SA Encryption and Decryption using Matlab The program set contains thirteen files listed below. errormeg.fig errormsg.m helpmsg.fig helpmsg.m inputmsg.fig inputmsg.m mesgcut.m pro2.fig pro2.m rsacore.m readme.txt screenshot.gif In order to run the program please call pro2.m under Matlab 6.0 Environment. System Requirement Matlab version 6.0 and if necessary, Maple version 6.0 on any platform PentiumII 300 MHz or equivalent.
标签: Encryption Decryption contains thirteen
上传时间: 2017-04-06
上传用户:dreamboy36
1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click on Security button in order to Add/Remove users and set user rights. Once you entered Security dialog you may select your Supervisor password. 2. Click OK when finished configuring users. Don t forget to disable some features in order to see what happens with GUI elements - menus, and buttons.
标签: SecurityBuilderDemo directory password located
上传时间: 2014-01-23
上传用户:chongcongying
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths. Note that, these paths are not vertex-disjoint i.e., the vertices may repeat but they are all edge-disjoint i.e., no two paths have the same edges. The input is the adjacency matrix of a directed acyclic graph and a pair(s) of source and destination vertices and the output should be the number of such disjoint paths and the paths themselves on separate lines. In case of multiple paths the output should be in order of paths with minimum vertices first. In case of tie the vertex number should be taken in consideration for ordering.
标签: fault-tolerant algorithms redundant underlyin
上传时间: 2013-12-18
上传用户:jkhjkh1982
Fortran 90 versions of all the Numerical Recipes routines appear in the following Chapters B1 through B20, numbered in correspondence with Chapters 1 through 20 in Volume 1. Within each chapter, the routines appear in the same order as in Volume 1, but not broken out separately by section number within Volume 1鈥檚 chapters. There are commentaries accompanying many of the routines, generally following the printed listing of the routine to which they apply. These are of two kinds: issues related to parallelizing the algorithm in question, and issues related to the Fortran 90 implementation. To distinguish between these two, rather different, kind
标签: Numerical following the Chapters
上传时间: 2017-04-12
上传用户:6546544
The files adi_ssl_init.h and adi_ssl_init.c are used to define the functions adi_ssl_Init() and 慳di_ssl_Terminate()?which initialize and terminate all the Blackfin System Services in the appropriate order, for a particular EZ-Kit, depending on the Blackfin processor used.
标签: adi_ssl_init adi_ssl_Init functions define
上传时间: 2014-01-21
上传用户:sammi
The purpose of this project is to explore the issues and implementation of a multiple instruction stream, single data stream processor. We are running two instruction streams on two CPUs which share an address space. The processors share a second level cache, and maintain coherence at the L1 cache with a write-invalidate policy. The L2 cache is two-way set associative, with a block size of 8 words, and a total capacity of 512 words.
标签: implementation instruction multiple purpose
上传时间: 2017-04-18
上传用户:731140412
This is an interface program for flip flop emulation. At first pulse at the input pin the apropriate output will latch and at the second pulse will release. Very short and efficient program
标签: apropriate interface emulation the
上传时间: 2017-04-19
上传用户:a3318966
This project features a complete JPEG Hardware Compressor (standard Baseline DCT, JFIF header) with 2:1:1 subsampling, able to compress at a rate of up to 24 images per second (on XC2V1000-4 @ 40 MHz with resolution 352x288). Image resolution is not limited. It takes an RGB input (row-wise) and outputs to a memory the compressed JPEG image. Its quality is comparable to software solutions.
标签: Compressor Hardware Baseline features
上传时间: 2017-04-21
上传用户:wyc199288
C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and example projects files facilitate writing C/C++ Code for the TI鈥檚 28xx MCUs. The code can be used as a learning tool or as the basis for a development platform depending on the current needs of the user. We suggest that you immediately download these header files in order for an easier transition to understanding the 28xx peripherals.
标签: Peripheral peripheral and Examples
上传时间: 2014-01-24
上传用户:fandeshun
java3D game engine design of the source [three-dimensionalvirtualrealitynetworkprogram] - "virtual reality 3D network programming language VRML -- second-generation network programming language" CD Distribution
标签: three-dimensionalvirtualrealityne tworkprogram virtual java3D
上传时间: 2013-12-10
上传用户:498732662