Added: March 28, 2013 | Visits: 300
The model simulates three phase inverter with symmetric PWM modulation in which reference is sampled at the positive peak of the carrier and is held constant till the next positive peak of the carrier appears. The model demonstrates symmetric regular sampling at positive peaks of carrier and...
Added: July 26, 2010 | Visits: 702
FlexiCrypt is a universal cryptography toolkit for managing certificates and symmetric keys. FlexiCrypt can perform many kinds of encryption, decryption, signing, and several related tasks..
Released: September 26, 2012
Added: September 26, 2012 | Visits: 206
Symmetric is a lightweight and easy to use application that allows you to draw symmetric figures. The software provides you with various options for symmetric drawings including: vertical symmetry, horizontal symmetry or quadrilateral symmetry.
Released: September 12, 2012
Added: September 12, 2012 | Visits: 289
Implements symmetric encryption algorithms: Rijndael, Blowfish, Twofish. Also provides public-key encryption and decryption using digital certificates. Provides hashing functionality for both strings and binary data using SHA1, SHA384, SHA512, MD2, MD5, and HAVAL.
Provides BZIP2 compression for...
Released: November 10, 2012
Added: November 10, 2012 | Visits: 321
Encrypting Safe is a simple, easy to use Java based software specially designed to help you keep your note in safe from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source to another in confidential manner.
Released: June 26, 2012
Added: June 26, 2012 | Visits: 266
finds exact gain, directivity and input impedance of Yagi or log-periodic antennas (planar symmetric array of cylindrical dipoles, many driven elements) for a range of specified frequencies, integrates 2D for segments on the same element, moment method
Platforms: Windows, Mac, BSD, Solaris, Linux
Added: November 30, 2013 | Visits: 297
MultiJava is an extension to the Java programming language that adds open classes and symmetric multiple dispatch. Open classes allow programmers to add methods to existing classes without editing those classes, or even having their source code. Multiple dispatch allows the code invoked by a...
Added: November 22, 2013 | Visits: 219
The underlayer is a symmetric decentralized parallel computing and load balancing framework, providing c, perl and java APIs for distributed job management.
Added: August 13, 2008 | Visits: 549
The Arabesk screensaver paints colourfull symmetric patterns on your screen. Note: it will unzip to the correct screensaver directory but that's all. You have to go into Desktop Properties/Screensavers & select it from the list.
Released: April 18, 2013
Added: May 05, 2013 | Visits: 3.234
SmartEncryptor uses the most powerfull encryption algorythms existing. AES - the US Government standard symmetric encryption algorythm and Blowfish.
Added: August 18, 2008 | Visits: 1.043
BMDFM (Binary Modular DataFlow Machine) is software, which enables running an application in parallel on shared memory symmetric multiprocessors (SMP) using the multiple processors to speed up the execution of single applications.BMDFM automatically identifies and exploits parallelism due to the...
Platforms: Windows, Mac, *nix
Released: November 22, 2012
Added: November 22, 2012 | Visits: 317
Common Data Security Architecture Objective-C Wrapper Framework - Digest: MD5/SHA-1 - Encryption/Decryption: Symmetric encryption - Utils: Base64 encoding/decoding
Released: December 20, 2012
Added: November 19, 2013 | Visits: 459
OpenSEED is open source implementation for SEED, the 128-bit Symmetric Block Cipher which is used widely among Korean Financial & Banking Companies. OpenSEED will implement TLS over SEED, also.
Released: October 04, 2012
Added: October 04, 2012 | Visits: 184
A Java Swing application to 'securely' store passwords using symmetric encryption. A user can set up one or many 'datastores' of password/username combinations and commit them to disk. They are stored on the file system using PBE Blowfish.
Platforms: Windows, Mac, Linux
Released: September 18, 2012
Added: September 18, 2012 | Visits: 243
This is a tool that helps map authors for the game Battle for Wesnoth to create symmetric maps.
Platforms: Windows, Mac, Linux
Added: April 08, 2013 | Visits: 278
ECC library is a package for Elliptic Curve cryptography.ECC is implemented by using OpenSSL 0.9.6a or higher, for message digests and symmetric ciphers, and by using the Portable Object Compiler and Computer Algebra Kit for the elliptic curve cryptography.
Platforms: C and C plus plus
Added: July 06, 2013 | Visits: 352
This function returns coefficients of Gaussian lowpass filter.Advantages of Gaussian filter: no ringing or overshoot in time domain.Diasadvantage: slow rolloff in frequency domain.Pass SR=sampling rate, fco=cutoff freq, both in Hz, to the function.Coefficients for FIR filter of length L (L always...
Added: April 06, 2013 | Visits: 200
4.1 DEFINITION OF THE -TRANSFORM4.2 PROPERTIES OF THE -TRANSFORM4.3 THE INVERSE -TRANSFORM 4.3.1 Inverse -transform by Partial Fraction Expansion 4.3.2 Inverse -transform by Long Division4.4 ANALYSIS OF LTI SYSTEMS USING THE -TRANSFORM4.5 GEOMETRIC EVALUATION OF THE -TRANSFORM4.6 THE -TRANSFORM...
Added: July 22, 2013 | Visits: 367
The conjugate gradient method aims to solve a system of linear equations, Ax=b, where A is symmetric, without calculation of the inverse of A. It only requires a very small amount of membory, hence is particularly suitable for large scale systems.It is faster than other approach such as Gaussian...
Added: August 10, 2013 | Visits: 148
This algorithm avoids the use ofchol.m and inv.m (the latter is a built-in M-file) and achieves the goal of inverting a symmetric positive definite matrix