亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

above

  • this is the MUL routine for the prime field and large numbers for ECC or RSA algorithms. with IAR v

    this is the MUL routine for the prime field and large numbers for ECC or RSA algorithms. with IAR version 5 or above.

    標簽: algorithms for the routine

    上傳時間: 2013-12-20

    上傳用戶:zxc23456789

  • this is the PRNG routine for the prime field and large numbers for ECC or RSA algorithms. with IAR

    this is the PRNG routine for the prime field and large numbers for ECC or RSA algorithms. with IAR version 5 or above.

    標簽: algorithms for the routine

    上傳時間: 2017-07-25

    上傳用戶:戀天使569

  • The C++ version of the IQmath librray requires the C header file and is built on top of the C funct

    The C++ version of the IQmath librray requires the C header file and is built on top of the C functions and definitions. See "Building A Project" section of this Read Me file on how to include the above files in a user C++ program/project.

    標簽: the requires version librray

    上傳時間: 2013-12-18

    上傳用戶:yxgi5

  • The C++ version of the IQmath librray requires the C header file and is built on top of the C funct

    The C++ version of the IQmath librray requires the C header file and is built on top of the C functions and definitions. See "Building A Project" section of this Read Me file on how to include the above files in a user C++ program/project.

    標簽: the requires version librray

    上傳時間: 2017-07-26

    上傳用戶:杜瑩12345

  • 計算本征值程序

    Computes all eigenvalues and eigenvectors of a real symmetric matrix a, ! which is of size n by n, stored in a physical np by np array. ! On output, elements of a above the diagonal are destroyed. ! d returns the eigenvalues of a in its first n elements. ! v is a matrix with the same logical and physical dimensions as a, ! whose columns contain, on output, the normalized eigenvectors of a. ! nrot returns the number of Jacobi rotations that were required. ! Please notice that the eigenvalues are not ordered on output. ! If the sorting is desired, the addintioal routine "eigsrt" ! can be invoked to reorder the output of jacobi.

    標簽: 計算 程序

    上傳時間: 2016-06-04

    上傳用戶:1512313

  • 32feet.NET 3.5 Bluetooth coding

    32feet.NET is a shared-source project to make personal area networking technologies such as Bluetooth, Infrared (IrDA) and more, easily accessible from .NET code. Supports desktop, mobile or embedded systems. 32feet.NET is free for commercial or non-commercial use. If you use the binaries you can just use the library as-is, if you make modifications to the source you need to include the 32feet.NET License.txt document and ensure the file headers are not modified/removed. The project currently consists of the following libraries:- Bluetooth IrDA Object Exchange Bluetooth support requires a device with either the Microsoft, Widcomm, BlueSoleil, or Stonestreet One Bluetopia Bluetooth stack. Requires .NET Compact Framework v3.5 or above and Windows CE.NET 4.2 or above, or .NET Framework v3.5 for desktop Windows XP, Vista, 7 and 8. A subset of functionality is available for Windows Phone 8 and Windows Embedded Handheld 8 in the InTheHand.Phone.Bluetooth.dll library.

    標簽: feet 3.5 NET 32

    上傳時間: 2016-07-06

    上傳用戶:magister2016

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    標簽: Fundamental Limits Secure Class on of

    上傳時間: 2020-01-04

    上傳用戶:kddlas

  • Distributed+Quality-of-Service+Support

    This thesis is about wireless communication in shared radio spectrum. Its origin and motivation is ideally represented by the two quotations from above. In this thesis, the support of Quality-of-Service (QoS) in cognitive radio networks is analyzed. New approaches to distributed coordination of cognitive radios are developed in different spectrum sharing scenarios. The Wireless Local Area Network (WLAN) 802.11 proto- col of the Institute of Electrical and Electronics Engineers (IEEE) (IEEE, 2003) with its enhancement for QoS support (IEEE, 2005d) is taken as basis. The Medium Access Control (MAC) of 801.11(e) is modified to realize flexible and dynamic spectrum assignment within a liberalized regulation framework.

    標簽: Quality-of-Service Distributed Support

    上傳時間: 2020-05-27

    上傳用戶:shancjb

  • Sharing+RF+Spectrum

    This book was born from the perception that there is much more to spectrum use and sharing than one sees reflected in publications, whether academic, commercial or political. the former – in good research style – tend towards reductionism and concentrate on specific, detailed aspects. commercial publications tend to empha- size the positive aspects and they tend to put promise above practice. Given the ever increasing pace of technology development and recent successes of new wireless technologies, some pundits predict large-scale spectrum scarcity, potentially lead- ing to economic catastrophe. Although economic theory has a hard time explaining recent events that shook the world economy, the notion of spectrum scarcity is intui- tively acceptable, even if not correct or immediately relevant.

    標簽: Spectrum Sharing RF

    上傳時間: 2020-06-01

    上傳用戶:shancjb

  • Wireless Communication Technology

    This is a book on wireless communication. That usually means communica- tion by radio, though ultrasound and infrared light are also used occasion- ally. The term “wireless” has come to mean nonbroadcast communication, usually between individuals who very often use portable or mobile equip- ment. The term is rather vague, of course, and there are certainly borderline applications that are called wireless without falling exactly into the above definition.

    標簽: Communication Technology Wireless

    上傳時間: 2020-06-01

    上傳用戶:shancjb

主站蜘蛛池模板: 崇信县| 乡城县| 连平县| 元江| 林周县| 蓝田县| 安多县| 南通市| 丰镇市| 诸城市| 阜平县| 垫江县| 册亨县| 自贡市| 涡阳县| 德化县| 称多县| 武鸣县| 德安县| 云浮市| 固始县| 广河县| 靖宇县| 永州市| 绥阳县| 禄劝| 东城区| 绍兴县| 虎林市| 含山县| 灌云县| 分宜县| 武山县| 北碚区| 开化县| 怀仁县| 平南县| 和林格尔县| 泾川县| 绥德县| 桦甸市|