Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The origina
Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The origina...
Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The origina...
A system simulation environment in Matlab/Simulink of RFID is constructed in this paper. Special at...
A very well constructed C# programming book that will allow even non programmers to get a quick gras...
It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom...
Convex constructed uisng Matlab...
本文依据集成电路设计方法学,探讨了一种基于标准Intel 8086 微处理器的单芯片计算机平台的架构。研究了其与SDRAM,8255 并行接口等外围IP 的集成,并在对AMBA协议和8086 CPU分...
在研究传统家用燃气报警器的基础上,以ZigBee协议为平台,构建mesh网状网络实现网络化的智能语音报警系统。由于传感器本身的温度和实际环境温度的影响,传感器标定后采用软件补偿方法。为了减少系统费用,...
This m file analyzes a coherent binary phase shift keyed(BPSK) and a amplitude shift keyed(ASK) comm...
The book consists of three sections. The first, foundations, provides a tutorial overview of the pri...
RS_latch using vhdl, When using static gates as building blocks, the most fundamental latch is the ...