虫虫首页|资源下载|资源专辑|精品软件
登录|注册

above

  • this is the MUL routine for the prime field and large numbers for ECC or RSA algorithms. with IAR v

    this is the MUL routine for the prime field and large numbers for ECC or RSA algorithms. with IAR version 5 or above.

    标签: algorithms for the routine

    上传时间: 2013-12-19

    上传用户:zxc23456789

  • this is the PRNG routine for the prime field and large numbers for ECC or RSA algorithms. with IAR

    this is the PRNG routine for the prime field and large numbers for ECC or RSA algorithms. with IAR version 5 or above.

    标签: algorithms for the routine

    上传时间: 2017-07-25

    上传用户:恋天使569

  • The C++ version of the IQmath librray requires the C header file and is built on top of the C funct

    The C++ version of the IQmath librray requires the C header file and is built on top of the C functions and definitions. See "Building A Project" section of this Read Me file on how to include the above files in a user C++ program/project.

    标签: the requires version librray

    上传时间: 2013-12-17

    上传用户:yxgi5

  • The C++ version of the IQmath librray requires the C header file and is built on top of the C funct

    The C++ version of the IQmath librray requires the C header file and is built on top of the C functions and definitions. See "Building A Project" section of this Read Me file on how to include the above files in a user C++ program/project.

    标签: the requires version librray

    上传时间: 2017-07-25

    上传用户:杜莹12345

  • 计算本征值程序

    Computes all eigenvalues and eigenvectors of a real symmetric matrix a, ! which is of size n by n, stored in a physical np by np array. ! On output, elements of a above the diagonal are destroyed. ! d returns the eigenvalues of a in its first n elements. ! v is a matrix with the same logical and physical dimensions as a, ! whose columns contain, on output, the normalized eigenvectors of a. ! nrot returns the number of Jacobi rotations that were required. ! Please notice that the eigenvalues are not ordered on output. ! If the sorting is desired, the addintioal routine "eigsrt" ! can be invoked to reorder the output of jacobi.

    标签: 计算 程序

    上传时间: 2016-06-04

    上传用户:1512313

  • 32feet.NET 3.5 Bluetooth coding

    32feet.NET is a shared-source project to make personal area networking technologies such as Bluetooth, Infrared (IrDA) and more, easily accessible from .NET code. Supports desktop, mobile or embedded systems. 32feet.NET is free for commercial or non-commercial use. If you use the binaries you can just use the library as-is, if you make modifications to the source you need to include the 32feet.NET License.txt document and ensure the file headers are not modified/removed. The project currently consists of the following libraries:- Bluetooth IrDA Object Exchange Bluetooth support requires a device with either the Microsoft, Widcomm, BlueSoleil, or Stonestreet One Bluetopia Bluetooth stack. Requires .NET Compact Framework v3.5 or above and Windows CE.NET 4.2 or above, or .NET Framework v3.5 for desktop Windows XP, Vista, 7 and 8. A subset of functionality is available for Windows Phone 8 and Windows Embedded Handheld 8 in the InTheHand.Phone.Bluetooth.dll library.

    标签: feet 3.5 NET 32

    上传时间: 2016-07-06

    上传用户:magister2016

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    标签: Fundamental Limits Secure Class on of

    上传时间: 2020-01-04

    上传用户:kddlas

  • Distributed+Quality-of-Service+Support

    This thesis is about wireless communication in shared radio spectrum. Its origin and motivation is ideally represented by the two quotations from above. In this thesis, the support of Quality-of-Service (QoS) in cognitive radio networks is analyzed. New approaches to distributed coordination of cognitive radios are developed in different spectrum sharing scenarios. The Wireless Local Area Network (WLAN) 802.11 proto- col of the Institute of Electrical and Electronics Engineers (IEEE) (IEEE, 2003) with its enhancement for QoS support (IEEE, 2005d) is taken as basis. The Medium Access Control (MAC) of 801.11(e) is modified to realize flexible and dynamic spectrum assignment within a liberalized regulation framework.

    标签: Quality-of-Service Distributed Support

    上传时间: 2020-05-27

    上传用户:shancjb

  • Sharing+RF+Spectrum

    This book was born from the perception that there is much more to spectrum use and sharing than one sees reflected in publications, whether academic, commercial or political. the former – in good research style – tend towards reductionism and concentrate on specific, detailed aspects. commercial publications tend to empha- size the positive aspects and they tend to put promise above practice. Given the ever increasing pace of technology development and recent successes of new wireless technologies, some pundits predict large-scale spectrum scarcity, potentially lead- ing to economic catastrophe. Although economic theory has a hard time explaining recent events that shook the world economy, the notion of spectrum scarcity is intui- tively acceptable, even if not correct or immediately relevant.

    标签: Spectrum Sharing RF

    上传时间: 2020-05-31

    上传用户:shancjb

  • Wireless Communication Technology

    This is a book on wireless communication. That usually means communica- tion by radio, though ultrasound and infrared light are also used occasion- ally. The term “wireless” has come to mean nonbroadcast communication, usually between individuals who very often use portable or mobile equip- ment. The term is rather vague, of course, and there are certainly borderline applications that are called wireless without falling exactly into the above definition.

    标签: Communication Technology Wireless

    上传时间: 2020-06-01

    上传用户:shancjb