# Crypt algorithmработы

### Фильтр

по
по
по
##### Статус работы
31,685 crypt algorithm работ(-а,-ы) найдено, цены указаны в USD
Hamiltonian Path Problem Завершено left

1. Write down a non-deterministic algorithm that solves the Hamiltonian Path Problem (HPP), and runs in polynomial-time. Deduce that HPP is NP. 2. Define a polynomial time-reduction of HPP to HCP (Hamiltonian Circuit Problem). 3. Define a polynomail time-reduction of HCP to HPP. 4. Assuming that HCP is NP-complete, prove that HPP is also NP-complete. ## Deliverables 1) Written answers to the ab...

\$32 (Avg Bid)
\$32 Ср. ставка
3 ставки
simple C algorithm Завершено left

need asap the algorithm need to be commented with good detail. my personal deadline is 23/03/03 ## Deliverables Write in C a specialised monitor capable of acquiring and releasing a resource in a system with R resource and N processes, each having a unique priority number, following the rule that the lowest priority number gets the resource. start by defining #define MAXRESOURCES R #define MAXP...

\$7 (Avg Bid)
\$7 Ср. ставка
3 ставки
Two Simple Matlab Programs Завершено left

There are two seprate simple projects: The First one is: implement the Mixture-of-Gaussians clustering algorithm. Description is in the zip file! The second one is: Write a matlab function that computes the input vector x for which a given network (W,Con,Trn) will produce a given output vector y. They are both very simple. I would like the project to be delivered by Friday March 21, 2002 or sooner...

\$63 (Avg Bid)
\$63 Ср. ставка
1 ставки

need a program in C that implements the algorithm getblock. The program should take number of buffers (N) in buffer pool as an argument and then prompt the user for one fo the following two requests: A: where is the block number needed to be accessed by a progress. F: where is the block number no longer neeeded by process and can be released. - Use Mod 4 hashing function. - uses a doubly circular ...

\$16 (Avg Bid)
\$16 Ср. ставка
2 ставки
applied cryptography Завершено left

i need a project report in cryptography algorithm- DES or GPG .A page report with one of the algorithms it's code (java/c++)and it's implications ,the way it works and its advantages/disadvantages. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Installation package that will install the softwa...

\$80 (Avg Bid)
\$80 Ср. ставка
11 ставки
C++ Expressions and Algorithms Завершено left

Hi, Basically just 2 small Questions in C++, concerning algorithm execution time analysis and a small program with stacks. Even if you can only do Question 2, it will help so much, since I only have 14 hours left due to the coder who didn't complete the work for no good reason! It's really not that difficult, and the price is negotiable! Thanks ## Deliverables 1) Complete and fully-fu...

\$17 (Avg Bid)
\$17 Ср. ставка
4 ставки
Neural Network in Java Завершено left

I've found a Multilayer Perceptron on the web, but as I know little about neural nets I don't really know how to use it. I need you to slightly modify the programme for me to suit my needs, as well as giving me an explaination/ example code as to how to use it - I can train it by following the instructions and the example code given, but once this is done I don't know how to pass th...

\$41 (Avg Bid)
\$41 Ср. ставка
2 ставки
Encrypt Decrypt DataSets in .NET Завершено left

I need functions that can encrypt and decrypt datasets. Currently I am reading/writing my datasets with ReadXML and writeXML. I would like to write out encrypted datasets and then be able to read in the encrypted datsets and de-crypt them. I would rather not write out un-encrypted datasets and then encrypt the files. I would like whatever file is written, to be written already encrypted. So I need...

\$85 (Avg Bid)
\$85 Ср. ставка
8 ставки

A program, that must be written in the "Scheme" programming language, that: -allows users to input the graph by adding vertices and edges with their weights.[core] -keeps a collection of algorithms and allows users to compute them on the inputted graph. (such as : Depth-First Search, Breadth-First Search, Topological sort, and dijkstra's)[core] -returns the shortest or best path for...

\$212 (Avg Bid)
\$212 Ср. ставка
1 ставки
Simple Short Algorithm in C Завершено left

Write in C a specialised monitor capable of acquiring and releasing a resource in a system with R resources and N processes, each having a unique priority number, following the rule that the lowest priority gets the resource. #define MAXRESOURCES R #define MAXPROCESSES N The code must be accompanied of a detailed description of how it works. You do not need a computer to write this code as it is a...

