搜索资源列表
lrDecrypt_release_01
- Numara TrackIT uses an XOR encryptor/decryptor algorithm to store domain credentials. These "encrypted" credentials are then stored on a server (in the domain). The file permissions are set to allow all members of the domain to read the file. fuckt
ann
- 3级神经网络实现"异或"功能。收敛需要40万次。请指教。-Three neural networks, " XOR" function. Convergence of 40 million. Please advice.
BPNet
- 几种C++神经模型和算法实例,主要有BP神经网络、BP神经网络解决异或问题、HMM的C语言实现、矢量量化的C语言实现等。-Several C++ examples of neural models and algorithms, there are BP neural network, BP neural network to solve XOR problem, HMM of the C language, vector quantization, such as the C language
COMMPORT
- 一个多功能串口监视工具,同一串口可以有不同波特率来收发数据,带有字符转换工具,可以多种方式的异或校验,也可以CRC校验,也可监视PPP数据包,把PPP数据包内容过虑出来!-A multi-serial port monitoring tool, the same can have different baud rate serial port to send and receive data, with a character conversion tools, you can XOR a nu
Fileencryptionfileencryptiontechnology
- 文件加密一例 给文件加密的技术很多,其中又分为不同等级,以适合不同场合的需要.这里给出最简单的文 件加密技术,即采用文件逐字节与密码异或方式对 文件进行加密,当解密时,只需再运行一遍加密程序即可. 下面是一个实例程序,能对任意一个文件进行加密,密码要求用户输入,限8位以内(当然你可以再更 改).程序有很好的容错设计,这是我们应该 学习的.-File encryption file encryption technology to the case of
program
- 前两个为人工智能程序,用C++编写,分别是动物判别程序及实现异或算法的bp程序。BLUETOOTH和F2M_BLUETOOTH是单片机和蓝牙模块通信的程序。“数字示波器”为利用单片机开发的一个简单数字示波器程序。-The first two for the artificial intelligence program, prepared with the C++, respectively, determine the procedures and implementation of anim
RD_util2
- verilog utilities such as and, xor, xnor etc
jiami
- 给文件加密的技术很多,其中又分为不同等级,以适合不同场合的需要.这里给出最简单的文件加密技术,即采用文件逐字节与密码异或方式对 文件进行加密,当解密时,只需再运行一遍加密程序即可. -File encryption technology to many of which are divided into different levels to suit the needs of different occasions. Here are the most simple file enc
rsa
- 安全性大大改进,可算做能完全代替MD5的散列验证算法.-1.Large input message block size 2.provably resistant to differential attacks 3.Alternative sequential mode 4.Key input K??of up to 512 bits?? K is input to every compression function 5.1024-bit interm
BPNN
- 采用BP算法实现了异或功能,采用C++编程-BP algorithm is implemented using XOR function, using C++ Programming
BP_study
- 基于VC++6.0的MFC编程实现人工智能的BP异或算法-Based on VC++6.0 to MFC programming of artificial intelligence algorithm for BP XOR
TableCrypt
- TableCrypt is a file encryption utility. The major difference with most file encryptors is that this program uses a generated table in combination with a password to encrypt a file. This way you need 2 variables to decrypt the file. This is how
Crypte
- 使用了动态链接库,用的是简单的异或加密算法,练手的-Uses the dynamic link library, using a simple XOR encryption algorithm, practice hand
TIC_TAC_game_gate_level
- Tic Tac Game is a classic game. Two players are using code-named “0” and “1”, fill in rotation in TICTACTOEMIDLET. If any player gates the first straight line will win, and if nobody is successful then the tie 1. Top module name: TT (Filename
NN1
- 是人工智能初学者入门的好代码。它主要解决了XOR问题,代码规范,容易理解。-back propagation neural network source code based on visual basic6.it resolve the XOR problem.
conv
- Its a small tool for encrypting and decrypting text and files Supports: String to Hex Hex to String String Reverse Base64 DeBase64 String to Chr$ (One way) ROT13 XOR DeXOR SHA256 (One way) Blowfish CryptAPI DES
tarnnewjtxor
- An implementation of XOR encryption.
tarunnewnvxor
- Another implementation of Exclusive-or (XOR) encryption.
CryptoStrings
- An example, how to encrypt\decrypt strings with XOR encryption. soruce and binary included.
XOR
- Artificial neural networks implementation