搜索结果

找到约 1,644 项符合 USED 的查询结果

按分类筛选

显示更多分类

加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/519/413134.html
下载: 97
查看: 1093

3G开发 This is the Low Energy Adaptive Clustering Hierarchy routing protocol [LEACH] source code for wirele

This is the Low Energy Adaptive Clustering Hierarchy routing protocol [LEACH] source code for wireless sensor network we have used.It is developed with MatLab7
https://www.eeworm.com/dl/701/416192.html
下载: 96
查看: 1104

VHDL/FPGA/Verilog Verilog, c and asm source codes of the Minimig system, a fpga implementation of the Amiga computer.

Verilog, c and asm source codes of the Minimig system, a fpga implementation of the Amiga computer. Version minimig-j used on the Minimig fpga board.
https://www.eeworm.com/dl/663/493079.html
下载: 107
查看: 1144

技术资料 ADC按键处理,抖动处理,应用于产品的按键输入

ADC按键处理,抖动处理,应用于产品的按键输入-The ADC key program ,Dithering process,used in key input devices
https://www.eeworm.com/dl/854960.html
下载: 6
查看: 9261

技术资料 AN3154

在STM32™的Bootloader中使用的CAN协议 (CAN protocol used in the STM32™ bootloader)
https://www.eeworm.com/dl/876930.html
下载: 6
查看: 8688

网络 xl2tpd is an implementation of the Layer 2 Tunnelling Protocol (RFC 2661). L2TP allows you to tunne

xl2tpd is an implementation of the Layer 2 Tunnelling Protocol (RFC 2661). L2TP allows you to tunnel PPP over UDP. Some ISPs use L2TP to tunnel user sessions from dial-in servers (modem banks, ADSL DSLAMs) to back-end PPP servers. Another important application is Virtual Private Networks where the I ...
https://www.eeworm.com/dl/635/337447.html
下载: 91
查看: 1102

加密解密 The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption sche

The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based Encryption from the Weil Pairing", CRYPTO 2001.) There are a few modifications and additions. The Boneh-Franklin scheme is used as a Key Encapsulation Mech ...
https://www.eeworm.com/dl/519/238196.html
下载: 140
查看: 1141

人工智能/神经网络 中心点漂移是一种非监督聚类算法(与k-means算法相似

中心点漂移是一种非监督聚类算法(与k-means算法相似,但应用范围更广些),可用于图像分割,基于Matlab实现的源码。 MedoidShift is a unsupervised clustering algorithm(similar to k-means algorithm, but can be used in border application fields), can be used for image segmentation. Included is the Matlab imple ...
https://www.eeworm.com/dl/650/276944.html
下载: 85
查看: 1109

软件工程 For a programming language, Fortran has been around a long time. It was one of the first widely use

For a programming language, Fortran has been around a long time. It was one of the first widely used 鈥渉igh-level鈥?languages, as well as the first programming language to be standardized. It is still the premier language for scientific and engineering computing applications. The purpose of this ha ...
https://www.eeworm.com/dl/540/426497.html
下载: 168
查看: 1126

数值算法/人工智能 This program incorporates the FV method for solving the Navier-Stokes equations using 2D, Cartesian

This program incorporates the FV method for solving the Navier-Stokes equations using 2D, Cartesian grids and the staggered arrangement of variables. Variables are stored as 2D arrays. SIMPLE method is used for pressure calculation. UDS and CDS are implemented for the discretization of convective te ...
https://www.eeworm.com/dl/518/440155.html
下载: 149
查看: 1093