\$10 (Avg Bid)
\$10 Ср. ставка
9 ставки

This project involves both research and knowledge of databases particularly in the area of searching and identification. It requires writing skills and a strong ability to hunt down ideas that are abstract. You can not present any hint of the idea to any person to help you find it, other than to say it has to do with searching using visual aids. I have a program that uses a new approach to searchi...

\$695 (Avg Bid)
\$695 Ср. ставка
11 ставки

Program Specs You MUST write this program by building and traversing a graph, if you find a cute math formula to solve the problem NO credit will be given. Create a [войдите, чтобы посмотреть URL] that explains your algorithm, think of it as a design spec. Someone reading it, that can code in any language, should be able to code your algorithm without having to ask you a bunch of questions. In the...

\$60 (Avg Bid)
\$60 Ср. ставка
6 ставки

I need a project on Invisible digital watermarking. I need the algorithm, the source code, and its output after execution. I also need comments for every line of he source code. I need even written documents of the project. The following is the information needed and are all mentioned in the buyer templates of the rentacoder website. I need everything according to the website rules. Problem/Opport...

\$85 (Avg Bid)
\$85 Ср. ставка
2 ставки
Markov algorithm program Завершено left

Please see the attached text file for complete details. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Installation package that will install the software (in ready-to-run condition) on the platform(s) specified in this bid request. 3) Complete ownership and distribution copyrights to all work purchased...

\$21 (Avg Bid)
\$21 Ср. ставка
1 ставки
DES implementation Завершено left

FPGA based DES implementation. Design and implement according to the federal information processing standards publication 46-3. Design initial, inverse permutation, sboxes, expansion table, design the key. I have code written for the initial, inverse, sboxes, expansion table. I need code for the key and to bring the algorithm together. ## Deliverables 1) Complete and fully-functional working pr...

\$48 (Avg Bid)
\$48 Ср. ставка
2 ставки
FPGA based DES implementation Завершено left

FPGA based DES implentation. Implementation of the data encryption algorithm with the in conjunction with the federal information processing standards publication 46-3. Code the Initial permutation, Inverse permutation, Sboxes, permutation expansion table and generation of the key which includes permuted choice 1 permuted choice 2 and left shifts. ## Deliverables 1) Complete and fully-functiona...

\$85 (Avg Bid)
\$85 Ср. ставка
1 ставки
Fpga based des implementaion Завершено left

Fpga based Data Encryption Standard implmentation. Programmed using VHDL. Do it using Federal standards publication 46-3. The DES algorithm includes code for initial permutation, Inverse permutation S boxes,Expansion table, permutation and the generation of the key. I am going to implement it in viewlogic e product designer. ## Deliverables 1) Complete and fully-functional working program(s) in...

\$85 (Avg Bid)
\$85 Ср. ставка
1 ставки
A Phone Book Завершено left

The format of the file is: int key;char lastName[20];char firstName[20]; char phone[20]; where key is a social security number (no dashes) of the person. Create an array of 100 entries as formatted above and initialize all integer elements to zero and string elements to spaces. Read each record on the [войдите, чтобы посмотреть URL] file and as each is read, use modulo-division hashing algorithm t...

\$26 (Avg Bid)
\$26 Ср. ставка
9 ставки
Cards game Завершено left

Assigment Specification: I have to write a card game that is in c language and then converts it to mips (assembly language). Any cards game is worked for me, excepted the Black Jack game. The game has to be played between two people. One is the player and the other one is the dealer. The program should prompt a menu for the user. The menu should include the following: 1) play the game, 2)display t...

\$36 (Avg Bid)
\$36 Ср. ставка
3 ставки
simulated annealing(VB) Завершено left

In this question, you will develop a nonlinear global optimization algorithm using a technique called simulated annealing. A short description is given below, but you can find much more information on the web. The document [войдите, чтобы посмотреть URL]~es205/lectures/For_Week_Of_April_18/[войдите, чтобы посмотреть URL] gives a quite good description. First, to have something to optimize, create ...

