Good security provider by using biometric feature as key. This is the program of server.
资源简介:Good security provider by using biometric feature as key. This is the program of server.
上传时间: 2013-12-07
上传用户:c12228
资源简介:Abstract: By using gateway systems on large 32-bit platforms, networks of small, 8- and 16-bit microcontrollers can be monitored and controlled over the Internet. With embedded Linux, these gateways are easily moved from full-blown host ...
上传时间: 2014-01-05
上传用户:kytqcool
资源简介:Pai has been a good sequence array. A few are imported, as called for under the original law will insert its array
上传时间: 2014-01-14
上传用户:凤临西北
资源简介:This is an extension of sign example. You can design your own traffic sign by using Verilog. And the result from Verilog can be seen by the attached C file.
上传时间: 2016-10-12
上传用户:haohaoxuexi
资源简介:This is an implementation of double-array structure for representing trie, as proposed by Junichi Aoe [1]. Trie is a kind of digital search tree, an efficient indexing method with O(1) time complexity for searching. Comparably as effic...
上传时间: 2013-12-10
上传用户:shinesyh
资源简介:In this paper, the feasibility of replacing a chaos source by an equivalent digital pseudo-random generator realized using Linear Feedback Shift Register (LFSR) is studied. Particular emphasis is given on the digital implementation Piece-Wi...
上传时间: 2013-12-13
上传用户:从此走出阴霾
资源简介:This is the code for vector quantization by using k-means
上传时间: 2017-08-22
上传用户:ynsnjs
资源简介:This is the source code for encryption using the latest AES algorithm. AES algorithm is also called Rijndael algorithm. AES algorithm is recommended for non-classified use by the National Institute of Standards and Technology(NIST), US...
上传时间: 2014-01-18
上传用户:xc216
资源简介:This is the source for a C compiler that generates 386 or m68K code. Code generation is fairly good although the optimizer is a little naive... the code itself should be highly portable although there are some issues involved with portin...
上传时间: 2016-08-01
上传用户:sxdtlqqjl
资源简介:Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. An a...
上传时间: 2017-07-29
上传用户:kjl