搜索结果

找到约 20 项符合 Symmetric 的查询结果

其他行业 A 2D homogeneous Helmholtz case (u=sin(x)cos(y) with a square) with % two Dirichlet edges (x=1,y=1

A 2D homogeneous Helmholtz case (u=sin(x)cos(y) with a square) with % two Dirichlet edges (x=1,y=1) and two Neumann edges (x=0,y=0) % by indirect symmetric BKM
https://www.eeworm.com/dl/668/241957.html
下载: 179
查看: 1033

数学计算 An object-oriented C++ implementation of Davidson method for finding a few selected extreme eigenpai

An object-oriented C++ implementation of Davidson method for finding a few selected extreme eigenpairs of a large, sparse, real, symmetric matrix
https://www.eeworm.com/dl/641/263451.html
下载: 47
查看: 1043

加密解密 This file contains a C++Builder 4 project called SimplyChaos-X ver 3.1 (SCX31). SCX31 is an encry

This file contains a C++Builder 4 project called SimplyChaos-X ver 3.1 (SCX31). SCX31 is an encryption tool. I designed it as my graduation paper work. SCX31 is a symmetric stream cipher built on chaos function, one time pad cipher and inspiration from Ground Effect (aviation). The key length can b ...
https://www.eeworm.com/dl/519/305307.html
下载: 101
查看: 1057

文件格式 An optimal neuron evolution algorithm for the restoration of linearly distorted images is presented

An optimal neuron evolution algorithm for the restoration of linearly distorted images is presented in this paper. The proposed algorithm is motivated by the symmetric positive-definite quadratic programming structure inherent in restoration. Theoretical analysis and experimental results show that t ...
https://www.eeworm.com/dl/639/317380.html
下载: 76
查看: 1070

通讯编程文档 摘 要 基于IP的语音、数据、视频等业务在NGN网络中所面临的一个实际困难就是如何有效地穿透各种NAT/FW的问题。对此

摘 要 基于IP的语音、数据、视频等业务在NGN网络中所面临的一个实际困难就是如何有效地穿透各种NAT/FW的问题。对此,会话初始化协议SIP以往的解决方法有ALGs,STUN,TURN等方式。本文探讨了一种新的媒体会话信令穿透NAT/FW的解决方案—交互式连通建立方式(ICE)。它通过综合利用现有协议,以一种更有效的方式来组织会话建立 ...
https://www.eeworm.com/dl/646/333104.html
下载: 67
查看: 1059

单片机开发 this directory contains the following: * The acdc algorithm for finding the approximate general

this directory contains the following: * The acdc algorithm for finding the approximate general (non-orthogonal) joint diagonalizer (in the direct Least Squares sense) of a set of Hermitian matrices. [acdc.m] * The acdc algorithm for finding the same for a set of Symmetric matrices. [acdc_s ...
https://www.eeworm.com/dl/648/343489.html
下载: 58
查看: 1075

Java编程 The applet illustrates the behaviour of binary search trees, Searching and Sorting Algorithms, Self-

The applet illustrates the behaviour of binary search trees, Searching and Sorting Algorithms, Self-adjusting Binary Search Trees, Symmetric binary B-trees,聽Data structure and maintenance algorithms
https://www.eeworm.com/dl/633/425925.html
下载: 76
查看: 1025

加密解密 a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded s

a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asym ...
https://www.eeworm.com/dl/519/481912.html
下载: 25
查看: 1114

数学计算 计算本征值程序

Computes all eigenvalues and eigenvectors of a real symmetric matrix a, ! which is of size n by n, stored in a physical np by np array. ! On output, elements of a above the diagonal are destroyed. ! d returns the eigenvalues of a in its first n elements. ! v is a matrix with the same logical and ...
https://www.eeworm.com/dl/511493.html
下载: 3
查看: 52

书籍 Fundamental Limits on a Class of Secure

Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity ...
https://www.eeworm.com/dl/521171.html
下载: 1
查看: 59