\$17 (Avg Bid)
\$17 Ср. ставка
1 ставки
MORE COMPUTER ALGORITHM HELP Завершено left

SEE ATTACHED *RTF file for DETAILS..... VERY SMALL PROOFS NEEDED..... SOME ARE ONLY A FEW LINES LONG ## Deliverables THERE ARE NO CODES INVOLVED HERE, JUST SIMPLE BASIC QUESTIONS THAT NEED TO BE ANSWERED, AND EXPLAINED TO ME WHEN NEEDED IN THE PROBLEM ## Platform ANSWER PROBLEMS EFFIECIENTLY AND EFFECTIVELY, AND CORRECTLY

\$13 (Avg Bid)
\$13 Ср. ставка
4 ставки
Computer Algorithms Help Завершено left

See attached document for problems... only 2 simple algorithm problems to compute... ## Deliverables The only thing required is complete, accurate, and easily understandble proofs.. comments gratly appreciated ## Platform WIndows 98, or MS word readable...

\$7 (Avg Bid)
\$7 Ср. ставка
1 ставки

I need a project on watermarking of digital images. I need the algorithm and its explanation.I need all the details of how the program is written. I have to defend my project before professors. I need complete explanation of the project.I also need to show that I implemented a new concept. Complete and fully-functional working program(s) in executable form as well as complete source code of all wo...

\$70 (Avg Bid)
\$70 Ср. ставка
5 ставки

I need an experienced Visual C++ 6.0 coder to modify an existing VC++6 library, namely the OpenH323 library located at [войдите, чтобы посмотреть URL] What I need adding to the code is the ability to supply a password and the library to use AES encryption to send information. The encryption should run in 256 Bit CBC mode, using the Rijndael (AES) algorithm. The implementation of AES is your choice...

\$44 (Avg Bid)
\$44 Ср. ставка
2 ставки
Postfix Evaluation Завершено left

Write a program to implement the postfix evaluation using the following algorithm: algorithm postFixEvaluate (valexpr ) This algorith evaluates a postfix expression and returns its value pre: a valid expression post: postfix value computed return: value of expression 1 exprSize = lenght of string 2 stack = create Stack 3 index 4 loop (index <= exprSize) 1 if (expr[index] is operand) 1 pushStack...

\$22 (Avg Bid)
\$22 Ср. ставка
14 ставки
mix two wav files Завершено left

I need a VB program or a C++ function that can do the following... It should ask the user to load two wav files. Then, it should mix both of them to make one new wav file. Also, when mixing Wave1 and Wave2 (the two wav files), Wave1 should not be mixed with Wave2 in the first 5 seconds. Then, after these 5 seconds, Wave2 should be added and start the real mixing. That's it! If you have any qu...

\$67 (Avg Bid)
\$67 Ср. ставка
9 ставки
Searching Завершено left

The purpose of this project is to gain a better understanding of algorithm efficiency and specifically the efficiency of several searching algorithms. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Installation package that will install the software (in ready-to-run condition) on the platform(s) specifi...

\$28 (Avg Bid)
\$28 Ср. ставка
12 ставки

Level of difficulty (1 - 10) this is 3 Program for Data Structures (in C language, with an algorithm, and can compile in visual C++ 6.0)(build the file of bills and the key field) Write a program that reads a file and builds a linked list. After the list is built, display it on the monitor. You may use any appropriate data structure, but it is to have a key field and data. Two possibilities are a ...

\$21 (Avg Bid)
\$21 Ср. ставка
5 ставки

WEB DESIGN INCLUDING FIRM'S CATALOG THAT CONSIST OF 800 [войдите, чтобы посмотреть URL] OF THEM WILL BE GIVEN IN [войдите, чтобы посмотреть URL] CHART AND ALGORITHM OF THE WEB BASED CATALOG APLICATION CAN BE USED FROM TEMPLATES BUT WE WILL EXPLAIN EXACTLY WHAT WE [войдите, чтобы посмотреть URL] MUST BE A SEARCH ENGINE FOR OUR THIS [войдите, чтобы посмотреть URL] THERE SHOULD BE 4 DIFFERENT LA...

\$200 - \$300
\$200 - \$300
0 ставки
small program in fortran(matrices) Завершено left

program 1) Write in fortran 90, code for factoring A (assume no pivoting) where A consists of reals of a n*n & n = mb (b is the blocksize) Your algorithm should be a block LU factorization algorithm. It should make use of the following 4 subroutines available from the code shown below. a)subroutine lu(a,n) integer, intent(in)::n real(pre), dimension(:,:), intent(inout) ::a This subroutine fact...

