虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Ch<b>In</b>a

  • 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an

    加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]

    标签: Cryptographic Primitives generate Library

    上传时间: 2015-07-16

    上传用户:wqxstar

  • 光学设计软件zemax源码: This DLL models an nular aspheric surface as described in: "Annular surfaces in

    光学设计软件zemax源码: This DLL models an nular aspheric surface as described in: "Annular surfaces in annular field systems" By Jose M. Sasian Opt. eng. 36 (12) P 3401-3401 December 1997 This surface is essentially an odd aspheric surface with an offset in the aspheric terms. The sag is given by: Z = (c*r*r) / (1+(1-((1+k)*c*c*r*r))^ 1/2 ) + a*(r-q)^2 + b*(r-q)^3 + c*(r-q)^4 + ... Note the terms a, b, c, ... have units of length to the -1, -2, -3, ... power.

    标签: described aspheric surfaces Annular

    上传时间: 2014-01-08

    上传用户:yyyyyyyyyy

  • This section contains a brief introduction to the C language. It is intended as a tutorial on the la

    This section contains a brief introduction to the C language. It is intended as a tutorial on the language, and aims at getting a reader new to C started as quickly as possible. It is certainly not intended as a substitute for any of the numerous textbooks on C. 2. write a recursive function FIB (n) to find out the nth element in theFibanocci sequence number which is 1,1,2,3,5,8,13,21,34,55,…3. write the prefix and postfix form of the following infix expressiona + b – c / d + e * f – g * h / i ^ j4. write a function to count the number of nodes in a binary tr

    标签: introduction the contains intended

    上传时间: 2013-12-23

    上传用户:liansi

  • Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search ma

    Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search main.cpp Then you can run it: ./search The input is loaded from a input file in.txt Here is the format of the input file: The first line of the input file shoud contain two chars indicate the source and destination city for breadth first and depth first algorithm. The second line of input file shoud be an integer m indicate the number of connections for the map. Following m lines describe the map, each line represents to one connection in this form: dist city1 city2, which means there is a connection between city1 and city2 with the distance dist. The following input are for A* The following line contains two chars indicate the source and destination city for A* algorithm. Then there is an integer h indicate the number of heuristic. The following h lines is in the form: city dist which means the straight-line distance from the city to B is dist.

    标签: Implemented following compile command

    上传时间: 2014-01-01

    上传用户:lhc9102

  • * "Copyright (c) 2006 Robert B. Reese ("AUTHOR")" * All rights reserved. * (R. Reese, reese@ece.

    * "Copyright (c) 2006 Robert B. Reese ("AUTHOR")" * All rights reserved. * (R. Reese, reese@ece.msstate.edu, Mississippi State University) * IN NO EVENT SHALL THE "AUTHOR" BE LIABLE TO ANY PARTY FOR * DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING OUT * OF THE USE OF THIS SOFTWARE AND ITS DOCUMENTATION, EVEN IF THE "AUTHOR" * HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

    标签: Reese B. R. Copyright

    上传时间: 2015-09-24

    上传用户:mpquest

  • EIA(ELECTRONIC INDUSTRIES ALLIANCE)标准文档EIA-CEA-861-B

    EIA(ELECTRONIC INDUSTRIES ALLIANCE)标准文档EIA-CEA-861-B,A DTV Profile for Uncompressed High Speed Digital Interfaces。

    标签: ELECTRONIC INDUSTRIES ALLIANCE EIA-CEA

    上传时间: 2015-09-27

    上传用户:hphh

  • This I develops based on the B/S structure student managementsystem management system, hoped brings

    This I develops based on the B/S structure student managementsystem management system, hoped brings a help to the novice

    标签: managementsystem management structure develops

    上传时间: 2014-01-07

    上传用户:钓鳌牧马

  • acm HDOJ 1051WoodenSticks Description: There is a pile of n wooden sticks. The length and weight o

    acm HDOJ 1051WoodenSticks Description: There is a pile of n wooden sticks. The length and weight of each stick are known in advance. The sticks are to be processed by a woodworking machine in one by one fashion. It needs some time, called setup time, for the machine to prepare processing a stick. The setup times are associated with cleaning operations and changing tools and shapes in the machine. The setup times of the woodworking machine are given as follows: (a) The setup time for the first wooden stick is 1 minute. (b) Right after processing a stick of length l and weight w , the machine will need no setup time for a stick of length l and weight w if l<=l and w<=w . Otherwise, it will need 1 minute for setup.

    标签: WoodenSticks Description length wooden

    上传时间: 2014-03-08

    上传用户:netwolf

  • in this paper,wo propose an extension of the zerotree-based space-frequency quantization algorithm b

    in this paper,wo propose an extension of the zerotree-based space-frequency quantization algorithm by adding a wedgelet symbol to its tree-pruning optimization.

    标签: space-frequency zerotree-based quantization algorithm

    上传时间: 2015-10-22

    上传用户:yxgi5

  • design LP,HP,B S digital Butterworth and Chebyshev filter. All array has been specified internally

    design LP,HP,B S digital Butterworth and Chebyshev filter. All array has been specified internally,so user only need to input f1,f2,f3,f4,fs(in hz), alpha1,alpha2(in db) and iband (to specify the type of to design). This program output hk(z)=bk(z)/ak(z),k=1,2,..., ksection and the freq.

    标签: Butterworth internally Chebyshev specified

    上传时间: 2015-11-08

    上传用户:253189838