虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

three-input

  • Avalon_VGA

    Avalon_VGA,-- This design provides an interface to the Alcahest VGA daughter card. -- The design comprises of an 8-bit VGA driver with Avalon bus interfaces. There are a total of -- three Avalon interfaces.

    标签: Avalon_VGA

    上传时间: 2015-07-07

    上传用户:kikye

  • 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an

    加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]

    标签: Cryptographic Primitives generate Library

    上传时间: 2015-07-16

    上传用户:wqxstar

  • 利用Atmel ATMega8 的定时器功能和PWM功能

    利用Atmel ATMega8 的定时器功能和PWM功能,制作频率发生器。 有LCD显示,并可实时调节ATMega8的各个相关的寄存器内容。 支持红外遥控器输入。 ..\频率发生器.prj ......主芯片项目文件 ..\频率发生器.c ......主芯片主程序 ..\频率发生器.asm ......主芯片汇编文件(自动生成) ..\频率发生器.hex ......可供烧录的文件 ..\频率发生器_client.prj ......副芯片项目文件 ..\频率发生器_client.c ......副芯片主程序 ..\频率发生器_client.asm ......副芯片汇编文件 ..\频率发生器_client.hex ......可供烧录的文件 ..\Config.h ......硬件配置文件 ..\Input.c ......接受红外遥控器输入并在LCD中显示 ..\LCD_Interface.c ......LCD 1602 接口文件 ..\Menu.c ......在LCD中显示菜单和其它信息 ..\Menu.h ......菜单定义文件 ..\Readme.txt ......本说明文件

    标签: ATMega8 Atmel PWM 定时器

    上传时间: 2013-12-12

    上传用户:源弋弋

  • PIECEWISE_EVAL: evaluates a piecewise function of x usage: y = PIECEWISE_EVAL(x,breakpoints,funs)

    PIECEWISE_EVAL: evaluates a piecewise function of x usage: y = PIECEWISE_EVAL(x,breakpoints,funs) arguments (input) x - vector or array of points to evaluate though the function breakpoints - list of n breakpoints, -inf and +inf are implicitly

    标签: PIECEWISE_EVAL breakpoints evaluates piecewise

    上传时间: 2014-01-25

    上传用户:xyipie

  • /* * EULER S ALGORITHM 5.1 * * TO APPROXIMATE THE SOLUTION OF THE INITIAL VALUE PROBLEM: * Y = F

    /* * EULER S ALGORITHM 5.1 * * TO APPROXIMATE THE SOLUTION OF THE INITIAL VALUE PROBLEM: * Y = F(T,Y), A<=T<=B, Y(A) = ALPHA, * AT N+1 EQUALLY SPACED POINTS IN THE INTERVAL [A,B]. * * INPUT: ENDPOINTS A,B INITIAL CONDITION ALPHA INTEGER N. * * OUTPUT: APPROXIMATION W TO Y AT THE (N+1) VALUES OF T. */

    标签: APPROXIMATE ALGORITHM THE SOLUTION

    上传时间: 2015-08-20

    上传用户:zhangliming420

  • 王小平《遗传算法——理论、应用与软件实现》随书光盘

    王小平《遗传算法——理论、应用与软件实现》随书光盘,内容有: \GA 本书中所附源程序C或C++代码文件及其可执行文件 Scs.cpp 基本分类算法源程序,输入数据文件cfile.txt,efile.txt,gfile.txt,pfile.txt,rfile.txt,tfile.txt Sga.c 基本遗传算法源程序, 输入数据文件input,输出文件output A_life.c 基于遗传算法的人工生命模拟源程序, 输入数据文件world GA_nn.c 基于遗传算法优化神经网络结构源程序,输入数据文件sample Patmat.c 基于遗传算法提取基元图形源程序 \Sources 遗传算法相关自由软件及代码

    标签: 算法 光盘 软件实现

    上传时间: 2013-12-14

    上传用户:sz_hjbf

  • Electromagnetic scattering from the trees above a tilted rough ground plane generated by the stochas

    Electromagnetic scattering from the trees above a tilted rough ground plane generated by the stochastic Lidenmayer system is studied by Monte Carlo simulations in this paper.The scattering coefficients are calculated in three methods:coherent addition approximation,tree-independent scattering,and independent scattering.

    标签: Electromagnetic scattering generated the

    上传时间: 2013-12-06

    上传用户:xieguodong1234

  • Secure Programming Cookbook for C and C++ is an important new resource for developers serious about

    Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

    标签: Programming developers for important

    上传时间: 2015-09-03

    上传用户:gundan

  • Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search ma

    Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search main.cpp Then you can run it: ./search The input is loaded from a input file in.txt Here is the format of the input file: The first line of the input file shoud contain two chars indicate the source and destination city for breadth first and depth first algorithm. The second line of input file shoud be an integer m indicate the number of connections for the map. Following m lines describe the map, each line represents to one connection in this form: dist city1 city2, which means there is a connection between city1 and city2 with the distance dist. The following input are for A* The following line contains two chars indicate the source and destination city for A* algorithm. Then there is an integer h indicate the number of heuristic. The following h lines is in the form: city dist which means the straight-line distance from the city to B is dist.

    标签: Implemented following compile command

    上传时间: 2014-01-01

    上传用户:lhc9102

  • * CONSTRAINTS * This module does not handle data which is considered out of range by the * appli

    * CONSTRAINTS * This module does not handle data which is considered out of range by the * application(i.e. fixed constants which represent error condition) * * Maximum weight value must be limited to 128 to prevent an overflow * condition during the calculation. * * The internal data type must be large enough to handle the calculations. * The maximum possible internal value * = Max Input Value * (weight - 1) + Max Input Value * If a maximum weight of 128 is used, the internal data type should be 2 * times the size of the input data type.

    标签: CONSTRAINTS considered module handle

    上传时间: 2015-09-07

    上传用户:qunquan