To write data to the FIFO, present the data to be written and assert the write enable. At the next rising edge of the clock, the data will be written. For every rising edge of the clock that the write enable is asserted, a piece of data is written into the FIFO. If the FIFO has data in it, the value at the head of the FIFO is present on the FIFO data output. To read data from the FIFO, assert the read enable. At the next rising edge of the clock, capture the data output the FIFO will subsequently advance to the next piece of data stored in the FIFO.
上传时间: 2014-08-16
上传用户:wab1981
DSP2407比较全的源程序 包括SPI设计,AD,DA,ramtest, SCI,CAN,PWM,key,EXINT,24C02,VECTOR等
上传时间: 2017-08-13
上传用户:aa54
The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of classified examples a decision tree is induced, biased by the information gain measure, which heuristically leads to small trees. The examples are given in attribute-value representation. The set of possible classes is finite. Only tests, that split the set of instances of the underlying example languages depending on the value of a single attribute are supported.
标签: algorithm induction decision top-down
上传时间: 2017-08-20
上传用户:hzy5825468
a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES.
标签: FPGA-based generator embedded hardware
上传时间: 2014-01-09
上传用户:一诺88
/* * tesswind.c * This program demonstrates the winding rule polygon * tessellation property. Four tessellated objects are drawn, * each with very different contours. When the w key is pressed, * the objects are drawn with a different winding rule. */
标签: demonstrates tessellation tesswind program
上传时间: 2013-12-10
上传用户:星仔
密钥扩展模块的接口如图4.4。clk为系统时钟,kld为输入的加载信号,key为输入的128位密钥数据,wo_0, wo_1, wo_2, wo_3分别为输出的密钥列
上传时间: 2014-01-14
上传用户:royzhangsz
RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key. RSA was created by Rivest, Shamir, and Adleman in 1977. Every user have a pair of key, public key and private key. Public key (e) . You may choose any number for e with these requirements, 1< e <Æ (n), where Æ (n)= (p-1) (q-1) ( p and q are first-rate), gcd (e,Æ (n))=1 (gcd= greatest common divisor). Private key (d). d=(1/e) mod(Æ (n)) Encyption (C) . C=Mª mod(n), a = e (public key), n=pq Descryption (D) . D=C° mod(n), o = d (private key
标签: crypthograph information Adleman Rivest
上传时间: 2017-09-01
上传用户:chfanjiang
给定一批的样本,当然这些样本间必须相互独立。如果Q > chi2(p, nu),假设拒绝,否则通过。 ARGUMENTS: x Absolut numbers. p The prob ability value, calculated from Q. Q The resulting Q-value.
标签: 样本
上传时间: 2017-09-06
上传用户:yoleeson
The 6.0 release of Visual C++ shows Microsoft s continued focus on Internet technologies and COM, which are key components of the new Windows Distributed interNet Application Architecture (DNA). In addition to supporting these platform initiatives, Visual C++ 6.0 also adds an amazing number of productivity-boosting features such as Edit And Continue, IntelliSense, AutoComplete, and code tips. These features take Visual C++ to a new level. We have tried to make sure that this book keeps you up to speed on the latest technologies being introduced into Visual C++.
标签: technologies Microsoft continued Internet
上传时间: 2017-09-07
上传用户:wsf950131
While there are many textbooks about the European Union (EU), Clive Archer covers the essential elements of the EU clearly and con- cisely, outlining the key debates and issues it faces today
标签: essential textbooks the European
上传时间: 2013-12-17
上传用户:aig85