\$19 (Avg Bid)
\$19 Ср. ставка
1 ставки
Domain Specific WebSearch Engine Завершено left

Name: Web Search Engine Softwares: Java, C, C++, Perl, any software Database: Access, mysql Main pieces of the Project 1. Inverted List Index 2. Store Index (built in Step1) in database or files 3. Searching Index built in step 1 4. Ranking Algorithm 5. Input Screen and Parsing 6. Display Output Brief Explanantion: Project Description: Domain specific search engine. 5. Input Screen: Accept input f...

\$119 (Avg Bid)
\$119 Ср. ставка
8 ставки
A small Question ,Disjoint Set ADT Завершено left

Can you please help me with the below questions about disjoint SET ADT.. (Union Find algorithm) 1. Show the result of the following sequence of instructions: union(1,2), union(3,4), union(3,5), union(1,7), union(3,6), union(8,9), union(1,8), union(3,10), union(3,11), union(3,12), union(3,13), union(14,15), union(16,0), union(14,16), union(1,3), union(1,14) when the unions are performed arbitrarily...

\$6 (Avg Bid)
\$6 Ср. ставка
2 ставки
Bresenham line algorithm Завершено left

Use Bresenham's algorithm to draw lines with varying thickness and in solid vs. dashed format. Use the weighted-intensity anti-aliasing approach to draw anti-aliased lines. (Note,no need to vary the thickness or style for the anti-aliased lines.) A sample program and makefile are provided showing the grid 0 to 500 in x and y with the origin in the lower left corner. The only opengl calls to b...

\$10 (Avg Bid)
\$10 Ср. ставка
4 ставки

Implement an algorithm that triangulates a monotone polygon (monotone along the y-axis) 1. Implement code that checks if the polygon is monotone in linear time. Assume that the polygon is given as a sequence of n coordinate pairs, that all the corrdinates are integers and distinct. Prove that checking routine runs in linear time. 2. Implement code that assumes that the input polygon is monotone, a...

\$54 (Avg Bid)
\$54 Ср. ставка
5 ставки
Locking algorithme Завершено left

I need a visual basic module (preferred, dll or activeX negotiable) implementing 2 public functions P() and V() for locking purposes (conform the Dijkstra algorithm) Description of problem: A visual basic app I'm writing tries to access a certain dll. This dll cannot be called at the same time due to reentrance problems. There are a few timers in my program with code calling at random time th...

\$30 - \$5000
\$30 - \$5000
0 ставки
DLL of Hash Algorithms Завершено left

I am in need of a Windows DLL that contains the MD5, SHA256, Haval, Tiger and RipeMD hash algorithms. These algorithms can be found on their respective web-sites but if needed I can provide valid C implementations. This project hopefully shouldn't take long for any experienced coder. All requirements listed in deliverables. ## Deliverables 1) Compiled Windows DLL containing the algorithms ...

\$51 (Avg Bid)
\$51 Ср. ставка
20 ставки
Bresenham's line algorithm in C++ Завершено left

Use Bresenham's algorithm to draw lines with varying thickness and in solid vs. dashed format. Use the weighted-intensity anti-aliasing approach to draw anti-aliased lines. (Note,no need to vary the thickness or style for the anti-aliased lines.) A sample program and makefile are provided showing the grid 0 to 500 in x and y with the origin in the lower left corner. The only opengl calls to b...

\$8 (Avg Bid)
\$8 Ср. ставка
2 ставки
Simplex Curve Fit in Delphi Завершено left

This project consist of porting a simplex curve-fit algorithm described in the May 1984 issue of Byte Magazine to Delphi Pascal. The original code is old CPM Pascal/Z so most of the port should be trivial. The coder will be supplied a stub form with the input and output fields already defined. The equation shall be processed by an equation evaluation component such as "TFormulaCompiler" ...

\$72 (Avg Bid)
\$72 Ср. ставка
8 ставки
BinarySearchTree (Part 2) Завершено left

(This is the rest of the project)...In other words, the algorithm for where to place this element will be as easy as comparing the value of the new element with the value of the root. If the new element's value is greater than or equal to the root's value, move to the right subtree and check that element. If the new element's value is less than the root's value, move to the lef...

