搜索资源列表
EncryWithPicture
- 本实例主要通过CFile类的Read方法分别读取图片文件和文本文件,然后将图片文件的每个字节和文本文件的每个字节进行异或运算。-This example mainly through CFile class Read method reads the picture files and text files, and then each byte of image files and text files for each byte XOR.
NOD32PWwriteread
- 一个deilphi编写的程序,包含了一个dll+exe dll内5个函数,分别是检测NOD32 ID是否有效,读取用户名密码,写入用户名密码,主要演示了xor以及注册表dword类型,以上5款源码皆本人自己编写且从未在其他网站有发布-Program written in a deilphi, contains a dll+ exe dll within the five functions, namely, the validity of testing NOD32 ID, username
5e2b02770906
- BP神经网络解决异或问题.模式识别常见问题解决-BP neural network to solve XOR problem. Pattern Recognition common problem-solving
A_very_sim977756232002-457852ngfppr2567
- A very simple example of Neural Networks using back propagation This program is a simple example of Neural Networks using back propagation. My code has all basic functionalities like learning rate, load net, save net, etc. You can have as many layer
8CPU
- 指令寄存器:在触发时钟的正沿触发下,寄存器将数据总线送来的指令存入寄存器; 累加器用于存放当前的结果,它也是双目运算的一个数据来源; 算术逻辑运算单元根据输入的8种不同操作码实现相应的加、与、异或、或等8种基本操作运算; 状态控制器实际上就是一个状态机,它是CPU的控制核心,用于产生一系列的控制信号,启动或停止某些部件。CPU何时进行读指令、读写I/O端口、对ROM数据的读取等操作,都是由状态机来控制的; -Instruction Register: The trigger is
ass1_2_hamming
- Hamming codes are a class of binary linear codes. They can detect up to two simultaneous bit errors, and correct single-bit errors. In particular, a single-error-correcting and double error detecting variant commonly referred to SECDED.-a) Develop a
Bog-XOR
- This is fodrjmaipjmrogjisarogj r iajg rai oi nioaengoang onj nao ienosenignhoi s i5jse ojgain i-This is fodrjmaipjmrogjisarogj r iajg rai oi nioaengoang onj nao ienosenignhoi s i5jse ojgain i
AIAB
- Genetic algorithm assignment with two floating inputs works like a xor gate. show the best genome in the population. use three different methods.
XOR_Encrypt
- 一个异或加密解密的例子,仅供参考 一个异或加密解密的例子,仅供参考-XOR encryption and decryption of a case, for reference only
rank
- 本算法与书上的相比稍微改动了一些。 因为日常加密中,明文不单是数字,经常会有字母或者其他字符出现。 本程序的思想就是先把明文以字符形式读取,转化成ASCII码,再把ASCII码转化成数字形式。 因为ASCII码共有256个也就是2的8次方,占8位二进制,把这八位二进制分为两部分,每部分占4位进行加密。 加密的算法和书上类似,先用密钥选取表,行,取反,然后与明文做异或,移位等运算。 最后得出两个4位的二进制数,合为一个,转化成十进制形式存储为密文。-The algorithm
wenjianjiamijiemi
- 采用文件逐字节与密码异或方式对文件进行加密,密码需在8个字符或数字以内 当解密时,只需再运行一遍加密程序即可-Using the file byte by byte XOR with the password encryption methods on the file, the password required to less than 8 characters or numbers when the decryption, just re-encryption program can
bp
- 使用BP算法实现异或功能,由matlab编程实现,可正确运行。-BP algorithm using the XOR function, the matlab programming, can be run correctly.
neural-network-training-for-XOR
- 一个简单的神经网络训练,一个二层的神经网络实现异或的功能-A simple neural network training, a different layer of the neural network function or
xor_encryption
- A simple XOR encryption using verilog.
611.asm
- 利用异或原理实现简单加密和再次利用异或解密的功能-Principle of using simple XOR encryption and decryption functions
lab1
- 本实验主要设计基本的门电路,包括两输入与门,两输入与非门,两输入或门,两输入 或非门,两输入异或门,两输入同或门。-In this study, the basic design of the main gates, including two input AND gate, two input NAND gate, two input OR gate, the two input NOR gate, the two input XOR gate with two input OR gate
BPNet_BP
- 一个BP神经网络解决的异或问题,解决方法挺不错的源代码。-A BP neural network to solve the XOR problem, the solution very good source.
C-programming-examples
- 给文件加密的技术很多,其中又分为不同等级,以适合不同场合的需要.这里给出最简单的文件加密技术,即采用文件逐字节与密码异或方式对 文件进行加密,当解密时,只需再运行一遍加密程序即可. -File encryption technology to many, which is divided into different levels to suit different occasions. Here are the most simple file encryption technolog
MaxCut
- This program implement the Max cut Max_Cut algorithm , as a deterministic algorithm using a pair wise method , which force the algorithm for deterministic solution with solution better then |E|/2 the graph is implemented using an adjacent matrix,
shenjingwangluo
- 模式识别作业实现感知器,BP分类器及异或门-Pattern recognition operations to achieve perceptron, BP classifier and XOR gates