VLSi KL partitioning Algorithm based programme for 100 nodes. It s dynamic progremme so by changing the MAX value we can change the number of nodes in the network.
标签: partitioning Algorithm programme progremme
上传时间: 2013-12-05
上传用户:wweqas
chat clinent server appliacation based in java
标签: appliacation clinent server based
上传时间: 2017-05-19
上传用户:1079836864
Probability of error based on pulse collision probability
标签: Probability probability collision error
上传时间: 2017-05-20
上传用户:电子世界
R. Lin and A.P. Petropulu, 揂 New Wireless Medium Access Protocol Based On Cooperation,擨EEE Trans. on Signal Processing, vol. 53, no. 12, pp. 4675-4684, December 2005. (MATLAB code).
标签: R. A.P. Cooperation Petropulu
上传时间: 2017-05-22
上传用户:libinxny
R. Lin and A.P. Petropulu, 揂 New Wireless Medium Access Protocol Based On Cooperation,擨EEE Trans. on Signal Processing, vol. 53, no. 12, pp. 4675-4684, December 2005.
标签: R. A.P. Cooperation Petropulu
上传时间: 2013-12-30
上传用户:sardinescn
Frequency Domain Blind MIMO System Identification Based on Second- and Higher Order Statistics
标签: Identification Statistics Frequency Domain
上传时间: 2017-05-24
上传用户:VRMMO
PARAFAC Based Blind Estimation Of Possibly Under-determined Convolutive MIMO Systems
标签: Under-determined Convolutive Estimation Possibly
上传时间: 2014-01-05
上传用户:xyipie
FINGERPRINT MATCHING BASED ON ERROR PROPAGATION
标签: FINGERPRINT PROPAGATION MATCHING BASED
上传时间: 2013-12-27
上传用户:jeffery
Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair Playfair Key Matrix 1.a 5X5 matrix of letters based on a keyword 2.fill in letters of keyword (sans duplicates) 3.fill rest of matrix with other letters Encrypting and Decrypting -plaintext is encrypted two letters at a time 1. if a pair is a repeated letter, insert filler like X’ 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end) 3. if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) 4. otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair
标签: monoalphabetic Playfair provides security
上传时间: 2017-05-25
上传用户:变形金刚
wavelet based compression
标签: compression wavelet based
上传时间: 2017-05-25
上传用户:qiao8960