- Full text PDF available (0)
- This year (1)
- Last five years (3)
MD5 and SHA-1 are the two known Hash Algorithms which are widely applied in information security. They are both developed from MD4. This paper introduces their algorithm logic in detail and their realization using C Language, and compares them through software testing, forms, etc. And finally, we draw a conclusion.
This paper presents a robust adaptive controller for time-varying systems with unknown dead-zone nonlinearity at the plant input. The controller is designed based on the pole assignment strategy, and it is applicable even to systems in the presence of unmodeled dynamics, bounded external disturbances and time-varying parameters. The global stability is… (More)
Power control is the most important system requirement for code-division multiple-access (CDMA) wireless cellular communication systems. This paper presents a robust adaptive power controller for CDMA systems with unmodeled dynamics and bounded disturbances. Modified least-squares scheme with a relative dead zone is developed to form a novel robust adaptive… (More)
This study examines the neuroprotective effects and mechanisms of action of total saponins from Rubus parvifolius L. (TSRP) on focal cerebral ischemia and reperfusion injury in rats. Focal cerebral ischemia and reperfusion injury was performed in rats using the suture method. The results indicate that intragastric injection of TSRP, at 5, 10 and 20 mg/kg,… (More)