\$26 (Avg Bid)
\$26 Ср. ставка
14 ставки
BinarySearchTree (Part 1) Завершено left

Part 1 - BinarySearchTree - Create an abstract class named BinarySearchTree in the cs312 package that extends the AbstractBinarySearchTree class as defined below. Please also include the two classes below in the [войдите, чтобы посмотреть URL] file, but note that you are NOT ALLOWED to change these two classes. class BinaryTreeNode { public BinaryTreeNode left; public BinaryTreeNode right; public ...

\$29 (Avg Bid)
\$29 Ср. ставка
13 ставки

This is a tough one to describe. What I want is an executable that will retrieve specific data from a website to be named later, process that data and output a value based on an algorithm that I will provide later. For example: My father would like to know if he should buy/sell a certain stock. He opens the executable, it asks for the stock symbol, retrieves the data from the website, processes th...

\$142 (Avg Bid)
\$142 Ср. ставка
36 ставки
MPEG-2 Завершено left

Make a coder and a decoder P-type which functions in two images (grayscale). To find the motion vectors use the block matching method and use as a cost function the MAD(mean absolute difference) and the algorithm of exhaustive search. You should divide the image in 16*16 blocks and find every pixel in a 12*12 [войдите, чтобы посмотреть URL] code the error use I coding with a quantization matrix th...

\$15 - \$20
\$15 - \$20
0 ставки

-A guitar tuner which is able to tune a guitar to its standard intonations. -This project must be done with DirectX 8.0 and other WinAPI compatible languages. -Thie project must be able to allow the user to enumerate the different input devices ([войдите, чтобы посмотреть URL],ports,etc) -Upon selection of input device, data from input device is stored in buffer[1]. -This tuner must utilise the FF...

\$30 - \$5000
\$30 - \$5000
0 ставки

The excellent (IMHO) online game 'Dark Age of Camelot' has a way of creating magical items for the game. The process is quite complicated but well documented, with free calculators (in JavaScript) giving the equations An overview: [войдите, чтобы посмотреть URL] An online calculator: [войдите, чтобы посмотреть URL] It gets complicated when trying to decide on the play enchantments for si...

\$44 (Avg Bid)
\$44 Ср. ставка
7 ставки

i want to implement dijkstar algorithm in VB 6 my description is below. see the attachement ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. ## Platform i want it in Windows 98. ## Deadline information i want this within 4 days.

\$24 (Avg Bid)
\$24 Ср. ставка
6 ставки
robot simulation Завершено left

This practical will simulate the movement of a robot on a 200 metre long track. In one move: The robot can move forward (F) 10 metres The robot can move backwards (B) 4 metres Or it can remain stationary (S). It can only move the full distance ??" partial moves of say 50 cms are not allowed. A target is placed at the side of the track (just far enough away that it doesn’t impede the pro...

\$70 (Avg Bid)
\$70 Ср. ставка
9 ставки
Number Algorithm Завершено left

We need a very experienced coder to take three sample numbers we provide and find out the Algorithm used in generating these number. Once the coder is able to dtermine the Algorithm, he can then write us a program to generate numbers for us in batches of these 12 digit numbers for us. In order to be sure that the Algorithm used is correct, the bidder must supply us with a sample of generated numbe...

\$45 (Avg Bid)
\$45 Ср. ставка
15 ставки
Algorithm Questions in Java Завершено left

I have some algoritm questions which are simple. Ijust need some answers for all this questions and their sourcecode together with it.I have attached the file so please be free to look at it. All must be coded in Java program. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Installation package that will...

\$90 (Avg Bid)
\$90 Ср. ставка
19 ставки
Encryption/Decryption Program Завершено left

I need a solution developed in Visual Basic 6.0 that will act as a file 'catcher' for an encryption/decryption program. The solution is to capture all open, modify, and save commands from the operating system and encrypt the files that have been marked for encryption. If I was to specify in the program that I wanted all ".txt" and ".bmp" files to be encrypted, the pro...

\$55 (Avg Bid)
\$55 Ср. ставка
4 ставки

I need an experienced Visual C++ 6.0 coder to modify an existing VC++6 library, namely the OpenH323 library located at [войдите, чтобы посмотреть URL] What I need adding to the code is the ability to supply a password and the library to use AES encryption to send information. The encryption should run in 256 Bit CBC mode, using the Rijndael (AES) algorithm. The implementation of AES is your choice...

\$29 (Avg Bid)
\$29 Ср. ставка
1 ставки