LINUX 全系列从安装到架站管理教学文件 共197个教学文件,包含: linux 208招 Linux Kemel 核心 Linux X Window应用问答 Linux 使用小技巧 Linux 指令大全 LINUX 文件系统介绍 Linux 系统设定 Linux 系统命令 Linux的安装 Linux的快技法 Linux是什么 Linux常用软体说明 Red Hat Linux SuSE Linux安装 硬体Q&A 程式教学....
上传时间: 2017-04-27
上传用户:小码农lz
Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair Playfair Key Matrix 1.a 5X5 matrix of letters based on a keyword 2.fill in letters of keyword (sans duplicates) 3.fill rest of matrix with other letters Encrypting and Decrypting -plaintext is encrypted two letters at a time 1. if a pair is a repeated letter, insert filler like X’ 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end) 3. if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) 4. otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair
标签: monoalphabetic Playfair provides security
上传时间: 2017-05-25
上传用户:变形金刚
This program implements a PIC-based fuzzy inference engine for the Fudge fuzzy development system from Motorola. It works by taking the output from Fudge for the 68HC11 processor, and converting it to a MPASM compatible assembler file using the convert batch file. This file can then be incorporated with fuzzy.asm to create a fuzzy inference engine. Tool chain ---------- FUDGE -> Fuzzy Rules -> MC68HC11.ASM -> CONVERT.BAT -> RULES.ASM -> MPASM FUZZY.ASM -> INTEL HEX Fuzzy input registers --------------------- current_ins 1..8 x 8-bit raw inputs Fuzzy inference function ------------------------ FuzzyEngine Fuzzy output registers ---------------------- cog_outs 1..8 x 8-bit raw outputs
标签: fuzzy development implements PIC-based
上传时间: 2014-01-18
上传用户:caozhizhi
NN Functions a program in Lisp to demonstrate working of an artificial neuron. (Enter an input vector X and weight vector W. Calculate weighted sum XW. Transform this using signal or activation functions like logistic, threshold, hyperbolic-tangent, linear, exponential, sigmoid or some other functions (syntax provided) and display the output).
标签: demonstrate artificial Functions program
上传时间: 2013-12-30
上传用户:hfmm633
音乐演奏程序设计 看看是否可以通过利用通用发声程序编写演奏乐曲的程序。本程序是当从键盘上输入歌曲的序号A,B或C时,计算机则演奏所选择所选的歌曲,当从键盘上按下X键时,跳出。 music1为《玛丽有只小羔羊》,music2为《太湖船》,music3为《祝福歌》。
上传时间: 2014-01-01
上传用户:13188549192
This routine calls the glpk library to solve a LP/MIP problem. A typical LP problem has following structure: [min|max] C x s.t. Ax ["="|"<="|">="] b {x <= UB} {x >= LB} The calling syntax is: [XMIN,FMIN,STATUS,EXTRA]=glpkmex(SENSE,C,A,B,CTYPE,LB,UB,... VARTYPE,PARAM,LPSOLVER,SAVE)
标签: problem following routine library
上传时间: 2014-12-01
上传用户:changeboy
This program contains the iterative methods of finding solutions of the equation f(x)=0, which are also known as the roots of the equation f(x)=0 The methods are: -bisection -false position -newton raphson -secant
标签: iterative the solutions contains
上传时间: 2013-12-27
上传用户:jennyzai
g a w k或GNU awk是由Alfred V. A h o,Peter J.We i n b e rg e r和Brian W. K e r n i g h a n于1 9 7 7年为U N I X创建的a w k编程语言的较新版本之一。a w k出自创建者姓的首字母。a w k语言(在其所有的版本中)是一种具有很强能力的模式匹配和过程语言。a w k获取一个文件(或多个文件)来查找匹配特定模式的记录。当查到匹配后,即执行所指定的动作。作为一个程序员,你不必操心通过文件打开、循环读每个记录,控制文件的结束,或执行完后关闭文件。
上传时间: 2014-01-02
上传用户:hwl453472107
Rotation tool, totates a single image contained in HANDLE.HANDLE can be a handle to figure, axes, or image object. This GUI is a pure imitation of ROTATEGUI from Birju Patel and uses some code from that function. However, it has extended functionalities and was re-writen using R13 syntax. Which means that it can be compiled with the V3.x compiler.
标签: HANDLE contained Rotation totates
上传时间: 2017-07-28
上传用户:han_zh
A certification path is an ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509 and further defined in Internet Engineering Task Force (IETF) Request for Comments (RFC) 3280. Certification path processing verifies the binding between the subject distinguished name and/or subject alternative name and the subject public key defined in the target certificate. The binding is limited by constraints, which are specified in the certificates that comprise the path, and inputs that are specified by the relying party. To ensure secure interoperation of PKI-enabled applications, the path validation must be done in accordance with the X.509 and RFC 3280 specifications. This document provides the test assertions and the test cases for testing path validation software against these specifications.
标签: certification certificates certificate starting
上传时间: 2017-07-31
上传用户:清风冷雨