The program of BASE 64 encryption and decryption
資源簡介:The program of BASE 64 encryption and decryption
上傳時間: 2015-09-03
上傳用戶:yuanyuan123
資源簡介:SA encryption and decryption using Matlab The program set contains thirteen files listed below. errormeg.fig errormsg.m helpmsg.fig helpmsg.m inputmsg.fig inputmsg.m mesgcut.m pro2.fig pro2.m rsacore.m readme.txt screensh...
上傳時間: 2017-04-06
上傳用戶:dreamboy36
資源簡介:this program is written in c.... and it imlements RSA encryption and decryption
上傳時間: 2017-07-19
上傳用戶:jcljkh
資源簡介:This book discusses the growth of digital television technology and the revolution in image and video compression, highlighting the need for standardization in processing static and moving images and their exchange between computer systems
上傳時間: 2015-12-23
上傳用戶:ommshaggar
資源簡介:This paper investigates the design of joint frequency offset and carrier phase estimation of a multi-frequency time division multiple access (MF-TDMA) demodulator that is applied to a digital video broadcasting—return channel system via...
上傳時間: 2015-12-30
上傳用戶:ls530720646
資源簡介:《單片機通信技術與工程實踐》所附程序 the program of the book is very good,it is useful of the developer.
上傳時間: 2016-02-20
上傳用戶:731140412
資源簡介:java AES RSA encryption and decryption
上傳時間: 2014-01-06
上傳用戶:zhangliming420
資源簡介:AES加密解密程序,C++實現的 做得不好,請多指教-AES encryption and decryption procedures, C realized not doing a good job, please enlighten
上傳時間: 2013-12-20
上傳用戶:silenthink
資源簡介:RSA encryption and decryption using Matlab by Thunyawat Rajatasereekul and Voranon Kiettrsalpipop
上傳時間: 2014-12-04
上傳用戶:agent
資源簡介:Relationship Between the Sum of Squared Difference (SSD) and Cross Correlation for Template Matching Konstantinos G. Derpanis York University kosta@cs.yorku.ca Version 1.0 December 23, 2005
上傳時間: 2014-01-10
上傳用戶:妄想演繹師
資源簡介:Signal system and Matlab courses in the series of high-level programming and engineering applications
上傳時間: 2013-12-23
上傳用戶:netwolf
資源簡介:AES encryption and decryption tool, which can encrypt any string to a HEX number and decrypt in AES.
上傳時間: 2017-02-16
上傳用戶:Zxcvbnm
資源簡介:The purpose of Software Project Tracking and Oversight is to provide adequate visibility into actual progress so that management can take effective actions when the project s performance deviates significantly from the plans.
上傳時間: 2017-02-27
上傳用戶:三人用菜
資源簡介:The code includes the implementation of inverse convolutional code and testing of it.
上傳時間: 2017-03-25
上傳用戶:csgcd001
資源簡介:it will make the sinosoidal wave forms after you input the values of phase,freq,delay and sampling intervals
上傳時間: 2014-01-17
上傳用戶:GHF
資源簡介:This project mainly deals with automating the tasks of Purchasing, maintaining,manfactioring and transacting the goods.In the Inventory Automation System the key process includes the activities such as maintenance of stock details, mainte...
上傳時間: 2014-01-15
上傳用戶:1427796291
資源簡介:the program connects to an URL and retrieves the index.php file content
上傳時間: 2017-05-05
上傳用戶:671145514
資源簡介:suitable file encryption and decryption aes and rijidael
上傳時間: 2014-01-11
上傳用戶:大融融rr
資源簡介:The document explains the concept of multiple-bandpass filtering and compacting of arbitrarily spaced frequency bands.
上傳時間: 2017-07-03
上傳用戶:pinksun9
資源簡介:Example: How to do BASE64 encryption and decryption
上傳時間: 2013-12-06
上傳用戶:dapangxie
資源簡介:This project is to design the automated system for the inventory of Al-Ahmad Cotton and Oil Mills situated at Vehari road, Multan. It is difficult to keep the track of sale purchase and production system of any company, department or organi...
上傳時間: 2013-12-22
上傳用戶:qq1604324866
資源簡介:Good security provider by using biometric feature as key. This is the program of server.
上傳時間: 2013-12-07
上傳用戶:c12228
資源簡介:Solving Problem inheritance by Prolog The parents of Mark are Linda and Peter. The parents of Fiona are Linda and Peter. The parents of Andrea are Fiona and Andrew. The parents of John are Fiona and Andrew. The parents of Eileen are Andr...
上傳時間: 2014-01-08
上傳用戶:15071087253
資源簡介:RSA加密算法在VB中的實現 rsa加密解密算法在vb中的實現 僅供參考-RSA encryption algorithm in the VB achieve rsa encryption and decryption algorithm in the vb achieve is for reference only
上傳時間: 2014-01-21
上傳用戶:xlcky
資源簡介:After an introduction to the history of mobile communications, this guide considers the basics of mobile radio, the design of cellular and private radio systems, and issues of interworking with the fixed network. It then looks at the role o...
上傳時間: 2016-06-24
上傳用戶:nanshan
資源簡介:programming PHP, Second Edition is the authoritative guide to PHP 5 and is filled with the unique knowledge of the creator of PHP (Rasmus Lerdorf) and other PHP experts. When it comes to creating web sites, the PHP scripting language is tru...
上傳時間: 2016-06-30
上傳用戶:qq1604324866
資源簡介:Instead of finding the longest common subsequence, let us try to determine the length of the LCS. 􀂄 Then tracking back to find the LCS. 􀂄 Consider a1a2…am and b1b2…bn. 􀂄 Case 1: am=bn. The LCS must contain am,...
上傳時間: 2013-12-17
上傳用戶:evil
資源簡介:The emphasis of this book is on real-time application of Synopsys tools, used to combat various problems seen at VDSM geometries. Readers will be exposed to an effective design methodology for handling complex, submicron ASIC designs. Si...
上傳時間: 2017-07-05
上傳用戶:waitingfy
資源簡介:David Vernon is the Coordinator of the European Network for the Advancement of Artificial Cognitive Systems and he is a Visiting Professor of Cognitive Systems at the University of Genoa. He is also a member of the management team of the Ro...
上傳時間: 2014-01-08
上傳用戶:netwolf
資源簡介:Java code where user can enter the height and BASE of a triangle and the program will calculate the area and perimeter if it is a right triangle
上傳時間: 2013-12-06
上傳用戶:yzhl1988