虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

teleCommunication Systems

  • Topics Practices: Programming and Numerical Methods Practice 1: Introduction to C Practice 2

    Topics Practices: Programming and Numerical Methods Practice 1: Introduction to C Practice 2: Cycles and functions First part cycles Part Two: Roles Practice 3 - Floating point arithmetic Practice 4 - Search for roots of functions Practice 5 - Numerical Integration Practice 6 - Arrangements and matrices Part One: Arrangements Part II: Matrices Practice 7 - Systems of linear equations Practice 8 - Interpolation Practice 9 - Algorithm Design Techniques

    标签: Practice Introduction Programming Practices

    上传时间: 2013-12-16

    上传用户:R50974

  • Hardware random number generators attempt to extract randomness directly from complex physical syst

    Hardware random number generators attempt to extract randomness directly from complex physical systems. In this way they create random outputs without requiring any seed inputs. In this paper we describe how to use Physical Random Functions (or Physical Unclonable Functions, PUFs) to create a candidate hardware random number generator.

    标签: generators randomness Hardware directly

    上传时间: 2013-12-20

    上传用户:缥缈

  • a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded s

    a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES.

    标签: FPGA-based generator embedded hardware

    上传时间: 2014-01-09

    上传用户:一诺88

  • The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at

    The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.

    标签: cryptographic applications attractive for

    上传时间: 2013-12-07

    上传用户:zhuimenghuadie

  • Click is a modular router toolkit. To use it you ll need to know how to compile and install the sof

    Click is a modular router toolkit. To use it you ll need to know how to compile and install the software, how to write router configurations, and how to write new elements. Our ACM Transactions on Computer Systems paper, available from the Web site, will give you a feeling for what Click can do. Using the optimization tools under CLICKDIR/tools, you can get even better performance than that paper describes.

    标签: compile install modular toolkit

    上传时间: 2013-12-20

    上传用户:wangchong

  • Abstract-In this paper, simple autonomous chaotic circuits coupled by resistors are investigated. B

    Abstract-In this paper, simple autonomous chaotic circuits coupled by resistors are investigated. By carrying out computer calculations and circuit experiments, irregular self-switching phenomenon of three spatial patterns characterized by the phase states of quasi-synchronization of chaos can be observed from only four simple chaotic circuits. This is the same phenomenon as chaotic wandering of spatial patterns observed very often from systems with a large number of degrees of freedom. Namely, one of spatial-temporal chaos observed from systems of large size can be also generated in the proposed system consisting of only four chaotic circuits. A six subcircuits case and a coupled chaotic circuits networks are also studied, and such systems are confirmed to produce more complicated spatio-temporal phenomena.

    标签: investigated Abstract-In autonomous resistors

    上传时间: 2014-06-09

    上传用户:h886166

  • Software-defined radios (SDRs) have been around for more than a decade. The first complete Global P

    Software-defined radios (SDRs) have been around for more than a decade. The first complete Global Positioning System (GPS) implementation was described by Dennis Akos in 1997. Since then several research groups have presented their contributions.We therefore find it timely to publish an up-to-date text on the subject and at the same time include Galileo, the forthcoming European satellitebased navigation system. Both GPS and Galileo belong to the category of Global Navigation Satellite Systems (GNSS)

    标签: Software-defined complete Global radios

    上传时间: 2013-12-16

    上传用户:xauthu

  • The many variants of the Unix operating system require use of a mode of thought that s significantly

    The many variants of the Unix operating system require use of a mode of thought that s significantly different from the one that s required by simpler operating systems. Think Unix introduces readers to important fundamental and intermediate Unix commands and, in the process, inculcates them in the Unix way of thinking. It s a worthy goal in a world with more Linux users than ever, and author Jon Lasser accomplishes it. He s both a capable writer and a knowledgeable user of Unix shell commands. Lasser uses bash under Red Hat Linux in most examples--which usually apply equally well to other Unix variants--and makes asides about other shells and environments, as needed.

    标签: significantly operating variants of

    上传时间: 2017-09-04

    上传用户:qq521

  • Memory allocation in C Dynamic memory allocation and the structures that implement it in C are so u

    Memory allocation in C Dynamic memory allocation and the structures that implement it in C are so universal that they re sometimes treated as a black box. In the real world of embedded systems, that may not be desirable or even possible.

    标签: allocation structures implement Dynamic

    上传时间: 2017-09-05

    上传用户:阿四AIR

  • Java technology has evolved from a programming language designed to create machine-independent embe

    Java technology has evolved from a programming language designed to create machine-independent embedded systems into a robust, vendor-independent, machine-independent, server-side technology, enabling the corporate community to realize the full potential of web-centric applications. Java began with the release of the Java Development Kit (JDK). It was obv

    标签: machine-independent programming technology designed

    上传时间: 2013-12-28

    上传用户:lacsx