The program of BASE 64 encryption and decryption
资源简介:The program of BASE 64 encryption and decryption
上传时间: 2015-09-03
上传用户:yuanyuan123
资源简介:SA encryption and decryption using Matlab The program set contains thirteen files listed below. errormeg.fig errormsg.m helpmsg.fig helpmsg.m inputmsg.fig inputmsg.m mesgcut.m pro2.fig pro2.m rsacore.m readme.txt screensh...
上传时间: 2017-04-06
上传用户:dreamboy36
资源简介:this program is written in c.... and it imlements RSA encryption and decryption
上传时间: 2017-07-19
上传用户:jcljkh
资源简介:This book discusses the growth of digital television technology and the revolution in image and video compression, highlighting the need for standardization in processing static and moving images and their exchange between computer systems
上传时间: 2015-12-23
上传用户:ommshaggar
资源简介:This paper investigates the design of joint frequency offset and carrier phase estimation of a multi-frequency time division multiple access (MF-TDMA) demodulator that is applied to a digital video broadcasting—return channel system via...
上传时间: 2015-12-30
上传用户:ls530720646
资源简介:《单片机通信技术与工程实践》所附程序 the program of the book is very good,it is useful of the developer.
上传时间: 2016-02-20
上传用户:731140412
资源简介:java AES RSA encryption and decryption
上传时间: 2014-01-06
上传用户:zhangliming420
资源简介:AES加密解密程序,C++实现的 做得不好,请多指教-AES encryption and decryption procedures, C realized not doing a good job, please enlighten
上传时间: 2013-12-20
上传用户:silenthink
资源简介:RSA encryption and decryption using Matlab by Thunyawat Rajatasereekul and Voranon Kiettrsalpipop
上传时间: 2014-12-04
上传用户:agent
资源简介:Relationship Between the Sum of Squared Difference (SSD) and Cross Correlation for Template Matching Konstantinos G. Derpanis York University kosta@cs.yorku.ca Version 1.0 December 23, 2005
上传时间: 2014-01-10
上传用户:妄想演绎师
资源简介:Signal system and Matlab courses in the series of high-level programming and engineering applications
上传时间: 2013-12-23
上传用户:netwolf
资源简介:AES encryption and decryption tool, which can encrypt any string to a HEX number and decrypt in AES.
上传时间: 2017-02-16
上传用户:Zxcvbnm
资源简介:The purpose of Software Project Tracking and Oversight is to provide adequate visibility into actual progress so that management can take effective actions when the project s performance deviates significantly from the plans.
上传时间: 2017-02-27
上传用户:三人用菜
资源简介:The code includes the implementation of inverse convolutional code and testing of it.
上传时间: 2017-03-25
上传用户:csgcd001
资源简介:it will make the sinosoidal wave forms after you input the values of phase,freq,delay and sampling intervals
上传时间: 2014-01-17
上传用户:GHF
资源简介:This project mainly deals with automating the tasks of Purchasing, maintaining,manfactioring and transacting the goods.In the Inventory Automation System the key process includes the activities such as maintenance of stock details, mainte...
上传时间: 2014-01-15
上传用户:1427796291
资源简介:the program connects to an URL and retrieves the index.php file content
上传时间: 2017-05-05
上传用户:671145514
资源简介:suitable file encryption and decryption aes and rijidael
上传时间: 2014-01-11
上传用户:大融融rr
资源简介:The document explains the concept of multiple-bandpass filtering and compacting of arbitrarily spaced frequency bands.
上传时间: 2017-07-03
上传用户:pinksun9
资源简介:Example: How to do BASE64 encryption and decryption
上传时间: 2013-12-06
上传用户:dapangxie
资源简介:This project is to design the automated system for the inventory of Al-Ahmad Cotton and Oil Mills situated at Vehari road, Multan. It is difficult to keep the track of sale purchase and production system of any company, department or organi...
上传时间: 2013-12-22
上传用户:qq1604324866
资源简介:Good security provider by using biometric feature as key. This is the program of server.
上传时间: 2013-12-07
上传用户:c12228
资源简介:Solving Problem inheritance by Prolog The parents of Mark are Linda and Peter. The parents of Fiona are Linda and Peter. The parents of Andrea are Fiona and Andrew. The parents of John are Fiona and Andrew. The parents of Eileen are Andr...
上传时间: 2014-01-08
上传用户:15071087253
资源简介:RSA加密算法在VB中的实现 rsa加密解密算法在vb中的实现 仅供参考-RSA encryption algorithm in the VB achieve rsa encryption and decryption algorithm in the vb achieve is for reference only
上传时间: 2014-01-21
上传用户:xlcky
资源简介:After an introduction to the history of mobile communications, this guide considers the basics of mobile radio, the design of cellular and private radio systems, and issues of interworking with the fixed network. It then looks at the role o...
上传时间: 2016-06-24
上传用户:nanshan
资源简介:programming PHP, Second Edition is the authoritative guide to PHP 5 and is filled with the unique knowledge of the creator of PHP (Rasmus Lerdorf) and other PHP experts. When it comes to creating web sites, the PHP scripting language is tru...
上传时间: 2016-06-30
上传用户:qq1604324866
资源简介:Instead of finding the longest common subsequence, let us try to determine the length of the LCS. 􀂄 Then tracking back to find the LCS. 􀂄 Consider a1a2…am and b1b2…bn. 􀂄 Case 1: am=bn. The LCS must contain am,...
上传时间: 2013-12-17
上传用户:evil
资源简介:The emphasis of this book is on real-time application of Synopsys tools, used to combat various problems seen at VDSM geometries. Readers will be exposed to an effective design methodology for handling complex, submicron ASIC designs. Si...
上传时间: 2017-07-05
上传用户:waitingfy
资源简介:David Vernon is the Coordinator of the European Network for the Advancement of Artificial Cognitive Systems and he is a Visiting Professor of Cognitive Systems at the University of Genoa. He is also a member of the management team of the Ro...
上传时间: 2014-01-08
上传用户:netwolf
资源简介:Java code where user can enter the height and BASE of a triangle and the program will calculate the area and perimeter if it is a right triangle
上传时间: 2013-12-06
上传用户:yzhl1988