It is an experimental testing for python M2Crypto module. M2Crypto is not well document. User may not know how to use SHA256 when signing and verify with RSA. It also have not enough document to show how to use DES to encrypt and decrypt. Here also includes source codes for performance evaluation of ...
The combinatorial core of the OVSF code assignment problem
that arises in UMTS is to assign some nodes of a complete binary
tree of height h (the code tree) to n simultaneous connections, such that
no two assigned nodes (codes) are on the same root-to-leaf path. Each
connection requires a code on a ...
3D FDTD 计算程序
ToyFDTD1 is a stripped-down, minimalist, 3-dimensional FDTD code that is published under the GNU General Public License. It is the first in the ToyFDTD series of codes, and it illustrates in heavily commented C and Fortran the basic tasks in implementing a simple 3D FDTD simulation ...
Create a Delaunay triangulation or Voronoi diagram by clicking points. Delaunay triangulations and Voronoi diagrams are among the most widely used data structures in the field of Computational Geometry. These are Java-oriented source codes.
This thesis is devoted to several efficient VLSI architecture design issues in errorcorrecting
coding, including finite field arithmetic, (Generalized) Low-Density Parity-
Check (LDPC) codes, and Reed-Solomon codes.
This is program with source code to convert ascii text files to the maxicode barcode standard.
The input file consists of two columns. The first column represents a code and the second column is a string enclosed in quotes. The
codes for the first column are as follows: PM, SM, CC, MO, SC, ...
An application on Hotel Management System. I developed it for my project during exam time. Any how it rewarded as best project.
my other source codes are at: http://www.developerssourcecode.com
Thanks Shyam Singh Chandel