报时小闹钟 本程序是一个用汇编编的精致的图形时钟,运行时双击clock图标即可, 钟表显示的时间为本机系统的时间。 按b键可扩大画面 ;按s键可缩小画面;按c键可改变颜色;按e键可听音乐; 按q键退出本程序.
上传时间: 2013-12-20
上传用户:lyy1234
加密的步骤 1) 计算N的有效位数tn(以字节数计),将最高位的零忽略掉,令tn1=tn-1。比如N=0x012A05,其有效位数tn=5,tn1=4。 2) 将明文数据A分割成tn1位(以字节数计)的块,每块看成一个大数,块数记为bn。从而,保证了每块都小于N。 3) 对A的每一块Ai进行Bi=Ai^E MOD N运算。Bi就是密文数据的一块,将所有密文块合并起来,就得到了密文数据B。
上传时间: 2014-12-05
上传用户:caozhizhi
tensor 向量的推广。在一个坐标系下,由若干个数(称为分量)来表示,而在不同坐标系下的分量之间应满足一定的变换规则,如矩阵、多变量线性形式等。一些物理量如弹性体的应力、应变以及运动物体的能量动量等都需用张量来表示。在微分几何的发展中,C.F.高斯、B.黎曼、E.B.克里斯托费尔等人在19世纪就导入了张量的概念,随后由G.里奇及其学生T.列维齐维塔发展成张量分析,A.爱因斯坦在其广义相对论中广泛地利用了张量。
上传时间: 2014-01-20
上传用户:silenthink
Neural Networks at your Fingertips.rar =============== Network: Adaline Network =============== Application: Pattern Recognition Classification of Digits 0-9 Author: Karsten Kutza Date: 15.4.96 Reference: B. Widrow, M.E. Hoff Adaptive Switching Circuits 1960 IRE WESCON Convention Record, IRE, New York, NY, pp. 96-104, 1960
标签: Network Fingertips Networks Adaline
上传时间: 2014-12-22
上传用户:lizhizheng88
复接入,B/W双用户使用直接扩频序列 % >>>multiple access b/w 2 users using DS CDMA % >>>format is : cdmamodem(user1,user2,snr_in_dbs) % >>>user1 and user2 are vectors and they should be of equal length % >>>e.g. user1=[1 0 1 0 1 0 1] , user2=[1 1 0 0 0 1 1],snr_in_dbs=-50 % >>>or snr_in_dbs=50 just any number wud do % Waqas Mansoor % NUST , Pakistan
标签:
上传时间: 2014-11-22
上传用户:zl5712176
【问题描述】 设计一个利用哈夫曼算法的编码和译码系统,重复地显示并处理以下项目,直到选择退出为止。 【基本要求】 (1)初始化:键盘输入字符集大小n、n个字符和n个权值,建立哈夫曼树; (2)编码:利用建好的哈夫曼树生成哈夫曼编码; (3)输出编码; (4)设字符集及频度如下表: 字符:A B C D E F 频度:4 9 23 2 17 15 字符:G H I J K 频度:1 2 3 3 4
上传时间: 2017-03-07
上传用户:qwe1234
本程序是ARM7系列下LPC2148的例程,通过K7I开发板实现的数码管显示 1-2-3-4-5-6-7-8-9-0-A-b-C-d-E-F
上传时间: 2017-03-30
上传用户:1966640071
We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.
标签: effectiveness analytically numerically cloaking
上传时间: 2017-03-30
上传用户:zxc23456789
Creating barcodes in Microsoft庐 Office has never been easier. With BarCodeWiz Toolbar you can add barcodes to Microsoft庐 Office applications with a click of a button. In Microsoft庐 Word, create single barcodes, pages of labels, or mail merge documents. In Microsoft庐 Excel庐, select a range of cells and automatically convert each cell to a barcode. In Microsoft庐 Access庐, create reports with barcodes based on your data tables.
标签: BarCodeWiz Microsoft Creating barcodes
上传时间: 2013-12-18
上传用户:asddsd
Although some FX1-based devices may use the FX1鈥檚 CPU to process USB data directly (Port I/O Mode), most applica- tions use the FX1 simply as a conduit between the USB and external data-processing logic (e.g., an ASIC or DSP, or the IDE controller on a hard disk drive).
标签: Although directly devices process
上传时间: 2014-01-08
上传用户:2467478207