亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲(chóng)蟲(chóng)首頁(yè)| 資源下載| 資源專輯| 精品軟件
登錄| 注冊(cè)

Parity-codes

  • An application on Hotel Management System. I developed it for my project during exam time. Any how i

    An application on Hotel Management System. I developed it for my project during exam time. Any how it rewarded as best project. my other source codes are at: http://www.developerssourcecode.com Thanks Shyam Singh Chandel

    標(biāo)簽: application Management developed project

    上傳時(shí)間: 2014-01-20

    上傳用戶:alan-ee

  • This project solves the purpose of creating vb6 application using oracle database in back end. It sh

    This project solves the purpose of creating vb6 application using oracle database in back end. It shows how to handle the record with the oracle. my other source codes are at: http://www.developerssourcecode.com Shyam Singh Chandel

    標(biāo)簽: application creating database project

    上傳時(shí)間: 2013-12-18

    上傳用戶:清風(fēng)冷雨

  • this is a gcc file, you can download it and learn its usetility, for further detail please look at t

    this is a gcc file, you can download it and learn its usetility, for further detail please look at the source codes

    標(biāo)簽: usetility download further detail

    上傳時(shí)間: 2014-11-21

    上傳用戶:ywqaxiwang

  • Some thesis studies about wireless sensor network algorithms. Algorithms are considered and some pse

    Some thesis studies about wireless sensor network algorithms. Algorithms are considered and some pseudo codes are shown.

    標(biāo)簽: Algorithms algorithms considered wireless

    上傳時(shí)間: 2013-11-27

    上傳用戶:luopoguixiong

  • Basicaly,a chatterbot is a computer program that when you provide it with some inputs in Natural Lan

    Basicaly,a chatterbot is a computer program that when you provide it with some inputs in Natural Language (English, French ...) responds with something meaningful in that same language. Which means that the strength of a chatterbot could be directly measured by the quality of the output selected by the Bot in response to the user. By the previous description,we could deduce that a very basic chatterbot can be written in a few lines of code in a given specific programming language. Lets make our first chatterbot (notice that all the codes that will be used in this tutorial will be written in C++. Also, it is assumed that the reader is familiar wih the STL library)

    標(biāo)簽: chatterbot Basicaly computer Natural

    上傳時(shí)間: 2017-07-30

    上傳用戶:小寶愛(ài)考拉

  • boost代碼

    boost的matlab代碼, Matlab source codes for the Boosting of the J-DLDA learner(B-JDLDA) 

    標(biāo)簽: boostcode

    上傳時(shí)間: 2015-03-23

    上傳用戶:52086

  • 16進(jìn)制轉(zhuǎn)十進(jìn)制

    DATAS SEGMENT w dw 0 keybuf db 255      db 0      db 255 dup(0)      ;定義鍵盤輸入需要的緩沖區(qū) DATAS ENDS STACKS SEGMENT db 200 dup(?) STACKS ENDS CODES SEGMENT ASSUME CS:CODES,DS:DATAS,SS:STACKS START: MOV AX,DATAS MOV DS,AX mov dx,offset keybuf     ;用0a號(hào)功能,輸入一個(gè)字符串 mov ah,0ah               ;用回車結(jié)束 int 21h mov dl,0ah               ;再進(jìn)行換行,以便在下一行顯示轉(zhuǎn)換后的字符串  mov ah,2     int 21h ;  push ax ;   push dx ;      mov dl,cl ;     mov ah,02 ;     int 21h   ;   pop dx ;  pop ax mov bx,offset keybuf+1   ;取出字符串的字符個(gè)數(shù),作為循環(huán)的次數(shù) mov cl,[bx] mov ch,0     mov ax,0             again:  inc bx mov ax,[w] push bx mov bx,16 mul bx pop bx            ;是小寫字母,則轉(zhuǎn)換為大寫字母 mov [w],ax mov dl,[bx]             ;取出一個(gè)字符, cmp dl,'9' jbe lab1 cmp dl,'F' jbe lab2 sub dl,32 lab2: sub dl ,07h lab1:  sub dl,30h add [w],dx  loop again   mov ax,[w]  mov bx,-1 push bx mov bx,10 lab3 :mov dx,0 div bx  push dx cmp ax,0 jnz lab3 lab5: pop dx cmp dx,-1 jz lab4 add dl,30h mov ah,02 int 21h        jmp  lab5            ;循環(huán),處理完整個(gè)字符串 lab4:  MOV AH,4CH INT 21H CODES ENDS END START

    標(biāo)簽: 匯編

    上傳時(shí)間: 2015-04-02

    上傳用戶:wcc0310

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    標(biāo)簽: Fundamental Limits Secure Class on of

    上傳時(shí)間: 2020-01-04

    上傳用戶:kddlas

  • Complex Orthogonal Space-Time Processing

    Multiple-Input Multiple-Output (MIMO) systems have recently been the subject of intensive consideration in modem wireless communications as they offer the potential of providing high capacity, thus unleashing a wide range of applications in the wireless domain. The main feature of MIMO systems is the use of space-time processing and Space-Time Codes (STCs). Among a variety of STCs, orthogonal Space-Time Block Codes (STBCs) have a much simpler decoding method, compared to other STCs

    標(biāo)簽: Orthogonal Space-Time Processing Complex

    上傳時(shí)間: 2020-05-26

    上傳用戶:shancjb

  • Detection Algorithms for Wireless Communications

    This book presents, in a unitary and novel perspective, some of the research work the authors have carried out over the last decade, along with several collaborators and students. The roots of this book can be traced back to the design of adaptive sequence detection algorithms for channels with parametric uncertainty. The explosion of turbo codes and iterative decoding around the middle of the Nineties has motivated the design of iterative (turbo and graph-based) detection algorithms.

    標(biāo)簽: Communications Algorithms Detection Wireless for

    上傳時(shí)間: 2020-05-27

    上傳用戶:shancjb

主站蜘蛛池模板: 将乐县| 额敏县| 曲麻莱县| 聂荣县| 花垣县| 天全县| 宜川县| 延川县| 高碑店市| 大渡口区| 万宁市| 牟定县| 镇雄县| 台中县| 大埔区| 简阳市| 彰化县| 元朗区| 九龙县| 宝坻区| 北流市| 溆浦县| 汝城县| 大关县| 武穴市| 田东县| 夏河县| 大石桥市| 柏乡县| 绥芬河市| 临沂市| 镇远县| 旬邑县| 崇左市| 隆林| 新乡市| 苗栗市| 大安市| 雷山县| 临沭县| 新宁县|