县| 平果县| 伊宁县| 长春市| 闽侯县| 嘉峪关市| 顺义区| 烟台市| 东港市| 潜江市| 连州市| 临海市| 新河县| 莲花县| 保山市| 赣榆县| 锡林郭勒盟| 安阳县| 吕梁市| 稻城县| 锦州市| 彩票| 洛宁县| 株洲市| 宁津县| 泉州市| 福州市| 黑山县| 公安县|